Showing 101 - 120 results of 190 for search '"deception"', query time: 0.05s Refine Results
  1. 101

    Paradigm shifters: tricksters and cultural science by Hartley John

    Published 2010-12-01
    “…Both practice a form of creativity based on deception, ‘creative destruction’; renewal by disruption and needs-must adaptation. …”
    Get full text
    Article
  2. 102

    D’Holbach on (Dis-)Esteeming Talent by Andreas Blank

    Published 2020-09-01
    “…The phenomenon of political deception in despotic regimes indicates a sense in which talent can be regarded as a tool for solving a pressing political problem: Genuinely estimable uses of talent are those that oppose despotism and support republican virtues. …”
    Get full text
    Article
  3. 103

    La fabrique des écoliers, ou l'enfance enfermée by Henri Louis Go

    Published 2025-01-01
    “…The school's promise of socializing and educating children turned out to be, in its historical construction, a deception. The confinement of school is thus a demarcation of being, a « putting in its place » of the pupil. …”
    Get full text
    Article
  4. 104

    SOCIAL MEDIA AS AN ADVOCATE FOR SOCIAL JUSTICE IN NIGERIA: AN APPRAISAL OF FACEBOOK USERS IN EKITI STATE by Awosenusi Omolara Christianah, Awofadeju Peter Olayinka, Babatola Deborah Bukunmi

    Published 2023-09-01
    “…It also recommends that government agency in-charge of social media regulation should regulate social media in order to curb deception in the social media report on issues related to injustice in Nigeria. …”
    Get full text
    Article
  5. 105

    MEASURES TO COUNTERACT MODERN METHODS OF FRAUD AGAINST THE POPULATION by Maria S. Tikhomirova, Arina D. Palatnikova

    Published 2024-07-01
    “…In the context of developing technologies, the risk of losing money through deception or abuse of trust increases significantly. …”
    Get full text
    Article
  6. 106

    Trustworthy collaborative evaluation of multi-service subjects in the cloud manufacturing model by Tao Yang, Yihuan Ding, Wei Chen

    Published 2025-02-01
    “…In the context of cloud manufacturing, challenges related to trust, including malicious deception and dishonest feedback, are exacerbated by information asymmetry among platform participants. …”
    Get full text
    Article
  7. 107

    Pengembangan strategi menyerang dan bertahan cabang olahraga bola voli: konstruk validity by Muhammad Andre Alfais, Hadi Hadi, Dewangga Yudhistira

    Published 2024-10-01
    “…Hasil penelitian dengan pertanyaan indikator prinsip deception, surprise, mobility, ekonomis, kesesuaian usia, variatif mendapatkan nilai aiken dari 0,75-0,95. …”
    Get full text
    Article
  8. 108

    Portraits de Résistantes (1847-1875) : la femme face au système patriarcal dans quelques romans victoriens by Jacqueline Fromonot

    Published 2012-06-01
    “…More active ways of resisting are based on lying and deception, a mise en abyme of literary creation itself—a signature in Thackeray and Meredith. …”
    Get full text
    Article
  9. 109

    Radar Jamming Recognition: Models, Methods, and Prospects by Zan Wang, Zhengwei Guo, Gaofeng Shu, Ning Li

    Published 2025-01-01
    “…Specifically, first building a system framework for jamming models, including deception jamming, suppression jamming, and smart jamming, thoroughly explaining the operational mechanisms. …”
    Get full text
    Article
  10. 110

    alchimia dall’inferno al paradiso nella divina commedia. l’influsso su dante dell’opera alchemica aurora consurgens, parzialmente attribuita a san tommaso d’aquino by Marino Alberto Balducci

    Published 2024-01-01
    “…We are in the presence of a true ideological and technical-scientific perversion: a false alchemy which, instead of offering help to our world, only produces deception and diseases of the body and spirit. Then, through the purgatorial evolution of conscience based on humility (Purg. …”
    Get full text
    Article
  11. 111

    Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024) by Jannat Naseeb

    Published 2025-01-01
    “…These include media and publications, support for separatist movements, counter-propaganda initiatives, and deception operations—all aimed at undermining Pakistan’s global image and influencing the international community. …”
    Get full text
    Article
  12. 112

    Beyond detection and correction: Fake news’ «news-ness» and «shareworthiness» as alternative ways to tackle disinformation by Raúl Rodríguez-Ferrándiz

    Published 2025-01-01
    “…The aim is twofold: to identify, compare and challenge the scholars’ underlying assumptions and practical implications, and to draw a coherent narrative that encompasses the motivation to deceive, the social media affordances that make this deception plausible and shareable, and the polarization, intergroup hostility, and the greater exposure to extreme political views that may boost disinformation. …”
    Get full text
    Article
  13. 113

    Efficient data possession–checking protocol with deduplication in cloud by Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao

    Published 2017-08-01
    “…We demonstrate that the proposed scheme satisfies signature unforgeability, and the malicious users cannot obtain any legitimate file from the cloud server in the form of deception.…”
    Get full text
    Article
  14. 114

    Virtual Agents-Based Attack-Resilient Distributed Control for Islanded AC Microgrid by Jun Zhang, Sheik M. Mohiuddin, Junjian Qi

    Published 2025-01-01
    “…Honeypot is a common method for cyber deception by introducing fake targets. However, in the context of microgrid, the misleading information spread by honeypots will also impact the system performance. …”
    Get full text
    Article
  15. 115

    Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly by Hussein Abdulkhaleq Saleh alsharya

    Published 2024-09-01
    “…Social engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. …”
    Get full text
    Article
  16. 116

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  17. 117

    Nurses’ health and work experiences during the COVID-19 pandemic in Swedish prehospital and hospital care: a deductive content analysis through the lens of the swAge model by Cicilia Nagel, Petra Nilsson Lindstrom, Albert Westergren, Sophie Schon Persson, Kerstin Nilsson

    Published 2025-01-01
    “…To perform effectively, nurses need adequate staffing, a safe work environment, fair compensation, manageable workloads, and recognition. Instances of deception and broken promises have undermined trust and professional well-being. …”
    Get full text
    Article
  18. 118

    INTERNATIONAL LEGAL FRAMEWORK ON HUMAN TRAFFICKING AND CRIMINAL LIABILITY ON TRAFFICKERS by Paul Nwala

    Published 2023-07-01
    “… Human trafficking involves recruitment, harbouring or transporting people into a situation of exploitation through the use of violence, deception or coercion and forced to work against their will. …”
    Get full text
    Article
  19. 119

    Prevalence and impact of Internet Gaming Disorder: A population-based study by Josip Razum, Renata Glavak Tkalić

    Published 2025-01-01
    “…Among the individual criteria, negative consequences for significant relationships, deception and escape had the strongest, while tolerance, loss of control and withdrawal had the weakest relationship to depression, anxiety and well-being, in a relative sense. …”
    Get full text
    Article
  20. 120

    Shared decision-making between patients and healthcare providers at rural health facilities in Eastern Uganda: an exploratory qualitative study by Ranga Solomon Owino, Olivia Kituuka, Paul Kutyabami, Nelson K. Sewankambo

    Published 2025-01-01
    “…Ethical issues identified include concerns about informed consent, privacy and confidentiality, deception, and harm. Conclusions This study highlighted the need for better sensitization of patients and comprehensive training for healthcare providers to minimize and resolve ethical issues that emerge during shared decision-making processes. …”
    Get full text
    Article