-
101
Paradigm shifters: tricksters and cultural science
Published 2010-12-01“…Both practice a form of creativity based on deception, ‘creative destruction’; renewal by disruption and needs-must adaptation. …”
Get full text
Article -
102
D’Holbach on (Dis-)Esteeming Talent
Published 2020-09-01“…The phenomenon of political deception in despotic regimes indicates a sense in which talent can be regarded as a tool for solving a pressing political problem: Genuinely estimable uses of talent are those that oppose despotism and support republican virtues. …”
Get full text
Article -
103
La fabrique des écoliers, ou l'enfance enfermée
Published 2025-01-01“…The school's promise of socializing and educating children turned out to be, in its historical construction, a deception. The confinement of school is thus a demarcation of being, a « putting in its place » of the pupil. …”
Get full text
Article -
104
SOCIAL MEDIA AS AN ADVOCATE FOR SOCIAL JUSTICE IN NIGERIA: AN APPRAISAL OF FACEBOOK USERS IN EKITI STATE
Published 2023-09-01“…It also recommends that government agency in-charge of social media regulation should regulate social media in order to curb deception in the social media report on issues related to injustice in Nigeria. …”
Get full text
Article -
105
MEASURES TO COUNTERACT MODERN METHODS OF FRAUD AGAINST THE POPULATION
Published 2024-07-01“…In the context of developing technologies, the risk of losing money through deception or abuse of trust increases significantly. …”
Get full text
Article -
106
Trustworthy collaborative evaluation of multi-service subjects in the cloud manufacturing model
Published 2025-02-01“…In the context of cloud manufacturing, challenges related to trust, including malicious deception and dishonest feedback, are exacerbated by information asymmetry among platform participants. …”
Get full text
Article -
107
Pengembangan strategi menyerang dan bertahan cabang olahraga bola voli: konstruk validity
Published 2024-10-01“…Hasil penelitian dengan pertanyaan indikator prinsip deception, surprise, mobility, ekonomis, kesesuaian usia, variatif mendapatkan nilai aiken dari 0,75-0,95. …”
Get full text
Article -
108
Portraits de Résistantes (1847-1875) : la femme face au système patriarcal dans quelques romans victoriens
Published 2012-06-01“…More active ways of resisting are based on lying and deception, a mise en abyme of literary creation itself—a signature in Thackeray and Meredith. …”
Get full text
Article -
109
Radar Jamming Recognition: Models, Methods, and Prospects
Published 2025-01-01“…Specifically, first building a system framework for jamming models, including deception jamming, suppression jamming, and smart jamming, thoroughly explaining the operational mechanisms. …”
Get full text
Article -
110
alchimia dall’inferno al paradiso nella divina commedia. l’influsso su dante dell’opera alchemica aurora consurgens, parzialmente attribuita a san tommaso d’aquino
Published 2024-01-01“…We are in the presence of a true ideological and technical-scientific perversion: a false alchemy which, instead of offering help to our world, only produces deception and diseases of the body and spirit. Then, through the purgatorial evolution of conscience based on humility (Purg. …”
Get full text
Article -
111
Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024)
Published 2025-01-01“…These include media and publications, support for separatist movements, counter-propaganda initiatives, and deception operations—all aimed at undermining Pakistan’s global image and influencing the international community. …”
Get full text
Article -
112
Beyond detection and correction: Fake news’ «news-ness» and «shareworthiness» as alternative ways to tackle disinformation
Published 2025-01-01“…The aim is twofold: to identify, compare and challenge the scholars’ underlying assumptions and practical implications, and to draw a coherent narrative that encompasses the motivation to deceive, the social media affordances that make this deception plausible and shareable, and the polarization, intergroup hostility, and the greater exposure to extreme political views that may boost disinformation. …”
Get full text
Article -
113
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01“…We demonstrate that the proposed scheme satisfies signature unforgeability, and the malicious users cannot obtain any legitimate file from the cloud server in the form of deception.…”
Get full text
Article -
114
Virtual Agents-Based Attack-Resilient Distributed Control for Islanded AC Microgrid
Published 2025-01-01“…Honeypot is a common method for cyber deception by introducing fake targets. However, in the context of microgrid, the misleading information spread by honeypots will also impact the system performance. …”
Get full text
Article -
115
Leveraging Social Engineering Techniques for Ethical Purposes: An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
Published 2024-09-01“…Social engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. …”
Get full text
Article -
116
Survey on Ethereum phishing detection technology
Published 2023-04-01“…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
Get full text
Article -
117
Nurses’ health and work experiences during the COVID-19 pandemic in Swedish prehospital and hospital care: a deductive content analysis through the lens of the swAge model
Published 2025-01-01“…To perform effectively, nurses need adequate staffing, a safe work environment, fair compensation, manageable workloads, and recognition. Instances of deception and broken promises have undermined trust and professional well-being. …”
Get full text
Article -
118
INTERNATIONAL LEGAL FRAMEWORK ON HUMAN TRAFFICKING AND CRIMINAL LIABILITY ON TRAFFICKERS
Published 2023-07-01“… Human trafficking involves recruitment, harbouring or transporting people into a situation of exploitation through the use of violence, deception or coercion and forced to work against their will. …”
Get full text
Article -
119
Prevalence and impact of Internet Gaming Disorder: A population-based study
Published 2025-01-01“…Among the individual criteria, negative consequences for significant relationships, deception and escape had the strongest, while tolerance, loss of control and withdrawal had the weakest relationship to depression, anxiety and well-being, in a relative sense. …”
Get full text
Article -
120
Shared decision-making between patients and healthcare providers at rural health facilities in Eastern Uganda: an exploratory qualitative study
Published 2025-01-01“…Ethical issues identified include concerns about informed consent, privacy and confidentiality, deception, and harm. Conclusions This study highlighted the need for better sensitization of patients and comprehensive training for healthcare providers to minimize and resolve ethical issues that emerge during shared decision-making processes. …”
Get full text
Article