📊Understand P-Hacking and Why It Wrecks Studies
See p-hacking with your own eyes — slice random data twenty ways, watch a 'significant' finding fall out of pure noise, then draft the pre-registration outline that would have stopped it.
Phase 1How Innocent Choices Manufacture Significance
Watch noise become significance through innocent slicing.
A coin flip looks significant if you flip it enough ways
7 minA coin flip looks significant if you flip it enough ways
Every analysis decision is a fork, and forks multiply
7 minEvery analysis decision is a fork, and forks multiply
Slice your noise twenty ways and watch significance appear
8 minSlice your noise twenty ways and watch significance appear
Most p-hacking is exploration that forgot to label itself
7 minMost p-hacking is exploration that forgot to label itself
Phase 2Spotting P-Hacking in the Wild
Spot the red flags in real-looking study descriptions.
If the outcome changed between protocol and paper, the result is exploratory
7 minIf the outcome changed between protocol and paper, the result is exploratory
Stopping the moment p < 0.05 is its own kind of cheating
7 minStopping the moment p < 0.05 is its own kind of cheating
Hypothesizing after the results are known
7 minHypothesizing after the results are known
If the effect only shows up in left-handed Tuesday-born subjects, it isn't real
8 minIf the effect only shows up in left-handed Tuesday-born subjects, it isn't real
Real p-values cluster smoothly. P-hacked ones pile up just under 0.05
7 minReal p-values cluster smoothly. P-hacked ones pile up just under 0.05
Phase 3From P-Hacking to the Replication Crisis
Trace p-hacking to the replication crisis and its fixes.
A scenario — only 39 of 100 famous psychology findings replicated
7 minA scenario — only 39 of 100 famous psychology findings replicated
A scenario — your colleague's exciting finding hits your desk
8 minA scenario — your colleague's exciting finding hits your desk
A scenario — you're peer-reviewing for a journal that does registered reports
8 minA scenario — you're peer-reviewing for a journal that does registered reports
A scenario — your team picks one statistical reform to adopt this year
8 minA scenario — your team picks one statistical reform to adopt this year
Phase 4Draft a Pre-Registration That Holds Up
Draft a pre-registration that closes every garden path.
Draft a pre-registration outline for a fake study
8 minDraft a pre-registration outline for a fake study
Frequently asked questions
- What is p-hacking and why is it considered a problem?
- This is covered in the “Understand P-Hacking and Why It Wrecks Studies” learning path. Start with daily 5-minute micro-lessons that build from fundamentals to hands-on application.
- How is p-hacking different from outright fraud?
- This is covered in the “Understand P-Hacking and Why It Wrecks Studies” learning path. Start with daily 5-minute micro-lessons that build from fundamentals to hands-on application.
- Why does the 0.05 significance threshold encourage p-hacking?
- This is covered in the “Understand P-Hacking and Why It Wrecks Studies” learning path. Start with daily 5-minute micro-lessons that build from fundamentals to hands-on application.
- What is pre-registration and how does it prevent p-hacking?
- This is covered in the “Understand P-Hacking and Why It Wrecks Studies” learning path. Start with daily 5-minute micro-lessons that build from fundamentals to hands-on application.
- Can a study be p-hacked without the researcher realizing it?
- This is covered in the “Understand P-Hacking and Why It Wrecks Studies” learning path. Start with daily 5-minute micro-lessons that build from fundamentals to hands-on application.
Related paths
∫Understand the Fundamental Theorem of Calculus
Build the Fundamental Theorem of Calculus from accumulation first — feel why differentiation undoes integration before you ever see the formal statement. You'll finish by pulling a real dataset and verifying the theorem numerically with your own code.
🧮Understand Vector Spaces: The Rulebook Behind Linear Algebra
See why polynomials, pixel images, and 3D arrows all live in the same mathematical world — then design your own vector space of polynomials up to degree two and compute its dimension from scratch.
🔗Understand Correlation vs Causation With Real Examples
Go beyond 'correlation is not causation' — learn to spot confounders, recognize when randomization or natural experiments are doing the real work, and leave with a 30-second rule of thumb you'll actually use on tomorrow's headline.
🔵Learn Set Theory Basics: The Language Every Math Class Assumes
Stop squinting at ∪, ∩, and ∁ — shade Venn diagrams first, then translate them into clean notation, until you can model anything from music genres to probability events as sets you can actually picture.