Articoli di riviste sul tema "Fake identities"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Fake identities.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Fake identities".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Teixeira da Silva, Jaime A. "Fake peer reviews, fake identities, fake accounts, fake data: beware!" AME Medical Journal 2 (1 marzo 2017): 28. http://dx.doi.org/10.21037/amj.2017.02.10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Topor, Lev, e Moran Pollack. "Fake Identities in Social Cyberspace". International Journal of Cyber Warfare and Terrorism 12, n. 1 (gennaio 2022): 1–17. http://dx.doi.org/10.4018/ijcwt.295867.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Personation - the act of assuming another’s identity with intent to deceive, is an ancient phenomenon. In this article we seek to research online impersonation and to uncover the causes for this phenomenon. We do so by analyzing and comparing several case studies while referring to more traditional concepts of social identity. As discovered, on the one hand users can create fake identities to enhance their personalities for personal reasons such as voyeurism or as means of escaping reality, or even promote human rights by avoiding local authoritarian censorship. On the other hand, malicious users like terrorists or criminals manipulate online users with phishing attempts and frauds, making social cyber space less secure.
3

Taj, Sohail, e Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook". Global Digital & Print Media Review V, n. II (30 giugno 2022): 44–52. http://dx.doi.org/10.31703/gdpmr.2022(v-ii).05.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Facebook is one of the most popular social networking sites, but some call it a "fake book" (Mülle and Schulz, 2019). Hence to explore the phenomenon of fake identities, the study examined how Facebook users construct their identities and how much profile information is phony. The study used a survey methodology, and 647 university students (252 male and 351 female) participated. Facebook has 14 fields of profile data against which respondents have answered on the Likert scale whether they disclose their accurate information. The study found that both male (mean score 1.9)and female (mean score 2.3) Facebook users create fake identities, but women create more fake identities than men.
4

Hasibuan, Juneidi, e Syafrudin Syam. "A Legal Analysis on Online Fraud Using Fake Identity". Indonesian Journal of Multidisciplinary Science 2, n. 10 (27 luglio 2023): 3308–17. http://dx.doi.org/10.55324/ijoms.v2i10.574.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This study aims to analyze the legal accountability for online fraud using fake identities, also known as catfishing. The phenomenon of catfishing has become increasingly prevalent with the advancement of information technology, particularly in the use of social media and online dating applications. The practice of online fraud using fake identities has detrimental emotional, psychological, and financial impacts on victims.The research method used is document analysis and literature review. Through document analysis, the researcher analyzes relevant texts and legal documents such as laws, regulations, court decisions, and government policies related to online fraud and fake identities. Meanwhile, through literature review, the researcher searches for and reviews relevant literature on the legal aspects of online fraud and fake identities.The research findings indicate that catfishing can be a violation of the law depending on the country and jurisdiction in place. Some countries have adopted laws that regulate online fraud and the misuse of fake identities. However, identifying catfish perpetrators and enforcing related laws often proves to be challenging as they employ various means to conceal their true identities in the virtual world. The legal accountability for online fraud using fake identities needs to be acknowledged and strengthened. In this regard, law enforcement and prosecution of catfish perpetrators are crucial to protect society from online fraud practices. Additionally, prevention and protection efforts involving education and public awareness regarding the risks and preventive measures against catfishing should also be enhanced.
5

Suganya, R., S. Muthulakshmi, B. Venmuhilan, K. Varun Kumar e G. Vignesh. "Detect fake identities using improved Machine Learning Algorithm". Journal of Physics: Conference Series 1916, n. 1 (1 maggio 2021): 012056. http://dx.doi.org/10.1088/1742-6596/1916/1/012056.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Walczyna, Tomasz, e Zbigniew Piotrowski. "Fast Fake: Easy-to-Train Face Swap Model". Applied Sciences 14, n. 5 (4 marzo 2024): 2149. http://dx.doi.org/10.3390/app14052149.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The proliferation of “Deep fake” technologies, particularly those facilitating face-swapping in images or videos, poses significant challenges and opportunities in digital media manipulation. Despite considerable advancements, existing methodologies often struggle with maintaining visual coherence, especially in preserving background features and ensuring the realistic integration of identity traits. This study introduces a novel face replacement model that leverages a singular framework to address these issues, employing the Adaptive Attentional Denormalization mechanism from FaceShifter and integrating identity features via ArcFace and BiSeNet for enhanced attribute extraction. Key to our approach is the utilization of Fast GAN, optimizing the training efficiency of our model on relatively small datasets. We demonstrate the model’s efficacy in generating convincing face swaps with high fidelity, showcasing a significant improvement in blending identities seamlessly with the original background context. Our findings contribute to visual deepfake generation by enhancing realism and training efficiency but also highlight the potential for applications where authentic visual representation is crucial.
7

Qu, Shunhai, e Viroj Wiwanitkit. "Fake Identities in Social Network Research: To Be Disclosed?" Science and Engineering Ethics 20, n. 4 (19 dicembre 2013): 1151. http://dx.doi.org/10.1007/s11948-013-9505-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Sarulatha, Sreerambabu, Kalidasan e Mohammed Riyaz. "Fake Face Detection in Identity Cards Using Stegoface". International Journal for Research in Applied Science and Engineering Technology 11, n. 8 (31 agosto 2023): 622–26. http://dx.doi.org/10.22214/ijraset.2023.55069.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract: Identification and Machine-Readable Travel Documents (MRTDs) play a crucial role in verifying and validating identities in various situations, such as international travel, civil applications, online commerce, and access to transaction processing systems. These documents incorporate multiple security features aimed at preventing document forgery. However, criminals have shifted their focus to obtaining genuine documents fraudulently and manipulating facial portraits, as the existing security systems are challenging to bypass. To address this issue and mitigate the risks associated with such fraud, it is imperative for governments and ID/MRTD manufacturers to continually enhance and develop security measures. In this context, we present StegoFace, an innovative and efficient steganography method specifically designed for concealing secret messages within facial images found on common IDs and MRTDs. StegoFace employs an end-to-end approach, consisting of an ensemble of n Deep Convolutional Auto Encoders, which encode the secret message into a stegofacial image, and a Deep Convolutional Auto Decoder, capable of extracting the hidden message from the stegofacial image. Notably, our StegoFace approach outperforms the StegaStamp method in terms of perceptual quality, as evidenced by the results of metrics such as Peak Signal-to-Noise Ratio, hiding capacity, and imperceptibility on the test dataset.
9

Al-Abri, Khalid Hassan. "Reasons for Internet Users Using Fake Identity from an Islamic Perspective". Islamiyyat 44, n. 1 (1 giugno 2022): 183–92. http://dx.doi.org/10.17576/islamiyyat-2022-4401-16.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Among internet users are those who hide their true personalities by having several identities and names on different sites. This research requires years of personal experience, careful observation, and analysis, which the researchers try to relate to reality. This paper discusses the consequence of fake accounts on the internet. The results of this study suggests one person may have multiple identities on different sites. As a result, the internet has become a hotbed for anyone to write and act irresponsibly. In the Islamic view, the reasons internet users have for hiding their real identities, can be divided into two categories; namely, acceptable and unacceptable or wrongful. Acceptable reasons include the need to protect identity, preventive measures, and fear of harm. Unacceptable or wrongful reasons include, harassment and spying.
10

Van Der Walt, Estee, e Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans". IEEE Access 6 (2018): 6540–49. http://dx.doi.org/10.1109/access.2018.2796018.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

A. Teixeira da Silva, Jaime. "AI in the Era of Fakes and Deepfakes: Risk of Fabricated Photographs and Identities in Academic Publishing". Journal of Information Security and Cybercrimes Research 6, n. 2 (28 novembre 2023): 71–73. http://dx.doi.org/10.26735/knja7076.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Academic publishing has entered an era of fake, including fake authors who are either real entities using fake credentials, or totally concocted personalities that give the impression of real humans. Both can be achieved via the use of artificial intelligence (AI) and software that is capable of completing such a task, and ultimately a deepfake is created. The creation of fictitious deepfakes, even more so when assisted or driven by AI, allows creators to not only establish a fake image or photo, but also embed it within a fake context (e.g., profile). For whatever reason, there are risk of deepfakes during manuscript submission and the publication process, as well as on academic social network sites, like ResearchGate, but are academics, journals and publishers sufficiently prepared to detect them?.
12

S. Borkar, Bharat. "Identification of Fake Identities on Social Media using various Machine Learning Algorithm". International Journal of Advanced Trends in Computer Science and Engineering 9, n. 4 (25 agosto 2020): 6214–20. http://dx.doi.org/10.30534/ijatcse/2020/299942020.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Elovici, Yuval, Michael Fire, Amir Herzberg e Haya Shulman. "Ethical Considerations when Employing Fake Identities in Online Social Networks for Research". Science and Engineering Ethics 20, n. 4 (12 novembre 2013): 1027–43. http://dx.doi.org/10.1007/s11948-013-9473-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Chaurasiya, Adarsh, Amrit Verma, Kota Shamitha e Dr Gaurav Kumar. "Fake Profile Detection in Instagram". International Journal for Research in Applied Science and Engineering Technology 12, n. 5 (31 maggio 2024): 1463–72. http://dx.doi.org/10.22214/ijraset.2024.60629.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract: In today's society, online communities have become an integral part of daily life, with individuals actively engaging in social media interactions regardless of their location or schedule. However, the prevalence of pseudo personas has contributed to sophisticated persistent attacks and other malicious activities, raising concerns about the privacy of personal data among online community members. This research seeks to identify and address the pressing issue of fraudulent identity projection on social media platforms, particularly focusing on Instagram. By employing automated techniques such as predictive modeling and image identification combined with text analysis, the study aims to enhance the detection of fake profiles. The research utilizes the chi-square method for feature selection and applies learner-centered algorithms like Random Forest (RF) and logistic regression for categorization. The evaluation of outcomes will be based on metrics including relevance, specificity, recall, f1- value efficiency, and accuracy. The exponential growth and influence of social media globally have underscored the urgency of mitigating the proliferation of fraudulent identities, which pose challenges ranging from propaganda to racial profiling. The findings of this research are expected to contribute to the development of effective strategies for identifying and addressing fake profiles, thus safeguarding the integrity and security of online communities
15

Saddique, Junaid, Imran Qureshi e Atif Shabbir. "Effects of Social Media Brand Reviews on Trust and Brand Perception: An Experimental Study on Facebook in Pakistani context". Jinnah Business Review 5, n. 2 (1 luglio 2017): 22–35. http://dx.doi.org/10.53369/haii7048.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Attraction towards social networking sites is increasing day by day. People join social networking sites to communicate with their friends, share their feelings and gain information from different platforms. One of the most popular social networking sites is Facebook with 1.7 billion active users. However, there are many users of Facebook with fake identities, communicating with other users just for fun and enjoyment. Companies are also attracted towards Facebook for advertisement, consumer engagement and feedbacks of customers bearing very low cost. However, users with fake identities also like different products and leave their comments on different brand pages. So companies are unable to get true picture of customer’s feedback and these fake reviews also damage trust of other customers. Current study examined the effect of brand page reviews on customer’s trust, perceived risk and perceived benefit. Both fake and original comments were considered in study. Effect of reviews is tested on three types of trust (interpersonal trust, dispositional trust and institutional trust). Experimental approach was used to collect data from 300 participants. Regression analysis was used to test the hypotheses of study. Results show that people believe more in comments and information provided by their friends or by third party. While getting information from social media, users trust comments and reviews provided by other users without differentiating original and fake comments. Users of Facebook trust in brand but normally ignore information provided by company itself. Furthermore, other users of social networking sites are affected by comments and reviews. Managerial implications are also discussed.
16

Hermawati, Tanti, Rila Setyaningsih e Rahmadya Putra Nugraha. "Teen Motivation to Create Fake Identity Account on Instagram Social Media". International Journal of Multicultural and Multireligious Understanding 8, n. 4 (3 aprile 2021): 87. http://dx.doi.org/10.18415/ijmmu.v8i4.2459.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The development of digital technology has brought human fantasy goes beyond limits, creating a three-dimensional space of the following items inside, to a stage where virtual reality has exceeded the manipulation and visual image so as to guide humans step from the real world to the fantasy world. The virtual world looks real and this includes the development of social media such as Instagram. Teens take advantage of such conditions to have a different identity. They can be whatever they want. Fake identities in cyberspace are a solution to teenage problems regarding the absence of self-confidence and social realities in the real world. In particular, this paper will discuss how the virtual reality phenomenon is coupled with real reality by reviewing virtual communication through social media in cyberspace, especially Instagram. The discussion section will begin to discuss the symbolic interactions found on social media, followed by the creation of identity among teens, and also the motivation of teens to create fake identities. The end part of the discussion concluded that social media provided a space for teenagers to have the identity they desire. This identity led teenagers to become another people to cover up their shortcomings. The motivation for teenagers to have a fake identity on Instagram was also supported by the desire to get good appraisal from fellow Instagram users that they might not get in the real world.
17

Liu, Dong, Quan Yuan Wu e Wei Hong Han. "Linking Multiple Identities in Online Social Networks Based on Co-Occurrence Analysis". Applied Mechanics and Materials 713-715 (gennaio 2015): 2257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2257.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
When tackling the problem of mining multiple fake identities which are controlled by the same individual in internet, traditional techniques used to analyze the posted comments using text-based methods. However, these texts are always in colloquial style which make the effect may not be as obvious as expected. In this paper a new multiple identities linking algorithm is proposed based on the fine-grained analysis of co-occurrence degree of user accounts using sliding window model. Finally, a series of experiments show the effectiveness of our proposed method.
18

Hamdan, Salam, Raad S. Al-Qassas e Sara Tedmori. "Comparative Study on Sybil Attack Detection Schemes". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, n. 7 (6 maggio 2015): 5869–76. http://dx.doi.org/10.24297/ijct.v14i7.1898.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Vehicular Ad Hoc Network (VANET) is a wireless network formed between a collection of vehicles connected through wireless connections. VANETs can help increase the passengers comfort, safety, efficiency and convenience by providing them with information about the ongoing road status and other relevant road information. VANETs, similar to other networks, face numerous security threats. One such threat is the Sybil attack, a critical threat that can impair the proper functioning of VANETs. In a Sybil attack, a malicious node illegitimately claims multiple identities and simultaneously exploits these fake identities in order todisturb the functionality of the VANET by disseminating false information. In the presence of a Sybil node, any kind of attack can be launched on the VANET. This paper provides a comprehensive review and comparison of the different techniques that have been proposed in the literature to prevent or reduce the adverse effects of Sybil attacks.
19

Tracy, Sarah J., e Angela Trethewey. "Fracturing the Real-Self?Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities". Communication Theory 15, n. 2 (maggio 2005): 168–95. http://dx.doi.org/10.1111/j.1468-2885.2005.tb00331.x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Tracy, S. J. "Fracturing the Real-Self Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities". Communication Theory 15, n. 2 (1 maggio 2005): 168–95. http://dx.doi.org/10.1093/ct/15.2.168.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Núñez-Canal, Margarita, e Luis Núñez-Ladevéze. "Understanding the revolt: «Man the Technician» in global rhetoric". Communication & Society 34, n. 4 (4 ottobre 2021): 33–47. http://dx.doi.org/10.15581/003.34.4.33-47.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
We have used quotations that McLuhan cited from the works of Ortega y Gasset, never been commented, for comparing the concurrence between the analyses of the “revolt of the masses” and “return to the village” in the network. This review discerns how both descriptions converge in a framework that fosters the unlimited expansion of face-to-face relationships which, by encouraging remote adherence to virtual identities, fosters a plethora of communicative practices. Internet encourages persuasive stratagems that foster rhetorical turmoil, which makes it impossible to distinguish sound arguments from those that are fallacious, and credible from false information. “Populism,” “fake news,” and “post-truth” suddenly appeared in everyday language as a sign of this rhetorical transience that fosters the collision of identities in the regressive, technological anchor of “back to the tribes” in the “global village.” Having analysed the concomitance of McLuhan and Ortega from a phenomenological perspective, which has into account emotion in the argumentative process, the conclusions focus on proposals for restoring deliberative norms that have become diluted during modernity and whose meaning endures in normative practices akin to the rhetorical tradition.
22

Sun, Ling, Yuan Rao, Yuqian Lan, Bingcan Xia e Yangyang Li. "HG-SL: Jointly Learning of Global and Local User Spreading Behavior for Fake News Early Detection". Proceedings of the AAAI Conference on Artificial Intelligence 37, n. 4 (26 giugno 2023): 5248–56. http://dx.doi.org/10.1609/aaai.v37i4.25655.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Recently, fake news forgery technology has become more and more sophisticated, and even the profiles of participants may be faked, which challenges the robustness and effectiveness of traditional detection methods involving text or user identity. Most propagation-only approaches mainly rely on neural networks to learn the diffusion pattern of individual news, which is insufficient to describe the differences in news spread ability, and also ignores the valuable global connections of news and users, limiting the performance of detection. Therefore, we propose a joint learning model named HG-SL, which is blind to news content and user identities, but capable of catching the differences between true and fake news in the early stages of propagation through global and local user spreading behavior. Specifically, we innovatively design a Hypergraph-based Global interaction learning module to capture the global preferences of users from their co-spreading relationships, and introduce node centrality encoding to complement user influence in hypergraph learning. Moreover, the designed Self-attention-based Local context learning module first introduce spread status to highlight the propagation ability of news and users, thus providing additional signals for verifying news authenticity. Experiments on real-world datasets indicate that our HG-SL, which solely relies on user behavior, outperforms SOTA baselines utilizing multidimensional features in both fake news detection and early detection task.
23

Gonçalves-Segundo, Paulo Roberto. "Fake news, moral panic, and polarization in Brazil: A critical discursive approach". Linguistic Frontiers 5, n. 2 (1 settembre 2022): 51–60. http://dx.doi.org/10.2478/lf-2022-0013.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract This paper aims to discuss the motivations and effects of the production, distribution and interpretation of fake news stories, which draw on moral panics in contemporary Brazilian society. To do so, the article combines recent research on fake news, mainly from Media Studies, Sociology and Political Science, with the Critical Discourse Analysis perspective on meaning-making. The main hypothesis advanced is that this kind of fake news story lies in the tension between the evident and the absurd, as they seem to be oriented towards eliciting different readings and reactions from the endo and the exogroup. In terms of the endogroup, they may function as a means both to foster social cohesion and induce affective responses that intensify the dichotomization of identities. Regarding the exogroup, they may act as a means of drawing antagonism towards progressive groups and political parties, in a process that aims at diverting public debate to topics that not only keep the polarization aflame, but also shift the focus of attention away from the issues and policies that the neoconservative agenda deems problematic.
24

Fuchs, Susanne. ""Proper” Profiles. On Facebook’s investment in the autobiographical genre." European Journal of Life Writing 5 (24 maggio 2016): 55–74. http://dx.doi.org/10.5463/ejlw.5.102.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The term “Fake profile” was invented by the press to designate Facebook-profiles that do not represent the life of their authors, but are instead used for depictions of alter egos or fictional characters. The following article investigates how the term “Fake profile” introduces a genre-designation that causes its alleged opposite, the “proper” profile to emerge. Put in conversation with Jacques Derrida’s discussion of the law of genre and Michel Foucault’s questioning of the referential function of the name of the author it becomes apparent, that the difference between “fake” and “proper” cannot be sustained; the signature of the author does not stabilize the relationship between the writer and the contents of the written text. It is ironically the company’s own attempt to guarantee the “authenticity” of the profiles established on the platform through a real name requirement, that draws attention to the impossibility of the fixation of this relation. The article examines in how far the suspension of genre-designations (fake and proper) causes the unease with which online-identities are generally regarded within the press and the Academic discourse. This article was submitted on July 22nd 2015 and published on May 24th 2916.
25

B. Deepika, S. Sneka, S. Susila, P. Suvetha e S. Swetha. "Blockchain Enabled Social Network for Detecting Fake Accounts". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n. 2 (27 aprile 2024): 747–56. http://dx.doi.org/10.32628/cseit24102107.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Front end technology with permanent accounts is employed in online social networks to help people get to know one another. In an effort to maintain connection with everyone, Facebook and Twitter are changing along with the users. OSNs are used by them for planning events, news exchange, interpersonal communication, and even running their own online enterprises. Because of OSNs' quick growth and the abundance of personal data that its users have shared, attackers and imposters have been lured to them with the intention of stealing personal information, spreading disruptive activities, and publishing false information. A further rationale for creating fictitious profiles for hateful accounts. In an attempt to harm the reputation of the person they detest, these users make profiles using their usernames and publish photographs and articles that aren't related to them. to use blockchain technology, Aadhar number verification, and SVM profile classification to create a reliable solution for detecting phoney social network profiles. By analysing several aspects of social media profiles, the SVM classification uses machine learning to discern between real and fraudulent accounts. By verifying Aadhar numbers through legitimate channels, Aadhar number verification is integrated into the registration process, guaranteeing the authenticity of user identities. A decentralised and secure identity management system is made possible by the use of blockchain technology, with smart contracts providing immutable storage for verified user data.
26

Al-Marshoud, Mishri Saleh, Ali H. Al-Bayatti e Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs". Electronics 10, n. 11 (30 maggio 2021): 1302. http://dx.doi.org/10.3390/electronics10111302.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system’s infrastructure introduce the potential for attacks that lessen safety and weaken passengers’ privacy. The purpose of short-lived anonymous identities, called “pseudo-identities”, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined area, called a cryptographic mix-zone (CMIX) to ensure enhanced protection. According to ETSI ITS technical report recommendations, the researchers must consider the low-density scenarios to achieve unlinkability in CMIX. Recently, Christian et al. proposed a Chaff-based CMIX scheme that sends fake messages under the consideration of low-density conditions to enhance vehicles’ privacy and confuse attackers. To accomplish full unlinkability, in this paper, we first show the following security and privacy vulnerabilities in the Christian et al. scheme: Linkability attacks outside the CMIX may occur due to deterministic data sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters’ (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang et al.’s scheme to provide mutual authentication without revealing the real identity. To this end, the messages of a vehicle are signed with a different pseudo-identity “certificate”. Furthermore, the density is increased via the sending of fake messages in low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian et al.’s scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the false positives’ effect on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, the mutual authentication prevents any leakage from the mix zones’ symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange.
27

Angelina, Dr J. Jane Rubel. "Fake Instagram Account Detection using ML Algorithms". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 02 (8 febbraio 2024): 1–13. http://dx.doi.org/10.55041/ijsrem28637.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract—Nowadays, the majority of people utilise social networking sites on a daily basis. Numerous people create profiles on social networking websites every day and connect with others there, regardless of their location or time. False identities are used in additional malicious operations in addition to playing a significant part in advanced persistent threats. Users of social networking sites can benefit from them, but they also have to worry about the security of their personal information. We must first determine the user's social network accounts before we can determine who is endorsing threats in these platforms. Social media usage has dramatically increased in recent years, according to statistics. Social networking sites have made things easier as they allow us to connect to people effortlessly and converse with them without the requirement for physical meetups. One of the major issues with Online Social Networks (OSNs) is fake interaction, which is used to artificially boost an account's popularity. Because phoney involvement causes businesses to lose money, inaccurate audience targeting in advertising, inaccurate product prediction systems, and an undesirable social network atmosphere, its detection is essential. Based on the classification, it is required to distinguish between real and phoney profiles on social media.Several categorization techniques have traditionally been used to identify phoney social media accounts. However, there are ways to improve social media's ability to detect phoney profiles. The suggested effort uses technology and machine learning to boost the percentage of predicted phoney profiles. Chi-square technique is used in feature selection models to find the best data. The several machine learning methods, including the Logistic Regression and Random Forest algorithms, are used in the classification approach. The classification outcome based on recall, sensitivity, specificity, f1-score, accuracy, and precision. Keywords—Machine learning, online social networks, Instagram, Social media, Natural language process.
28

Teixeira da Silva, Jaime, e Aceil Al-Khatib. "The Deontology of Using Pets in Academic Publishing-Related Sting Operations". Exchanges: The Interdisciplinary Research Journal 10, n. 1 (27 ottobre 2022): 1–20. http://dx.doi.org/10.31273/eirj.v10i1.843.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Academic publishing has become considerably stringent in the past few years because of increased scrutiny focused on an overwhelming number of challenges. One of the greatest challenges that academia faces is the notion that certain elements within science publishing have entered an era of ‘fake’. There are few moral arguments in favor of anything fake in academic publishing, including fake identities (authors, reviewers, or editors), fake peer reviews, or fake publications. We argue – humor aside – that a zero-tolerance approach is likely essential to prevent the proliferation of fake aspects in academic publishing, independent of the publishing venue, i.e., journal or publisher. Sting operations against ‘predatory’ publishing outlets, which involve the use of fake authors, papers, or editors, continue to be selectively praised, including by some media. In this opinion article, we focus on the personification of animals assuming roles within academic publishing, such as authors or editors, to emphasize that while perhaps there is an element of humor, such actions may further endanger scientific integrity, precisely at a time when academic publishing is in the phase of a crisis of trust. We believe that while the authors of such hoaxes and sting operations involving animals, as well as some readers, may find humor in these actions, academic publishing cannot and should not be equated with reality shows. We ultimately argue that such hoaxes and sting operations have no place in academic publishing, nor do they have any scholarly value. Finally, we put forward a set of guidelines that could assist academics, including early career researchers, editors, publishers and ethics-related organizations, in dealing with these threats.
29

K. S. Sowmiya e G. Vinoth Kumar. "Gender Roles: An Examination of Sexuality and Socio-Cultural Tribal Identity". Shanlax International Journal of English 12, S1-Dec (14 dicembre 2023): 295–98. http://dx.doi.org/10.34293/rtdh.v12is1-dec.96.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The identity of sex is classified based on biological characteristics which are examined and proved by physician during the birth of the child. Whereas, Gender differences encompass the behaviors, expressions, desires, roles and identities which are socially formed. This paper attempts to examine whether the gay relationship in the college environment is real or unreal. It also aims to analyses the socio-cultural identities of the select Santhal Tribe with references to the food, festivals, religious beliefs, language, and other environmental elements. The relationship between gardening and human emotions is studied from the select work. According to Judith Butler’s Gender Theory and Gender Performative, gender is socially constructed by society. From her thoughts, the character in this select work assumes himself as homosexual and falls into the wrong fake relationship which destroys his mental and physical health.
30

Kareem, Rafeef, e Wesam Bhaya. "Fake Profiles Types of Online Social Networks: A Survey". International Journal of Engineering & Technology 7, n. 4.19 (27 novembre 2018): 919. http://dx.doi.org/10.14419/ijet.v7i4.19.28071.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. It plays a substantial role for users of the internet to hold out their everyday actions such as news reading, content sharing, product reviews, messages posting, and events discussing etc. Unfortunately, on the OSNs some new attacks have been recognized. Different types of spammers are existing in these OSNs. These cyber-criminals containing online fraudsters, sexual predators, catfishes, social bots, and advertising campaigners etc.OSNs abuse in different ways especially by creating fake profiles to carry out scams and spread their content. The identities of all these malicious are so damaging to the service providers and the users. From the opinion of OSNs service providers, the loss of bandwidth moreover the overall reputation of the network is affected by fake profiles. Thus, needing more complex automated methods, and tremendous effort manpower to discover and stopping these harmful users.This paper explains different kinds of OSNs risk generators such as cloned profiles, compromised profiles, and online bots (spam-bots, chat-bots, and social-bots). In addition, it presents several classifications of features that have been used for training classifiers in order to discover fake profiles. We try to show different ways that used to detect every kind of these malicious profiles. Also, this paper trying to show what is the dangerous type of profile attacks and the most popular in OSNs.
31

Krombholz, Katharina, Dieter Merkl e Edgar Weippl. "Fake identities in social media: A case study on the sustainability of the Facebook business model". Journal of Service Science Research 4, n. 2 (dicembre 2012): 175–212. http://dx.doi.org/10.1007/s12927-012-0008-z.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

KARAS, ELENI. "FAKE NEWS AND THE RITUALISATION OF THE SELF". Society Register 3, n. 2 (31 dicembre 2019): 109–21. http://dx.doi.org/10.14746/sr.2019.3.2.07.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Two hundred years have passed since the question of subjectivity (re-interpreted through Kierkegaard’s existentialism) became central in modern philosophy. Over these two centuries, multiple theories addressed and questioned the borders between authentic subjectivity and an internalized panopticon of the hegemonic views that dominate the subject. Nevertheless, they still have to be definitively defined. As we may try to point Fake News (FN) is an opponent to subjectivity, and yet it comes from the subject. FN is the intentional spreading through new technologies of false information on a global level by subjects that use social media, a process influencing not only the sense of socio-political reality but also the concept of identity. Identities (personal or collective) are in general the combination of the socially determined understanding of ‘who I am’ and the socially and psychologically influenced ‘mental model’ of ‘what the world - and the self within it - should be’, all expressed and produced under the fundamental influence of our idiosyncratic characteristics. One of the fields that all these factors meet and interact is the new mediated environment where almost everyone can participate and contribute. According to the Sociology of Communication as founded by Giddens, Habermas and Luckmann (Leydesdorff 2000) this makes the public part of our identity the dominant one, creating a ritual in which our narcissistic elements dominate our private ones. The Self, addressing itself into the public like an echo and back to the Self, becomes ritualized. In our paper, we explore the interrelation of this phenomenon with the creation and distribution of Fake News, from the vantage point of Kierkegaard’s existential philosophy.
33

Lavanya, S. Sri, N. Nikhitha Reddy, Nishath Afreen K.S, Noothi Srivarshini e N.Chudamani. "INSTAGRAM FAKE PROFILE DETECTION USING MACHINE LEARNING". Journal of Nonlinear Analysis and Optimization 14, n. 02 (2023): 215–24. http://dx.doi.org/10.36893/jnao.2023.v14i2.0215-0224.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
One of the major issues with Online Social Networks (OSNs) is fake interaction, which is used to artificially boost an account's popularity. The identification of fraudulent involvement is essential to prevent company losses, inaccurate audience targeting in advertising, inaccurate product prediction algorithms, and a negative impact on the atmosphere of social networks. This initiative focuses on the identification of automated and phoney accounts that cause phoney activity on Instagram. We are aware of no publicly accessible dataset for automated and phoney accounts. Two datasets have been created for this purpose in order to detect automated and phoney accounts. Machine learning approaches including Naive Bayes, logistic regression, support vector machines, and neural networks are used to find these accounts. Due to the dataset's unnatural bias, a cost-sensitive evolutionary algorithm is also used for the detection of automated accounts. Smote Nc technique is used to address the unevenness issue in the fictitious dataset. The results are 86% and 96%, respectively, for the automated and false account detection issues. Nowadays, the majority of people utilise social networking sites on a daily basis. Numerous people create profiles on social networking websites every day and connect with others there, regardless of their location or time. False identities are prevalent in different types of crime, as well as advanced persistent threats. Social networking site users not only benefit from them but also worry about the security of their personal information. We must first identify the user's social network accounts in order to determine who is disseminating threats in social networks. Based on the classification, it is required to distinguish between real and phoney profiles on social media. Several categorization techniques have traditionally been used to identify phoney social media accounts. However, there are ways to improve social media's ability to identify phoney profiles. The suggested effort uses technology and machine learning to boost the percentage of predicted phoney profiles.
34

Dwi Kurnia Wibowo, Ahmad Luthfi e Nur Widiyasono. "Investigation of Fake Insider Threats on Private Cloud Computing Services". International Journal of Science, Technology & Management 3, n. 5 (29 settembre 2022): 1484–91. http://dx.doi.org/10.46729/ijstm.v3i5.613.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Private cloud computing scheme is a solution that can be implemented as an alternative. The problem that occurs is the possibility of MITC (Man in the Cloud) attacks that infiltrate and manipulate identities so that they are detected as fake insider threats on cloud systems. This thesis aims to carry out threat analysis with the Man in the Cloud attack technique on private cloud computing services based on a study of the ISO 27032 standard. Reports and documentation of the results of the analysis are expected to become recommendations for the cybersecurity investigation and management process related to threats to cloud services with private schemes cloud computing.
35

Zubrzycki, Geneviève, e Anna Woźny. "The Comparative Politics of Collective Memory". Annual Review of Sociology 46, n. 1 (30 luglio 2020): 175–94. http://dx.doi.org/10.1146/annurev-soc-121919-054808.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This article examines the theoretical and empirical contributions of the interdisciplinary field of memory studies for a comparative sociology of collective memory and politics. We identify three major empirical foci that have structured the scholarship: the role of collective memory in the creation, legitimation, and maintenance of national identities and nation-states; political reckoning with the memory of difficult and violent pasts; and the ongoing transnationalization of collective memory. We conclude with suggestions for future research on the politics of memory given the rise of populism and so-called fake news.
36

Harunullah, Alvian, e Yusuf Gunawan. "Law Enforcement in Revealing Fraud Crime Cases via Internet Media". FOCUS 4, n. 2 (15 agosto 2023): 163–71. http://dx.doi.org/10.37010/fcs.v4i2.1331.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This research aims to assess how investigation and law enforcement are used to uncover cases of fraud committed via electronic media. This research was conducted at the Depok Metro Police. This research applies qualitative methods in its process with a focus on empirical research. Data collection was carried out through primary data sources and secondary data. Primary data was collected through interviews with investigators, while secondary information was obtained through the use of books and scientific publications. journals. The research results show that investigators at the Depok Metro Police face several obstacles in tracking fraud perpetrators via electronic media. These obstacles include difficulties in tracking criminals because they often use fake identities, obstacles in accessing perpetrators' account identity information because of the bank's bureaucratic process which takes quite a long time, as well as the lack of a special unit that handles fraud cases using electronic media and a lack of adequate equipment. to carry out searches for criminals using electronic media.
37

Leshno, Jacob D., e Philipp Strack. "Bitcoin: An Axiomatic Approach and an Impossibility Theorem". American Economic Review: Insights 2, n. 3 (1 settembre 2020): 269–86. http://dx.doi.org/10.1257/aeri.20190494.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Bitcoin’s main innovation lies in allowing a decentralized system that relies on anonymous, profit-driven miners who can freely join the system. We formalize these properties in three axioms: anonymity of miners, no incentives for miners to consolidate, and no incentive to assuming multiple fake identities. This novel axiomatic formalization allows us to characterize what other protocols are feasible: every protocol with these properties must have the same reward scheme as Bitcoin. This implies an impossibility result for risk-averse miners. Furthermore, any protocol either gives up on some degree of decentralization or its reward scheme is equivalent to Bitcoin’s. (JEL D82, E42, O33)
38

Rutjens, Bastiaan T., Sander van der Linden, Romy van der Lee e Natalia Zarzeczna. "A group processes approach to antiscience beliefs and endorsement of “alternative facts”". Group Processes & Intergroup Relations 24, n. 4 (31 maggio 2021): 513–17. http://dx.doi.org/10.1177/13684302211009708.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The global spread of antiscience beliefs, misinformation, fake news, and conspiracy theories is posing a threat to the well-being of individuals and societies worldwide. Accordingly, research on why people increasingly doubt science and endorse “alternative facts” is flourishing. Much of this work has focused on identifying cognitive biases and individual differences. Importantly, however, the reasons that lead people to question mainstream scientific findings and share misinformation are also inherently tied to social processes that emerge out of divisive commitments to group identities and worldviews. In this special issue, we focus on the important and thus far neglected role of group processes in motivating science skepticism. The articles that feature in this special issue cover three core areas: the group-based roots of antiscience attitudes; the intergroup dynamics between science and conspiratorial thinking; and finally, insights about science denial related to the COVID-19 pandemic. Across all articles, we highlight the role of worldviews, identities, norms, religion, and other inter- and intragroup processes that shape antiscientific attitudes. We hope that this collection will inspire future research endeavors that take a group processes approach to the social psychological study of science skepticism.
39

Jang, SangHoon, e SukJun Lee. "Study on the Invention of Real-time Internet Document Automatic Search & Analysis System for MND's Digital Identity". Journal of Advances in Military Studies 2, n. 3 (31 dicembre 2019): 1–21. http://dx.doi.org/10.37944/jams.v2i3.55.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
As Internet media develops, not only individuals but governments have digital identities (digital identity includes images made by digital media), in addition, as Internet media develops, chances are high that images will be determined by digital identity. Therefore, companies are meeting customer needs through digital image management and data analysis. This is also necessary for government organizations like the Ministry of National Defence (MND). At least we can prevent the damage caused by fake news and can see the Internet’s response to defense policy. Therefore, we invented an automatic search and analysis program for real-time internet documents. Also, through experiments with the policy of MND, we studied the significance and possibility of the project.
40

Shabir, Ghulam, Noor Ul Ain Nasir e Tanveer Hussain. "Impact Of Facebook Usage On Female University Students Of Pakistan: A Case Of Sexting And Harassment". Pakistan Journal of Gender Studies 21, n. 1 (8 marzo 2021): 19–32. http://dx.doi.org/10.46568/pjgs.v21i1.513.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This research study attempts to identify and understand the impact of social media, specifically Facebook on university female students living in Pakistan. In-depth interviews have been conducted with 20 female Facebook user of university students to knows the impact. The findings show that Cyberbullying and sexual harassment prevailing online and involves in different activities like; sexting, stalking, blackmailing, abusive & immoral conversation and forceful friendships with fake identities that has a serious influence on female students. Pakistani women are often easy victims of such crimes and there suffering goes unreported. They tend to hide it from society in order to guard their reputation. The study recommends strict punishments for such criminals in order to ensure security for women.
41

Chaubey, Nirbhay Kumar, e Dhananjay Yadav. "Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance". International Journal of Electrical and Computer Engineering (IJECE) 12, n. 2 (1 aprile 2022): 1703. http://dx.doi.org/10.11591/ijece.v12i2.pp1703-1710.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
<span>Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.</span>
42

Zhou, Xue, e Jiaru Zheng. "The Construction of Muslim Minorities Image and the Communication of National Image through Media Discourse - A Case Study of China CGTNs Documentary on Xinjiang Uyghurs". SHS Web of Conferences 159 (2023): 02020. http://dx.doi.org/10.1051/shsconf/202315902020.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Nowadays, the Muslim community is under the spotlight. The ongoing international debate over Muslim minorities identities reflects the dilemma of their integration into non-Muslim modern multi-ethnic nations under the context of multiculturalism. One typical example is the heated debate between the West and China over Chinese Muslims, also known as Uyghurs, through media discourse. Western media, such as the BBC, claim that China assimilates and forces Uyghurs to integrate. The Chinese side, meanwhile, asserts that mainstream Western media reports are lies, smears, and fake. Facing the discourse challenges from the West, China applies media discourse to reinforce its understanding of Uyghurs in the international discourse system. The analysis reveals that the Chinese government has consciously aligned the image of Uyghurs with its Chinese national image, and building a real Xinjiang image on CGTN.
43

Slater, John. "Branding, Bondage, and Lope's Typeface". Bulletin of the Comediantes 74, n. 1 (2022): 225–47. http://dx.doi.org/10.1353/boc.2022.a927756.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract: In plays such as Los melindres de Belisa , Lope de Vega's characters pretend to be enslaved people who have been branded on the face. Their cosmetic brands or fingidos hierros act as signs within a system of figuration I call typeface. In Lope's typeface plays, hierros are removed easily but are undetectable as fake. These simulated brandings do not disfigure the characters pretending to be enslaved; instead, branding makes the character feigning unfreedom appear simultaneously more sexually attractive and racially ambiguous to other characters. Rather than clarifying racial hierarchies, as Miles Grier demonstrates is the case with the phenomenon he calls "inkface," typeface performances of enslavement represent what is for Lope a metaphysical reality: all human beings are enslaved and branded. Typeface goes beyond the appropriation of enslavement and entails a theory of signification in which human identities circulate as fungible signs, conflating the slave trade and literary dissemination, typographical characters and characterization. By elucidating how simulated brandings signify in plays Lope wrote across decades, this article identifies typeface plays as a subset of Lope's oeuvre, suggesting new ways of understanding his attitudes toward race and enslavement.
44

Shaqilla, Nikita, e Yahia Reda. "Catfishing, Is it Unregulated Crime in Indonesia?" Neoclassical Legal Review: Journal of Law and Contemporary Issues 2, n. 2 (18 gennaio 2024): 39–46. http://dx.doi.org/10.32734/nlr.v2i2.13733.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Catfishing is a type of an international cybercrime. Unfortunately, it lacks clarity in Indonesia's national framework. Catfishing, which utilizes a fake identities on the internet, can be classified as fraud. This study examines the legal consequences in personal relationships stemming from the practice of online fraud. This study used a normative juridical approach with empirical data, this study raises the questions of why teenagers engage in catfishing on social media and explains the legal complexities it entails. As a result, this research shows that 99 percent of respondents - teenagers inside and outside North Sumatra Province - lack self-awareness about catfishing issues in building online relationships. This type of fraud is often committed when registered on social media, even though this can be an entry point for catfishing and subsequent legal offenses, especially fraud as regulated in Article 378 of the Criminal Code
45

Sari, Andi Siti Nurbaya. "Analysis Prudential Principles About The Treath of Phishing Sites For Internet Banking Customers". Journal Of Institution And Sharia Finance 5, n. 1 (17 dicembre 2022): 26–38. http://dx.doi.org/10.24256/joins.v4i1.3378.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This thesis is motivated by the existence of an internet site that refers to the act of luring internet banking users to visit fake websites designed by cyber-cybers that resemble the official website in such a way as to trick victims through fake emails (or instant messages) and then secretly take the victim's personal information. . Seeing this requires the precautionary principle regulated by banks to find out customer identities, monitor customer transaction activities including reporting suspicious transactions. The type of research used is the Quantitative Method with 30 samples using a nonprobability sampling technique, namely saturated samples. The instrument used is a questionnaire (questionnaire). Data were processed and analyzed using simple linear regression using SPSS 22 for windows. The results showed that the precautionary principle had a positive effect on the threat of phishing sites by 36.2% with t count (3.982) t table (2.048) with a significant level of 0.000 <0.05. This means that the precautionary principle variable partially has a significant effect on the threat of phishing sites on internet banking at Islamic banks in Palopo city. So it can be concluded that with the precautionary principle of the bank and for customers it can reduce the risk of phishing site threats and more guaranteed security of customer data on internet banking at Islamic banks in Palopo city.
46

Rezky, Michelle, e Aji Lukman Ibrahim. "Fake Accounts on Social Media as a Criminal Act of Electronic Information Manipulation in Indonesia". Yuridika 37, n. 3 (1 settembre 2022): 615–32. http://dx.doi.org/10.20473/ydk.v37i3.32484.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
There are often cases where irresponsible individuals create social media accounts using other people's personal identities as if the account is the original account of the person whose identity is being used, hereinafter referred to as fake social media accounts. Such actions can be threatened with Article 35 jo. Article 51 paragraph (1) of Law Number 11 of 2008 concerning Information and Electronic Transactions (ITE Law). The type of research used by the author in this study is prescriptive normative law research with a statute approach and a case approach. In Verdict Number 1739/Pid.Sus/2020/PN Jkt.Brt, the defendant was declared guilty of committing a crime under Article 28 paragraph (1) jo. Article 45A paragraph (1) ITE Law. Not only fulfilling the elements in Article 28 paragraph (1) of the ITE Law, but the defendant also fulfilled the elements in Article 35 of the ITE Law. However, the defendant was not found guilty of a criminal offense under Article 35 of the ITE Law, even though Article 35 of the ITE Law was one of the prosecutor's indictments. Based on this research, the defendant was not found guilty of a criminal offense under Article 35 of the ITE Law because the form of the indictment in Verdict Number 1739/Pid.Sus/2020/PN Jkt.Brt is less precise. The form of indictment used by the public prosecutor is an Alternative Indictment where ideally the public prosecutor ought to use Cumulative Indictment on a concursus realis crime that the defendant committed.
47

Salawati, Lysanza, Abdul Manan e Dhody A. R. Widjajaatmadja. "Akibat Hukum Pejabat Pembuat Akta Tanah (PPAT) Karena Adanya Gugatan Terkait Dokumen Palsu dan Keterangan Palsu Dalam Pembuatan Akta". SALAM: Jurnal Sosial dan Budaya Syar-i 9, n. 3 (28 aprile 2022): 683–704. http://dx.doi.org/10.15408/sjsbs.v9i3.25884.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
A Land Deed Registrar (PPAT) is only authorized to check the formal correctness of the identity of the parties such as the Identity Card (KTP) and the legal basis for the actions of the parties. They are not required to check the material truth of the identities of the parties because in the deed they made, the PPAT only included the information or the wishes of the parties presented to them. The method used in this research is the normative legal research method or the library legal research method, which is the method or method used in legal research which is carried out by reviewing materials derived from the literature supported by empirical data through interviews with relevant practitioners. This study uses the juridical-normative method, namely examining legal rules or regulations as a building system related to a legal event. The results of the study state that in practice, although the introduction is mandatory, there are still many legal problems with PPAT deeds caused by identities such as fake Identity Cards (KTP), fake signatures, documents, letters or false statements which then cause harm to other parties.Keywords: Legal Consequences; Land Titles Registrar; sue AbstrakSeorang Pejabat Pencatat Akta Tanah (PPAT) hanya berwenang memeriksa kebenaran formil dari identitas para pihak seperti Kartu Tanda Penduduk (KTP) dan dasar hukum tindakan para pihak. Mereka tidak diharuskan untuk memeriksa kebenaran materiil dari identitas para pihak karena dalam akta yang dibuatnya, PPAT hanya memasukkan keterangan atau kehendak para penghadap yang disampaikan kepadanya. Metode yang digunakan dalam penelitian ini adalah metode penelitian hukum normatif atau metode penelitian hukum kepustakaan adalah metode atau cara yang dipergunakan di dalam penelitian hukum yang dilakukan dengan cara mengkaji bahan-bahan yang berasal dari literature yang didukung dengan data empiris melalui wawancara dari praktisi yang terkait. Penelitian ini menggunakan metode yuridis-normatif yaitu meneliti kaidah atau peraturan hukum sebagai suatu bangunan sistem yang terkait dengan suatu peristiwa hukum. Hasil penelitian menyatakan bahwa pada praktiknya meskipun pengenalan wajib dilakukan, namun masih terdapat banyak permasalahan hukum akta PPAT yang disebabkan adanya identitas seperti Kartu Tanda Penduduk (KTP) palsu, Tanda tangan palsu, dokumen, surat atau keterangan palsu yang kemudian menyebabkan kerugian bagi pihak lain.Kata Kunci: Akibat Hukum; Pejabat Pembuat Akta Tanah; Gugat
48

Abdel-Fadil, Mona. "The Politics of Affect: the Glue of Religious and Identity Conflicts in Social Media". Journal of Religion, Media and Digital Culture 8, n. 1 (20 marzo 2019): 11–34. http://dx.doi.org/10.1163/21659214-00801002.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Affect theory often overlooks decades of anthropological, feminist, queer, and postcolonial scholarship on emotion. I build on this extensive scholarship of emotion and use my online ethnography of a Facebook group that promotes the public visibility of Christianity as a springboard to build a conceptual framework of the politics of affect. I address three theoretical gaps: 1) the lack of distinction between different emotions, 2) how affect is often performed for someone, and 3) the varying intensities of emotion. I delve into the intricate ways in which emotions fuel identities, worldviews, and their contestations, and how fake news may come to be perceived as affectively factual. This article deepens our understanding of the role of affect in polemic and mediatized conflicts. The role of emotion in religious conflicts and identity politics is not simply analytically useful, but is, at times, the very fabric of which political ideas are made.
49

BHARGAVA, BHARAT, MAMATA JENAMANI e YUHUI ZHONG. "COUNTERACTING SHILL BIDDING IN ONLINE ENGLISH AUCTION". International Journal of Cooperative Information Systems 14, n. 02n03 (giugno 2005): 245–63. http://dx.doi.org/10.1142/s0218843005001158.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The popularity of online auctions and the associated frauds have led to many auction sites preferring English auction over other auction mechanisms. The ease of adopting multiple fake identities over the Internet nourishes shill bidding by fraudulent sellers in English auction. In this paper, we derive an equilibrium bidding strategy to counteract shill bidding in an online English auction. An algorithm based on this strategy is developed. We conduct experiments to evaluate the strategy in a simulated eBay like auction environment. Five popular bidding strategies are compared with the proposed one. In the simulation, bidders compete to buy a product in the presence of a shill. Each bidder is randomly assigned a bidding strategy. She draws her valuation from a uniform distribution. The experiments show hat the average expected utility of agents with proposed strategy is the highest when the auction continues for a longer duration.
50

Teixeira da Silva, Jaime A. "Are Mandatory Institutional Emails for Manuscript Submission an Unfair and Discriminatory Policy?" Journal of Interdisciplinary Medicine 6, n. 4 (1 dicembre 2021): 189–91. http://dx.doi.org/10.2478/jim-2021-0039.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract With increasing cases of fraud in submission, peer review, and publication processes, some by authors with fake identities and who use concocted emails, including the use of web-based emails, editors and publishers are looking for ways to try and stem the tide of fraud. In some journals, editors and publishers mistakenly believe that this might be possible by implementing a policy that mandates submitting authors to have an institutional email. However, this may be discriminatory at various levels, the most obvious of which is unfairness, i.e., no right to “entry” to a journal based exclusively on the type of email used, even more so when the submitting author is not fake. Such policies might, very ironically, even violate stated journal or publisher policies on discrimination and inclusivity. Editors and publishers that employ such tactics, as a way to attempt to reduce fraudulent submissions, need to rethink this potentially discriminatory strategy. In a publishing world that is becoming increasingly litigious, it would not be surprising if legal action would one day be taken against a journal or publisher by a valid author using a web-based email such as @gmail.com, @yahoo.com, or @163.com, but who may have been unfairly barred entry to that journal based on such a policy. Two real case examples are provided, Tumor Biology, a struggling journal published by IOS Press, and Journal of Business Ethics, a journal published by Springer Nature.

Vai alla bibliografia