Results 11 to 20 of about 10,182 (242)

Tempest in a teacup: An analysis of p-Hacking in organizational research.

open access: yesPLoS ONE, 2023
We extend questionable research practices (QRPs) research by conducting a robust, large-scale analysis of p-hacking in organizational research. We leverage a manually curated database of more than 1,000,000 correlation coefficients and sample sizes, with
Alisha Gupta, Frank Bosco
doaj   +1 more source

Does subnetting and port hardening influence human adversarial decisions? An investigation via a HackIT tool

open access: yesFrontiers in Big Data, 2023
Prior research in cyber deception has investigated the effectiveness of the timing of deception on human decisions using simulation tools. However, there exists a gap in the literature on how the availability of subnets and port-hardening influence human
Shashank Uttrani   +2 more
doaj   +1 more source

Criminalità e cyberspazio, alcune riflessioni in materia di cybercriminalità [PDF]

open access: yesRivista di Criminologia, Vittimologia e Sicurezza, 2023
Lo sviluppo tecnologico avvenuto negli ultimi anni ha trasformato la società in uno “spazio iperconnesso” determinando terreno fertile per la proliferazione di nuove forme di criminalità.
Tonellotto M.
doaj   +1 more source

Detecting p‐Hacking

open access: yesEconometrica, 2022
We theoretically analyze the problem of testing for p‐hacking based on distributions of p‐values across multiple studies. We provide general results for when such distributions have testable restrictions (are non‐increasing) under the null of no p‐hacking. We find novel additional testable restrictions for
Elliott, Graham   +2 more
openaire   +4 more sources

Health diplomacy through health entrepreneurship: using hackathons to address Palestinian-Israeli health concerns

open access: yesBMJ Global Health, 2019
The universally shared values of improving health and well-being of populations make health a suitable diplomacy tool that transcends populations.
Rifat Atun   +2 more
doaj   +1 more source

RedHerd: Offensive Cyberspace Operations as a Service

open access: yesSignals, 2021
Nowadays, time, scope and cost constraints along with knowledge requirements and personnel training constitute blocking restrictions for effective Offensive Cyberspace Operations (OCO).
Giovanni Pecoraro   +2 more
doaj   +1 more source

How to maintain a business continuity despite cyber incidents? [PDF]

open access: yesTehnika, 2015
Modern IT systems can bring a lot of advantages in terms of electronic commerce and governance as well as an automatic process control within industry, traffic and the other ways of classical and critical infrastructure.
Đekić Milica D.
doaj   +1 more source

P-hacking

open access: yesThe Journal of Contemporary Dental Practice, 2017
How to cite this article Raj AT, Patil S, Sarode S, Sarode G. P-hacking. J Contemp Dent Pract 2017;18(8):633-634.
A Thirumal, Raj   +3 more
openaire   +2 more sources

Hacking Surveillance Cameras, Tricking AI and Disputing Biases: Artistic Critiques of Machine Vision

open access: yesOpen Library of Humanities, 2023
In the field of AI, troublesome machine behaviour is a recurring problem, and is particularly worrying when the governance of populations is externalised to machines.
Linda Kronman
doaj   +2 more sources

An Exploration of the Psychological Impact of Hacking Victimization

open access: yesSAGE Open, 2021
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studies have examined the adverse psychological impact of cybercrime for victims; however, the specific effects for victims of hacking are unexplored.
Alexa Palassis   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy