Results 21 to 30 of about 233,719 (314)

Does subnetting and port hardening influence human adversarial decisions? An investigation via a HackIT tool

open access: yesFrontiers in Big Data, 2023
Prior research in cyber deception has investigated the effectiveness of the timing of deception on human decisions using simulation tools. However, there exists a gap in the literature on how the availability of subnets and port-hardening influence human
Shashank Uttrani   +2 more
doaj   +1 more source

Criminalità e cyberspazio, alcune riflessioni in materia di cybercriminalità [PDF]

open access: yesRivista di Criminologia, Vittimologia e Sicurezza, 2023
Lo sviluppo tecnologico avvenuto negli ultimi anni ha trasformato la società in uno “spazio iperconnesso” determinando terreno fertile per la proliferazione di nuove forme di criminalità.
Tonellotto M.
doaj   +1 more source

An Exploration of the Psychological Impact of Hacking Victimization

open access: yesSAGE Open, 2021
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studies have examined the adverse psychological impact of cybercrime for victims; however, the specific effects for victims of hacking are unexplored.
Alexa Palassis   +2 more
doaj   +1 more source

Health diplomacy through health entrepreneurship: using hackathons to address Palestinian-Israeli health concerns

open access: yesBMJ Global Health, 2019
The universally shared values of improving health and well-being of populations make health a suitable diplomacy tool that transcends populations.
Rifat Atun   +2 more
doaj   +1 more source

Systemizers are better code-breakers: self-reported systemizing predicts code-breaking performance in expert hackers and naïve participants [PDF]

open access: yes, 2016
Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to
Colin eMcLean   +5 more
core   +4 more sources

HARKing, Cherry-Picking, P-Hacking, Fishing Expeditions, and Data Dredging and Mining as Questionable Research Practices.

open access: yesJournal of Clinical Psychiatry, 2021
Questionable research practices (QRPs) in the statistical analysis of data and in the presentation of the results in research papers include HARKing, cherry-picking, P-hacking, fishing, and data dredging or mining.
C. Andrade
semanticscholar   +1 more source

RedHerd: Offensive Cyberspace Operations as a Service

open access: yesSignals, 2021
Nowadays, time, scope and cost constraints along with knowledge requirements and personnel training constitute blocking restrictions for effective Offensive Cyberspace Operations (OCO).
Giovanni Pecoraro   +2 more
doaj   +1 more source

P-hacking

open access: yesThe Journal of Contemporary Dental Practice, 2017
How to cite this article Raj AT, Patil S, Sarode S, Sarode G. P-hacking. J Contemp Dent Pract 2017;18(8):633-634.
A Thirumal, Raj   +3 more
openaire   +2 more sources

Car Hacking and Defense Competition on In-Vehicle Network

open access: yesProceedings Third International Workshop on Automotive and Autonomous Vehicle Security, 2021
—Cybersecurity competitions can promote the importance of security and discover talented researchers. We hosted the Car Hacking: Attack & Defense Challenge from September 14, 2020 to November 27, 2020, and many security companies and researchers ...
Hyunjae Kang   +5 more
semanticscholar   +1 more source

How to maintain a business continuity despite cyber incidents? [PDF]

open access: yesTehnika, 2015
Modern IT systems can bring a lot of advantages in terms of electronic commerce and governance as well as an automatic process control within industry, traffic and the other ways of classical and critical infrastructure.
Đekić Milica D.
doaj   +1 more source

Home - About - Disclaimer - Privacy