Results 11 to 20 of about 233,719 (314)

Detecting p‐Hacking

open access: yesEconometrica, 2022
We theoretically analyze the problem of testing for p‐hacking based on distributions of p‐values across multiple studies. We provide general results for when such distributions have testable restrictions (are non‐increasing) under the null of no p‐hacking. We find novel additional testable restrictions for
Elliott, Graham   +2 more
openaire   +5 more sources

The extent and consequences of p-hacking in science.

open access: yesPLoS Biology, 2015
A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until ...
Megan L Head   +4 more
doaj   +2 more sources

Ethical Hacking

open access: yesCEH v10 Certified Ethical Hacker Study Guide, 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force.
Alana Maurushat
openaire   +5 more sources

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping [PDF]

open access: yesConference on Computer and Communications Security, 2023
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches, yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi hardware to obtain desired CSIs.
Jingyang Hu   +6 more
semanticscholar   +1 more source

Defining and Characterizing Reward Hacking [PDF]

open access: yesarXiv.org, 2022
We provide the first formal definition of reward hacking, a phenomenon where optimizing an imperfect proxy reward function leads to poor performance according to the true reward function. We say that a proxy is unhackable if increasing the expected proxy
J. Skalse   +3 more
semanticscholar   +1 more source

Business model scaling and growth hacking in digital entrepreneurship

open access: yesJournal of Small Business Management, 2023
Creating an innovative product and validating an innovative business model may not be enough for digital startups to be competitive. To grow fast and expand globally, digital startups need to innovate their business model during the scaling phase.
A. Cavallo, Federico Cosenz, G. Noto
semanticscholar   +1 more source

Hacking, Switching, Combining: Understanding and Supporting DIY Assistive Technology Design by Blind People

open access: yesInternational Conference on Human Factors in Computing Systems, 2023
Existing assistive technologies (AT) often fail to support the unique needs of blind and visually impaired (BVI) people. Thus, BVI people have become domain experts in customizing and ‘hacking’ AT, creatively suiting their needs.
Jaylin Herskovitz   +3 more
semanticscholar   +1 more source

Tempest in a teacup: An analysis of p-Hacking in organizational research.

open access: yesPLoS ONE, 2023
We extend questionable research practices (QRPs) research by conducting a robust, large-scale analysis of p-hacking in organizational research. We leverage a manually curated database of more than 1,000,000 correlation coefficients and sample sizes, with
Alisha Gupta, Frank Bosco
doaj   +1 more source

Shining a Light on Policing of the Dark Web: An analysis of UK investigatory Powers [PDF]

open access: yes, 2020
The dark web and the proliferation of criminals who have exploited its cryptographic protocols to commit crimes anonymously has created major challenges for law enforcement around the world. Traditional policing techniques have required amendment and new
Davies, Gemma
core   +2 more sources

Unpacking P-Hacking and Publication Bias

open access: yesSocial Science Research Network, 2023
We use unique data from journal submissions to identify and unpack publication bias and p-hacking. We find initial submissions display significant bunching, suggesting the distribution among published statistics cannot be fully attributed to a ...
A. Brodeur   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy