To see the other types of publications on this topic, follow the link: Fake identities.

Journal articles on the topic 'Fake identities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Fake identities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Teixeira da Silva, Jaime A. "Fake peer reviews, fake identities, fake accounts, fake data: beware!" AME Medical Journal 2 (March 1, 2017): 28. http://dx.doi.org/10.21037/amj.2017.02.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Topor, Lev, and Moran Pollack. "Fake Identities in Social Cyberspace." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–17. http://dx.doi.org/10.4018/ijcwt.295867.

Full text
Abstract:
Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious us
APA, Harvard, Vancouver, ISO, and other styles
3

Taj, Sohail, and Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review V, no. II (2022): 44–52. http://dx.doi.org/10.31703/gdpmr.2022(v-ii).05.

Full text
Abstract:
Facebook is one of the most popular social networking sites, but some call it a "fake book" (Mülle and Schulz, 2019). Hence to explore the phenomenon of fake identities, the study examined how Facebook users construct their identities and how much profile information is phony. The study used a survey methodology, and 647 university students (252 male and 351 female) participated. Facebook has 14 fields of profile data against which respondents have answered on the Likert scale whether they disclose their accurate information. The study found that both male (mean score 1.9)and female (mean scor
APA, Harvard, Vancouver, ISO, and other styles
4

Hasibuan, Juneidi, and Syafrudin Syam. "A Legal Analysis on Online Fraud Using Fake Identity." Indonesian Journal of Multidisciplinary Science 2, no. 10 (2023): 3308–17. http://dx.doi.org/10.55324/ijoms.v2i10.574.

Full text
Abstract:
This study aims to analyze the legal accountability for online fraud using fake identities, also known as catfishing. The phenomenon of catfishing has become increasingly prevalent with the advancement of information technology, particularly in the use of social media and online dating applications. The practice of online fraud using fake identities has detrimental emotional, psychological, and financial impacts on victims.The research method used is document analysis and literature review. Through document analysis, the researcher analyzes relevant texts and legal documents such as laws, regu
APA, Harvard, Vancouver, ISO, and other styles
5

Taj, Sohail, and Zaheer Khan. "Creation of Fake Identities on Social Media for Pleasure Seeking: An Analysis of Facebook." International Journal of Data Science and Analysis 10, no. 6 (2024): 129–40. https://doi.org/10.11648/j.ijdsa.20241006.12.

Full text
Abstract:
The study examined the relationship between creating fake identities on Facebook and the pursuit of pleasurable experiences. A total of 603 participants, consisting of 252 males and 351 females, were surveyed to gather insights. The results, analyzed using an independent samples t-test, indicated a significant difference in the number of fake identities created by each gender. Females reported a higher average number of fictitious identities as a means of seeking pleasure. Additionally, correlation analysis revealed a weak relationship between the creation of fake identities and the desire for
APA, Harvard, Vancouver, ISO, and other styles
6

Kolenbrander, Jack, and Alan J. Michaels. "Personality Emulation Utilizing Large Language Models." Applied Sciences 15, no. 12 (2025): 6636. https://doi.org/10.3390/app15126636.

Full text
Abstract:
Fake identities have proven to be an effective methodology for conducting privacy and cybersecurity research; however, existing models are limited in their ability to interact with and respond to received communications. To perform privacy research in more complex Internet domains, withstand enhanced scrutiny, and persist long-term, fake identities must be capable of automatically generating responses while maintaining consistent behavior and personality. This work proposes a method for assigning personality to fake identities using the widely accepted psychometric Big Five model. Leveraging t
APA, Harvard, Vancouver, ISO, and other styles
7

Fernando, Youngky. "Punsishment for The Crime of Fraud Using A Fake Identity Is Reviwed From Islamic Law." International Journal of Education Management and Sociology 1, no. 2 (2022): 103–13. https://doi.org/10.58818/ijems.v1i2.139.

Full text
Abstract:
The purpose of this research is to determine the review of Islamic criminal law regarding perpetrators of criminal acts of fraud using fake identities. The data collection technique uses the library research method and uses descriptive data, in-depth direct interviews with respondents. This research is a descriptive analysis which aims to explain data about fraud using fake identities which is then analyzed using theories in Islamic law. The results of the research show that there is a specific and detailed explanation regarding the meaning of fraud using a fake identity regarding fraud using
APA, Harvard, Vancouver, ISO, and other styles
8

Suganya, R., S. Muthulakshmi, B. Venmuhilan, K. Varun Kumar, and G. Vignesh. "Detect fake identities using improved Machine Learning Algorithm." Journal of Physics: Conference Series 1916, no. 1 (2021): 012056. http://dx.doi.org/10.1088/1742-6596/1916/1/012056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Walczyna, Tomasz, and Zbigniew Piotrowski. "Fast Fake: Easy-to-Train Face Swap Model." Applied Sciences 14, no. 5 (2024): 2149. http://dx.doi.org/10.3390/app14052149.

Full text
Abstract:
The proliferation of “Deep fake” technologies, particularly those facilitating face-swapping in images or videos, poses significant challenges and opportunities in digital media manipulation. Despite considerable advancements, existing methodologies often struggle with maintaining visual coherence, especially in preserving background features and ensuring the realistic integration of identity traits. This study introduces a novel face replacement model that leverages a singular framework to address these issues, employing the Adaptive Attentional Denormalization mechanism from FaceShifter and
APA, Harvard, Vancouver, ISO, and other styles
10

Qu, Shunhai, and Viroj Wiwanitkit. "Fake Identities in Social Network Research: To Be Disclosed?" Science and Engineering Ethics 20, no. 4 (2013): 1151. http://dx.doi.org/10.1007/s11948-013-9505-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sarulatha, Sreerambabu, Kalidasan, and Mohammed Riyaz. "Fake Face Detection in Identity Cards Using Stegoface." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 622–26. http://dx.doi.org/10.22214/ijraset.2023.55069.

Full text
Abstract:
Abstract: Identification and Machine-Readable Travel Documents (MRTDs) play a crucial role in verifying and validating identities in various situations, such as international travel, civil applications, online commerce, and access to transaction processing systems. These documents incorporate multiple security features aimed at preventing document forgery. However, criminals have shifted their focus to obtaining genuine documents fraudulently and manipulating facial portraits, as the existing security systems are challenging to bypass. To address this issue and mitigate the risks associated wi
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Abri, Khalid Hassan. "Reasons for Internet Users Using Fake Identity from an Islamic Perspective." Islamiyyat 44, no. 1 (2022): 183–92. http://dx.doi.org/10.17576/islamiyyat-2022-4401-16.

Full text
Abstract:
Among internet users are those who hide their true personalities by having several identities and names on different sites. This research requires years of personal experience, careful observation, and analysis, which the researchers try to relate to reality. This paper discusses the consequence of fake accounts on the internet. The results of this study suggests one person may have multiple identities on different sites. As a result, the internet has become a hotbed for anyone to write and act irresponsibly. In the Islamic view, the reasons internet users have for hiding their real identities
APA, Harvard, Vancouver, ISO, and other styles
13

Van Der Walt, Estee, and Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans." IEEE Access 6 (2018): 6540–49. http://dx.doi.org/10.1109/access.2018.2796018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shamim, Ahmad, and Manish Madhava Tripathi Dr. "A Review Article on Detection of Fake Profile on Social-Media." International Journal of Innovative Research in Computer Science & Technology (IJIRCST) 11, no. 2 (2023): 44–49. https://doi.org/10.5281/zenodo.7837298.

Full text
Abstract:
Nowadays, practically everyone, from a youngster to an adult, spends more time on online social media platforms, connecting with and exchanging information with individuals all over the world. The social network is becoming a popular means to communicate with people who live in different parts of the world. Because of the tremendous interconnectedness and information sharing enabled by the internet, social media platforms. This highlights the importance of establishing a system capable of detecting fake profiles on social media networks. There has been a lot of study done in this area utilisin
APA, Harvard, Vancouver, ISO, and other styles
15

A. Teixeira da Silva, Jaime. "AI in the Era of Fakes and Deepfakes: Risk of Fabricated Photographs and Identities in Academic Publishing." Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 71–73. http://dx.doi.org/10.26735/knja7076.

Full text
Abstract:
Academic publishing has entered an era of fake, including fake authors who are either real entities using fake credentials, or totally concocted personalities that give the impression of real humans. Both can be achieved via the use of artificial intelligence (AI) and software that is capable of completing such a task, and ultimately a deepfake is created. The creation of fictitious deepfakes, even more so when assisted or driven by AI, allows creators to not only establish a fake image or photo, but also embed it within a fake context (e.g., profile). For whatever reason, there are risk of de
APA, Harvard, Vancouver, ISO, and other styles
16

S. Borkar, Bharat. "Identification of Fake Identities on Social Media using various Machine Learning Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (2020): 6214–20. http://dx.doi.org/10.30534/ijatcse/2020/299942020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Elovici, Yuval, Michael Fire, Amir Herzberg, and Haya Shulman. "Ethical Considerations when Employing Fake Identities in Online Social Networks for Research." Science and Engineering Ethics 20, no. 4 (2013): 1027–43. http://dx.doi.org/10.1007/s11948-013-9473-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Saddique, Junaid, Imran Qureshi, and Atif Shabbir. "Effects of Social Media Brand Reviews on Trust and Brand Perception: An Experimental Study on Facebook in Pakistani context." Jinnah Business Review 5, no. 2 (2017): 22–35. http://dx.doi.org/10.53369/haii7048.

Full text
Abstract:
Attraction towards social networking sites is increasing day by day. People join social networking sites to communicate with their friends, share their feelings and gain information from different platforms. One of the most popular social networking sites is Facebook with 1.7 billion active users. However, there are many users of Facebook with fake identities, communicating with other users just for fun and enjoyment. Companies are also attracted towards Facebook for advertisement, consumer engagement and feedbacks of customers bearing very low cost. However, users with fake identities also li
APA, Harvard, Vancouver, ISO, and other styles
19

Putra Sedana, Agus. "The Criminal Law Enforcement Against the Use of Fake Identities as Doctors in Carrying Out Medical Practices." Journal of Development Research 8, no. 2 (2024): Process. https://doi.org/10.28926/jdr.v8i2.375.

Full text
Abstract:
This study aims to analyze criminal law enforcement against the use of fake identities as doctors. The type of research used is empirical legal research. There are 2 types of data obtained, namely the first primary data obtained through interviews, the second secondary data, namely laws, books and journals. The research locations were centered at the Makassar District Court, the South Sulawesi High Prosecutor's Office, the South Sulawesi Regional Police and the Makassar City Branch of the Indonesian Doctors' Association. The results of the data that have been obtained were analyzed qualitative
APA, Harvard, Vancouver, ISO, and other styles
20

Chaurasiya, Adarsh, Amrit Verma, Kota Shamitha, and Dr Gaurav Kumar. "Fake Profile Detection in Instagram." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 1463–72. http://dx.doi.org/10.22214/ijraset.2024.60629.

Full text
Abstract:
Abstract: In today's society, online communities have become an integral part of daily life, with individuals actively engaging in social media interactions regardless of their location or schedule. However, the prevalence of pseudo personas has contributed to sophisticated persistent attacks and other malicious activities, raising concerns about the privacy of personal data among online community members. This research seeks to identify and address the pressing issue of fraudulent identity projection on social media platforms, particularly focusing on Instagram. By employing automated techniq
APA, Harvard, Vancouver, ISO, and other styles
21

Hermawati, Tanti, Rila Setyaningsih, and Rahmadya Putra Nugraha. "Teen Motivation to Create Fake Identity Account on Instagram Social Media." International Journal of Multicultural and Multireligious Understanding 8, no. 4 (2021): 87. http://dx.doi.org/10.18415/ijmmu.v8i4.2459.

Full text
Abstract:
The development of digital technology has brought human fantasy goes beyond limits, creating a three-dimensional space of the following items inside, to a stage where virtual reality has exceeded the manipulation and visual image so as to guide humans step from the real world to the fantasy world. The virtual world looks real and this includes the development of social media such as Instagram. Teens take advantage of such conditions to have a different identity. They can be whatever they want. Fake identities in cyberspace are a solution to teenage problems regarding the absence of self-confid
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Dong, Quan Yuan Wu, and Wei Hong Han. "Linking Multiple Identities in Online Social Networks Based on Co-Occurrence Analysis." Applied Mechanics and Materials 713-715 (January 2015): 2257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2257.

Full text
Abstract:
When tackling the problem of mining multiple fake identities which are controlled by the same individual in internet, traditional techniques used to analyze the posted comments using text-based methods. However, these texts are always in colloquial style which make the effect may not be as obvious as expected. In this paper a new multiple identities linking algorithm is proposed based on the fine-grained analysis of co-occurrence degree of user accounts using sliding window model. Finally, a series of experiments show the effectiveness of our proposed method.
APA, Harvard, Vancouver, ISO, and other styles
23

Hamdan, Salam, Raad S. Al-Qassas, and Sara Tedmori. "Comparative Study on Sybil Attack Detection Schemes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (2015): 5869–76. http://dx.doi.org/10.24297/ijct.v14i7.1898.

Full text
Abstract:
Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such threat is the Sybil attack, a critical threat that can impair the proper functioning of VANETs. In a Sybil attack, a malicious node illegitimately claims multiple identities and simultaneously exploits t
APA, Harvard, Vancouver, ISO, and other styles
24

M.Afrizal Zulfar. "Tanggung Jawab Notaris Terkait Penggunaan Identitas Palsu Penghadap Dalam Pembuatan Akta." Birokrasi: JURNAL ILMU HUKUM DAN TATA NEGARA 2, no. 1 (2024): 319–28. http://dx.doi.org/10.55606/birokrasi.v2i1.943.

Full text
Abstract:
A notary is a public official whose job is to register, create and complete legally binding documents. The problem of notary responsibilities related to the use of fake identities in making the deed is caused by several factors such as a lack of understanding of the applicable law, as well as a lack of sanctions. applied to violations of the law. The writing of this article is included in qualitative descriptive research. Then, after collecting the data, a comparative data analysis was carried out, then apart from that, this article was made using online observations and in-depth literature st
APA, Harvard, Vancouver, ISO, and other styles
25

Atanesyan, Arthur V., Samson Mkhitaryan, and Anrieta Karapetyan. "“Virtual Masks” and Online Identity: The Use of Fake Profiles in Armenian Social Media Communication." Journalism and Media 6, no. 2 (2025): 49. https://doi.org/10.3390/journalmedia6020049.

Full text
Abstract:
The goal of the study is to reveal the reasons (strategies) behind the use of “virtual masks” (fake profiles and altered identities) by real (human) users of social media networks (SMNs) within a cultural context, specifically in Armenia. Applying Erving Goffman’s Dramaturgical Theory and concepts of virtual identity, the research explores how users construct their online personas, either reflecting their real identities or modifying them to achieve specific communicative goals. A statistical analysis of the most popular SMNs in Armenia, combined with semi-structured interviews with 400 users,
APA, Harvard, Vancouver, ISO, and other styles
26

Abhimanyu Nayak. "Fake Profile Detection using Machine Learning Algorithms." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 391–401. https://doi.org/10.52783/jisem.v10i16s.2624.

Full text
Abstract:
Fake profiles resulting from the explosion of social media and internet platforms provide major problems for digital security, privacy, and user confidence since they multiply exponentially. Emerging as a potent method to identify and reduce these false identities is machine learning. Using cutting-edge methods in artificial intelligence, pattern recognition, and data mining, scientists are creating complex models able to differentiate between real and created user profiles. Usually analyzing several features and behavior patterns, these machine learning techniques help to find possible false
APA, Harvard, Vancouver, ISO, and other styles
27

Tracy, Sarah J., and Angela Trethewey. "Fracturing the Real-Self?Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities." Communication Theory 15, no. 2 (2005): 168–95. http://dx.doi.org/10.1111/j.1468-2885.2005.tb00331.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tracy, S. J. "Fracturing the Real-Self Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities." Communication Theory 15, no. 2 (2005): 168–95. http://dx.doi.org/10.1093/ct/15.2.168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Núñez-Canal, Margarita, and Luis Núñez-Ladevéze. "Understanding the revolt: «Man the Technician» in global rhetoric." Communication & Society 34, no. 4 (2021): 33–47. http://dx.doi.org/10.15581/003.34.4.33-47.

Full text
Abstract:
We have used quotations that McLuhan cited from the works of Ortega y Gasset, never been commented, for comparing the concurrence between the analyses of the “revolt of the masses” and “return to the village” in the network. This review discerns how both descriptions converge in a framework that fosters the unlimited expansion of face-to-face relationships which, by encouraging remote adherence to virtual identities, fosters a plethora of communicative practices. Internet encourages persuasive stratagems that foster rhetorical turmoil, which makes it impossible to distinguish sound arguments f
APA, Harvard, Vancouver, ISO, and other styles
30

LIVINGSTON, DAVID, G.SINDHU, G.GEETHA, and K.SONIYA. "SCA: SYBIL-BASED COLLIONS ATTACKS OF IIOT DATA POISOING IN FEDERATED LEARNING." Journal of Engineering Sciences 15, no. 10 (2024): 81–88. http://dx.doi.org/10.36893/jes.2024.v15i10.011.

Full text
Abstract:
The project focuses on enhancing security in Vehicular Ad Hoc Networks (VANETs) by proposing a novel approach for detecting Sybil attacks. Sybil attacks in VANETs involve a malicious vehicle creating multiple fake identities to manipulate network operations. This project employs a combination of Proofs of Work (PoW) and location-based techniques to detect and mitigate Sybil attacks effectively, ensuring the integrity and reliability of vehicular communication.
APA, Harvard, Vancouver, ISO, and other styles
31

Gonçalves-Segundo, Paulo Roberto. "Fake news, moral panic, and polarization in Brazil: A critical discursive approach." Linguistic Frontiers 5, no. 2 (2022): 51–60. http://dx.doi.org/10.2478/lf-2022-0013.

Full text
Abstract:
Abstract This paper aims to discuss the motivations and effects of the production, distribution and interpretation of fake news stories, which draw on moral panics in contemporary Brazilian society. To do so, the article combines recent research on fake news, mainly from Media Studies, Sociology and Political Science, with the Critical Discourse Analysis perspective on meaning-making. The main hypothesis advanced is that this kind of fake news story lies in the tension between the evident and the absurd, as they seem to be oriented towards eliciting different readings and reactions from the en
APA, Harvard, Vancouver, ISO, and other styles
32

Sun, Ling, Yuan Rao, Yuqian Lan, Bingcan Xia, and Yangyang Li. "HG-SL: Jointly Learning of Global and Local User Spreading Behavior for Fake News Early Detection." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (2023): 5248–56. http://dx.doi.org/10.1609/aaai.v37i4.25655.

Full text
Abstract:
Recently, fake news forgery technology has become more and more sophisticated, and even the profiles of participants may be faked, which challenges the robustness and effectiveness of traditional detection methods involving text or user identity. Most propagation-only approaches mainly rely on neural networks to learn the diffusion pattern of individual news, which is insufficient to describe the differences in news spread ability, and also ignores the valuable global connections of news and users, limiting the performance of detection. Therefore, we propose a joint learning model named HG-SL,
APA, Harvard, Vancouver, ISO, and other styles
33

Fuchs, Susanne. ""Proper” Profiles. On Facebook’s investment in the autobiographical genre." European Journal of Life Writing 5 (May 24, 2016): 55–74. http://dx.doi.org/10.5463/ejlw.5.102.

Full text
Abstract:
The term “Fake profile” was invented by the press to designate Facebook-profiles that do not represent the life of their authors, but are instead used for depictions of alter egos or fictional characters. The following article investigates how the term “Fake profile” introduces a genre-designation that causes its alleged opposite, the “proper” profile to emerge. Put in conversation with Jacques Derrida’s discussion of the law of genre and Michel Foucault’s questioning of the referential function of the name of the author it becomes apparent, that the difference between “fake” and “proper” cann
APA, Harvard, Vancouver, ISO, and other styles
34

B. Deepika, S. Sneka, S. Susila, P. Suvetha, and S. Swetha. "Blockchain Enabled Social Network for Detecting Fake Accounts." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 747–56. http://dx.doi.org/10.32628/cseit24102107.

Full text
Abstract:
Front end technology with permanent accounts is employed in online social networks to help people get to know one another. In an effort to maintain connection with everyone, Facebook and Twitter are changing along with the users. OSNs are used by them for planning events, news exchange, interpersonal communication, and even running their own online enterprises. Because of OSNs' quick growth and the abundance of personal data that its users have shared, attackers and imposters have been lured to them with the intention of stealing personal information, spreading disruptive activities, and publi
APA, Harvard, Vancouver, ISO, and other styles
35

Al-Marshoud, Mishri Saleh, Ali H. Al-Bayatti, and Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs." Electronics 10, no. 11 (2021): 1302. http://dx.doi.org/10.3390/electronics10111302.

Full text
Abstract:
Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system’s infrastructure introduce the potential for attacks that lessen safety and weaken passengers’ privacy. The purpose of short-lived anonymous identities, called “pseudo-identities”, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined are
APA, Harvard, Vancouver, ISO, and other styles
36

Khalifa, Nader, Madiha Anjum, and Zhonglin (Jolin) Qu. "The Harmful Impact of Fake Images in Local Societies: A Case Study and the Path to Regulation." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 5, no. 1 (2024): 98–108. http://dx.doi.org/10.60087/jaigs.v5i1.177.

Full text
Abstract:
In recent years, the proliferation of artificial intelligence (AI) technology has brought unprecedented advancements and opportunities. However, it has also given rise to significant ethical and social challenges(Mika et al., 2019). One particularly alarming issue is the creation and dissemination of fake images(AlShariah et al., 2019), often involving minors. This article explores the profound negative impacts of such activities on local societies, using a case study of 50 schoolgirls whose photo identities were misused, and discusses the variables that need to be addressed at an academic lev
APA, Harvard, Vancouver, ISO, and other styles
37

Angelina, Dr J. Jane Rubel. "Fake Instagram Account Detection using ML Algorithms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28637.

Full text
Abstract:
Abstract—Nowadays, the majority of people utilise social networking sites on a daily basis. Numerous people create profiles on social networking websites every day and connect with others there, regardless of their location or time. False identities are used in additional malicious operations in addition to playing a significant part in advanced persistent threats. Users of social networking sites can benefit from them, but they also have to worry about the security of their personal information. We must first determine the user's social network accounts before we can determine who is endorsin
APA, Harvard, Vancouver, ISO, and other styles
38

Teixeira da Silva, Jaime, and Aceil Al-Khatib. "The Deontology of Using Pets in Academic Publishing-Related Sting Operations." Exchanges: The Interdisciplinary Research Journal 10, no. 1 (2022): 1–20. http://dx.doi.org/10.31273/eirj.v10i1.843.

Full text
Abstract:
Academic publishing has become considerably stringent in the past few years because of increased scrutiny focused on an overwhelming number of challenges. One of the greatest challenges that academia faces is the notion that certain elements within science publishing have entered an era of ‘fake’. There are few moral arguments in favor of anything fake in academic publishing, including fake identities (authors, reviewers, or editors), fake peer reviews, or fake publications. We argue – humor aside – that a zero-tolerance approach is likely essential to prevent the proliferation of fake aspects
APA, Harvard, Vancouver, ISO, and other styles
39

K. S. Sowmiya and G. Vinoth Kumar. "Gender Roles: An Examination of Sexuality and Socio-Cultural Tribal Identity." Shanlax International Journal of English 12, S1-Dec (2023): 295–98. http://dx.doi.org/10.34293/rtdh.v12is1-dec.96.

Full text
Abstract:
The identity of sex is classified based on biological characteristics which are examined and proved by physician during the birth of the child. Whereas, Gender differences encompass the behaviors, expressions, desires, roles and identities which are socially formed. This paper attempts to examine whether the gay relationship in the college environment is real or unreal. It also aims to analyses the socio-cultural identities of the select Santhal Tribe with references to the food, festivals, religious beliefs, language, and other environmental elements. The relationship between gardening and hu
APA, Harvard, Vancouver, ISO, and other styles
40

Kareem, Rafeef, and Wesam Bhaya. "Fake Profiles Types of Online Social Networks: A Survey." International Journal of Engineering & Technology 7, no. 4.19 (2018): 919. http://dx.doi.org/10.14419/ijet.v7i4.19.28071.

Full text
Abstract:
Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. It plays a substantial role for users of the internet to hold out their everyday actions such as news reading, content sharing, product reviews, messages posting, and events discussing etc. Unfortunately, on the OSNs some new attacks have been recognized. Different types of spammers are existing in these OSNs. These cyber-criminals containing online fraudsters, sexual predators, catfishes, social bots, and advertising campaigners etc.OSNs abuse in different ways especially by creating fake profiles to ca
APA, Harvard, Vancouver, ISO, and other styles
41

Krombholz, Katharina, Dieter Merkl, and Edgar Weippl. "Fake identities in social media: A case study on the sustainability of the Facebook business model." Journal of Service Science Research 4, no. 2 (2012): 175–212. http://dx.doi.org/10.1007/s12927-012-0008-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Singhal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.

Full text
Abstract:
In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-peer systems. We have a trust agency to certify the identities prevent from the “Sybil Attack”. Multiple identities that control sustainable fraction of systems so prevent from loss of information while data exchanging via networks or intern
APA, Harvard, Vancouver, ISO, and other styles
43

Kolenbrander, Jack, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison Boswell, and Alan J. Michaels. "Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 546–71. http://dx.doi.org/10.3390/jcp4030026.

Full text
Abstract:
When personal information is shared across the Internet, we have limited confidence that the designated second party will safeguard it as we would prefer. Privacy policies offer insight into the best practices and intent of the organization, yet most are written so loosely that sharing with undefined third parties is to be anticipated. Tracking these sharing behaviors and identifying the source of unwanted content is exceedingly difficult when personal information is shared with multiple such second parties. This paper formulates a model for realistic fake identities, constructs a robust fake
APA, Harvard, Vancouver, ISO, and other styles
44

A, Sneha, and Boopathi Kumar E. "A Machine Learning approach for Fake Profile Classification in Social Networking." International Journal of Innovative Research in Computer Science and Technology 13, no. 2 (2025): 96–102. https://doi.org/10.55524/ijircst.2025.13.2.14.

Full text
Abstract:
This study suggests a machine learning-based detection system built with Python and Django to tackle the growing problem of fraudulent profiles on social networking sites. Malicious actors are progressively setting up phony identities for spamming, phishing, and disseminating false information as social media usage keeps growing. In order to accurately identify bogus profiles, the suggested system analyzes user attributes, behavioral patterns, and network properties using a variety of supervised learning algorithms, such as Random Forests, Support Vector Machines, and Decision Trees. Our appro
APA, Harvard, Vancouver, ISO, and other styles
45

Norhashim, Nurhakimah, Shahrul Ahmad Shah, Nadhiya Liyana Mohd Kamal, Zulhilmy Sahwee, Mohd Amzar Azizan, and Muhammad Izzat Afiq Ab Norizan. "Face Recognition System at the Airport Based on Internet of Things and Cloud Technologies." Karya Journal of Aerospace and Avionics System 1, no. 1 (2025): 31–40. https://doi.org/10.37934/kjaas.1.1.3140.

Full text
Abstract:
Nowadays, the level of airport security system has been questioned, as there are a few cases involving unexpected events, such as hijacking. Based on the report, the suspected passenger used fake passport and documents, for example, the MH370 incident, whereby after an investigation was conducted by Interpol, two of the passengers were using fake passports and documents. Therefore, airport security could be enhanced at the security, immigration and boarding gates with the combination of new technologies, such as artificial intelligence, biometric technology and big data. This project aims to e
APA, Harvard, Vancouver, ISO, and other styles
46

KARAS, ELENI. "FAKE NEWS AND THE RITUALISATION OF THE SELF." Society Register 3, no. 2 (2019): 109–21. http://dx.doi.org/10.14746/sr.2019.3.2.07.

Full text
Abstract:
Two hundred years have passed since the question of subjectivity (re-interpreted through Kierkegaard’s existentialism) became central in modern philosophy. Over these two centuries, multiple theories addressed and questioned the borders between authentic subjectivity and an internalized panopticon of the hegemonic views that dominate the subject. Nevertheless, they still have to be definitively defined. As we may try to point Fake News (FN) is an opponent to subjectivity, and yet it comes from the subject. FN is the intentional spreading through new technologies of false information on a globa
APA, Harvard, Vancouver, ISO, and other styles
47

Lavanya, S. Sri, N. Nikhitha Reddy, Nishath Afreen K.S, Noothi Srivarshini, and N.Chudamani. "INSTAGRAM FAKE PROFILE DETECTION USING MACHINE LEARNING." Journal of Nonlinear Analysis and Optimization 14, no. 02 (2023): 215–24. http://dx.doi.org/10.36893/jnao.2023.v14i2.0215-0224.

Full text
Abstract:
One of the major issues with Online Social Networks (OSNs) is fake interaction, which is used to artificially boost an account's popularity. The identification of fraudulent involvement is essential to prevent company losses, inaccurate audience targeting in advertising, inaccurate product prediction algorithms, and a negative impact on the atmosphere of social networks. This initiative focuses on the identification of automated and phoney accounts that cause phoney activity on Instagram. We are aware of no publicly accessible dataset for automated and phoney accounts. Two datasets have been c
APA, Harvard, Vancouver, ISO, and other styles
48

Dwi Kurnia Wibowo, Ahmad Luthfi, and Nur Widiyasono. "Investigation of Fake Insider Threats on Private Cloud Computing Services." International Journal of Science, Technology & Management 3, no. 5 (2022): 1484–91. http://dx.doi.org/10.46729/ijstm.v3i5.613.

Full text
Abstract:
Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Privat
APA, Harvard, Vancouver, ISO, and other styles
49

Kirana Wiguna, Ni Komang Cahya, and I. Nyoman Bagiastra. "The Role and Responsibilities of Notaries in Making Authentic Deeds Based on Forged Letters from the Parties." West Science Interdisciplinary Studies 3, no. 01 (2025): 29–36. https://doi.org/10.58812/wsis.v3i01.1620.

Full text
Abstract:
Notaries play an important role in the Indonesian legal system, especially in the making of authentic deeds that have high evidentiary power. One of the main responsibilities of a notary is to ensure the validity of the documents used as the basis for making authentic deeds. However, in practice, it is not uncommon for fake documents to escape the notary's inspection and be used in making authentic deeds. This study aims to analyze the role and responsibilities of notaries in making authentic deeds based on fake letters, as well as the legal risks faced by notaries if they are involved in usin
APA, Harvard, Vancouver, ISO, and other styles
50

Zubrzycki, Geneviève, and Anna Woźny. "The Comparative Politics of Collective Memory." Annual Review of Sociology 46, no. 1 (2020): 175–94. http://dx.doi.org/10.1146/annurev-soc-121919-054808.

Full text
Abstract:
This article examines the theoretical and empirical contributions of the interdisciplinary field of memory studies for a comparative sociology of collective memory and politics. We identify three major empirical foci that have structured the scholarship: the role of collective memory in the creation, legitimation, and maintenance of national identities and nation-states; political reckoning with the memory of difficult and violent pasts; and the ongoing transnationalization of collective memory. We conclude with suggestions for future research on the politics of memory given the rise of populi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!