UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 6,030
1.
Full text
2.
  • Psychology's Renaissance Psychology's Renaissance
    Nelson, Leif D; Simmons, Joseph; Simonsohn, Uri Annual review of psychology, 01/2018, Volume: 69, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In 2010-2012, a few largely coincidental events led experimental psychologists to realize that their approach to collecting, analyzing, and reporting data made it too easy to publish false-positive ...
Full text
3.
  • Pre‐registration: Why and How Pre‐registration: Why and How
    Simmons, Joseph; Nelson, Leif; Simonsohn, Uri Journal of consumer psychology, January 2021, 2021-01-00, Volume: 31, Issue: 1
    Journal Article
    Peer reviewed

    In this article, we (1) discuss the reasons why pre‐registration is a good idea, both for the field and individual researchers, (2) respond to arguments against pre‐registration, (3) describe how to ...
Full text
4.
  • Detecting and avoiding like... Detecting and avoiding likely false‐positive findings – a practical guide
    Forstmeier, Wolfgang; Wagenmakers, Eric‐Jan; Parker, Timothy H. Biological reviews of the Cambridge Philosophical Society, November 2017, Volume: 92, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    ABSTRACT Recently there has been a growing concern that many published research findings do not hold up in attempts to replicate them. We argue that this problem may originate from a culture of ‘you ...
Full text

PDF
5.
  • The World of Hacking: A Survey The World of Hacking: A Survey
    Imran Memon; Riaz Ahmed Shaikh; Hadiqua Fazal ... University of Sindh journal of information and communication technology (Online), 03/2020, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Hacking is the most genius field of computing science which is getting bigger with the passage of time. This research paper has the methods and techniques of hacking, types of hacking, types of ...
Full text
6.
  • What Is a Bayes Factor? What Is a Bayes Factor?
    Schmalz, Xenia; Biurrun Manresa, José; Zhang, Lei Psychological methods, 06/2023, Volume: 28, Issue: 3
    Journal Article
    Peer reviewed

    The use of Bayes factors is becoming increasingly common in psychological sciences. Thus, it is important that researchers understand the logic behind the Bayes factor in order to correctly interpret ...
Full text
7.
  • From Russia with Code : Pro... From Russia with Code : Programming Migrations in Post-Soviet Times
    Biagioli, Mario; Lépinay, Vincent Antonin 05/2019
    eBook
    Open access

    While Russian computer scientists are notorious for their interference in the 2016 US presidential election, they are ubiquitous on Wall Street and coveted by international IT firms and often ...
Full text
8.
  • Ethical Hacking Ethical Hacking
    Maurushat, Alana 2019, 2019-04-09
    eBook
    Open access

    How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely ...
Full text
9.
  • The Eco-Friendly Hacker: A Sustainable Lab for Teaching Ethical Hacking
    Michael Dorin South sustainability, 06/2024, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Teaching ethical hacking requires access to a safe and controlled environment where students can practice skills presented to them. This can be a problem since many modern students attend class ...
Full text
10.
  • When Shooting for the Stars... When Shooting for the Stars Becomes Aiming for Asterisks: P-Hacking in Family Business Research
    Brinkerink, Jasper Entrepreneurship theory and practice, 03/2023, Volume: 47, Issue: 2
    Journal Article
    Peer reviewed

    As a side-effect of increasing publication pressures, academics may be tempted to engage in p-hacking: a questionable research practice involving the iterative and incompletely-disclosed adjustment ...
Full text
1 2 3 4 5
hits: 6,030

Load filters