Return to Article Details A method to streamline p-hacking Download Download PDF