Showing 121 - 140 results of 190 for search '"deception"', query time: 0.04s Refine Results
  1. 121

    DEVIANT BEHAVIOR OF STUDENTS IN THE SOCIAL AND PSYCHOLOGICAL ADAPTATION IN HIGHER EDUCATION by Elena Yu. Dvoinikova

    Published 2015-06-01
    “…Explore areas such as the impact of neurosis on I-conceptual structures of personality: lie as a self-deception both in the form of an inadequate indicator of self-bias, distort the perception of their own social significance and lies as a means to manipulate the behavior of participants in social interaction. …”
    Get full text
    Article
  2. 122

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  3. 123

    Intersectionalities of the Left and Right in Latin America and Europe. An exploration of contemporary political processes by Nicol A. Barria-Asenjo, Slavoj Žižek, Brian Willems, Ruben Balotol, Gonzalo Salas, Jesús Ayala-Colqui

    Published 2023-09-01
    “…Based on the populist discourse that exploits the discontent caused by neoliberal democracy, they gain followers for nationalist, cultural, and racist reasons that in the end are nothing more than right-wing deception to protect the rule of capital. Faced with the restoration of an already exhausted neoliberal model, an intersectionality appears between the Left and the Right which, far from confirming the diagnosis of the end of ideologies and the deactivation of the class struggle, rekindles conflicts over capital. …”
    Get full text
    Article
  4. 124

    Specifics of combating corruption at higher education institutions in the context of integrity policy by O. S. Bondarenko

    Published 2023-06-01
    “…Positions of domestic and foreign scholars on the essence and importance of academic integrity, the definition of “academic integrity” enshrined in legislation have been analysed, and the legally enshrined forms of academic integrity have been characterised, namely: academic plagiarism, self-plagiarism, fabrication, falsification, cheating, deception, bribery, biased assessment, providing assistance to students during the assessment of their learning outcomes or creating obstacles not provided for by the terms and/or procedures for such assessment, as well as impact in any form. …”
    Get full text
    Article
  5. 125

    Digitalisation Profile of the Elderly and ‘Grey Digital Violence’ by Hatice Oğuz Özgür

    Published 2024-12-01
    “…The elderly are sometimes exposed to actions such as deception, fraud, insult and humiliation by those who use digital technologies with bad intentions. …”
    Get full text
    Article
  6. 126

    Jacobean Morality and Moral Performativity in Volpone and Women Beware Women by Gül Kurtuluş

    Published 2021-04-01
    “…Volpone’s inner world and motivations for his actions show that he is initially driven by negative traits; greed, extravagance and deception. The motivation behind the excessive need for pleasure and satisfaction, initially, is his need for more material possessions and his fortune, for which he commits unjust actions and acts out deceptive behaviour. …”
    Get full text
    Article
  7. 127

    Chemical Changes Under Heat Stress and Identification of Dendrillolactone, a New Diterpene Derivative with a Rare Rearranged Spongiane Skeleton from the Antarctic Marine Sponge <i>... by Andrea Prófumo, Conxita Avila, Adele Cutignano

    Published 2024-12-01
    “…From the dichloromethane extract of sponge samples from Deception Island collected in January 2023, we isolated a novel derivative with an unusual β-lactone diterpene skeleton here named dendrillolactone (<b>1</b>), along with seven previously described diterpenes, including deceptionin (<b>2</b>), a gracilane norditerpene (<b>3</b>), cadlinolide C (<b>4</b>), a glaciolane norditerpene (<b>5</b>), membranolide (<b>6</b>), aplysulphurin (<b>7</b>), and tetrahydroaplysulphurine-1 (<b>8</b>). …”
    Get full text
    Article
  8. 128

    Distributed optimization and scheduling strategy for source load storage distribution grid based on alliance chain by Jinhua Tian, Yueyuan Zhang, Yanan Gao, Yu Qin, Bihan Fan, Cheng Zhang, Qiqi Zang

    Published 2024-08-01
    “…In response to issues as difficult global information acquisition, less consideration of flexible load and energy storage unit access, individual deception, and insufficient security in the optimization scheduling process of active distribution networks, this paper constructed a distribution network optimization scheduling model that includes sources, loads, and storage. …”
    Get full text
    Article
  9. 129
  10. 130

    The Oxford handbook of language and law /

    Published 2012
    Table of Contents: “…Identification of authorship and deception -- Author identification in the forensic setting / Carole E. …”
    View in OPAC
    Book
  11. 131

    Ethical attitudes of the future Russian officials and businessmen: Comparative analysis by A. A. Maksimenko, O. S. Deyneka, D. V. Krylova, E. V. Zabelina, E. A. Bulgakova

    Published 2023-02-01
    “…Compared to future entrepreneurs, future officials are significantly more likely to justify the act of appropriation, deception due to omissions, and revenge within the law. …”
    Get full text
    Article
  12. 132

    Longitudinal impact of past-year reproductive coercion on contraceptive use dynamics in Sub-Saharan Africa: evidence from eight population-based cohortsResearch in context by Shannon N. Wood, Haley L. Thomas, Georges Guiella, Rosine Mosso, Peter Gichangi, Simon P.S. Kibira, Fredrick Makumbi, Pierre Z. Akilimali, Funmilola M. OlaOlorun, Elizabeth Omoluabi, Michele R. Decker

    Published 2025-02-01
    “…Summary: Background: Reproductive coercion (RC) is a type of abuse where a partner intentionally attempts to interfere with fertility through deception or violence, often by manipulating one’s contraceptive use or reproductive decision-making. …”
    Get full text
    Article
  13. 133

    LA CRITIQUE IRONIQUE DE L’ACQUISITION DE LA DOCTRINE DE LIBERTE ABSOLUE DANS “L’IMMORALISTE” D’ANDRE GIDE / ANDRE GIDE’İN AHLAKSIZ ADLI ROMANINDA MUTLAK ÖZGÜRLÜK DOKTRİNİN EDİNİMİN... by Fuat BOYACIOĞLU, Hülya KOL

    Published 2016-06-01
    “…Il découvre que la doctrine de la liberté absolue lui mène à la misère et à la déception et ne fait pas le bonheur. Le fait qu'il se repent de ses pervers des relations sexuelles et qu’il invoque à ses amis nous montrent l'ironie de la doctrine de la liberté absolue.…”
    Get full text
    Article
  14. 134

    Presenting Iran's new economic diplomacy model with an export approach for neighboring countries with an emphasis on cultural and media diplomacy capacities by sekhavat kheirkhah, sayed Ali Tabatabai Panah, Alireza Soltani, Hamid Reza Shirzad

    Published 2024-12-01
    “…Robert Cohen, one of the most important theorists of neoliberal institutionalism, states that international institutions make cooperation between countries easier by reducing the possibility of deception and facilitate cooperation through information, monitoring and reducing transaction costs (Keohane, 1993). …”
    Get full text
    Article
  15. 135

    The rise and fall of promises: a preliminary method to trace promises in science and technology by Stefan D. M. Gaillard, Sanda Hachana

    Published 2025-12-01
    “…This scandal resulted from continuous overpromises and deceptive promises, practices not uncommon in science. …”
    Get full text
    Article
  16. 136

    Masochism of Play by Samantha Close

    Published 2025-01-01
    “…This practice research begins with the deceptively simple question: Why?…”
    Get full text
    Article
  17. 137

    An Unusual Case of Tracheoesophageal Fistulae by Jadelis Giquel, Christina Matadial, Yiliam F. Rodriguez Blanco, Ricardo Martinez-Ruiz, Dao Nguyen, Keith Candiotti

    Published 2012-01-01
    “…We present the case of a patient with a deceptive history for TEF and report an approach that provides adequate oxygenation, ventilation, surgical exposure, and postoperative analgesia with excellent outcome.…”
    Get full text
    Article
  18. 138

    A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields by Xiuli Wang

    Published 2013-01-01
    “…The parameters and the probabilities of deceptions of this code are also computed.…”
    Get full text
    Article
  19. 139

    A Construction of Multisender Authentication Codes with Sequential Model from Symplectic Geometry over Finite Fields by Shangdi Chen, Chunli Yang

    Published 2014-01-01
    “…In this paper, we construct multisender authentication codes with sequential model from symplectic geometry over finite fields, and the parameters and the maximum probabilities of deceptions are also calculated.…”
    Get full text
    Article
  20. 140

    Les racines de la « révolution du 25 janvier » en Égypte : une réflexion géographique by Delphine Pagès-El Karoui, Leila Vignal

    Published 2011-10-01
    “…The stalemate of the political system and the deceptive effects of an economic liberalization with little trickle-down effect explain the run-up to the revolution. …”
    Get full text
    Article