Javascript must be enabled to continue!
Critical Values Robust to P-hacking
View through CrossRef
Abstract
P-hacking is prevalent in reality but absent from classical hypothesis-testing theory. We therefore build a model of hypothesis testing that accounts for p-hacking. From the model, we derive critical values such that, if they are used to determine significance, and if p-hacking adjusts to the new significance standards, spurious significant results do not occur more often than intended. Because of p-hacking, such robust critical values are larger than classical critical values. In the model calibrated to medical science, the robust critical value is the classical critical value for the same test statistic but with one fifth of the significance level.
Title: Critical Values Robust to P-hacking
Description:
Abstract
P-hacking is prevalent in reality but absent from classical hypothesis-testing theory.
We therefore build a model of hypothesis testing that accounts for p-hacking.
From the model, we derive critical values such that, if they are used to determine significance, and if p-hacking adjusts to the new significance standards, spurious significant results do not occur more often than intended.
Because of p-hacking, such robust critical values are larger than classical critical values.
In the model calibrated to medical science, the robust critical value is the classical critical value for the same test statistic but with one fifth of the significance level.
Related Results
Life hacking
Life hacking
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your life is amena...
The Economics of Hacking
The Economics of Hacking
Hacking is becoming more common and dangerous. The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly a...
A Network Defense System for Detecting and Preventing Hacking
A Network Defense System for Detecting and Preventing Hacking
Many computing systems have recently suffered significantly from hacking and preventing hacking is important in protecting business, sensitive information and every day network com...
(Im)possible Futures
(Im)possible Futures
In a Western post – Cold War era, the pharmaceutical industry, state, and capitalism have merged to regulate gender and sexual normativity. According to Paul Preciado in Testo Junk...
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploit...
A Review Paper on Ethical Hacking
A Review Paper on Ethical Hacking
An ethical hacker is the network specialist & computer who pounce some security systems on the behalf of its possessor seeking amenability that could be exploited by a maliciou...
Ethical Hacking and Hacking Attacks
Ethical Hacking and Hacking Attacks
Nowadays, as all the information is available online, a large number of users are accessing it. Some of them use this information to gain knowledge, while others use it to learn ho...
Body Hacking and Conceptions of Corporeality
Body Hacking and Conceptions of Corporeality
This paper is the culmination of my independent research into the phenomenon of "body hacking": DIY techno-body modification that typically involves the surgical embedding of elect...

