-
21
Les nouveaux outils de la tricherie scolaire au lycée
Published 2013-06-01“…The survey of 1,909 students revealed that nearly 20% of them have used during their schooling, a mobile phone for cheating. However, cheating with using a cheat sheet or calculator is the most common. …”
Get full text
Article -
22
Approche compréhensive de la tricherie en milieu scolaire : la parole aux lycéens tricheurs
Published 2016-01-01“…Academic cheating in France is a phenomenon that has been only conducted by a few studies. …”
Get full text
Article -
23
Ghostwriting: Simulacra of Academic Performance
Published 2022-04-01“…This book describes the practices of contract cheating in Russian higher education as an established social institution involving undergraduate and graduate students. …”
Get full text
Article -
24
Moral, competence, and status values in youth sports: predictors of attitude to moral decision-making
Published 2025-01-01“…Objective: This study aimed to investigate the influence of moral, competence, and status values on moral decision-making among Indonesian adolescent athletes, focusing on acceptance of cheating, acceptance of gamesmanship, and maintaining proportionality in winning. …”
Get full text
Article -
25
What do we mean by academic integrity?
Published 2025-01-01“…Some implications of our view include the fact that not cheating or breaking rules of academic institutions is not enough for acting with academic integrity, the need to be aware of and collectively resist internal and external –including societal– pressures and threats, and the demands on academic institutions and organisations to promote democratic climates that allow all their members to speak up, and to favour democratic-educative over causal-objective approaches –such as incentive-based and cheating-proof designs– to protect the integrity of academic practice.…”
Get full text
Article -
26
Peranan Pondasi Moral dalam Menjelaskan Seksisme
Published 2021-07-01“…Penelitian ini bertujuan untuk mengetahui peranan pondasi care/harm, fairness/cheating, authority/subversion, dan purity/sanctity dalam teori pondasi moral untuk menjelaskan hostile dan benevolent sexism. …”
Get full text
Article -
27
Analyses for initiative defense based on cost
Published 2007-01-01“…Based on state-analysis and cheat technology,a improving scheme was brought out based on several initiative defense methods.By applying the state transition to network defense,the method and the steps of cost-calculating was put forward,a case of inform action deception was also been introduced.The method was verified by simulation results that it can divert direction of intrusion effectively.…”
Get full text
Article -
28
Development of Embedded CAPTCHA Elements for Bot Prevention in Fischer Random Chess
Published 2012-01-01“…Cheating in chess can take many forms and has existed almost as long as the game itself. …”
Get full text
Article -
29
Context-aware and self-adaptive trust model for pervasive computing
Published 2012-11-01“…To cope with the behaviour trust problems emerging at ve environments,a context-aware and selfadaptive trust model(CASATM) for pervasive environments was proposed,the trust model provided security protection based on service content adaptively at various level,nd be sensitive to contexts such as time,location and service content.A simple and efficient risk evaluation model was presented to initialize trust value to unknown entities which was a common phenomenon in pervasive environments.Simulation results testify to the contexts awareness of this model,as well as resistance of periodically cheating behaviour from malicious entity.…”
Get full text
Article -
30
L’adultère à l’ère numérique : Une discussion sur la non/monogamie et le développement des technologies numériques à partir du cas Ashley Madison
Published 2017-06-01“…This interview with Nathan Rambukkana uses the case of the ‘cheating website’ Ashley Madison to address the broader topic of digital intimacies. …”
Get full text
Article -
31
Research on credit counting and risk evaluation for C2C e-commerce
Published 2009-01-01“…An improved method of credit counting was introduced,which used the interval distribution of commodity prices to rate success trades and used different deducting coefficients to rate failed trades according to different credit rating.A risk evaluation approach for online transactions was proposed through analyzing the credit risks.It was based on the improved credit counting method.The approach could evaluate the risk of current trades according to the trading history and current trading prices.The simulation experiments show that the improved credit counting method is preferable on anti credit hyping and anti periodical cheating,and the risk evaluation method is relatively accurate and effective when it is used to analyze and forecast risk in the transactions of e-commerce.…”
Get full text
Article -
32
Information System Construction and Application of the Standardized Test Center Based on Internet
Published 2015-10-01“…Based on the construction of internet information system,the basic specification of the standardized test center was studied and a set of comprehensive business requirements including monitoring,communication,audio,video and education examination management technology was proposed.The standardized test center design principles were analyzed and developed,according to the designed business function module,the composition,the system overall structure and the application system.The technology implementation scheme including on-line inspection system,video conference system,cheating prevention and control system,identity authentication system and display system were given.Finally,the integration and connection of internet and the educational research network in China were analyzed,and the other entry way when the condition was unavailable.…”
Get full text
Article -
33
Some critical issues of content sharing network
Published 2016-10-01“…As a sharing platform for files,information and resources,CSN (content sharing network) possessed a very wide distribution in Internet.It did provide a great convenience for people to share various contents through Internet with the rapid development and wide application of network techniques,especially the emergence and prevalence of P2P (peer-to-peer).However,numerous malicious files,cheating information and spywares swarmed into Internet,which pose a serious threat to the security of CSN.A survey was made of some critical issues of CSN combining with the current development and research status from the perspective of network security.The critical issues include the definition and important properties,different taxonomies of types,key techniques,developing and researching trends of CSN.…”
Get full text
Article -
34
La Nouvelle-Orléans, miroir des angoisses de l’Amérique ?The Not Yet, roman dystopique de Moira Crone
Published 2016-12-01“…The climactic performance of the “Sim Verite” appears as the hyperbolic expression of a world that delights in reenacting its deepest anxieties over and over again in order to cheat death itself. Through this representation of New Orleans, Crone eventually articulates the tension between the same and the other that informs Louisiana’s ambivalent position towards the rest of the United States.…”
Get full text
Article -
35
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01“…For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation,and to provide mutual authentication between the label and the server,and anonymity and forward security.The analysis showed that the scheme could resist replay attack,tag camouflage attack,server cheat attack,DoS attack,position tracking attack and clone attack.Compared with the existing schemes,the proposed scheme provides high security performance under low memory,computation and communication requirements,and it can meet the security requirements of the RFID system.…”
Get full text
Article -
36
Research on trust transitivity and aggregation in evidential trust model
Published 2011-01-01“…Current trust models had some certain disadvantages in dealing with trust transitivity and trust aggregation.Firstly,these models ignored the feedback trust measurement on the direct recommender in the process of trust transitivity.Secondly,the models contained the problems of information loss or repetitive calculation for the limits in analysis and dis-posal of the dependent relationships among referral chains.A new evidential trust model was proposed,and the problems existed in current methods for transferring and aggregating trust relationships were addressed by combing D-S evidence with graph theory.It can be seen from the simulation results that compared with existing trust models,the proposed model is more robust on defending malicious attacks for various strategy cheating and collusion,and has more remarkable en-hancements in the accuracy of trust measurement.…”
Get full text
Article -
37
Fejk – „fabuła z zamiarem oszukania”
Published 2019-09-01“…The article characterizes this relevant social phenomenon linked to cheating, misinformation and manipulation and also proposes its classification and definition.…”
Get full text
Article -
38
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
Published 2015-04-01“…A SDN communication quality assurance strategy which organic combines DDoS threat identification with route optimization was put forward.It means,when the intent link was congestive attacked by DDoS,it wi11 identify and filter the abnormal data packet,and wi11 generate optimized routing to ensure the quality of network communications.First of a11,a distributed intrusion detection system under SDN framework was designed.The system realizes the detection recognition,filtration and treatment about the DDoS threat,such as cheating message,excepting message and destroying message.Secondly,a kind of best algorithm about generating routing path was realized.The experimental result shows that the network deployment plan which mentioned in this paper,can identify and filter the aggressive data packet,and the average network data transmission delay doesn't increase sharply when the network is under attack.…”
Get full text
Article -
39
Artificial intelligence-based large language models and integrity of exams and assignments in higher education: the case of tourism courses
Published 2023-10-01“…Educators were recommended to use comprehensive approaches that combine technological and educational techniques to address the issue of cheating enabled by tools, such as ChatGPT-4, during assessment and exam processes.…”
Get full text
Article -
40
Internet Addiction and Antisocial Internet Behavior of Adolescents
Published 2011-01-01“…., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. …”
Get full text
Article