Journal articles on the topic 'Fake identities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Fake identities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Teixeira da Silva, Jaime A. "Fake peer reviews, fake identities, fake accounts, fake data: beware!" AME Medical Journal 2 (March 1, 2017): 28. http://dx.doi.org/10.21037/amj.2017.02.10.
Full textTopor, Lev, and Moran Pollack. "Fake Identities in Social Cyberspace." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–17. http://dx.doi.org/10.4018/ijcwt.295867.
Full textTaj, Sohail, and Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review V, no. II (2022): 44–52. http://dx.doi.org/10.31703/gdpmr.2022(v-ii).05.
Full textHasibuan, Juneidi, and Syafrudin Syam. "A Legal Analysis on Online Fraud Using Fake Identity." Indonesian Journal of Multidisciplinary Science 2, no. 10 (2023): 3308–17. http://dx.doi.org/10.55324/ijoms.v2i10.574.
Full textTaj, Sohail, and Zaheer Khan. "Creation of Fake Identities on Social Media for Pleasure Seeking: An Analysis of Facebook." International Journal of Data Science and Analysis 10, no. 6 (2024): 129–40. https://doi.org/10.11648/j.ijdsa.20241006.12.
Full textKolenbrander, Jack, and Alan J. Michaels. "Personality Emulation Utilizing Large Language Models." Applied Sciences 15, no. 12 (2025): 6636. https://doi.org/10.3390/app15126636.
Full textFernando, Youngky. "Punsishment for The Crime of Fraud Using A Fake Identity Is Reviwed From Islamic Law." International Journal of Education Management and Sociology 1, no. 2 (2022): 103–13. https://doi.org/10.58818/ijems.v1i2.139.
Full textSuganya, R., S. Muthulakshmi, B. Venmuhilan, K. Varun Kumar, and G. Vignesh. "Detect fake identities using improved Machine Learning Algorithm." Journal of Physics: Conference Series 1916, no. 1 (2021): 012056. http://dx.doi.org/10.1088/1742-6596/1916/1/012056.
Full textWalczyna, Tomasz, and Zbigniew Piotrowski. "Fast Fake: Easy-to-Train Face Swap Model." Applied Sciences 14, no. 5 (2024): 2149. http://dx.doi.org/10.3390/app14052149.
Full textQu, Shunhai, and Viroj Wiwanitkit. "Fake Identities in Social Network Research: To Be Disclosed?" Science and Engineering Ethics 20, no. 4 (2013): 1151. http://dx.doi.org/10.1007/s11948-013-9505-9.
Full textSarulatha, Sreerambabu, Kalidasan, and Mohammed Riyaz. "Fake Face Detection in Identity Cards Using Stegoface." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 622–26. http://dx.doi.org/10.22214/ijraset.2023.55069.
Full textAl-Abri, Khalid Hassan. "Reasons for Internet Users Using Fake Identity from an Islamic Perspective." Islamiyyat 44, no. 1 (2022): 183–92. http://dx.doi.org/10.17576/islamiyyat-2022-4401-16.
Full textVan Der Walt, Estee, and Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans." IEEE Access 6 (2018): 6540–49. http://dx.doi.org/10.1109/access.2018.2796018.
Full textShamim, Ahmad, and Manish Madhava Tripathi Dr. "A Review Article on Detection of Fake Profile on Social-Media." International Journal of Innovative Research in Computer Science & Technology (IJIRCST) 11, no. 2 (2023): 44–49. https://doi.org/10.5281/zenodo.7837298.
Full textA. Teixeira da Silva, Jaime. "AI in the Era of Fakes and Deepfakes: Risk of Fabricated Photographs and Identities in Academic Publishing." Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 71–73. http://dx.doi.org/10.26735/knja7076.
Full textS. Borkar, Bharat. "Identification of Fake Identities on Social Media using various Machine Learning Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (2020): 6214–20. http://dx.doi.org/10.30534/ijatcse/2020/299942020.
Full textElovici, Yuval, Michael Fire, Amir Herzberg, and Haya Shulman. "Ethical Considerations when Employing Fake Identities in Online Social Networks for Research." Science and Engineering Ethics 20, no. 4 (2013): 1027–43. http://dx.doi.org/10.1007/s11948-013-9473-0.
Full textSaddique, Junaid, Imran Qureshi, and Atif Shabbir. "Effects of Social Media Brand Reviews on Trust and Brand Perception: An Experimental Study on Facebook in Pakistani context." Jinnah Business Review 5, no. 2 (2017): 22–35. http://dx.doi.org/10.53369/haii7048.
Full textPutra Sedana, Agus. "The Criminal Law Enforcement Against the Use of Fake Identities as Doctors in Carrying Out Medical Practices." Journal of Development Research 8, no. 2 (2024): Process. https://doi.org/10.28926/jdr.v8i2.375.
Full textChaurasiya, Adarsh, Amrit Verma, Kota Shamitha, and Dr Gaurav Kumar. "Fake Profile Detection in Instagram." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 1463–72. http://dx.doi.org/10.22214/ijraset.2024.60629.
Full textHermawati, Tanti, Rila Setyaningsih, and Rahmadya Putra Nugraha. "Teen Motivation to Create Fake Identity Account on Instagram Social Media." International Journal of Multicultural and Multireligious Understanding 8, no. 4 (2021): 87. http://dx.doi.org/10.18415/ijmmu.v8i4.2459.
Full textLiu, Dong, Quan Yuan Wu, and Wei Hong Han. "Linking Multiple Identities in Online Social Networks Based on Co-Occurrence Analysis." Applied Mechanics and Materials 713-715 (January 2015): 2257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2257.
Full textHamdan, Salam, Raad S. Al-Qassas, and Sara Tedmori. "Comparative Study on Sybil Attack Detection Schemes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (2015): 5869–76. http://dx.doi.org/10.24297/ijct.v14i7.1898.
Full textM.Afrizal Zulfar. "Tanggung Jawab Notaris Terkait Penggunaan Identitas Palsu Penghadap Dalam Pembuatan Akta." Birokrasi: JURNAL ILMU HUKUM DAN TATA NEGARA 2, no. 1 (2024): 319–28. http://dx.doi.org/10.55606/birokrasi.v2i1.943.
Full textAtanesyan, Arthur V., Samson Mkhitaryan, and Anrieta Karapetyan. "“Virtual Masks” and Online Identity: The Use of Fake Profiles in Armenian Social Media Communication." Journalism and Media 6, no. 2 (2025): 49. https://doi.org/10.3390/journalmedia6020049.
Full textAbhimanyu Nayak. "Fake Profile Detection using Machine Learning Algorithms." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 391–401. https://doi.org/10.52783/jisem.v10i16s.2624.
Full textTracy, Sarah J., and Angela Trethewey. "Fracturing the Real-Self?Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities." Communication Theory 15, no. 2 (2005): 168–95. http://dx.doi.org/10.1111/j.1468-2885.2005.tb00331.x.
Full textTracy, S. J. "Fracturing the Real-Self Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities." Communication Theory 15, no. 2 (2005): 168–95. http://dx.doi.org/10.1093/ct/15.2.168.
Full textNúñez-Canal, Margarita, and Luis Núñez-Ladevéze. "Understanding the revolt: «Man the Technician» in global rhetoric." Communication & Society 34, no. 4 (2021): 33–47. http://dx.doi.org/10.15581/003.34.4.33-47.
Full textLIVINGSTON, DAVID, G.SINDHU, G.GEETHA, and K.SONIYA. "SCA: SYBIL-BASED COLLIONS ATTACKS OF IIOT DATA POISOING IN FEDERATED LEARNING." Journal of Engineering Sciences 15, no. 10 (2024): 81–88. http://dx.doi.org/10.36893/jes.2024.v15i10.011.
Full textGonçalves-Segundo, Paulo Roberto. "Fake news, moral panic, and polarization in Brazil: A critical discursive approach." Linguistic Frontiers 5, no. 2 (2022): 51–60. http://dx.doi.org/10.2478/lf-2022-0013.
Full textSun, Ling, Yuan Rao, Yuqian Lan, Bingcan Xia, and Yangyang Li. "HG-SL: Jointly Learning of Global and Local User Spreading Behavior for Fake News Early Detection." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (2023): 5248–56. http://dx.doi.org/10.1609/aaai.v37i4.25655.
Full textFuchs, Susanne. ""Proper” Profiles. On Facebook’s investment in the autobiographical genre." European Journal of Life Writing 5 (May 24, 2016): 55–74. http://dx.doi.org/10.5463/ejlw.5.102.
Full textB. Deepika, S. Sneka, S. Susila, P. Suvetha, and S. Swetha. "Blockchain Enabled Social Network for Detecting Fake Accounts." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 747–56. http://dx.doi.org/10.32628/cseit24102107.
Full textAl-Marshoud, Mishri Saleh, Ali H. Al-Bayatti, and Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs." Electronics 10, no. 11 (2021): 1302. http://dx.doi.org/10.3390/electronics10111302.
Full textKhalifa, Nader, Madiha Anjum, and Zhonglin (Jolin) Qu. "The Harmful Impact of Fake Images in Local Societies: A Case Study and the Path to Regulation." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 5, no. 1 (2024): 98–108. http://dx.doi.org/10.60087/jaigs.v5i1.177.
Full textAngelina, Dr J. Jane Rubel. "Fake Instagram Account Detection using ML Algorithms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28637.
Full textTeixeira da Silva, Jaime, and Aceil Al-Khatib. "The Deontology of Using Pets in Academic Publishing-Related Sting Operations." Exchanges: The Interdisciplinary Research Journal 10, no. 1 (2022): 1–20. http://dx.doi.org/10.31273/eirj.v10i1.843.
Full textK. S. Sowmiya and G. Vinoth Kumar. "Gender Roles: An Examination of Sexuality and Socio-Cultural Tribal Identity." Shanlax International Journal of English 12, S1-Dec (2023): 295–98. http://dx.doi.org/10.34293/rtdh.v12is1-dec.96.
Full textKareem, Rafeef, and Wesam Bhaya. "Fake Profiles Types of Online Social Networks: A Survey." International Journal of Engineering & Technology 7, no. 4.19 (2018): 919. http://dx.doi.org/10.14419/ijet.v7i4.19.28071.
Full textKrombholz, Katharina, Dieter Merkl, and Edgar Weippl. "Fake identities in social media: A case study on the sustainability of the Facebook business model." Journal of Service Science Research 4, no. 2 (2012): 175–212. http://dx.doi.org/10.1007/s12927-012-0008-z.
Full textSinghal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.
Full textKolenbrander, Jack, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison Boswell, and Alan J. Michaels. "Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 546–71. http://dx.doi.org/10.3390/jcp4030026.
Full textA, Sneha, and Boopathi Kumar E. "A Machine Learning approach for Fake Profile Classification in Social Networking." International Journal of Innovative Research in Computer Science and Technology 13, no. 2 (2025): 96–102. https://doi.org/10.55524/ijircst.2025.13.2.14.
Full textNorhashim, Nurhakimah, Shahrul Ahmad Shah, Nadhiya Liyana Mohd Kamal, Zulhilmy Sahwee, Mohd Amzar Azizan, and Muhammad Izzat Afiq Ab Norizan. "Face Recognition System at the Airport Based on Internet of Things and Cloud Technologies." Karya Journal of Aerospace and Avionics System 1, no. 1 (2025): 31–40. https://doi.org/10.37934/kjaas.1.1.3140.
Full textKARAS, ELENI. "FAKE NEWS AND THE RITUALISATION OF THE SELF." Society Register 3, no. 2 (2019): 109–21. http://dx.doi.org/10.14746/sr.2019.3.2.07.
Full textLavanya, S. Sri, N. Nikhitha Reddy, Nishath Afreen K.S, Noothi Srivarshini, and N.Chudamani. "INSTAGRAM FAKE PROFILE DETECTION USING MACHINE LEARNING." Journal of Nonlinear Analysis and Optimization 14, no. 02 (2023): 215–24. http://dx.doi.org/10.36893/jnao.2023.v14i2.0215-0224.
Full textDwi Kurnia Wibowo, Ahmad Luthfi, and Nur Widiyasono. "Investigation of Fake Insider Threats on Private Cloud Computing Services." International Journal of Science, Technology & Management 3, no. 5 (2022): 1484–91. http://dx.doi.org/10.46729/ijstm.v3i5.613.
Full textKirana Wiguna, Ni Komang Cahya, and I. Nyoman Bagiastra. "The Role and Responsibilities of Notaries in Making Authentic Deeds Based on Forged Letters from the Parties." West Science Interdisciplinary Studies 3, no. 01 (2025): 29–36. https://doi.org/10.58812/wsis.v3i01.1620.
Full textZubrzycki, Geneviève, and Anna Woźny. "The Comparative Politics of Collective Memory." Annual Review of Sociology 46, no. 1 (2020): 175–94. http://dx.doi.org/10.1146/annurev-soc-121919-054808.
Full text