Siga este enlace para ver otros tipos de publicaciones sobre el tema: Fake identities.

Artículos de revistas sobre el tema "Fake identities"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Fake identities".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Teixeira da Silva, Jaime A. "Fake peer reviews, fake identities, fake accounts, fake data: beware!" AME Medical Journal 2 (March 1, 2017): 28. http://dx.doi.org/10.21037/amj.2017.02.10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Topor, Lev, and Moran Pollack. "Fake Identities in Social Cyberspace." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–17. http://dx.doi.org/10.4018/ijcwt.295867.

Texto completo
Resumen
Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious us
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Taj, Sohail, and Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review V, no. II (2022): 44–52. http://dx.doi.org/10.31703/gdpmr.2022(v-ii).05.

Texto completo
Resumen
Facebook is one of the most popular social networking sites, but some call it a "fake book" (Mülle and Schulz, 2019). Hence to explore the phenomenon of fake identities, the study examined how Facebook users construct their identities and how much profile information is phony. The study used a survey methodology, and 647 university students (252 male and 351 female) participated. Facebook has 14 fields of profile data against which respondents have answered on the Likert scale whether they disclose their accurate information. The study found that both male (mean score 1.9)and female (mean scor
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hasibuan, Juneidi, and Syafrudin Syam. "A Legal Analysis on Online Fraud Using Fake Identity." Indonesian Journal of Multidisciplinary Science 2, no. 10 (2023): 3308–17. http://dx.doi.org/10.55324/ijoms.v2i10.574.

Texto completo
Resumen
This study aims to analyze the legal accountability for online fraud using fake identities, also known as catfishing. The phenomenon of catfishing has become increasingly prevalent with the advancement of information technology, particularly in the use of social media and online dating applications. The practice of online fraud using fake identities has detrimental emotional, psychological, and financial impacts on victims.The research method used is document analysis and literature review. Through document analysis, the researcher analyzes relevant texts and legal documents such as laws, regu
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Taj, Sohail, and Zaheer Khan. "Creation of Fake Identities on Social Media for Pleasure Seeking: An Analysis of Facebook." International Journal of Data Science and Analysis 10, no. 6 (2024): 129–40. https://doi.org/10.11648/j.ijdsa.20241006.12.

Texto completo
Resumen
The study examined the relationship between creating fake identities on Facebook and the pursuit of pleasurable experiences. A total of 603 participants, consisting of 252 males and 351 females, were surveyed to gather insights. The results, analyzed using an independent samples t-test, indicated a significant difference in the number of fake identities created by each gender. Females reported a higher average number of fictitious identities as a means of seeking pleasure. Additionally, correlation analysis revealed a weak relationship between the creation of fake identities and the desire for
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Kolenbrander, Jack, and Alan J. Michaels. "Personality Emulation Utilizing Large Language Models." Applied Sciences 15, no. 12 (2025): 6636. https://doi.org/10.3390/app15126636.

Texto completo
Resumen
Fake identities have proven to be an effective methodology for conducting privacy and cybersecurity research; however, existing models are limited in their ability to interact with and respond to received communications. To perform privacy research in more complex Internet domains, withstand enhanced scrutiny, and persist long-term, fake identities must be capable of automatically generating responses while maintaining consistent behavior and personality. This work proposes a method for assigning personality to fake identities using the widely accepted psychometric Big Five model. Leveraging t
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Fernando, Youngky. "Punsishment for The Crime of Fraud Using A Fake Identity Is Reviwed From Islamic Law." International Journal of Education Management and Sociology 1, no. 2 (2022): 103–13. https://doi.org/10.58818/ijems.v1i2.139.

Texto completo
Resumen
The purpose of this research is to determine the review of Islamic criminal law regarding perpetrators of criminal acts of fraud using fake identities. The data collection technique uses the library research method and uses descriptive data, in-depth direct interviews with respondents. This research is a descriptive analysis which aims to explain data about fraud using fake identities which is then analyzed using theories in Islamic law. The results of the research show that there is a specific and detailed explanation regarding the meaning of fraud using a fake identity regarding fraud using
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Suganya, R., S. Muthulakshmi, B. Venmuhilan, K. Varun Kumar, and G. Vignesh. "Detect fake identities using improved Machine Learning Algorithm." Journal of Physics: Conference Series 1916, no. 1 (2021): 012056. http://dx.doi.org/10.1088/1742-6596/1916/1/012056.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Walczyna, Tomasz, and Zbigniew Piotrowski. "Fast Fake: Easy-to-Train Face Swap Model." Applied Sciences 14, no. 5 (2024): 2149. http://dx.doi.org/10.3390/app14052149.

Texto completo
Resumen
The proliferation of “Deep fake” technologies, particularly those facilitating face-swapping in images or videos, poses significant challenges and opportunities in digital media manipulation. Despite considerable advancements, existing methodologies often struggle with maintaining visual coherence, especially in preserving background features and ensuring the realistic integration of identity traits. This study introduces a novel face replacement model that leverages a singular framework to address these issues, employing the Adaptive Attentional Denormalization mechanism from FaceShifter and
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Qu, Shunhai, and Viroj Wiwanitkit. "Fake Identities in Social Network Research: To Be Disclosed?" Science and Engineering Ethics 20, no. 4 (2013): 1151. http://dx.doi.org/10.1007/s11948-013-9505-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Sarulatha, Sreerambabu, Kalidasan, and Mohammed Riyaz. "Fake Face Detection in Identity Cards Using Stegoface." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 622–26. http://dx.doi.org/10.22214/ijraset.2023.55069.

Texto completo
Resumen
Abstract: Identification and Machine-Readable Travel Documents (MRTDs) play a crucial role in verifying and validating identities in various situations, such as international travel, civil applications, online commerce, and access to transaction processing systems. These documents incorporate multiple security features aimed at preventing document forgery. However, criminals have shifted their focus to obtaining genuine documents fraudulently and manipulating facial portraits, as the existing security systems are challenging to bypass. To address this issue and mitigate the risks associated wi
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Al-Abri, Khalid Hassan. "Reasons for Internet Users Using Fake Identity from an Islamic Perspective." Islamiyyat 44, no. 1 (2022): 183–92. http://dx.doi.org/10.17576/islamiyyat-2022-4401-16.

Texto completo
Resumen
Among internet users are those who hide their true personalities by having several identities and names on different sites. This research requires years of personal experience, careful observation, and analysis, which the researchers try to relate to reality. This paper discusses the consequence of fake accounts on the internet. The results of this study suggests one person may have multiple identities on different sites. As a result, the internet has become a hotbed for anyone to write and act irresponsibly. In the Islamic view, the reasons internet users have for hiding their real identities
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Van Der Walt, Estee, and Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans." IEEE Access 6 (2018): 6540–49. http://dx.doi.org/10.1109/access.2018.2796018.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Shamim, Ahmad, and Manish Madhava Tripathi Dr. "A Review Article on Detection of Fake Profile on Social-Media." International Journal of Innovative Research in Computer Science & Technology (IJIRCST) 11, no. 2 (2023): 44–49. https://doi.org/10.5281/zenodo.7837298.

Texto completo
Resumen
Nowadays, practically everyone, from a youngster to an adult, spends more time on online social media platforms, connecting with and exchanging information with individuals all over the world. The social network is becoming a popular means to communicate with people who live in different parts of the world. Because of the tremendous interconnectedness and information sharing enabled by the internet, social media platforms. This highlights the importance of establishing a system capable of detecting fake profiles on social media networks. There has been a lot of study done in this area utilisin
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

A. Teixeira da Silva, Jaime. "AI in the Era of Fakes and Deepfakes: Risk of Fabricated Photographs and Identities in Academic Publishing." Journal of Information Security and Cybercrimes Research 6, no. 2 (2023): 71–73. http://dx.doi.org/10.26735/knja7076.

Texto completo
Resumen
Academic publishing has entered an era of fake, including fake authors who are either real entities using fake credentials, or totally concocted personalities that give the impression of real humans. Both can be achieved via the use of artificial intelligence (AI) and software that is capable of completing such a task, and ultimately a deepfake is created. The creation of fictitious deepfakes, even more so when assisted or driven by AI, allows creators to not only establish a fake image or photo, but also embed it within a fake context (e.g., profile). For whatever reason, there are risk of de
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

S. Borkar, Bharat. "Identification of Fake Identities on Social Media using various Machine Learning Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (2020): 6214–20. http://dx.doi.org/10.30534/ijatcse/2020/299942020.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Elovici, Yuval, Michael Fire, Amir Herzberg, and Haya Shulman. "Ethical Considerations when Employing Fake Identities in Online Social Networks for Research." Science and Engineering Ethics 20, no. 4 (2013): 1027–43. http://dx.doi.org/10.1007/s11948-013-9473-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Saddique, Junaid, Imran Qureshi, and Atif Shabbir. "Effects of Social Media Brand Reviews on Trust and Brand Perception: An Experimental Study on Facebook in Pakistani context." Jinnah Business Review 5, no. 2 (2017): 22–35. http://dx.doi.org/10.53369/haii7048.

Texto completo
Resumen
Attraction towards social networking sites is increasing day by day. People join social networking sites to communicate with their friends, share their feelings and gain information from different platforms. One of the most popular social networking sites is Facebook with 1.7 billion active users. However, there are many users of Facebook with fake identities, communicating with other users just for fun and enjoyment. Companies are also attracted towards Facebook for advertisement, consumer engagement and feedbacks of customers bearing very low cost. However, users with fake identities also li
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Putra Sedana, Agus. "The Criminal Law Enforcement Against the Use of Fake Identities as Doctors in Carrying Out Medical Practices." Journal of Development Research 8, no. 2 (2024): Process. https://doi.org/10.28926/jdr.v8i2.375.

Texto completo
Resumen
This study aims to analyze criminal law enforcement against the use of fake identities as doctors. The type of research used is empirical legal research. There are 2 types of data obtained, namely the first primary data obtained through interviews, the second secondary data, namely laws, books and journals. The research locations were centered at the Makassar District Court, the South Sulawesi High Prosecutor's Office, the South Sulawesi Regional Police and the Makassar City Branch of the Indonesian Doctors' Association. The results of the data that have been obtained were analyzed qualitative
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Chaurasiya, Adarsh, Amrit Verma, Kota Shamitha, and Dr Gaurav Kumar. "Fake Profile Detection in Instagram." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 1463–72. http://dx.doi.org/10.22214/ijraset.2024.60629.

Texto completo
Resumen
Abstract: In today's society, online communities have become an integral part of daily life, with individuals actively engaging in social media interactions regardless of their location or schedule. However, the prevalence of pseudo personas has contributed to sophisticated persistent attacks and other malicious activities, raising concerns about the privacy of personal data among online community members. This research seeks to identify and address the pressing issue of fraudulent identity projection on social media platforms, particularly focusing on Instagram. By employing automated techniq
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Hermawati, Tanti, Rila Setyaningsih, and Rahmadya Putra Nugraha. "Teen Motivation to Create Fake Identity Account on Instagram Social Media." International Journal of Multicultural and Multireligious Understanding 8, no. 4 (2021): 87. http://dx.doi.org/10.18415/ijmmu.v8i4.2459.

Texto completo
Resumen
The development of digital technology has brought human fantasy goes beyond limits, creating a three-dimensional space of the following items inside, to a stage where virtual reality has exceeded the manipulation and visual image so as to guide humans step from the real world to the fantasy world. The virtual world looks real and this includes the development of social media such as Instagram. Teens take advantage of such conditions to have a different identity. They can be whatever they want. Fake identities in cyberspace are a solution to teenage problems regarding the absence of self-confid
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Liu, Dong, Quan Yuan Wu, and Wei Hong Han. "Linking Multiple Identities in Online Social Networks Based on Co-Occurrence Analysis." Applied Mechanics and Materials 713-715 (January 2015): 2257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2257.

Texto completo
Resumen
When tackling the problem of mining multiple fake identities which are controlled by the same individual in internet, traditional techniques used to analyze the posted comments using text-based methods. However, these texts are always in colloquial style which make the effect may not be as obvious as expected. In this paper a new multiple identities linking algorithm is proposed based on the fine-grained analysis of co-occurrence degree of user accounts using sliding window model. Finally, a series of experiments show the effectiveness of our proposed method.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Hamdan, Salam, Raad S. Al-Qassas, and Sara Tedmori. "Comparative Study on Sybil Attack Detection Schemes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (2015): 5869–76. http://dx.doi.org/10.24297/ijct.v14i7.1898.

Texto completo
Resumen
Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such threat is the Sybil attack, a critical threat that can impair the proper functioning of VANETs. In a Sybil attack, a malicious node illegitimately claims multiple identities and simultaneously exploits t
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

M.Afrizal Zulfar. "Tanggung Jawab Notaris Terkait Penggunaan Identitas Palsu Penghadap Dalam Pembuatan Akta." Birokrasi: JURNAL ILMU HUKUM DAN TATA NEGARA 2, no. 1 (2024): 319–28. http://dx.doi.org/10.55606/birokrasi.v2i1.943.

Texto completo
Resumen
A notary is a public official whose job is to register, create and complete legally binding documents. The problem of notary responsibilities related to the use of fake identities in making the deed is caused by several factors such as a lack of understanding of the applicable law, as well as a lack of sanctions. applied to violations of the law. The writing of this article is included in qualitative descriptive research. Then, after collecting the data, a comparative data analysis was carried out, then apart from that, this article was made using online observations and in-depth literature st
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Atanesyan, Arthur V., Samson Mkhitaryan, and Anrieta Karapetyan. "“Virtual Masks” and Online Identity: The Use of Fake Profiles in Armenian Social Media Communication." Journalism and Media 6, no. 2 (2025): 49. https://doi.org/10.3390/journalmedia6020049.

Texto completo
Resumen
The goal of the study is to reveal the reasons (strategies) behind the use of “virtual masks” (fake profiles and altered identities) by real (human) users of social media networks (SMNs) within a cultural context, specifically in Armenia. Applying Erving Goffman’s Dramaturgical Theory and concepts of virtual identity, the research explores how users construct their online personas, either reflecting their real identities or modifying them to achieve specific communicative goals. A statistical analysis of the most popular SMNs in Armenia, combined with semi-structured interviews with 400 users,
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Abhimanyu Nayak. "Fake Profile Detection using Machine Learning Algorithms." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 391–401. https://doi.org/10.52783/jisem.v10i16s.2624.

Texto completo
Resumen
Fake profiles resulting from the explosion of social media and internet platforms provide major problems for digital security, privacy, and user confidence since they multiply exponentially. Emerging as a potent method to identify and reduce these false identities is machine learning. Using cutting-edge methods in artificial intelligence, pattern recognition, and data mining, scientists are creating complex models able to differentiate between real and created user profiles. Usually analyzing several features and behavior patterns, these machine learning techniques help to find possible false
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Tracy, Sarah J., and Angela Trethewey. "Fracturing the Real-Self?Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities." Communication Theory 15, no. 2 (2005): 168–95. http://dx.doi.org/10.1111/j.1468-2885.2005.tb00331.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Tracy, S. J. "Fracturing the Real-Self Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities." Communication Theory 15, no. 2 (2005): 168–95. http://dx.doi.org/10.1093/ct/15.2.168.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Núñez-Canal, Margarita, and Luis Núñez-Ladevéze. "Understanding the revolt: «Man the Technician» in global rhetoric." Communication & Society 34, no. 4 (2021): 33–47. http://dx.doi.org/10.15581/003.34.4.33-47.

Texto completo
Resumen
We have used quotations that McLuhan cited from the works of Ortega y Gasset, never been commented, for comparing the concurrence between the analyses of the “revolt of the masses” and “return to the village” in the network. This review discerns how both descriptions converge in a framework that fosters the unlimited expansion of face-to-face relationships which, by encouraging remote adherence to virtual identities, fosters a plethora of communicative practices. Internet encourages persuasive stratagems that foster rhetorical turmoil, which makes it impossible to distinguish sound arguments f
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

LIVINGSTON, DAVID, G.SINDHU, G.GEETHA, and K.SONIYA. "SCA: SYBIL-BASED COLLIONS ATTACKS OF IIOT DATA POISOING IN FEDERATED LEARNING." Journal of Engineering Sciences 15, no. 10 (2024): 81–88. http://dx.doi.org/10.36893/jes.2024.v15i10.011.

Texto completo
Resumen
The project focuses on enhancing security in Vehicular Ad Hoc Networks (VANETs) by proposing a novel approach for detecting Sybil attacks. Sybil attacks in VANETs involve a malicious vehicle creating multiple fake identities to manipulate network operations. This project employs a combination of Proofs of Work (PoW) and location-based techniques to detect and mitigate Sybil attacks effectively, ensuring the integrity and reliability of vehicular communication.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Gonçalves-Segundo, Paulo Roberto. "Fake news, moral panic, and polarization in Brazil: A critical discursive approach." Linguistic Frontiers 5, no. 2 (2022): 51–60. http://dx.doi.org/10.2478/lf-2022-0013.

Texto completo
Resumen
Abstract This paper aims to discuss the motivations and effects of the production, distribution and interpretation of fake news stories, which draw on moral panics in contemporary Brazilian society. To do so, the article combines recent research on fake news, mainly from Media Studies, Sociology and Political Science, with the Critical Discourse Analysis perspective on meaning-making. The main hypothesis advanced is that this kind of fake news story lies in the tension between the evident and the absurd, as they seem to be oriented towards eliciting different readings and reactions from the en
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Sun, Ling, Yuan Rao, Yuqian Lan, Bingcan Xia, and Yangyang Li. "HG-SL: Jointly Learning of Global and Local User Spreading Behavior for Fake News Early Detection." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 4 (2023): 5248–56. http://dx.doi.org/10.1609/aaai.v37i4.25655.

Texto completo
Resumen
Recently, fake news forgery technology has become more and more sophisticated, and even the profiles of participants may be faked, which challenges the robustness and effectiveness of traditional detection methods involving text or user identity. Most propagation-only approaches mainly rely on neural networks to learn the diffusion pattern of individual news, which is insufficient to describe the differences in news spread ability, and also ignores the valuable global connections of news and users, limiting the performance of detection. Therefore, we propose a joint learning model named HG-SL,
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Fuchs, Susanne. ""Proper” Profiles. On Facebook’s investment in the autobiographical genre." European Journal of Life Writing 5 (May 24, 2016): 55–74. http://dx.doi.org/10.5463/ejlw.5.102.

Texto completo
Resumen
The term “Fake profile” was invented by the press to designate Facebook-profiles that do not represent the life of their authors, but are instead used for depictions of alter egos or fictional characters. The following article investigates how the term “Fake profile” introduces a genre-designation that causes its alleged opposite, the “proper” profile to emerge. Put in conversation with Jacques Derrida’s discussion of the law of genre and Michel Foucault’s questioning of the referential function of the name of the author it becomes apparent, that the difference between “fake” and “proper” cann
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

B. Deepika, S. Sneka, S. Susila, P. Suvetha, and S. Swetha. "Blockchain Enabled Social Network for Detecting Fake Accounts." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 747–56. http://dx.doi.org/10.32628/cseit24102107.

Texto completo
Resumen
Front end technology with permanent accounts is employed in online social networks to help people get to know one another. In an effort to maintain connection with everyone, Facebook and Twitter are changing along with the users. OSNs are used by them for planning events, news exchange, interpersonal communication, and even running their own online enterprises. Because of OSNs' quick growth and the abundance of personal data that its users have shared, attackers and imposters have been lured to them with the intention of stealing personal information, spreading disruptive activities, and publi
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Al-Marshoud, Mishri Saleh, Ali H. Al-Bayatti, and Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs." Electronics 10, no. 11 (2021): 1302. http://dx.doi.org/10.3390/electronics10111302.

Texto completo
Resumen
Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system’s infrastructure introduce the potential for attacks that lessen safety and weaken passengers’ privacy. The purpose of short-lived anonymous identities, called “pseudo-identities”, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined are
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Khalifa, Nader, Madiha Anjum, and Zhonglin (Jolin) Qu. "The Harmful Impact of Fake Images in Local Societies: A Case Study and the Path to Regulation." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 5, no. 1 (2024): 98–108. http://dx.doi.org/10.60087/jaigs.v5i1.177.

Texto completo
Resumen
In recent years, the proliferation of artificial intelligence (AI) technology has brought unprecedented advancements and opportunities. However, it has also given rise to significant ethical and social challenges(Mika et al., 2019). One particularly alarming issue is the creation and dissemination of fake images(AlShariah et al., 2019), often involving minors. This article explores the profound negative impacts of such activities on local societies, using a case study of 50 schoolgirls whose photo identities were misused, and discusses the variables that need to be addressed at an academic lev
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Angelina, Dr J. Jane Rubel. "Fake Instagram Account Detection using ML Algorithms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28637.

Texto completo
Resumen
Abstract—Nowadays, the majority of people utilise social networking sites on a daily basis. Numerous people create profiles on social networking websites every day and connect with others there, regardless of their location or time. False identities are used in additional malicious operations in addition to playing a significant part in advanced persistent threats. Users of social networking sites can benefit from them, but they also have to worry about the security of their personal information. We must first determine the user's social network accounts before we can determine who is endorsin
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Teixeira da Silva, Jaime, and Aceil Al-Khatib. "The Deontology of Using Pets in Academic Publishing-Related Sting Operations." Exchanges: The Interdisciplinary Research Journal 10, no. 1 (2022): 1–20. http://dx.doi.org/10.31273/eirj.v10i1.843.

Texto completo
Resumen
Academic publishing has become considerably stringent in the past few years because of increased scrutiny focused on an overwhelming number of challenges. One of the greatest challenges that academia faces is the notion that certain elements within science publishing have entered an era of ‘fake’. There are few moral arguments in favor of anything fake in academic publishing, including fake identities (authors, reviewers, or editors), fake peer reviews, or fake publications. We argue – humor aside – that a zero-tolerance approach is likely essential to prevent the proliferation of fake aspects
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

K. S. Sowmiya and G. Vinoth Kumar. "Gender Roles: An Examination of Sexuality and Socio-Cultural Tribal Identity." Shanlax International Journal of English 12, S1-Dec (2023): 295–98. http://dx.doi.org/10.34293/rtdh.v12is1-dec.96.

Texto completo
Resumen
The identity of sex is classified based on biological characteristics which are examined and proved by physician during the birth of the child. Whereas, Gender differences encompass the behaviors, expressions, desires, roles and identities which are socially formed. This paper attempts to examine whether the gay relationship in the college environment is real or unreal. It also aims to analyses the socio-cultural identities of the select Santhal Tribe with references to the food, festivals, religious beliefs, language, and other environmental elements. The relationship between gardening and hu
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Kareem, Rafeef, and Wesam Bhaya. "Fake Profiles Types of Online Social Networks: A Survey." International Journal of Engineering & Technology 7, no. 4.19 (2018): 919. http://dx.doi.org/10.14419/ijet.v7i4.19.28071.

Texto completo
Resumen
Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. It plays a substantial role for users of the internet to hold out their everyday actions such as news reading, content sharing, product reviews, messages posting, and events discussing etc. Unfortunately, on the OSNs some new attacks have been recognized. Different types of spammers are existing in these OSNs. These cyber-criminals containing online fraudsters, sexual predators, catfishes, social bots, and advertising campaigners etc.OSNs abuse in different ways especially by creating fake profiles to ca
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Krombholz, Katharina, Dieter Merkl, and Edgar Weippl. "Fake identities in social media: A case study on the sustainability of the Facebook business model." Journal of Service Science Research 4, no. 2 (2012): 175–212. http://dx.doi.org/10.1007/s12927-012-0008-z.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Singhal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.

Texto completo
Resumen
In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-peer systems. We have a trust agency to certify the identities prevent from the “Sybil Attack”. Multiple identities that control sustainable fraction of systems so prevent from loss of information while data exchanging via networks or intern
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Kolenbrander, Jack, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison Boswell, and Alan J. Michaels. "Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 546–71. http://dx.doi.org/10.3390/jcp4030026.

Texto completo
Resumen
When personal information is shared across the Internet, we have limited confidence that the designated second party will safeguard it as we would prefer. Privacy policies offer insight into the best practices and intent of the organization, yet most are written so loosely that sharing with undefined third parties is to be anticipated. Tracking these sharing behaviors and identifying the source of unwanted content is exceedingly difficult when personal information is shared with multiple such second parties. This paper formulates a model for realistic fake identities, constructs a robust fake
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

A, Sneha, and Boopathi Kumar E. "A Machine Learning approach for Fake Profile Classification in Social Networking." International Journal of Innovative Research in Computer Science and Technology 13, no. 2 (2025): 96–102. https://doi.org/10.55524/ijircst.2025.13.2.14.

Texto completo
Resumen
This study suggests a machine learning-based detection system built with Python and Django to tackle the growing problem of fraudulent profiles on social networking sites. Malicious actors are progressively setting up phony identities for spamming, phishing, and disseminating false information as social media usage keeps growing. In order to accurately identify bogus profiles, the suggested system analyzes user attributes, behavioral patterns, and network properties using a variety of supervised learning algorithms, such as Random Forests, Support Vector Machines, and Decision Trees. Our appro
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Norhashim, Nurhakimah, Shahrul Ahmad Shah, Nadhiya Liyana Mohd Kamal, Zulhilmy Sahwee, Mohd Amzar Azizan, and Muhammad Izzat Afiq Ab Norizan. "Face Recognition System at the Airport Based on Internet of Things and Cloud Technologies." Karya Journal of Aerospace and Avionics System 1, no. 1 (2025): 31–40. https://doi.org/10.37934/kjaas.1.1.3140.

Texto completo
Resumen
Nowadays, the level of airport security system has been questioned, as there are a few cases involving unexpected events, such as hijacking. Based on the report, the suspected passenger used fake passport and documents, for example, the MH370 incident, whereby after an investigation was conducted by Interpol, two of the passengers were using fake passports and documents. Therefore, airport security could be enhanced at the security, immigration and boarding gates with the combination of new technologies, such as artificial intelligence, biometric technology and big data. This project aims to e
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

KARAS, ELENI. "FAKE NEWS AND THE RITUALISATION OF THE SELF." Society Register 3, no. 2 (2019): 109–21. http://dx.doi.org/10.14746/sr.2019.3.2.07.

Texto completo
Resumen
Two hundred years have passed since the question of subjectivity (re-interpreted through Kierkegaard’s existentialism) became central in modern philosophy. Over these two centuries, multiple theories addressed and questioned the borders between authentic subjectivity and an internalized panopticon of the hegemonic views that dominate the subject. Nevertheless, they still have to be definitively defined. As we may try to point Fake News (FN) is an opponent to subjectivity, and yet it comes from the subject. FN is the intentional spreading through new technologies of false information on a globa
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Lavanya, S. Sri, N. Nikhitha Reddy, Nishath Afreen K.S, Noothi Srivarshini, and N.Chudamani. "INSTAGRAM FAKE PROFILE DETECTION USING MACHINE LEARNING." Journal of Nonlinear Analysis and Optimization 14, no. 02 (2023): 215–24. http://dx.doi.org/10.36893/jnao.2023.v14i2.0215-0224.

Texto completo
Resumen
One of the major issues with Online Social Networks (OSNs) is fake interaction, which is used to artificially boost an account's popularity. The identification of fraudulent involvement is essential to prevent company losses, inaccurate audience targeting in advertising, inaccurate product prediction algorithms, and a negative impact on the atmosphere of social networks. This initiative focuses on the identification of automated and phoney accounts that cause phoney activity on Instagram. We are aware of no publicly accessible dataset for automated and phoney accounts. Two datasets have been c
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Dwi Kurnia Wibowo, Ahmad Luthfi, and Nur Widiyasono. "Investigation of Fake Insider Threats on Private Cloud Computing Services." International Journal of Science, Technology & Management 3, no. 5 (2022): 1484–91. http://dx.doi.org/10.46729/ijstm.v3i5.613.

Texto completo
Resumen
Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Privat
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Kirana Wiguna, Ni Komang Cahya, and I. Nyoman Bagiastra. "The Role and Responsibilities of Notaries in Making Authentic Deeds Based on Forged Letters from the Parties." West Science Interdisciplinary Studies 3, no. 01 (2025): 29–36. https://doi.org/10.58812/wsis.v3i01.1620.

Texto completo
Resumen
Notaries play an important role in the Indonesian legal system, especially in the making of authentic deeds that have high evidentiary power. One of the main responsibilities of a notary is to ensure the validity of the documents used as the basis for making authentic deeds. However, in practice, it is not uncommon for fake documents to escape the notary's inspection and be used in making authentic deeds. This study aims to analyze the role and responsibilities of notaries in making authentic deeds based on fake letters, as well as the legal risks faced by notaries if they are involved in usin
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Zubrzycki, Geneviève, and Anna Woźny. "The Comparative Politics of Collective Memory." Annual Review of Sociology 46, no. 1 (2020): 175–94. http://dx.doi.org/10.1146/annurev-soc-121919-054808.

Texto completo
Resumen
This article examines the theoretical and empirical contributions of the interdisciplinary field of memory studies for a comparative sociology of collective memory and politics. We identify three major empirical foci that have structured the scholarship: the role of collective memory in the creation, legitimation, and maintenance of national identities and nation-states; political reckoning with the memory of difficult and violent pasts; and the ongoing transnationalization of collective memory. We conclude with suggestions for future research on the politics of memory given the rise of populi
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!