Results 91 to 100 of about 233,719 (314)

Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking

open access: yesForensic Sciences
Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology.
Mary P. Aiken   +5 more
doaj   +1 more source

p-Hacking and publication bias interact to distort meta-analytic effect size estimates.

open access: yesPsychological methods, 2019
Science depends on trustworthy evidence. Thus, a biased scientific record is of questionable value because it impedes scientific progress, and the public receives advice on the basis of unreliable evidence that has the potential to have far-reaching ...
Malte Friese, Julius Frankenbach
semanticscholar   +1 more source

Policy Spandrels: How Design Decisions Can Open Up Spaces for Unintended Policy Change

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT This article introduces the concept of policy spandrels to make sense of public policies producing second‐order effects that are unintentional from the perspective of policy design and yet are fraught with consequences. By analogy with architectural spandrels—leftover spaces that can be used for unforeseen purposes—policy change can be enabled
Martino Maggetti
wiley   +1 more source

Digital Security in Human Security: A Case Study of the Bjorka Hacking Incident

open access: yesPoliticos
The issue of human security in the digital era has garnered attention in line with technological advancements. The threats to individual privacy and security have become increasingly evident, particularly following the hacking incident by Bjorka in ...
Nadia Varayandita Ingrida, Dody Wibowo
doaj   +1 more source

Constructive Memory in Truth‐Telling for Reconciliation

open access: yesJournal of Applied Philosophy, EarlyView.
ABSTRACT Truth‐telling has, in diverse contexts, been conceptualised as a vehicle for achieving reconciliation following injustice. As a social and political phenomenon, it involves the communication of narratives grounded in episodic memory. Such narratives may fail to reproduce the details of past events and may even include details that were not ...
Alberto Guerrero‐Velázquez   +1 more
wiley   +1 more source

The Role of Knowledge‐Based Resources in Leveraging Business Analytics

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT Business analytics enhances managerial decision‐making. To this end, previous research guides firms to combine their tangible business analytics resources, such as data and technology, with intangible knowledge‐based business analytics resources to enable that business analytics supports decision‐making.
Johanna Orjatsalo   +2 more
wiley   +1 more source

"Learn to p-hack like the pros!"

open access: yes, 2019
The replication crisis has hit several scientific fields. The most systematic investigation has been done in psychology, which revealed replication rates less than 40% (Open Science Collaboration, 2015). However, the same problem has been well documented
Schönbrodt, F.
core  

Secure Quantum Key Distribution

open access: yes, 2014
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos   +2 more
core   +1 more source

Ethical Hacking and Hacking Attacks

open access: yesJournal of Neonatal Surgery
Nowadays, as all the information is available online, a large number of users are accessing it. Some of them use this information to gain knowledge, while others use it to learn how to destroy or steal data from websites or databases without the knowledge of the owner.
Divyaraj Makwana   +5 more
openaire   +1 more source

Hacking into tragedy : exploring the ethics of death reporting in the social media age [PDF]

open access: yes, 2012
The phone-tapping scandal blew up with the revelation that murder victim Milly Dowler’s phone had been hacked, seeming to demonstrate that the public are much more concerned with the feelings of bereaved families than with the reputations of celebrities ...
Duncan, Sallyanne, Newton, Jackie
core  

Home - About - Disclaimer - Privacy