Academic literature on the topic 'Fake identities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fake identities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Fake identities":

1

Teixeira da Silva, Jaime A. "Fake peer reviews, fake identities, fake accounts, fake data: beware!" AME Medical Journal 2 (March 1, 2017): 28. http://dx.doi.org/10.21037/amj.2017.02.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Topor, Lev, and Moran Pollack. "Fake Identities in Social Cyberspace." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 2022): 1–17. http://dx.doi.org/10.4018/ijcwt.295867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.
3

Taj, Sohail, and Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook." Global Digital & Print Media Review V, no. II (June 30, 2022): 44–52. http://dx.doi.org/10.31703/gdpmr.2022(v-ii).05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Facebook is one of the most popular social networking sites, but some call it a "fake book" (Mülle and Schulz, 2019). Hence to explore the phenomenon of fake identities, the study examined how Facebook users construct their identities and how much profile information is phony. The study used a survey methodology, and 647 university students (252 male and 351 female) participated. Facebook has 14 fields of profile data against which respondents have answered on the Likert scale whether they disclose their accurate information. The study found that both male (mean score 1.9)and female (mean score 2.3) Facebook users create fake identities, but women create more fake identities than men.
4

Hasibuan, Juneidi, and Syafrudin Syam. "A Legal Analysis on Online Fraud Using Fake Identity." Indonesian Journal of Multidisciplinary Science 2, no. 10 (July 27, 2023): 3308–17. http://dx.doi.org/10.55324/ijoms.v2i10.574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study aims to analyze the legal accountability for online fraud using fake identities, also known as catfishing. The phenomenon of catfishing has become increasingly prevalent with the advancement of information technology, particularly in the use of social media and online dating applications. The practice of online fraud using fake identities has detrimental emotional, psychological, and financial impacts on victims.The research method used is document analysis and literature review. Through document analysis, the researcher analyzes relevant texts and legal documents such as laws, regulations, court decisions, and government policies related to online fraud and fake identities. Meanwhile, through literature review, the researcher searches for and reviews relevant literature on the legal aspects of online fraud and fake identities.The research findings indicate that catfishing can be a violation of the law depending on the country and jurisdiction in place. Some countries have adopted laws that regulate online fraud and the misuse of fake identities. However, identifying catfish perpetrators and enforcing related laws often proves to be challenging as they employ various means to conceal their true identities in the virtual world. The legal accountability for online fraud using fake identities needs to be acknowledged and strengthened. In this regard, law enforcement and prosecution of catfish perpetrators are crucial to protect society from online fraud practices. Additionally, prevention and protection efforts involving education and public awareness regarding the risks and preventive measures against catfishing should also be enhanced.
5

Suganya, R., S. Muthulakshmi, B. Venmuhilan, K. Varun Kumar, and G. Vignesh. "Detect fake identities using improved Machine Learning Algorithm." Journal of Physics: Conference Series 1916, no. 1 (May 1, 2021): 012056. http://dx.doi.org/10.1088/1742-6596/1916/1/012056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Walczyna, Tomasz, and Zbigniew Piotrowski. "Fast Fake: Easy-to-Train Face Swap Model." Applied Sciences 14, no. 5 (March 4, 2024): 2149. http://dx.doi.org/10.3390/app14052149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The proliferation of “Deep fake” technologies, particularly those facilitating face-swapping in images or videos, poses significant challenges and opportunities in digital media manipulation. Despite considerable advancements, existing methodologies often struggle with maintaining visual coherence, especially in preserving background features and ensuring the realistic integration of identity traits. This study introduces a novel face replacement model that leverages a singular framework to address these issues, employing the Adaptive Attentional Denormalization mechanism from FaceShifter and integrating identity features via ArcFace and BiSeNet for enhanced attribute extraction. Key to our approach is the utilization of Fast GAN, optimizing the training efficiency of our model on relatively small datasets. We demonstrate the model’s efficacy in generating convincing face swaps with high fidelity, showcasing a significant improvement in blending identities seamlessly with the original background context. Our findings contribute to visual deepfake generation by enhancing realism and training efficiency but also highlight the potential for applications where authentic visual representation is crucial.
7

Qu, Shunhai, and Viroj Wiwanitkit. "Fake Identities in Social Network Research: To Be Disclosed?" Science and Engineering Ethics 20, no. 4 (December 19, 2013): 1151. http://dx.doi.org/10.1007/s11948-013-9505-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sarulatha, Sreerambabu, Kalidasan, and Mohammed Riyaz. "Fake Face Detection in Identity Cards Using Stegoface." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 622–26. http://dx.doi.org/10.22214/ijraset.2023.55069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: Identification and Machine-Readable Travel Documents (MRTDs) play a crucial role in verifying and validating identities in various situations, such as international travel, civil applications, online commerce, and access to transaction processing systems. These documents incorporate multiple security features aimed at preventing document forgery. However, criminals have shifted their focus to obtaining genuine documents fraudulently and manipulating facial portraits, as the existing security systems are challenging to bypass. To address this issue and mitigate the risks associated with such fraud, it is imperative for governments and ID/MRTD manufacturers to continually enhance and develop security measures. In this context, we present StegoFace, an innovative and efficient steganography method specifically designed for concealing secret messages within facial images found on common IDs and MRTDs. StegoFace employs an end-to-end approach, consisting of an ensemble of n Deep Convolutional Auto Encoders, which encode the secret message into a stegofacial image, and a Deep Convolutional Auto Decoder, capable of extracting the hidden message from the stegofacial image. Notably, our StegoFace approach outperforms the StegaStamp method in terms of perceptual quality, as evidenced by the results of metrics such as Peak Signal-to-Noise Ratio, hiding capacity, and imperceptibility on the test dataset.
9

Al-Abri, Khalid Hassan. "Reasons for Internet Users Using Fake Identity from an Islamic Perspective." Islamiyyat 44, no. 1 (June 1, 2022): 183–92. http://dx.doi.org/10.17576/islamiyyat-2022-4401-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Among internet users are those who hide their true personalities by having several identities and names on different sites. This research requires years of personal experience, careful observation, and analysis, which the researchers try to relate to reality. This paper discusses the consequence of fake accounts on the internet. The results of this study suggests one person may have multiple identities on different sites. As a result, the internet has become a hotbed for anyone to write and act irresponsibly. In the Islamic view, the reasons internet users have for hiding their real identities, can be divided into two categories; namely, acceptable and unacceptable or wrongful. Acceptable reasons include the need to protect identity, preventive measures, and fear of harm. Unacceptable or wrongful reasons include, harassment and spying.
10

Van Der Walt, Estee, and Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans." IEEE Access 6 (2018): 6540–49. http://dx.doi.org/10.1109/access.2018.2796018.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Fake identities":

1

Zarei, Koosha. "Fake identity & fake activity detection in online social networks based on transfer learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les médias sociaux ont permis de connecter un plus grand nombre de personnes dans le monde entier et d'accroître la facilité d'accès à des contenus gratuits, mais ils sont confrontés à des phénomènes critiques tels que les faux contenus, les fausses identités et les fausses activités. La détection de faux contenus sur les médias sociaux est récemment devenue une recherche émergente qui attire une attention considérable. une recherche émergente qui suscite une attention considérable. Dans ce domaine, les fausses identités jouent un rôle important dans la production et la propagation de faux contenus dans les réseaux sociaux en ligne réseaux sociaux en ligne tels que Meta (Facebook), Twitter et Instagram. La principale raison de ce phénomène est que les médias sociaux encouragent les usurpateurs d'identité, les comptes malveillants, les trolls et les robots sociaux àproduire du contenu et interagir avec des humains ou d'autres robots sans tenir compte de la crédibilité du contenu. La détection de faux contenus sur les médias sociaux est récemment devenue une recherche émergente qui attire une attention considérable. une recherche émergente qui suscite une attention considérable. Dans ce domaine, les fausses identités jouent un rôle important dans la production et la propagation de faux contenus dans les réseaux sociaux en ligne réseaux sociaux en ligne tels que Meta (Facebook), Twitter et Instagram. La principale raison de ce phénomène est que les médias sociaux encouragent les usurpateurs d'identité, les comptes malveillants, les trolls et les robots sociaux à produire du contenu et interagir avec des humains ou d'autres bots sans tenir compte de la crédibilité du contenu et inciter les utilisateurs à cliquer et à les partager.L'objectif de cette thèse est d'étudier le problème des fausses identités, des fausses activités et du contenu authentique qu'elles génèrent dans les médias sociaux et de proposer des algorithmes pour classifier le contenu factice. Nous définissons le faux contenu comme un élément d'information vérifiable et faux partagé intentionnellement pour tromper les lecteurs. Je propose différentes approches dans lesquelles j'adapte des modèles avancés de Transfer Learning (TL) et des techniques NLP pour détecter les fausses identités et classer le faux contenu automatiquement
While Social Media has connected more people around the world and has increased the easeof access to free content, but is dealing with critical phenomena such as fake content, fakeidentities, and fake activities. Fake content detection on social media has recently becomeemerging research that is attracting tremendous attention. In this area, fake identities areplaying an important role in the production and propagation of fake content in Online SocialNetworks such as Meta (Facebook), Twitter, and Instagram. The main reason behind thisis that social media encourages impersonators, malicious accounts, trolls, and social bots toproduce content and interact with humans or other bots without considering the credibilityof the content and entice users to click and share them.In this thesis, I primarily concentrate on impersonators as one of the concerning vari-eties of fake identities. These entities are nefarious fake accounts that intend to disguise alegitimate account by making similar profiles and then striking social media with fake con-tent, which makes it considerably harder to understand which posts are genuinely produced.The recent advancements in Natural Language Processing (NLP), and Transformer-basedLanguage Models (LM) can be adapted to develop automatic methods for many relatedNLP downstream tasks in this area. Language Models and their flexibility to cope withany corpus delivering great results has made this approach very popular. The fake contentclassification can be handled using Pretrained Language Models (PLM) and accurate deeplearning models.The aim of this thesis is to investigate the problem of fake identities, fake activities, andtheir generated ingenuine content in social media and propose algorithms to classify fakecontent. We define fake content as a verifiably false piece of information shared intentionallyto mislead the readers. I propose different approaches in which I adapt advanced TransferLearning (TL) models and NLP techniques to detect fake identities and classify fake contentautomatically
2

Anyona, Ondigi Evans. "Face-work and identities in a discussion about xenophobia." Thesis, University of the Western Cape, 2011. http://hdl.handle.net/11394/3994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Magister Artium - MA
International students arriving at the University of the Western Cape (UWC) from other African countries find themselves in a position of having to negotiate their identities and positions with their South African counterparts. The local students too are faced with the prospect of doing the same since they have to coexist with the former. This study aims to investigate how, in a discussion about xenophobia, a selection of UWC students perform face-work and negotiate or construct their identities as well as those of their coparticipants and position themselves in relation to each other. I was interested in exploring how the participants, who were representative of the two groups that clashed in the xenophobic attacks of 2008, would engage with each other while discussing this sensitive topic.The data was gathered during an open-ended discussion among four UWC postgraduate students in a casual, relaxed setting (my room on campus). The transcribed data was then analyzed using a combination of theoretical frameworks from Systemic Functional Linguistics (SFL) and Discourse Analysis. In particular, the SFL theory of modality(Halliday 1994) and Engagement (Martin and White 2005) and Goffman’s (1999[1967]) notion of face were used as tools of analysis.The analysis reveals that participants use a variety of linguistic choices and discourse strategies to maintain face during the discussion of this sensitive topic of xenophobia. The participants make an effort to take care of each other’s face (desires to be appreciated and left free of any imposition) and keep conflicts to a minimum even when they at times disagree and give incriminatory information about each other. It also reveals that the participants, in addition to maintaining face, also construct and negotiate identities which in turn help build in-group solidarity and provide a sense of belonging to them.
3

Sueda, Kiyoko. "Shame and pride behind face : Japanese returnees' negotiation of multiple identities." Thesis, Lancaster University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.275317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kikutani, Mariko. "Categorical perception for unfamiliar identities : Issues of face learning, labelling and distinctiveness." Thesis, University of Essex, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.499820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Geiselmann, Anna Maria. "The PI3K/AKT pathway regulates cell fate identities during early mouse development." Electronic Thesis or Diss., Sorbonne université, 2022. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2022SORUS138.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'embryon précoce de la souris est un modèle unique de développement régulatif nécessitant un équilibre délicat entre plasticité et différentiation irréversible. En quelques jours seulement, l'œuf fécondé forme un embryon multicellulaire capable de s'attacher au tissu utérin de la mère et de développer des connexions complexes avec celui-ci. Initialement équivalentes, les cellules de l’embryon précoce voient leur potentiel de différentiation se restreindre et s'engagent vers une destinée cellulaire spécifique tout en conservant la capacité de répondre, dans des fenêtres de temps bien définies, aux signaux externes et aux perturbations du développement. Peu avant l'implantation, la masse cellulaire interne (MCI) des blastocystes précoces se différencie en épiblaste (Epi), qui donnera naissance au fœtus, et en endoderme primitif (PrE), à l'origine de tissus extra-embryonnaires. Des études antérieures ont établi qu’un réseau de régulation, impliquant les facteurs de transcription (FTs) NANOG et GATA6 et la signalisation FGF/ERK, contrôle de nombreux aspects de ce processus de différenciation. Cependant, plusieurs questions demeurent quant aux processus biologiques sous-jacents contrôlant la génération des premiers lignages embryonnaires. L'objectif de cette thèse était d'étudier le rôle de la signalisation PI3K/AKT dans le blastocyste, lorsque les cellules Epi, puis PrE, se forment à partir du pool de cellules indifférenciées de la MCI. Mon travail montre que PI3K/AKT est constitutivement actif pendant le développement préimplantatoire et que des variations d’activité entre cellules apparaissent aux stades blastocystes intermédiaires et tardifs. En modulant l'activité de la voie, j'ai pu montrer que l'activité de PI3K/AKT est une condition préalable à la formation de l'Epi, car les FTs spécifiques de l'Epi NANOG et SOX2 sont considérablement diminués et SOX17, un FT du PrE, est activé en absence d’activité PI3K/AKT. J'apporte en outre la preuve que la régulation des niveaux d’expression des FT dans la MCI est, au moins en partie, médiée par GSK3, une cible directe de PI3K/AKT. Le séquençage ARN en cellule unique (scRNAseq) a révélé que l'inhibition de PI3K/AKT induit des changements minimes dans le transcriptome des cellules internes, indiquant que la voie PI3K/AKT régule les niveaux des FTs par des mécanismes post-transcriptionnels. De manière surprenante, j'ai observé une régulation à la hausse de SOX17 lorsque PI3K/AKT est inhibé dans les embryons mutants Gata6, ce qui suggère que l'initiation de la différenciation en PrE nécessite la levée de l'inhibition de PI3K/AKT. En conclusion, ce projet de thèse illustre que PI3K/AKT, une voie souvent associée au contrôle de la survie, de la prolifération et du métabolisme, agit également comme médiateur du destin cellulaire pendant une période spécifique et limitée du développement précoce de la souris. Nous proposons que PI3K/AKT préserve la pluripotence des progéniteurs Epi en formation en maintenant l'expression de marqueurs clés du lignage tout en empêchant la différenciation vers le PrE. Ainsi, mon travail donne un aperçu nouveau et important de la régulation du FT de pluripotence clé NANOG dans les embryons précoces et identifie des signaux autres que la signalisation FGF/ERK qui participent aux décisions de lignage indépendamment de cette dernière
The early mouse embryo is a unique paradigm for regulative development which requires a fine-tuned balance between plasticity and commitment. In just a few days, the fertilized egg forms a multicellular embryo which is able to attach to and develop intricate connections with the mother's uterine tissue. Initially equivalent, early embryonic cells become restricted in their developmental potential and commit to a specific cell identity while keeping short windows of responsiveness to react to external cues or developmental perturbations. Shortly before implantation, the inner cell mass (ICM) of early blastocysts differentiates into the epiblast (Epi), that will give rise to the fetus, and the primitive endoderm (PrE), at the origin of extraembryonic tissues. Previous studies have established a regulatory network, involving the transcription factors (TFs) NANOG and GATA6 and the FGF/ERK signaling, which controls many aspects of this differentiation process. However, several questions remain about the underlying mechanisms controlling the generation of the first embryonic lineages. The objective of this thesis was to study the role of PI3K/AKT signaling during blastocyst development when first Epi, then PrE cells arise from the uncommitted pool of ICM cells. My work demonstrates that PI3K/AKT is constitutively active during preimplantation development and that variations of signaling activities occur during mid to late blastocyst stages. By modulating pathway activity, I could demonstrate that PI3K/AKT activity is a premise for Epi formation as the Epi-specific TFs NANOG and SOX2 are dramatically reduced and endodermal SOX17 is activated in the absence of PI3K/AKT. I further provide evidence that the regulation of TF patterning in the ICM is, at least in part, mediated by the PI3K/AKT downstream target GSK3. Single cell RNA sequencing (scRNAseq) revealed that PI3K/AKT inhibition induced marginal alterations in the inner cell transcriptome, indicating that PI3K/AKT regulates TFs levels through post-transcriptional mechanisms. Surprisingly, I observed upregulation of SOX17 when PI3K/AKT is inhibited in Gata6 mutant embryos which suggests that initiation of PrE fate requires the release of PI3K/AKT inhibition. In conclusion, this PhD project illustrates that PI3K/AKT, a pathway often associated with controlling survival, proliferation and metabolism, acts also as a mediator of cell fate during a specific and limited period of early mouse development. We propose that PI3K/AKT guards the pluripotency of forming Epi progenitors by maintaining the expression of key Epi markers while simultaneously preventing differentiation towards PrE fate. Thus, my work gives novel and important insights into the regulation of the Epi master TF NANOG in early embryos and identifies signals other than FGF/ERK signaling that participate in lineage decisions independently of the latter
6

Marriott, Richard. "Data-augmentation with synthetic identities for robust facial recognition." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEC048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
En 2014, l'utilisation des réseaux neuronaux profonds (RNP) a révolutionné la reconnaissance faciale (RF). Les RNP sont capables d'apprendre à extraire des images des représentations basées sur des caractéristiques qui sont discriminantes et robustes aux détails non pertinents. On peut dire que l'un des facteurs les plus importants qui limitent aujourd'hui les performances des algorithmes de RF sont les données utilisées pour les entraîner. Les ensembles de données d'images de haute qualité qui sont représentatives des conditions de test du monde réel peuvent être difficiles à collecter. Une solution possible est d'augmenter les ensembles de données avec des images synthétiques. Cette option est récemment devenue plus viable suite au développement des « generative adversarial networks » (GAN) qui permettent de générer des échantillons de données synthétiques très réalistes. Cette thèse étudie l'utilisation des GAN pour augmenter les ensembles de données FR. Elle examine la capacité des GAN à générer de nouvelles identités, et leur capacité à démêler l'identité des autres formes de variation des images. Enfin, un GAN intégrant un modèle 3D est proposé afin de démêler complètement la pose de l'identité. Il est démontré que les images synthétisées à l'aide du GAN 3D améliorent la reconnaissance des visages aux poses larges et une précision état de l'art est démontrée pour l'ensemble de données d'évaluation ``Cross-Pose LFW''.Le dernier chapitre de la thèse évalue l'une des utilisations plus néfastes des images synthétiques : l'attaque par morphing du visage. Ces attaques exploitent l'imprécision des systèmes de RF en manipulant les images de manière à ce qu'il puisse être faussement vérifié qu'elles appartiennent à plus d'une personne. Une évaluation des attaques par morphing de visage basées sur le GAN est fournie. Une nouvelle méthode de morphing basée sur le GAN est également présentée, qui minimise la distance entre l'image transformée et les identités originales dans un espace de caractéristiques biométriques. Une contre-mesure potentielle à ces attaques par morphing consiste à entraîner les réseaux FR en utilisant des identités synthétiques supplémentaires. Dans cette veine, l'effet de l'entraînement utilisant des données synthétiques GAN 3D sur le succès des attaques simulées de morphing facial est évalué
In 2014, use of deep neural networks (DNNs) revolutionised facial recognition (FR). DNNs are capable of learning to extract feature-based representations from images that are discriminative and robust to extraneous detail. Arguably, one of the most important factors now limiting the performance of FR algorithms is the data used to train them. High-quality image datasets that are representative of real-world test conditions can be difficult to collect. One potential solution is to augment datasets with synthetic images. This option recently became increasingly viable following the development of generative adversarial networks (GANs) which allow generation of highly realistic, synthetic data samples. This thesis investigates the use of GANs for augmentation of FR datasets. It looks at the ability of GANs to generate new identities, and their ability to disentangle identity from other forms of variation in images. Ultimately, a GAN integrating a 3D model is proposed in order to fully disentangle pose from identity. Images synthesised using the 3D GAN are shown to improve large-pose FR and a state-of-the-art accuracy is demonstrated for the challenging Cross-Pose LFW evaluation dataset.The final chapter of the thesis evaluates one of the more nefarious uses of synthetic images: the face-morphing attack. Such attacks exploit imprecision in FR systems by manipulating images such that they might be falsely verified as belonging to more than one person. An evaluation of GAN-based face-morphing attacks is provided. Also introduced is a novel, GAN-based morphing method that minimises the distance of the morphed image from the original identities in a biometric feature-space. A potential counter measure to such morphing attacks is to train FR networks using additional, synthetic identities. In this vein, the effect of training using synthetic, 3D GAN data on the success of simulated face-morphing attacks is evaluated
7

Buguet, Julie. "Remaniements identitaires familiaux face à l'épreuve de mobilité internationale : le cas des conjoints d'expatriés." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE2039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La trajectoire migratoire des conjoints d'expatriés se donne à voir dans son ensemble lors de l'expérience de mobilité internationale se traduisant par une rencontre interculturelle. Depuis les conditions de départ, en passant par les diverses modalités de confrontation, individuelles, collectives et culturelles avec le pays d'accueil, le conjoint d'expatrié, souvent considéré comme simple suiveur de l’expatrié professionnel, peut également se poser comme un véritable acteur, évoluant à l'intérieur d'une gamme d'opportunité et de contraintes définies par le contexte de migration. Dans une démarche méthodologique compréhensive, nous proposons un modèle intégratif de recherche, basé sur deux dimensions du processus acculturatif et identitaire : l’adaptation psychologique et l’adaptation socioculturelle. A ces aspects, s’ajoutent les enjeux interculturels d’identification à la culture d’origine et d’accueil, entre autres. Dans notre étude, les prédicteurs définis dans notre modèle apparaissent comme des ressources, psychologiques, interpersonnelles et culturelles, mobilisables facilitant l'adaptation des conjoints d'expatriés. Nous argumentons que les processus d'adaptation des conjoints en situation de migration temporaire sont largement facilités par la décision concertée du projet d'expatriation, ainsi que par l'identification à la culture du pays d'accueil. Les conjoints d'expatriés, en raison notamment de la nature du projet migratoire, adoptent cependant, en majorité, des stratégies identitaires privilégiant l'identification à leur culture d'origine. Cette étude met en avant les dynamiques interculturelles et les négociations identitaires possibles des conjoints d’expatriés français en prenant en compte les différents dynamismes adaptatifs et définit une base de compréhension du vécu de migration temporaire de ce groupe, permettant ainsi l’optimisation du bien-être psychologique et socioculturelle des familles envoyées en expatriation
Spousal adjustment issues to host country are a major reason for expatriate assidûment failure and the main focus of our field study. By combining elements of Berry's conceptual framework for the analysis of acculturation attitudes with Ward and colleagues' theorising on cross-cultural adjustment of sojourners, our research examined, among other predictors, host-national and conational identification in relation to sociocultural and psychological adaptation of 96 expatriates spouses. This research highlights, through completed questionnaires and interviews, that our proposed integrative model of research is highly reliable to predict psychological and sociocultural adjustment. Results revealed two main effects. Considering the adaptation process, subjects with strong involvement in the decision making process of expatriation will experience a better psychological adaptation during cross-cultural transitions. In addition, those with a strong hostnational identification will largely experience a better socio-cultural adaptation during their assignment abroad. The effect of identity change is however limited as a large majority of subject chose the separation acculturation strategy, implying a weak identification to the host-national culture and a strong identification to the co-national culture. The investigation makes a useful contribution to theoretical developments in the study of acculturation of a specific group: the french expatriates spouses living abroad. Moreover, the study corroborates the validity and the empirical distinction of psychological and sociocultural adaptation, as acculturation strategies and the predictors of adjustment's domains in the vast and expending literature on acculturation and identity
8

Valfort, Blandine. "Le lyrisme face à l’événement : étude comparée des poésies francophones du Maghreb et du Machrek : (Algérie, Liban, 1950-1990)." Thesis, Lyon 2, 2013. http://www.theses.fr/2013LYO20049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Dans les deux aires qui se présentent comme le Levant et le Couchant d’un même monde arabe – le Machrek et le Maghreb –, des poètes ont choisi la langue française pour réagir à certains événements de la seconde moitié du XXe siècle tels que la guerre d’Algérie, la guerre des Six Jours et la guerre civile du Liban. L’étude des recueils algériens et libanais qui ont été composés entre 1950 et 1990 permet d’envisager le rapport culturel, idéologique et esthétique de ces deux régions en adoptant une approche comparative différentielle. Le choix du français – dont les enjeux sont évidemment très différents dans ces deux aires – soulève des questions identitaires qui méritent d’être analysées et favorise l’expression d’un métissage culturel. Ce corpus poétique permet aussi de réexaminer les liens entre l’Histoire et l’intime, car l'événement, indissociable des problématiques collectives qu’il soulève, est réinterprété par la voix lyrique. Il ne se contente pas de créer une esthétique du chant redécouvert, ni d’offrir un éventail thématique à la mesure des drames qu’il entraîne. Il suscite surtout un parcours énonciatif, étroitement lié au travail du poème. À travers le lyrisme, l’événement historique ouvre la voie/-x de l’intime qui révèle les différentes strates du questionnement identitaire et lui donne une portée universelle. Le sujet n’est plus absorbé dans un collectif renforcé par les circonstances, il ne se définit plus uniquement à travers l’opposition dichotomique à l’altérité ; grâce à l’adresse lyrique, on assiste à l’avènement simultané d’un je et d’un tu qui, sans rien renier du conflit, en subsument les enjeux
In both areas which stand for the East and the West of the same Arab world – Maghreb and Mashreq –, some poets have chosen the French language to react to certain events of the second half of the twentieth century, as the Algerian War, the Six Days War and the Lebanese Civil War. By studying Algerian and Lebanese collections of poetry written between 1950 and 1990, we can consider the cultural, ideological and esthetical relationship of these two areas adopting a differential comparative approach. The choice of French – whose issues are very different in both areas – raises questions of identity that must be analyzed and promotes the expression of a cultural mixture. Through this poetic corpus, we can reconsider the relationship between history and intimacy because the event, inseparable from collective issues, is reinterpreted by the lyric voice. Not only does it create a rediscovered aesthetic of singing nor only provides a thematic range representative of dramas it causes. It raises an enunciative course closely linked to the poetic process. Through lyricism, historical event opens the way to intimacy which reveals the different layers of questioning identity and gives it a universal dimension. The subject is no longer absorbed into a collective reinforced by the circumstances, it is no longer defined only through the dichotomous opposition to otherness; thanks to the lyrical address, we are witnessing the simultaneous advent of “I” and “you” that, without denying the conflict, subsume its issues
9

Pillard, Thomas. "Négociations identitaires : le film noir français face aux bouleversements de la France d’après-guerre (1946-1960)." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Bien que le terme « film noir » soit généralement réservé au cinéma hollywoodien, cette appellation a en réalité été forgée dans la France des années 1930 pour désigner des films français, et elle renvoie plutôt à une forme transnationale, circulant entre l’Europe et Hollywood. C’est à ce titre que l’on se propose de l’étudier dans le cinéma hexagonal, en montrant que le genre noir s’inscrit en France dans le cadre d’une tradition ancienne, et en analysant l’évolution du « film noir français » après-guerre, selon une approche historique et culturelle. En postulant que le film noir est indissociable d’un discours sur la modernité, cette thèse montre qu’il existe trois actualisations de la forme « noire » dans la France de 1946-1960, qui témoignent chacune des ambivalences d’une nation en transition, devant négocier le basculement entre l’Occupation et l’entrée dans la société de consommation : le « réalisme noir » exprime un fort pessimisme ayant des implications nostalgiques, masculinistes et nationalistes ; la « série noire pour rire » propose au contraire une réappropriation ludique de l’Histoire et de la modernité ; le film de gangsters confronte des personnages vieillissants marqués par la guerre aux mutations contemporaines et à l’American way of life. Par sa diversité même, le film noir français illustre ainsi les contradictions de la France d’après-guerre : désireuse de se plonger dans l’avenir mais obsédée par son passé traumatique, en partie séduite par la « tentation américaine » mais déterminée à conserver sa « francité »
Although the term « film noir » is generally associated with Hollywood cinema, this generic label was originally coined in France in reference to French films made in the 1930s, and the « noir » genre defines a transnational form which circulated between Europe and Hollywood. We intend to study « noir » films in French cinema through this lens, highlighting that the genre is rooted in an old French tradition. Our analysis of the evolution of French film noir foregrounds historical and cultural aspects, positing that film noir articulates a critical discourse on modernity. This doctoral thesis shows that the « noir » form underwent changes which evidenced the ambivalence of identity in a nation in transition between 1946 and 1960, that had to negotiate the cultural shift from Occupation to the Consumer society : the « noir realism » cycle expressed a strong pessimism that has nostalgic, masculinist and nationalist implications, in opposition to the « série noire pour rire » which illustrated a playful reappropriation of History and modernity ; last but not least, gangster films built on the contrast between older characters, marked by the burdens of war, and contemporary mutations, including the development of the American way of life in France. Through its diversity, French film noir reveals the contradictions of post-war French society : the country was keen to dive into the future but obsessed with its traumatic past ; in part seduced by the « American model », it was however determined to keep its « French identity »
10

Klein, Nicolas. "Face aux mutations de la vente : Orange, ses vendeurs, et le devenir d’un métier." Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC0068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le commerce électronique, dont l’essor est observable depuis le début des années 2000, transforme en profondeur les modalités de relation sur le marché des télécommunications. Ses développements récents, permis par le raffinement toujours plus poussé des technologies de l’information et de la communication, amènent les entreprises à reconsidérer les orientations de leurs stratégies commerciales. Pour une entreprise comme Orange, ex-France Télécom, ces interrogations sont également motivées par les évolutions des formes de la concurrence, marquées par l’arrivée d’un nouvel opérateur de téléphonie et fournisseur d’accès internet. Où et comment s’adresser aux clients afin d’assurer la performance économique de l’entreprise sont aujourd’hui les questions au cœur des transformations de l’organisation. Or, si la présence de professionnels au contact des clients ne semble a priori pas remise en cause, la nature de leur activité fait débat. La thèse porte sur l’existence d’un métier de vendeurs au sein des différents espaces commerciaux de l’entreprise (boutique, téléphone, internet). Son objectif est de montrer l’épaisseur du travail de vente afin d’éclairer son évolution au sein d’une entreprise qui s’interroge sur son utilité. Nous proposons pour ce faire une analyse sur deux niveaux. D’abord, nous étudions la construction de l’organisation commerciale de l’entreprise. Nous montrons que la place des vendeurs s’y construit au travers de nombreux débats porté par différents acteurs managériaux et trouvant des échos dans l’histoire de l’entreprise, débats portant notamment sur l’importance du service dans le travail commercial. Ensuite, nous étudions l’activité de travail pratiquée par les vendeurs. Nous nous intéressons tant aux tâches accomplies, aux enjeux rencontrés et aux compétences mobilisées, qu’aux significations qu’y attachent les vendeurs. Nous montrons notamment comment la pratique quotidienne de la vente les amène à se construire un métier. Au final, la thèse entend démontrer comment le métier de vendeur dévoile une épaisseur permettant à ces membres de faire face aux évolutions de leur environnement de travail. Ce faisant, la thèse entend ainsi contribuer à une sociologie des vendeurs et de la vente, dont la nécessité commence à être reconnue
E-commerce, which we can see emerge since the early 2000s, profoundly transforms relationships on the telecommunications market. Its recent developments, due to the ever more refined technologies of information and communication, lead firms to reevaluate their commercial strategies. For Orange, previously France Telecom, these questions are also motivated by evolutions in competition, notably the arrival of a new phone operator and Internet access provider. Where and how to address customers in order to ensure economic performance is at the center of organizational change. If the participation of professionals to everyday relationship with customers doesn’t seem to be put into question, the nature of their work raises debates. This thesis discusses the existence of an occupation of sellers within the firm’s various commercial spaces (shop, call center, Internet). Its aim is to reveal the depth of their work and its evolution within an organization which seems to doubt its usefulness. We propose an analysis on two levels. First, we study the construction of Orange’s commercial organization. We show that the role of sellers is the result of numerous debates opposing various organizational actors and finding echoes throughout the firm’s history, notably on the importance of services within sale practice. Then we explore sellers work practice. We take notice in their daily tasks, challenges, professional skills, as well as the meanings attached to them. In particular, we show how this daily practice leads to define an occupation of sellers. Finally, we demonstrate how the depth of this occupation enables its member to face changes in their work environment. This thesis thus aims to contribute to a sociology of sale and of its professionals, the benefit of which seems to appear

Books on the topic "Fake identities":

1

Bout-Monteau, Anja. Vriendschap fase 2. [Apeldoorn]: De Banier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kidd, Joshua Alexander. Face and enactment of identities in the L2 classroom. Bristol: Multilingual Matters, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fonkoué, Jean. Différence & identité: Les sociologues africains face à la sociologie. Paris: Silex, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Idiata, Daniel Franck. Le reflet du miroir: Le Gabon face à ses identités. Libreville, Gabon: Les Éditions du CENAREST, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vinsonneau, Geneviève. L' Identité des françaises face au sexe masculin: Perspectives cognitives et expérimentales. Paris: L'Harmattan, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cunha, Manuel Antunes da. Les Portugais de France face à leur télévision: Médias, migrations et enjeux identitaires. Rennes: Presses universitaires de Rennes, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hart, Martine, Danielle Buyssens, and Vincent Chenal. Genève, la Suisse et les arts, 1814-1846: Les artistes face aux identités nationales. Chêne-Bourg: Georg éditeur, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dean, Carolyn J. Aversion and erasure: The fate of the victim after the Holocaust. Ithaca: Cornell University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

M, Olechowska Elżbieta, and Aster Howard, eds. Challenges for international broadcasting: Identity, economics, integration = La radiodiffusion internationale face à ses défis : identité, aspects économiques, intégration. Oakville, Ont: Mosaic Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pierre, Frustier, and Centre de recherche éducation-culture (La Roche-sur-Yon, France), eds. Les identités insulaires face au tourisme: Actes du colloque organisé par le CREC, Centre de recherche éducation-culture, Université de Nantes, La Roche-sur-Yon, 1er et 2 juin 2006. La Roche-sur-Yon: Siloë, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Fake identities":

1

Otrel-Cass, Kathrin, and Michael Fasching. "Postdigital Truths: Educational Reflections on Fake News and Digital Identities." In Postdigital Science and Education, 89–108. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65592-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chetanroop, Pedada, Ruthwik Preetham, and S. Gowri. "To detect fake identities in Twitter using machine learning models." In Emerging Trends in IoT and Computing Technologies, 232–36. London: Routledge, 2023. http://dx.doi.org/10.1201/9781003350057-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nemmaoui, Saadia, and Sihame Elhammani. "A New Approach Based on Steganography to Face Facial Recognition Vulnerabilities Against Fake Identities." In Business Intelligence, 269–83. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76508-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McWilliam, Rohan. "Unauthorized Identities: The Impostor, the Fake and the Secret History in Nineteenth-Century Britain." In Legitimacy and Illegitimacy in Nineteenth-Century Law, Literature and History, 67–92. London: Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230277250_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gragnaniello, Diego, Francesco Marra, and Luisa Verdoliva. "Detection of AI-Generated Synthetic Faces." In Handbook of Digital Face Manipulation and Detection, 191–212. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractIn recent years there have been astonishing advances in AI-based synthetic media generation. Thanks to deep learning methods it is now possible to generate visual data with a high level of realism. This is especially true for human faces. Advanced deep learning tools allow one to easily change some specific attributes of a real face or even create brand new identities. Although this opens up a large number of new opportunities, just think of the entertainment industry, it also undermines the trustworthiness of media content and supports the spread of fake identities over the internet. In this context, there is a fundamental need to develop robust and automatic tools capable of distinguishing synthetic faces from real ones. The scientific community is making a huge research effort in this field, proposing several interesting approaches. However, a universal detector is yet to come. Fundamentally, the research in this field is like a cat and mouse game, with new detectors that are designed to deal with powerful synthetic face generators, while the latter keep improving to produce more and more realistic images. In this chapter we will present the most effective techniques proposed in the literature for the detection of synthetic faces. We will analyze their rationale, present real-world application scenarios , and compare different approaches in terms of accuracy and generalization ability.
6

Sueda, Kiyoko. "Shame and Pride Behind Face." In Negotiating multiple identities, 37–50. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-008-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kiernan, Patrick. "Multimodal Resources in Face-to-Face Interviews." In Learner Narratives of Translingual Identities, 31–59. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-95438-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sueda, Kiyoko. "Research on Face in Communication Studies." In Negotiating multiple identities, 19–36. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-008-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

King, Barry. "Unsettling Identities: From Custom to Price." In Taking Fame to Market, 13–38. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137344281_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sueda, Kiyoko. "Face (Mentsu), Shame and Pride in Identity Negotiation." In Negotiating multiple identities, 161–77. Singapore: Springer Singapore, 2014. http://dx.doi.org/10.1007/978-981-287-008-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Fake identities":

1

Torky, Mohamed, Ali Meligy, and Hani Ibrahim. "Recognizing Fake identities in Online Social Networks based on a Finite Automaton approach." In 2016 12th International Computer Engineering Conference (ICENCO). IEEE, 2016. http://dx.doi.org/10.1109/icenco.2016.7856436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

V, Lakshmanan, Kapu Manasa, P. S. Soundarya, R. Renuka, and R. Subanandhana. "A Survey on Machine Learning to Detect Creation of Fake Identities by Human vs. Bots." In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2023. http://dx.doi.org/10.1109/icssit55814.2023.10060939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yao, Xiuzhen Zhang, and Dengji Zhao. "Sybil-proof Answer Querying Mechanism." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We study a question answering problem on a social network, where a requester is seeking an answer from the agents on the network. The goal is to design reward mechanisms to incentivize the agents to propagate the requester's query to their neighbours if they don't have the answer. Existing mechanisms are vulnerable to Sybil-attacks, i.e., an agent may get more reward by creating fake identities. Hence, we combat this problem by first proving some impossibility results to resolve Sybil-attacks and then characterizing a class of mechanisms which satisfy Sybil-proofness (prevents Sybil-attacks) as well as other desirable properties. Except for Sybil-proofness, we also consider cost minimization for the requester and agents' collusions.
4

Shahaf, Gal, Ehud Shapiro, and Nimrod Talmon. "Sybil-Resilient Reality-Aware Social Choice." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Sybil attacks, in which fake or duplicate identities (a.k.a., Sybils) infiltrate an online community, pose a serious threat to such communities, as they might tilt community-wide decisions in their favor. While the extensive research on sybil identification may help keep the fraction of sybils in such communities low, it cannot however ensure their complete eradication. Thus, our goal here is to enhance social choice theory with effective group decision mechanisms for communities with bounded sybil penetration. Inspired by Reality-Aware Social Choice, we use the status quo as the anchor of Sybil Resilience, characterized by Sybil Safety -- the inability of sybils to change the status quo against the will of the genuine agents, and Sybil Liveness -- the ability of the genuine agents to change the status quo against the will of the sybils. We consider the social choice settings of deciding on a single proposal, on multiple proposals, and on updating a parameter. For each, we present social choice rules that are sybil-safe and, under certain conditions, satisfy sybil-liveness.
5

Soares, Álysson De Sá, Ricardo Batista Das Neves Junior, and Byron Leite Dantas Bezerra. "BID Dataset: a challenge dataset for document processing tasks." In Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sibgrapi.est.2020.12997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The digital relationship between companies and customers happens through online systems where consumers must upload their identification documents pictures to prove their identities. The existence of this large volume of document images encourages the research development to generate image processing systems to automate tasks usually performed by humans, such as Document Type Classification and Document Reading. The lack of identification documents public datasets delays the research development in document image processing because researchers need to attempt partnerships with private or governmental institutions to obtain the data or build their dataset. In this context, this work presents as main contributions a system to support the automatic creation of identification document public datasets and the Brazilian Identity Document Dataset (BID Dataset): the first Brazilian identification documents public dataset. To accomplish the current personal data privacy law, all information in the BID Dataset comes from fake data. This work aims to increase the velocity of research development in identification document image processing, considering that researchers will be able to use the BID Dataset to develop their research freely.
6

Monaro, Merylin, Luciano Gamberini, and Giuseppe Sartori. "Spotting Faked Identities via Mouse Dynamics Using Complex Questions." In Proceedings of the 32nd International BCS Human Computer Interaction Conference. BCS Learning & Development, 2018. http://dx.doi.org/10.14236/ewic/hci2018.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Pengfei, Yingfan Tao, Qiqi Bao, Guijin Wang, and Wenming Yang. "EvenFace: Deep Face Recognition with Uniform Distribution of Identities." In 2023 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 2023. http://dx.doi.org/10.1109/icme55011.2023.00298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liodakis, Stylianos, and Tilemachos Kakardakis. "Measuring the Particle Flammability of Forest Species from Wildland/Urban Inter-face (WUI) near Athens by Thermal Analysis." In 2006 First International Symposium on Environment Identities and Mediterranean Area. IEEE, 2006. http://dx.doi.org/10.1109/iseima.2006.345043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Paora, Tangaroa. "Applying a kaupapa Māori paradigm to researching takatāpui identities." In LINK 2022. Tuwhera Open Access, 2022. http://dx.doi.org/10.24135/link2022.v3i1.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this practice-led doctoral thesis I adopt a Kaupapa Māori paradigm, where rangahau (gathering, grouping and forming, to create new knowledge and understanding), is grounded in a cultural perspective and Māori holistic worldview that is respectful of tikanga Māori (customs) and āhuatanga Māori (cultural practices). The case study that forms the focus of the presentation asks, “How might an artistic reconsideration of gender role differentiation shape new forms of Māori performative expression”. In addressing this, the researcher is guided and upheld by five mātāpono (principles): He kanohi kitea (a face seen, is appreciated) Titiro, whakarongo, kōrero (looking, listening and speaking) Manaakitangata (sharing and hosting people, being generous) Kia tūpato (being cautious) Kāua e takahi i te mana o te tangata (avoiding trampling on the mana of participants). In connecting these principles and values that are innate within te ao Māori (Māori people and culture) the paper unpacks a distinctive approach taken to interviewing and photographing nine takatāpui tāne (Māori males whose sexuality and gender identification are non-heteronormative). These men’s narratives of experience form the cornerstone of the inquiry that has a research focus on tuakiritanga (identity) where performative expression and connectivity to Māori way of being, causes individuals to carry themselves in distinctive ways. The lived experience of being takatāpui within systems that are built to be exclusive and discriminatory is significant for such individuals as they struggle to reclaim a place of belonging within te ao Māori, re-Indigenise whakaaro (understanding), and tangatatanga (being the self). In discussing a specifically Māori approach to drawing the poetics of lived experience forward in images and text, the presentation considers cultural practices like kaitahi (sharing of food and space), kanohi ki te kanohi kōrero (face to face interviewing), and manaakitangata (hosting with respect and care). The paper then considers the implications of working with an artistic collaborator (photographer), who is not Māori and does not identify as takatāpui yet becomes part of an environment of trust and vulnerable expression. Finally, the paper discusses images surfacing from a series of photoshoots and interviews conducted between August 2021 and February 2023. Here my concern was with how a participant’s identitiy and perfomativity might be discussed when preparing for a photoshoot, and then reviewing images that had been taken. The process involved an initial interview about each person’s identitiy, then a reflection on images emanating from studio session. For the shoot, the participant initially dressed themseleves as the takatāpui tāne who ‘passed’ in the world and later as the takatāpui tāne who dwelt inside. For the researcher, the process of titiro, whakarongo, kōrero (observing, listening and recording what was spoken), resourced a subsequent creative writing exercise where works were composed from fragments of interviews. These poems along with the photographs and interviews, constituted portraits of how each person understood themself as a self-realising, proud, fluid and distinctive Māori individual.
10

Caldeira, Eduarda, Pedro C. Neto, Tiago Gonçalves, Naser Damer, Ana F. Sequeira, and Jaime S. Cardoso. "Unveiling the Two-Faced Truth: Disentangling Morphed Identities for Face Morphing Detection." In 2023 31st European Signal Processing Conference (EUSIPCO). IEEE, 2023. http://dx.doi.org/10.23919/eusipco58844.2023.10289844.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Fake identities":

1

Kothari, Jayna, Krithika Balu, and Rohit Sarma. Beyond the Binary: Advancing Legal Recognition for Intersex Persons in India. Centre for Law and Policy Research, July 2020. http://dx.doi.org/10.54999/horl3024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This Policy Brief proposes the need for legal recognition of intersex persons and intersex rights, given their unique experience and the inability of the overlap between transgender and intersex identities to address all the vulnerabilities and rights of the latter community. Legal recognition of intersex rights creates awareness about the unique identity of intersex persons, can curb IGM and other forms of discrimination and stigma that intersex persons face.
2

Borch, Thomas, Yitzhak Hadar, and Tamara Polubesova. Environmental fate of antiepileptic drugs and their metabolites: Biodegradation, complexation, and photodegradation. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597927.bard.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Many pharmaceutical compounds are active at very low doses, and a portion of them regularly enters municipal sewage systems and wastewater-treatment plants following use, where they often do not fully degrade. Two such compounds, CBZ and LTG, have been detected in wastewater effluents, surface waters, drinking water, and irrigation water, where they pose a risk to the environment and the food supply. These compounds are expected to interact with organic matter in the environment, but little is known about the effect of such interactions on their environmental fate and transport. The original objectives of our research, as defined in the approved proposal, were to: Determine the rates, mechanisms and products of photodegradation of LTG, CBZ and selected metabolites in waters exposed to near UV light, and the influence of DOM type and binding processes on photodegradation. Determine the potential and pathways for biodegradation of LTG, CBZ and selected metabolites using a white rot fungus (Pleurotusostreatus) and ADP, and reveal the effect of DOM complexation on these processes. Reveal the major mechanisms of binding of LTG, CBZ and selected metabolites to DOM and soil in the presence of DOM, and evaluate the effect of this binding on their photodegradation and/or biodegradation. We determined that LTG undergoes relatively slow photodegradation when exposed to UV light, and that pH affects each of LTG’s ability to absorb UV light, the efficiency of the resulting reaction, and the identities of LTG’sphotoproducts (t½ = 230 to 500 h during summer at latitude 40 °N). We observed that LTG’sphotodegradation is enhanced in the presence of DOM, and hypothesized that LTG undergoes direct reactions with DOM components through nucleophilic substitution reactions. In combination, these data suggest that LTG’s fate and transport in surface waters are controlled by environmental conditions that vary with time and location, potentially affecting the environment and irrigation waters. We determined that P. ostreatusgrows faster in a rich liquid medium (glucose peptone) than on a natural lignocellulosic substrate (cotton stalks) under SSF conditions, but that the overall CBZ removal rate was similar in both media. Different and more varied transformation products formed in the solid state culture, and we hypothesized that CBZ degradation would proceed further when P. ostreatusand the ᵉⁿᶻʸᵐᵃᵗⁱᶜ ᵖʳᵒᶠⁱˡᵉ ʷᵉʳᵉ ᵗᵘⁿᵉᵈ ᵗᵒ ˡⁱᵍⁿⁱⁿ ᵈᵉᵍʳᵃᵈᵃᵗⁱᵒⁿ. ᵂᵉ ᵒᵇˢᵉʳᵛᵉᵈ ¹⁴C⁻Cᴼ2 ʳᵉˡᵉᵃˢᵉ ʷʰᵉⁿ ¹⁴C⁻ᶜᵃʳᵇᵒⁿʸˡ⁻ labeled CBZ was used as the substrate in the solid state culture (17.4% of the initial radioactivity after 63 days of incubation), but could not conclude that mineralization had occurred. In comparison, we determined that LTG does not degrade in agricultural soils irrigated with treated wastewater, but that P. ostreatusremoves up to 70% of LTG in a glucose peptone medium. We detected various metabolites, including N-oxides and glycosides, but are still working to determine the degradation pathway. In combination, these data suggest that P. ostreatuscould be an innovative and effective tool for CBZ and LTG remediation in the environment and in wastewater used for irrigation. In batch experiments, we determined that the sorption of LTG, CBZ and selected metabolites to agricultural soils was governed mainly by SOM levels. In lysimeter experiments, we also observed LTG and CBZ accumulation in top soil layers enriched with organic matter. However, we detected CBZ and one of its metabolites in rain-fed wheat previously irrigated with treated wastewater, suggesting that their sorption was reversible, and indicating the potential for plant uptake and leaching. Finally, we used macroscale analyses (including adsorption/desorption trials and resin-based separations) with molecular- level characterization by FT-ICR MS to demonstrate the adsorptive fractionation of DOM from composted biosolids by mineral soil. This suggests that changes in soil and organic matter types will influence the extent of LTG and CBZ sorption to agricultural soils, as well as the potential for plant uptake and leaching.
3

Meadows, Michael. Thesis Review: The Role of SANZ, a Migrant Radio Programme, in Making Sense of Place for South African Migrants in New Zealand. Unitec ePress, November 2016. http://dx.doi.org/10.34074/thes.revw22016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study is a detailed, qualitative exploration of the role played by a South African migrant radio programme, SANZ Live, in supporting its audience to create a sense of place in Auckland, New Zealand, through a range of on- and off-air activities. The thesis concludes that SANZ Live contributes to the creation of opportunities for South African migrants to find a sense of place through producing media content, participating in face-to-face communication through the off-air activities of SANZ Live, participating in SANZ Live social media and perpetuating aspects of South African culture through various programme-related activities. This multi-layered participation works to establish a new routine and a hybrid culture that enables South African migrants to establish new individual, group, and collective identities – becoming ‘South African Kiwis’ – in their new home of choice.In her exploration of this important topic, the author has used a wide range of relevant academic and industry sources to outline the role of Auckland community radio, and the station SANZ in particular, in creating a new hybrid sense of identity for the city’s South African community. It builds on earlier work elsewhere that has explored similar topics (Downing, 2001, 2003; Downing & Husband, 2005; Forde et al, 2009). But importantly, the study has revealed the critical role of being played by the radio programme in smoothing South African immigrants’ transition into New Zealand society – an important dimension of the settlement process.
4

Carter, Becky. Gender Inequalities in the Eastern Neighbourhood Region. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/k4d.2021.062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This rapid review examines evidence on the structural causes and drivers of gender inequalities in the Eastern Neighbourhood region and how these gender inequalities contribute to instability in the region. While the Eastern Neighbourhood region performs relatively well on gender equality compared with the rest of the world, women and girls continue to face systemic political and economic marginalisation and are vulnerable to gender-based violence. Research on Armenia, Azerbaijan, Georgia, and Moldova identifies the key underlying cause to be a set of traditional patriarchal gender norms, intersecting with conservative religious identities and harmful customary practices. These norms do not operate in isolation: the literature highlights that gender inequalities are caused by the interplay of multiple factors (with women’s unequal economic resources having a critical effect), while overlapping disadvantages affect lived experiences of inequalities. Other key factors are the region’s protracted conflicts; legal reform gaps and implementation challenges; socio-economic factors (including the impact of COVID-19); and governance trends (systemic corruption, growing conservatism, and negative narratives influenced by regional geopolitics). Together these limit women and girls’ empowerment; men and boys are also affected negatively in different ways, while LGBT+ people have become a particular target for societal discrimination in the region. Global evidence – showing that more gender unequal societies correlate with increased instability – provides a frame of reference for the region’s persistent gender inequalities.
5

Shaw, Kristi Lee, and Geoff Bridgman. Creating Appreciation and Community Support for Mothers Caring for a Child with an Anxiety Disorder. Unitec ePress, February 2023. http://dx.doi.org/10.34074/mono.097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This research examined a unique approach to anxiety disorder, one of the most prevalent and growing mental health concerns internationally. It uncovered the mostly invisible and challenging experiences of mothers caring for a child with an anxiety disorder and the value of their reciprocal relationships with their children for both their health and wellbeing. In addition, it explored social identity in making meaningful connection using a generative action-oriented social approach to address anxiety in the community. An appreciative inquiry, using social constructionist theory, and underpinned by elements of kaupapa Māori values, was utilised to explore the research questions. The data was collected via paired interviews, focus groups and small questionnaires with three to four mothers, after which thematic analysis was undertaken to identify important themes.There were four key themes discovered in the findings: (1) the mothers’ ongoing and challenging experiences of being silenced and isolated on the fringes, navigating the quagmire of social and institutional systems to help them help their children; (2) the mothers’ learning to cope by creating calm in the home, the child, and in themselves, often requiring them to ‘suspend’ their lives until their children become more independent; (3) the mothers employing a mother as advocate identity to face the challenges, and co-creating a mother as advocate group identity to continue to face those challenges to design a collective initiative;and (4) the value of freedom that the mothers experienced participating in the appreciative inquiry process with other mothers facing similar challenges and sharing their stories.This study demonstrates how appreciative inquiry is aligned with and supports the value of social identity theory and creating meaningful connections to help position and address anxiety disorder in the community. A key insight gained in this study is that our current social and institutional systems create disconnection in many facets of Western life, which contributes to the generation and perpetuation of stigmatisation, isolation and anxiety disorder. Within a Western capitalistic and individualistic culture, mental illness has become predominantly pathologised and medicated, positioning anxiety disorder within the child, and relegating the social dimension of the biopsychosocial approach as almost irrelevant. As mothers in this system spend valuable energy advocating for more support for their children, they put their own mental health at risk. There is no one solution; however, this study demonstrates that when mothers are supported through an appreciative inquiry process, strengthening their personal and social identities, there is the potential for health and wellbeing to increase for them, their children and the community.

To the bibliography