Artigos de revistas sobre o tema "Fake identities"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Fake identities".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Teixeira da Silva, Jaime A. "Fake peer reviews, fake identities, fake accounts, fake data: beware!" AME Medical Journal 2 (1 de março de 2017): 28. http://dx.doi.org/10.21037/amj.2017.02.10.
Texto completo da fonteTopor, Lev, e Moran Pollack. "Fake Identities in Social Cyberspace". International Journal of Cyber Warfare and Terrorism 12, n.º 1 (janeiro de 2022): 1–17. http://dx.doi.org/10.4018/ijcwt.295867.
Texto completo da fonteTaj, Sohail, e Babar Hussain Shah. "Creation of Fake Identities on Social Media: An Analysis of Facebook". Global Digital & Print Media Review V, n.º II (30 de junho de 2022): 44–52. http://dx.doi.org/10.31703/gdpmr.2022(v-ii).05.
Texto completo da fonteHasibuan, Juneidi, e Syafrudin Syam. "A Legal Analysis on Online Fraud Using Fake Identity". Indonesian Journal of Multidisciplinary Science 2, n.º 10 (27 de julho de 2023): 3308–17. http://dx.doi.org/10.55324/ijoms.v2i10.574.
Texto completo da fonteSuganya, R., S. Muthulakshmi, B. Venmuhilan, K. Varun Kumar e G. Vignesh. "Detect fake identities using improved Machine Learning Algorithm". Journal of Physics: Conference Series 1916, n.º 1 (1 de maio de 2021): 012056. http://dx.doi.org/10.1088/1742-6596/1916/1/012056.
Texto completo da fonteWalczyna, Tomasz, e Zbigniew Piotrowski. "Fast Fake: Easy-to-Train Face Swap Model". Applied Sciences 14, n.º 5 (4 de março de 2024): 2149. http://dx.doi.org/10.3390/app14052149.
Texto completo da fonteQu, Shunhai, e Viroj Wiwanitkit. "Fake Identities in Social Network Research: To Be Disclosed?" Science and Engineering Ethics 20, n.º 4 (19 de dezembro de 2013): 1151. http://dx.doi.org/10.1007/s11948-013-9505-9.
Texto completo da fonteSarulatha, Sreerambabu, Kalidasan e Mohammed Riyaz. "Fake Face Detection in Identity Cards Using Stegoface". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 622–26. http://dx.doi.org/10.22214/ijraset.2023.55069.
Texto completo da fonteAl-Abri, Khalid Hassan. "Reasons for Internet Users Using Fake Identity from an Islamic Perspective". Islamiyyat 44, n.º 1 (1 de junho de 2022): 183–92. http://dx.doi.org/10.17576/islamiyyat-2022-4401-16.
Texto completo da fonteVan Der Walt, Estee, e Jan Eloff. "Using Machine Learning to Detect Fake Identities: Bots vs Humans". IEEE Access 6 (2018): 6540–49. http://dx.doi.org/10.1109/access.2018.2796018.
Texto completo da fonteA. Teixeira da Silva, Jaime. "AI in the Era of Fakes and Deepfakes: Risk of Fabricated Photographs and Identities in Academic Publishing". Journal of Information Security and Cybercrimes Research 6, n.º 2 (28 de novembro de 2023): 71–73. http://dx.doi.org/10.26735/knja7076.
Texto completo da fonteS. Borkar, Bharat. "Identification of Fake Identities on Social Media using various Machine Learning Algorithm". International Journal of Advanced Trends in Computer Science and Engineering 9, n.º 4 (25 de agosto de 2020): 6214–20. http://dx.doi.org/10.30534/ijatcse/2020/299942020.
Texto completo da fonteElovici, Yuval, Michael Fire, Amir Herzberg e Haya Shulman. "Ethical Considerations when Employing Fake Identities in Online Social Networks for Research". Science and Engineering Ethics 20, n.º 4 (12 de novembro de 2013): 1027–43. http://dx.doi.org/10.1007/s11948-013-9473-0.
Texto completo da fonteChaurasiya, Adarsh, Amrit Verma, Kota Shamitha e Dr Gaurav Kumar. "Fake Profile Detection in Instagram". International Journal for Research in Applied Science and Engineering Technology 12, n.º 5 (31 de maio de 2024): 1463–72. http://dx.doi.org/10.22214/ijraset.2024.60629.
Texto completo da fonteSaddique, Junaid, Imran Qureshi e Atif Shabbir. "Effects of Social Media Brand Reviews on Trust and Brand Perception: An Experimental Study on Facebook in Pakistani context". Jinnah Business Review 5, n.º 2 (1 de julho de 2017): 22–35. http://dx.doi.org/10.53369/haii7048.
Texto completo da fonteHermawati, Tanti, Rila Setyaningsih e Rahmadya Putra Nugraha. "Teen Motivation to Create Fake Identity Account on Instagram Social Media". International Journal of Multicultural and Multireligious Understanding 8, n.º 4 (3 de abril de 2021): 87. http://dx.doi.org/10.18415/ijmmu.v8i4.2459.
Texto completo da fonteLiu, Dong, Quan Yuan Wu e Wei Hong Han. "Linking Multiple Identities in Online Social Networks Based on Co-Occurrence Analysis". Applied Mechanics and Materials 713-715 (janeiro de 2015): 2257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2257.
Texto completo da fonteHamdan, Salam, Raad S. Al-Qassas e Sara Tedmori. "Comparative Study on Sybil Attack Detection Schemes". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, n.º 7 (6 de maio de 2015): 5869–76. http://dx.doi.org/10.24297/ijct.v14i7.1898.
Texto completo da fonteTracy, Sarah J., e Angela Trethewey. "Fracturing the Real-Self?Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities". Communication Theory 15, n.º 2 (maio de 2005): 168–95. http://dx.doi.org/10.1111/j.1468-2885.2005.tb00331.x.
Texto completo da fonteTracy, S. J. "Fracturing the Real-Self Fake-Self Dichotomy: Moving Toward "Crystallized" Organizational Discourses and Identities". Communication Theory 15, n.º 2 (1 de maio de 2005): 168–95. http://dx.doi.org/10.1093/ct/15.2.168.
Texto completo da fonteNúñez-Canal, Margarita, e Luis Núñez-Ladevéze. "Understanding the revolt: «Man the Technician» in global rhetoric". Communication & Society 34, n.º 4 (4 de outubro de 2021): 33–47. http://dx.doi.org/10.15581/003.34.4.33-47.
Texto completo da fonteSun, Ling, Yuan Rao, Yuqian Lan, Bingcan Xia e Yangyang Li. "HG-SL: Jointly Learning of Global and Local User Spreading Behavior for Fake News Early Detection". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 4 (26 de junho de 2023): 5248–56. http://dx.doi.org/10.1609/aaai.v37i4.25655.
Texto completo da fonteGonçalves-Segundo, Paulo Roberto. "Fake news, moral panic, and polarization in Brazil: A critical discursive approach". Linguistic Frontiers 5, n.º 2 (1 de setembro de 2022): 51–60. http://dx.doi.org/10.2478/lf-2022-0013.
Texto completo da fonteFuchs, Susanne. ""Proper” Profiles. On Facebook’s investment in the autobiographical genre." European Journal of Life Writing 5 (24 de maio de 2016): 55–74. http://dx.doi.org/10.5463/ejlw.5.102.
Texto completo da fonteB. Deepika, S. Sneka, S. Susila, P. Suvetha e S. Swetha. "Blockchain Enabled Social Network for Detecting Fake Accounts". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n.º 2 (27 de abril de 2024): 747–56. http://dx.doi.org/10.32628/cseit24102107.
Texto completo da fonteAl-Marshoud, Mishri Saleh, Ali H. Al-Bayatti e Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs". Electronics 10, n.º 11 (30 de maio de 2021): 1302. http://dx.doi.org/10.3390/electronics10111302.
Texto completo da fonteAngelina, Dr J. Jane Rubel. "Fake Instagram Account Detection using ML Algorithms". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 02 (8 de fevereiro de 2024): 1–13. http://dx.doi.org/10.55041/ijsrem28637.
Texto completo da fonteTeixeira da Silva, Jaime, e Aceil Al-Khatib. "The Deontology of Using Pets in Academic Publishing-Related Sting Operations". Exchanges: The Interdisciplinary Research Journal 10, n.º 1 (27 de outubro de 2022): 1–20. http://dx.doi.org/10.31273/eirj.v10i1.843.
Texto completo da fonteK. S. Sowmiya e G. Vinoth Kumar. "Gender Roles: An Examination of Sexuality and Socio-Cultural Tribal Identity". Shanlax International Journal of English 12, S1-Dec (14 de dezembro de 2023): 295–98. http://dx.doi.org/10.34293/rtdh.v12is1-dec.96.
Texto completo da fonteKareem, Rafeef, e Wesam Bhaya. "Fake Profiles Types of Online Social Networks: A Survey". International Journal of Engineering & Technology 7, n.º 4.19 (27 de novembro de 2018): 919. http://dx.doi.org/10.14419/ijet.v7i4.19.28071.
Texto completo da fonteKrombholz, Katharina, Dieter Merkl e Edgar Weippl. "Fake identities in social media: A case study on the sustainability of the Facebook business model". Journal of Service Science Research 4, n.º 2 (dezembro de 2012): 175–212. http://dx.doi.org/10.1007/s12927-012-0008-z.
Texto completo da fonteKARAS, ELENI. "FAKE NEWS AND THE RITUALISATION OF THE SELF". Society Register 3, n.º 2 (31 de dezembro de 2019): 109–21. http://dx.doi.org/10.14746/sr.2019.3.2.07.
Texto completo da fonteLavanya, S. Sri, N. Nikhitha Reddy, Nishath Afreen K.S, Noothi Srivarshini e N.Chudamani. "INSTAGRAM FAKE PROFILE DETECTION USING MACHINE LEARNING". Journal of Nonlinear Analysis and Optimization 14, n.º 02 (2023): 215–24. http://dx.doi.org/10.36893/jnao.2023.v14i2.0215-0224.
Texto completo da fonteDwi Kurnia Wibowo, Ahmad Luthfi e Nur Widiyasono. "Investigation of Fake Insider Threats on Private Cloud Computing Services". International Journal of Science, Technology & Management 3, n.º 5 (29 de setembro de 2022): 1484–91. http://dx.doi.org/10.46729/ijstm.v3i5.613.
Texto completo da fonteZubrzycki, Geneviève, e Anna Woźny. "The Comparative Politics of Collective Memory". Annual Review of Sociology 46, n.º 1 (30 de julho de 2020): 175–94. http://dx.doi.org/10.1146/annurev-soc-121919-054808.
Texto completo da fonteHarunullah, Alvian, e Yusuf Gunawan. "Law Enforcement in Revealing Fraud Crime Cases via Internet Media". FOCUS 4, n.º 2 (15 de agosto de 2023): 163–71. http://dx.doi.org/10.37010/fcs.v4i2.1331.
Texto completo da fonteLeshno, Jacob D., e Philipp Strack. "Bitcoin: An Axiomatic Approach and an Impossibility Theorem". American Economic Review: Insights 2, n.º 3 (1 de setembro de 2020): 269–86. http://dx.doi.org/10.1257/aeri.20190494.
Texto completo da fonteRutjens, Bastiaan T., Sander van der Linden, Romy van der Lee e Natalia Zarzeczna. "A group processes approach to antiscience beliefs and endorsement of “alternative facts”". Group Processes & Intergroup Relations 24, n.º 4 (31 de maio de 2021): 513–17. http://dx.doi.org/10.1177/13684302211009708.
Texto completo da fonteJang, SangHoon, e SukJun Lee. "Study on the Invention of Real-time Internet Document Automatic Search & Analysis System for MND's Digital Identity". Journal of Advances in Military Studies 2, n.º 3 (31 de dezembro de 2019): 1–21. http://dx.doi.org/10.37944/jams.v2i3.55.
Texto completo da fonteShabir, Ghulam, Noor Ul Ain Nasir e Tanveer Hussain. "Impact Of Facebook Usage On Female University Students Of Pakistan: A Case Of Sexting And Harassment". Pakistan Journal of Gender Studies 21, n.º 1 (8 de março de 2021): 19–32. http://dx.doi.org/10.46568/pjgs.v21i1.513.
Texto completo da fonteChaubey, Nirbhay Kumar, e Dhananjay Yadav. "Detection of Sybil attack in vehicular ad hoc networks by analyzing network performance". International Journal of Electrical and Computer Engineering (IJECE) 12, n.º 2 (1 de abril de 2022): 1703. http://dx.doi.org/10.11591/ijece.v12i2.pp1703-1710.
Texto completo da fonteZhou, Xue, e Jiaru Zheng. "The Construction of Muslim Minorities Image and the Communication of National Image through Media Discourse - A Case Study of China CGTNs Documentary on Xinjiang Uyghurs". SHS Web of Conferences 159 (2023): 02020. http://dx.doi.org/10.1051/shsconf/202315902020.
Texto completo da fonteSlater, John. "Branding, Bondage, and Lope's Typeface". Bulletin of the Comediantes 74, n.º 1 (2022): 225–47. http://dx.doi.org/10.1353/boc.2022.a927756.
Texto completo da fonteShaqilla, Nikita, e Yahia Reda. "Catfishing, Is it Unregulated Crime in Indonesia?" Neoclassical Legal Review: Journal of Law and Contemporary Issues 2, n.º 2 (18 de janeiro de 2024): 39–46. http://dx.doi.org/10.32734/nlr.v2i2.13733.
Texto completo da fonteSari, Andi Siti Nurbaya. "Analysis Prudential Principles About The Treath of Phishing Sites For Internet Banking Customers". Journal Of Institution And Sharia Finance 5, n.º 1 (17 de dezembro de 2022): 26–38. http://dx.doi.org/10.24256/joins.v4i1.3378.
Texto completo da fonteRezky, Michelle, e Aji Lukman Ibrahim. "Fake Accounts on Social Media as a Criminal Act of Electronic Information Manipulation in Indonesia". Yuridika 37, n.º 3 (1 de setembro de 2022): 615–32. http://dx.doi.org/10.20473/ydk.v37i3.32484.
Texto completo da fonteSalawati, Lysanza, Abdul Manan e Dhody A. R. Widjajaatmadja. "Akibat Hukum Pejabat Pembuat Akta Tanah (PPAT) Karena Adanya Gugatan Terkait Dokumen Palsu dan Keterangan Palsu Dalam Pembuatan Akta". SALAM: Jurnal Sosial dan Budaya Syar-i 9, n.º 3 (28 de abril de 2022): 683–704. http://dx.doi.org/10.15408/sjsbs.v9i3.25884.
Texto completo da fonteAbdel-Fadil, Mona. "The Politics of Affect: the Glue of Religious and Identity Conflicts in Social Media". Journal of Religion, Media and Digital Culture 8, n.º 1 (20 de março de 2019): 11–34. http://dx.doi.org/10.1163/21659214-00801002.
Texto completo da fonteBHARGAVA, BHARAT, MAMATA JENAMANI e YUHUI ZHONG. "COUNTERACTING SHILL BIDDING IN ONLINE ENGLISH AUCTION". International Journal of Cooperative Information Systems 14, n.º 02n03 (junho de 2005): 245–63. http://dx.doi.org/10.1142/s0218843005001158.
Texto completo da fonteTeixeira da Silva, Jaime A. "Are Mandatory Institutional Emails for Manuscript Submission an Unfair and Discriminatory Policy?" Journal of Interdisciplinary Medicine 6, n.º 4 (1 de dezembro de 2021): 189–91. http://dx.doi.org/10.2478/jim-2021-0039.
Texto completo da fonte