107 results on '"FORGERY"'
Search Results
2. Round-up of European enforcement case law 2023.
- Author
-
Gommers, Carina, Leppink, Willem, and Schneider, Marius
- Subjects
INTELLECTUAL property ,FORGERY ,PATENT suits - Abstract
In 2023, several noteworthy decisions relating to the enforcement of intellectual property rights (IPRs) were handed down, including in relation to anti-counterfeiting, parallel trade, litigation aspects and restrictions on the enforcement of IPRs. The decisions of the Court of Justice of the European Union and Supreme Courts and Courts of Appeals of the European Union Member States that the authors consider important are summarized in this contribution. The judgments were rendered between 1 January 2023 and 31 December 2023. As in previous editions, the authors have adopted a practical approach aimed at readers seeking an overview of the key IPR enforcement decisions of 2023. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Suspected North Carolina counterfeit pill-involved deaths, 2020–2022.
- Author
-
Friederich, Laura W, Cox, Mary E, Hyson, Brian E, and Bishop-Freeman, Sandra C
- Subjects
- *
SUDDEN death , *CONVENIENCE sampling (Statistics) , *FORGERY , *DRUGS , *FORENSIC toxicology , *FORENSIC sciences - Abstract
The NC Office of the Chief Medical Examiner regularly assumes jurisdiction over deaths that are suspicious, unusual or unattended by a medical professional. In recent years, the presence of counterfeit pills is occasionally suggested by investigatory notes and/or scene findings that document reported consumption of prescription drugs, or prescription drugs on scene, which are not reflected in the final autopsy findings after toxicological analysis of the decedent's blood samples. Counterfeit pill consumption is a major public health hazard worthy of attention from the forensic toxicology community. Seventy-five cases from January 2020 to December 2022 serve as a convenience sample of cases where prescription pills including formulations of alprazolam, oxycodone and hydrocodone were specifically referenced during the death scene investigation as recently consumed, yet an unexpected substance was found during toxicological analysis rather than the expected pharmaceutical drug. Of note, novel benzodiazepines detected included flualprazolam, etizolam, clonazolam metabolite (8-aminoclonazolam), bromazolam, flubromazolam and desalkylflurazepam. Decedents' ages ranged from 16 to 69, across 33 different NC counties. Case notes indicated that eight of the decedents obtained pills through direct personal relationships, six decedents obtained them from "the street" and one decedent likely purchased pills online. Pills were largely consumed orally or through insufflation. Seven case reports contained indication that decedents knew or suspected the counterfeit nature of their pills. This study describes the context and characteristics of 2020–2022 suspected counterfeit pill-involved deaths in NC to further the understanding of the forensic science community, law enforcement partners, public health stakeholders and those potentially at risk through the consumption of counterfeit pills. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Forging lesbians: Sappho and The Songs of Bilitis.
- Author
-
Lambert, Cat
- Subjects
LESBIANS ,QUEER theory ,PATRIARCHY ,AMERICANS ,FORGERY ,SONGS ,ART forgeries - Abstract
In Les Chansons de Bilitis ('The Songs of Bilitis', 1894), Pierre Louÿs purports to have translated into French for the first time the long-lost Greek poems of Bilitis, a contemporary of Sappho. Classicists have often heralded Bilitis as a watershed moment for reclaiming the lesbian Sappho from the clutches of homophobic, misogynist philologists. This paper complicates this narrative by reframing Bilitis as an object that participates in a broader cultural — and potentially queer — history of forgery. Rather than categorizing Bilitis as a forgery per se, I use forgery (and related textual practices) as a lens for illuminating how Louÿs 'plays' the forger and how this performance relates to readers' divergent desires and reactions. This lens also brings into focus the queer dynamics and effects of this text in relation to Sappho's corpus. At the same time, following Kadji Amin's cue to 'deidealize queerness' (2017), I show how such queer dynamics are inextricable from colonialist and patriarchal relations of power, in particular an Orientalizing tradition of forgeries by white European and American men. This framework illuminates the affective and political ramifications of forging queer narratives and identifications through the medium of this curious artefact. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Counterfeiting Periodicals in Seventeenth-Century Europe: Engravings, Music, and Binding of the Dutch Mercure galant in the Austrian National Library (1678–1679).
- Author
-
Schuwey, Christophe
- Subjects
- *
NATIONAL libraries , *FORGERY , *ENGRAVING - Abstract
This article analyses in detail a collection of seven counterfeit volumes of the Mercure galant—the main cultural periodical and principal propaganda machine of the late seventeenth-century—kept in the Austrian National Library in Vienna. These counterfeits, which have never been studied before, reveal the efforts and strategies undertaken by the Dutch bookseller Abraham Wolfgang to copy the text, engravings and music in each monthly issue. Analysing this set also reveals the financial and material constraints faced by the Parisian publishers of the original Mercure. Finally, the binding and bookplate reveal important clues regarding the international distribution and readership of Le Mercure galant, as well as its transformation from a periodical to an historical account. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Con Air: exploring the trade in counterfeit and unapproved aircraft parts.
- Author
-
Kotzé, Justin and Antonopoulos, Georgios A
- Subjects
- *
FORGERY , *PUBLIC safety , *AIRPLANE parts , *AIRLINE industry , *SUPPLY chains - Abstract
Counterfeit aircraft parts are among the most well-known counterfeits and pose a significant risk to public safety. It is estimated that as much as 10% of the legal market for aircraft parts are counterfeits and the presence of these parts on commercial aircraft are more commonplace than many people realise. Yet, criminological research on this pressing issue is remarkably scarce. Informed by accounts from specialised and highly knowledgeable actors embedded in the aviation industry, this paper aims to explore how counterfeit and unapproved parts enter the legitimate supply chain and what factors drive or motivate their circulation and use. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Literary Indiscernibles, Referential Forgery, and the Possibility of Allographic Art.
- Author
-
Spinella, Jake
- Subjects
- *
ART & literature , *FORGERY , *COPYING - Abstract
Peter Lamarque, in chapter 4 of his 2010 book Work and Object, argues that certain art forms, like music and literature, are such that there can be no forgeries that purport to be of an actually existing work—what Lamarque calls "referential forgeries." Put more clearly, any attempt at referentially forging a musical or literary work just results in making a copy of that work. Lamarque motivates this claim via appeal to another distinction, first made by Nelson Goodman, between "allographic" and "autographic" artforms. This article will evaluate Lamarque's argument that allographic literary works are unable to be referentially forged and will find that it does not pass muster. In so doing, the distinction between allographic and autographic artforms will also be called into question. In Section I, I will characterize referential forgery and Lamarque's definition of allographic and autographic artforms. Section II will critically examine Lamarque's argument against the possibility of referential forgery in allographic artforms. Section III will offer a case where it appears that a putatively allographic text's type membership is sensitive to facts about its causal-intentional provenance. This case will serve as pretext for Section IV's identification of this causal-intentional relation with the sanctioning relation of Sherri Irvin (2005). On the basis of considerations treated in Sections I through IV, Section V will question the tenability of the allographic/autographic distinction. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. The Source of Normativity.
- Author
-
Bengson, John, Cuneo, Terence, and Shafer-Landau, Russ
- Subjects
- *
NORMATIVITY (Ethics) , *METAPHYSICS , *FORGERY , *ETIOLOGY of diseases , *PHILOSOPHY - Abstract
This paper seeks to clarify one of the deepest questions about the source or ground of normativity, while also presenting an essence-based approach to answering it. We call it the 'Arché Question.' Though all metanormative theories must address this question, very few realists have explicitly grappled with the challenge it poses; those who have appear to deny any need to give an answer. After critically discussing extant realist responses, this paper outlines an essence-based approach to answering the Arché Question that draws on theoretical resources forged in recent advances in post-modal metaphysics. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Real and counterfeit cores: how feedback expands haloes and disrupts tracers of inner gravitational potential in dwarf galaxies.
- Author
-
Jahn, Ethan D, Sales, Laura V, Marinacci, Federico, Vogelsberger, Mark, Torrey, Paul, Qi, Jia, Smith, Aaron, Li, Hui, Kannan, Rahul, Burger, Jan D, and Zavala, Jesús
- Subjects
- *
GRAVITATIONAL potential , *INTERSTELLAR medium , *DARK matter , *DWARF galaxies , *DENSITY of stars , *FORGERY , *GALAXY formation - Abstract
The tension between the diverging density profiles in Lambda cold dark matter simulations and the constant-density inner regions of observed galaxies is a long-standing challenge known as the 'core–cusp' problem. We demonstrate that the SMUGGLE galaxy formation model implemented in the arepo moving mesh code forms constant-density cores in idealized dwarf galaxies of M ⋆ ≈ 8 × 107 Msun with initially cuspy dark matter (DM) haloes of M 200 ≈ 1010 Msun. Identical initial conditions run with an effective equation of state interstellar medium model preserve cuspiness. Literature on the subject has pointed to the low density threshold for star formation, ρth, in such effective models as an obstacle to baryon-induced core formation. Using a SMUGGLE run with equal ρth, we demonstrate that core formation can proceed at low density thresholds, indicating that ρth is insufficient on its own to determine whether a galaxy develops a core. We reaffirm that the ability to resolve a multiphase interstellar medium at sufficiently high densities is a more reliable indicator of core formation than any individual model parameter. In SMUGGLE , core formation is accompanied by large degrees of non-circular motion, with gas rotational velocity profiles that consistently fall below the circular velocity |$v_\text{circ} = \sqrt{GM/R}$| out to ∼2 kpc. Asymmetric drift corrections help recover the average underlying DM potential for some of our less efficient feedback runs, but time-variations in the instantaneous azimuthal gas velocity component are substantial, highlighting the need for careful modelling in the inner regions of dwarfs to infer the true distribution of DM. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Observations on the Security of COMET.
- Author
-
Xu, Zheng, Li, Yongqiang, and Wang, Mingsheng
- Subjects
- *
BLOCK ciphers , *COMETS , *CRYPTOGRAPHY , *FORGERY , *SECURITY management , *PERMUTATIONS - Abstract
This paper investigates the security of counter mode encryption with authentication tag (COMET), one of the 32 second-round candidates in National Institute of Standards and Technology's lightweight cryptography standardization process, against differential cryptanalysis. CHAM-64/128 is a block cipher chosen as one of the underlying block ciphers in COMET for hardware-oriented applications, and a differential characteristic with a high probability for CHAM-64/128 is useful for forgery attacks on COMET. However, we find that the optimal |$\mathbf{39}$| -round differential characteristic for CHAM-64/128 proposed by Roh et al. , which is the longest differential characteristic of CHAM-64/128, is invalid. Then, we propose a new method of distinguishing an |$\mathbf{m}$| -bit block cipher from an |$\mathbf{m}$| -bit random permutation using a differential characteristic with a probability not higher than |$\mathbf{2^{-m}}$|. Using our method, we use two |$\mathbf{39}$| -round differential characteristics with a probability of |$\mathbf{2^{-64}}$| for CHAM-64/128 to distinguish |$\mathbf{39}$| -round-reduced CHAM-64/128 from a |$\mathbf{64}$| -bit random permutation, respectively. Furthermore, we refine the probabilities of two differentials with the same input and output differential masks as the two |$\mathbf{39}$| -round differential characteristics, respectively. Finally, we present the first forgery attacks on COMET with the two differentials without using weak keys. Our forgery attacks follow the nonce-misuse scenario. It should be noticed that this attack does not invalidate the security claims of the designers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm.
- Author
-
Kashyap, Abhishek, Suresh, B, and Gupta, Hariom
- Subjects
- *
FORGERY , *WAVELET transforms , *ALGORITHMS , *IMAGE processing , *FORGERS , *RUMOR - Abstract
Nowadays, the whole world is covered with the revolution of digital information so that digital data are easy to transfer, access and process. Modern image processing tools are used to create forged images; by using these tools, forgers introduced forged region in the original image to spread the rumor in the public. Now there is a challenge for the forensic department to prove the authenticity of the original image. So there is required a new efficient copy-move tamper detection method. To fulfill this requirement, a new computational efficient method for copy-move forgery detection using firefly algorithm is proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. Getty Gnaios: A love story.
- Author
-
Lapatin, Kenneth
- Subjects
HISTORICAL fiction ,ROMANCE fiction ,ART collecting ,FORGERY ,PRINCES ,ROMANS ,PERSONAL property - Abstract
An amethyst intaglio depicting the Roman general Mark Antony and inscribed 'Gnaios' has been much lauded and frequently illustrated over the past fifty years. Other gems signed by this ancient engraver have been prized, replicated and forged for centuries. This article traces the amethyst, previously in the Ionides collection and acquired by the J. Paul Getty Museum in 2001, to the possession of Prince Stanislas Poniatowski, and demonstrates that, rather than dating to the late first century bc , it was cut by Giovanni Calandrelli between 1817 and 1824, apparently to complement a similarly inscribed gem thought to depict Cleopatra. The amethyst's reception exemplifies the desire of collectors to possess creations of renowned artists, scholars eager to construct compelling narratives around superb works of art, and over-optimistic reliance on expert authority. 'Master Gnaios' even appears in well-researched historical fiction. Thus, the Getty gem is another demonstration of the enduring and transformative power of outstanding forgeries. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Early Martyr Narratives: Neither Authentic Accounts nor Forgeries.
- Author
-
Moss, Candida R
- Subjects
- *
MARTYRS , *FORGERY , *PRIMITIVE & early church, ca. 30-600 - Published
- 2021
- Full Text
- View/download PDF
14. Metre as a stylometric feature in Latin hexameter poetry.
- Author
-
Nagy, Benjamin
- Subjects
- *
LATIN poetry , *MAGNITUDE (Mathematics) , *SAMPLE size (Statistics) , *FORGERY - Abstract
This article demonstrates that metre is a privileged indicator of authorial style in classical Latin hexameter poetry. Using only metrical features, classification experiments are performed between the works of six authors using four different machine-learning models. The results showed a pairwise classification accuracy of at least 90% with samples as small as ten lines and no greater than seventy-five lines (up to around 500 words). In a multiclass setting, classification accuracy exceeded 95% for all four algorithms when using eighty-one-line chunks. These sample sizes are an order of magnitude smaller than those typically recommended for BOW ('bag of words') or n -gram approaches, and the reported accuracy is outstanding. Additionally, this article explores the potential for outlier (forgery) detection, or 'one-class classification'. As an example, analysis of the disputed Aldine Additamentum (Sil. Ital. Pun. 8:144–223) concludes (P < 0.0001) that the metrical style differs significantly from that of the rest of the poem. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
15. Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection.
- Author
-
Vinolin, V and Sucharitha, M
- Subjects
- *
FORGERY , *IMAGE processing , *INTEGRATED software - Abstract
Information in the form of the image conveys more details than any other form of information. Several software packages are available to manipulate the images so that the authenticity of the images is being questioned. Several image processing approaches are available to create fake images without leaving any visual clue about the forging operation. So, proper image forgery detection tools are required to detect such forgery images. Over the past few years, several research papers were published in the digital image forensics domain for detecting fake images, thus escalating the legitimacy of the images. This survey paper attempts to review the recent approaches proposed for detecting image forgery. Accordingly, several research papers related to image forgery detection are reviewed and analyzed. The taxonomy of image forgery detection techniques is presented, and the algorithms related to each technique are discussed. The comprehensive analysis is carried out based on the dataset used, software used for the implementation and the performance achievement. Besides, the research issues associated with every approach were scrutinized together with the recommendation for future work. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
16. Oscar Wilde and the Confidence Trick.
- Author
-
Boyiopoulos, Kostas
- Subjects
- *
CENTRALITY , *FORGERY , *CONFIDENCE - Abstract
Critics have long highlighted the centrality of forgery in Oscar Wilde. This essay focuses instead on the idea of the confidence trick in Wilde's life and work, with a special focus on 'The Portrait of Mr. W. H.'. The capstone of the confidence trick is the so-called long con , a type of elaborate deception that resembles an extended theatrical performance. With its properties of narrativity and plot-making, the long con subsumes forgery. Its use in literature points to literature itself as a piece of trickery. Through cultural, biographical and textual analysis, this essay dwells on the various striking ways by which Wilde's fictions are entangled with reality as they are pervaded by the long con trope. By considering Wilde's perceived image in his 1882 American tour and his brushing shoulders with famous conmen, the essay first suggests that the confidence trick and dandyism share common ground. It demonstrates that the confidence trick is akin to Wilde's 'lying' and catalytic as an aesthetic performance. The cultural consciousness of the confidence trick is strongly present in such works as An Ideal Husband and The Importance of Being Earnest , which are built around long cons. 'Mr. W. H.' features a long con and in targeting the reader operates as one. Paradoxically, because of its open exploration of forgery, the story as a confidence trick in literature is failproof, imperceptible, and so perfect. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
17. Analysis of Aspirin, Prasugrel and Clopidogrel in Counterfeit Pharmaceutical and Herbal Products: Plackett–Burman Screening and Box–Behnken Optimization.
- Author
-
Mohammad, Mohammad Abdul-Azim, Elkady, Ehab Farouk, Fouad, Marwa Ahmed, and Salem, Wadhah Atef
- Subjects
- *
PRASUGREL , *ASPIRIN , *HYDROCHLOROTHIAZIDE , *POTASSIUM dihydrogen phosphate , *THIN layer chromatography , *CLOPIDOGREL , *FORGERY , *PLATELET aggregation inhibitors - Abstract
An isocratic reversed-phase high-performance liquid chromatographic method has been developed and validated for the simultaneous determination of aspirin, prasugrel HCl and clopidogrel bisulfate in the presence of clopidogrel-related compound (impurity-A) in focus on counterfeit. This method was used to determine counterfeited antiplatelet drugs in two substandard Indian pharmaceutical products sold on the market in Yemen and two traditional herbal medicines sold on the market in China. Thin layer chromatography and mass spectrometry of counterfeit herbal medicines have additionally been carried out to verify the identification of adulterants. Chromatographic separation was performed on Inertsil ® ODS-3 C18 (4.6 × 250 mm, 5 μm) with isocratic mobile phase elution containing a mixture of acetonitrile: (25 mM) potassium dihydrogen phosphate buffer, pH 2.7 adjusted with 0.1 M o -phosphoric acid (79: 21, v/v), at a flow rate of 1 mL/min and UV detection at 220 nm. Designs of experiment methodology, Plackett–Burman and Box–Behnken designs were used for the screening and optimization of the mobile phase composition. The method validation was also performed in accordance with the International Council on Harmonization (ICH) guidelines. The method developed for routine analysis was found to be sensitive, simple, accurate and highly robust. The results were statistically compared to reference methods using Student's t -test and variance ratio F -test at P < 0.05. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. Interpretative Challenges in the Archive: An Introduction.
- Author
-
Freije, Vanessa and Nolan, Rachel
- Subjects
- *
RUMOR , *FORGERY , *DENUNCIATION (Criminal law) - Abstract
The twenty-first century has already seen extensive handwringing over how disinformation, "fake news," and conspiracy theories shape contemporary politics. While social media and new technologies have undoubtedly accelerated the dissemination of such information, the problem of how unauthorized, dubious, or discredited claims shape political subjectivities and historical events is not new. In Latin America and the Caribbean, as elsewhere, conflicts over credibility and truth abound in the historical archive, leaving traces of rumor, denunciation, and even outright forgery that pose interpretative challenges for historians. We argue that dubious or challenged claims, instead of unreliable narratives to be separated out and discarded, are an important constitutive part of the historical record and often altered material realities. Introducing readers to select historical cases from Latin America and the Caribbean, we argue that some especially resonant denunciations, forgeries, rumors, and counter-narratives behave less like plot than like event. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
19. Internal Passports, Counterfeiting, and Subversive Practices in Early Postcolonial Peru.
- Author
-
Ragas, José
- Subjects
- *
FORGERY , *IDENTIFICATION documents , *SUBVERSIVE activities , *INTERNAL migration ,PERUVIAN history - Abstract
Counterfeit identity papers have accompanied many Peruvians over the past two centuries as they moved within their own country. Through these documents, they have embraced numerous personalities and eluded strict controls to the dismay of policymakers and experts who envisioned building a robust surveillance system based on identity cards. This article analyzes counterfeiting as a set of objects, practices, and knowledge that emerged in the aftermath of the Wars of Independence during the transition to an autonomous Republic. Committed to establishing social and political order in this chaotic scenario, Peruvian authorities relied on low-tech devices known as internal passports to regulate mobility within the convoluted territory. Nonetheless, internal passports proved more fragile and less effective than expected. Peruvians rapidly learned to produce their own internal passports or to adulterate their information, developing a particular expertise that enabled them to navigate the nascent biometric system. Forged internal passports thus illustrate the enduring tensions between governments, citizens, and technology, as well as early efforts of individuals to regain control of their personal data. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
20. Transitory Trust: Falsified Passports, Circulars, and Other Speculations in Nineteenth-Century Cuba.
- Author
-
Sartorius, David
- Subjects
- *
FORGERY , *PASSPORTS , *ADVERTISING fliers , *SPECULATION - Abstract
In nineteenth-century Cuba, the increasing and uneven use of passports for maritime travel generated confusion about their authority and encouraged their falsification. This essay explores the forgery and misuse of travel papers alongside the fabrications of an official colonial record that concealed the illegal transatlantic slave trade as it implemented documentary procedures for legal travel. Cuban officials pursued individuals who traveled without passports, with other people's passports, or lacked other papers, with a disproportionate focus on the circulation of free people of African descent. At the same time, the limited reach of government decrees and policies complicated strict determinations of transgression. Rather than taking this as evidence of a broken system, recognizing how various actors created the conditions for a collective susceptibility both to the authority conferred by passports and to plausible falsehoods lets us view borders, individual identity, and Caribbean mobility in new light. The essay calls on historians to approach the archival record of passports and mobility by balancing our retrospective recognition of falsifications with an awareness of fluctuating estimations of documentary veracity in the past. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
21. Detection of splicing forgery using differential evolution and wavelet decomposition.
- Author
-
Kashyap, Abhishek, Suresh, B, and Gupta, Hariom
- Subjects
- *
FORGERY , *ALGORITHMS , *RANDOM noise theory , *DIFFERENTIAL evolution , *IMAGE processing , *IMAGE compression - Abstract
In this paper, we have proposed a computationally efficient algorithm to detect splicing (copy-create) forgery, our proposed method is developed by using differential evolution and wavelet decomposition, the differential evolution algorithm automatically generates customized parameter values of tampered images, and wavelet decomposition is used to process large-size images under block-based framework. Our proposed method is resilient to distortions, such as the addition of Gaussian noise, scaling and compression of the forged images. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
22. Counterfeit Rabies Vaccines: The Philippine Experience.
- Author
-
Henson, Karl Evans R, Santiago, Anthony Aldrin C, and Namqui, Sherilyne S
- Subjects
- *
RABIES vaccines , *FORGERY , *PRODUCT counterfeiting , *POISONS , *PRODUCT recall - Abstract
Background In December 2018, a large, tertiary, university-affiliated hospital in the Philippines discovered that their legitimate supply chain was infiltrated with counterfeit rabies vaccines. Methods All vials suspected to be counterfeit were quarantined and surrendered to the Philippine Food and Drug Administration. Patients who may have received the counterfeit products were recalled, evaluated, and revaccinated accordingly. Vials of the counterfeit vaccines were sent to various laboratories for testing. Results Two batches of counterfeit rabies vaccines were found to have infiltrated the hospital's supply chain between December 2017 and December 2018. Of the 1711 patients who may have received counterfeit vaccines, 1397 patients were successfully contacted, and 734 were revaccinated with at least 1 dose of authentic rabies vaccine. The counterfeit vials were sterile, contained no toxic substances, and both contained active antirabies ingredient. No report of rabies infection or other adverse events were noted. Conclusions Our experience demonstrates the need for strong intervention and collaborative response from all stakeholders—government and regulatory bodies, the pharmaceutical industry, and individual institutions and consumers—to effectively eradicate counterfeiting and protect our patients. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
23. Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage.
- Author
-
Guo, Wei, Qin, Sujuan, Lu, Jun, Gao, Fei, Jin, Zhengping, and Wen, Qiaoyan
- Subjects
- *
CLOUD storage , *DATA replication , *EVIDENCE , *FORGERY - Abstract
For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
24. False Passports, Undocumented Workers, and Public (Dis)Order in Late-Eighteenth-Century Russia.
- Author
-
Smith, Alison K
- Subjects
- *
PASSPORTS , *FORGERY , *SOCIAL control , *PUBLIC discontent - Abstract
In 1798, a case of suspected passport forgery in the new town of Gatchina brought to light an array of legal, semilegal, and totally illegal behavior when it came to tsarist Russia's documentary requirements that governed mobility. Although there had been earlier kinds of documents required for travel, in the early eighteenth century, decrees established a system of short-term passports to allow a degree of mobility within a social structure based in binding legal statuses (soslovie) that tied nearly all subjects of the tsar to their localities or their owners. This specific case demonstrates that although the tsarist state clearly viewed this passport system as a method of social control, there were several significant limits to that control. First, documents were only reliable as long as they could be taken as truthful; cases of passport forgery like this showed how difficult it was for authorities to ascertain that truth. Second, the investigation uncovered many individuals who were negotiating (or sometimes ignoring) the passport system in ways that show the real limits of tsarist control. And third, the passport system took significant effort to maintain, effort that did not necessarily always seem worthwhile to some local authorities. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
25. The Kalām-i pīr and its place in the Central Asian Ismaʿili Tradition.
- Author
-
Beben, Daniel
- Subjects
- *
RELIGIOUS doctrines , *ISLAMIC studies , *ISLAM , *ISMAILITES , *FORGERY - Abstract
This paper is a study of the Kalām-i pīr , a text on religious doctrine preserved among the Ismaʿili Shiʿi community of the Badakhshan region of Central Asia, attributed to the fifth/eleventh-century Ismaʿili author Nāṣir-i Khusraw. An edition and translation of this work was first published by Wladimir Ivanow, who judged it to be a 'forgery' by the tenth/sixteenth-century Ismaʿili missionary Khayrkhwāh Harātī. Ivanow concluded that while the text overall holds value as a specimen of Ismaʿili doctrinal writing, its first chapter, which purports to be an autobiographical account of its reputed author, Nāṣir-i Khusraw, is an irrelevant appendage to the work. Since then, Ivanow's interpretation has remained broadly authoritative within the field. In recent years, however, multiple new manuscripts of the work and a range of related materials have come to light, indicating the need for a thorough re-evaluation of the text and its history. In this article I demonstrate that Harātī had no role in the development of the Kalām-i pīr and that its production should be dated to the eighteenth century, rather than the sixteenth. Furthermore, I argue that the attribution to Nāṣir-i Khusraw, elaborated in the first chapter, is not incidental to the text, but central to understanding its significance within the Ismaʿili tradition of Central Asia. The text must be considered within the context of the history of Badakhshan in the eighteenth century, which saw an energetic expansion of the Ismaʿili mission (daʿwa) in the region and the development of a competitive hagiographical tradition connected with Nāṣir-i Khusraw among various constituencies. This re-evaluation of the Kalām-i pīr demonstrates the need for a revision of the broader framework by which we understand both the legacy of Nāṣir-i Khusraw and the historical development of the Ismaʿili daʿwa in Central Asia. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
26. Presence of Counterfeit Marlboro Gold Packs in Licensed Retail Stores in New York City: Evidence From Test Purchases.
- Author
-
Kurti, Marin, He, Yi, Silver, Diana, Giorgio, Margaret, Lampe, Klaus von, Macinko, James, Ye, Hua, Tan, Fidelis, Mei, Victoria, and von Lampe, Klaus
- Subjects
- *
RETAIL stores , *FORGERY , *CIGARETTE packaging , *GOLD as an investment , *PURCHASING - Abstract
Background: There are no independent studies measuring the availability of premium brand counterfeit cigarettes in New York City from licensed retailers.Methods: We forensically analyzed the cigarette packaging of Marlboro Gold (n = 1021) purchased from licensed tobacco retailers in New York City, using ultraviolet irradiation and light microscopy to determine whether they were counterfeit.Results: We find that while only 0.5% (n = 5) of our sample exhibits at least one characteristic synonymous with counterfeit packaging, none of our packs can be conclusively classified as counterfeit.Conclusions: We do not find any counterfeit Marlboro Gold packs purchased at full price from licensed cigarette retailers throughout New York City. Future research using test purchases should include other venues (eg, street and online) and specifically ask for discounts to ascertain the overall presence of counterfeit cigarettes.Implications: This is the first study to independently measure the availability of counterfeit cigarette packs purchased at full price from licensed retailers in New York City. We find that none of the Marlboro Gold packs purchased from licensed cigarette retailers are counterfeit. [ABSTRACT FROM AUTHOR]- Published
- 2019
- Full Text
- View/download PDF
27. Butlers and dish-bearers in Anglo-Saxon courts: household officers at the royal table.
- Author
-
Gautier, Alban
- Subjects
- *
COURTS & courtiers , *PROSOPOGRAPHY , *FORGERY , *HISTORY , *EIGHTEENTH century ,18TH century British history ,BRITISH politics & government - Abstract
In Anglo-Saxon courts, from the eighth century down to the Norman conquest, 'officers of the mouth', bore household titles and served the king and his guests during meals, at least on major occasions. Those butlers ( pincernae) and dish-bearers ( dapiferi, disciferi) were not mere 'waiters' but members of great aristocratic families; serving the king's table was an honour for them, with all the implications of that word in an early medieval context. Using a variety of sources, particularly the subscription lists of charters, this article examines their rank at court, social origin, degree of proximity to kings and queens, and the nature of their occupation. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
28. Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
- Author
-
LIU, JOSEPH K., SZE LING YEO, WUN-SHE YAP, CHOW, SHERMAN S. M., WONG, DUNCAN S., and SUSILO, WILLY
- Subjects
- *
THRESHOLD signatures , *AGREEMENT protocols (Computer network protocols) , *FORGERY , *ANONYMITY , *CYBERTERRORISM - Abstract
In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen. We show that by choosing some inappropriate domains, two such instantiations suffer from forgery and anonymity attacks. Our attacks rely on algebraic techniques which involve solving some particular instances of the well-known subset sum problem. While we focus our attacks on two particular instantiations of the TRS, they are generic and are applicable to other schemes with the same choice of domains or a similar structure. We believe this paper can act as an important security remark on the design of future TRS schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
29. The Ithaca jewel: an authentic fake.
- Author
-
Baker, Abigail
- Subjects
ANCIENT jewelry ,EXCAVATION ,FORGERY ,COLLECTORS & collecting - Abstract
The story of the Fitzwilliam Museum's so-called 'Ithaca jewel' appears to be a typical one for a forgery: hopeful acquisition, uncomfortable research and finally oblivion. This article asks what is missing from such a story by looking deeper at the circumstances surrounding the jewel's creation, revealing a history that links it to the excavators of Bassae and Aegina. In light of this deeper history, the Ithaca jewel reflects the attitudes and interests of collectors in Greece in the early nineteenth century. It shows a time when engagement with the past could be both personal and nationalistic, scholarly and imaginative. It demonstrates some notions of authenticity that are radically different from those used by modern museums, but which continue to have repercussions for museums today. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
30. Stefania Tutino. A Fake Saint and the True Church.
- Author
-
Liere, Katherine Elliot Van
- Subjects
- *
FORGERY , *NONFICTION ,CATHOLIC Church history - Published
- 2023
- Full Text
- View/download PDF
31. Prescription Opioid Forgery: Reporting to Law Enforcement and Protection of Medical Information.
- Author
-
Singh, Naileshni, Fishman, Scott, Rich, Ben, and Orlowski, Anna
- Subjects
- *
DRUG laws , *CRIME , *MEDICAL ethics , *NARCOTICS , *PATIENTS , *PHARMACISTS , *PHYSICIANS , *PRIVACY , *HEALTH Insurance Portability & Accountability Act - Abstract
Objective To review confidentiality requirements of prescribers who become aware of a forged prescription. Design A case is reviewed in which a prescriber believes that a prescription has been forged. Results The literature and law related to prescription forgery and confidentiality are reviewed. Although prescription forgery is a crime, the prescriber's responsibility for reporting to law enforcement is not clear under current state and federal law. Federal laws and regulations, including the Health Insurance Portability and Accountability Act ( HIPAA), do not permit prescribers in all circumstances to disclose prescription fraud to law enforcement. Conclusions Under common circumstances, HIPAA may prohibit prescribers from reporting prescription forgery to law enforcement. However, collaborating with a dispensing pharmacist may offer a lawful pathway to reporting prescription forgery. State legislature may consider laws that clarify the reporting responsibilities of prescribers in cases of prescription forgery. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
32. Naturalism's Spurious Aesthetics: Mimesis and Forgery in Alphonse Daudet's L'immortel.
- Author
-
Bielecki, Emma
- Subjects
- *
NATURALISM , *AESTHETICS , *MIMESIS , *FORGERY , *ACOLYTES - Abstract
This article examines Alphonse Daudet's novel L'immortel, based on a notorious nineteenth-century forgery scandal, the Vrain-Lucas affair. It explores how Daudet uses the idea of the fake not only to frame a critique of a specific social formation (the milieu surrounding the Académie française, to which he had failed to secure election, and which is presented as a sclerotic, moribund institution), but also to articulate an attack on naturalism as practised by Zola and his acolytes. It argues that L'immortel can be read as an intervention in a long-running debate about the status of mimesis, a debate that received fresh impetus in the nineteenth century with the emergence of realism and naturalism. It suggests that Daudet's text reformulates the Platonic condemnation of mimesis to condemn naturalism as a degraded and aesthetically bankrupt form, belonging to the regime of the fake. At the same time, it promotes an alternative, Aristotelian conception of mimesis as an imaginative appropriation and transfiguration of the world. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
33. Fictional Doubles in Henry Green’s Back.
- Author
-
Hentea, Marius
- Subjects
- *
ARITHMETIC , *FICTION , *FORGERY , *INTERTEXTUALITY - Abstract
Henry Green’s 1946 novel Back is effectively cut in two because at the arithmetic middle of the book, there is a translated (and quite long) passage from the purportedly eighteenth century Souvenirs of the Marquise de Créquy. While most critics have agreed upon the importance of this passage to the novel, not only structurally but thematically, none have actually looked into the original source and considered the most crucial thing about it: the original source was a forgery. When considering the forged status of this passage and its vital importance to Back, our reading of Green’s novel must change drastically: no longer does the novel read as a quest for authenticity on the part of its protagonist, the disabled war veteran Charley Summers. Rather, one must consider the possibility of a true self in a world of forgery and duplicity. This also implicates our understandings of modernist intertextual practices. [ABSTRACT FROM PUBLISHER]
- Published
- 2010
- Full Text
- View/download PDF
34. The Strange Business of Memory: Relic Forgery in Latin America.
- Author
-
Gillingham, Paul
- Subjects
- *
RELICS , *FORGERY , *RELIGIOUS articles , *ARCHAEOLOGY , *LATIN American history , *RELIGIOUS life ,LATIN American civilization - Abstract
The article presents an examination into the practice of relic forgery throughout Latin American history, including examples from colonial times to contemporary conditions in the 21st century. Details are given describing several instances of relic forgery, discussing both the methods and economic aspects of the practice as well as deeper examination into the cultural and religious factors which allow such a practice to be successful in the region. Final analysis is offered highlighting the resultant emergence of archaeology dedicated to the certification of validity or fraud in religious relics.
- Published
- 2010
- Full Text
- View/download PDF
35. John Payne Collier, the Scholar Forger.
- Author
-
McCue, Jim
- Subjects
- *
PAINTING , *FORGERY , *MANUSCRIPTS , *BOOKS , *UNIVERSITIES & colleges - Abstract
The article focuses on the works of painter John Payne Collier. His oil painting "An Old Man's Diary," William Hazlitt was so impressed that he compared it with the style of Leonardo da Vinci. Collier is believed to be an expert in turning his documents with exciting patterns specially unique manuscripts and books. Moreover, he was labelled as a forger of materials including a title-page inscription in a publication at Dulwich College as well as works of famous artists like William Shakespeare's "King Lear" and "Romeo and Juliet."
- Published
- 2007
- Full Text
- View/download PDF
36. Science crime. The Korean cloning scandal and the role of ethics.
- Author
-
Bogner, Alexander and Menz, Wolfgang
- Subjects
- *
FORGERY , *MEDICINE , *STEM cells - Abstract
Today, Hwang Woo-Suk, the Korean stem cell researcher, stands for the most spectacular forgery scandal in biomedicine, if not in the history of science. Within a few weeks, his exposure as a stem cell forger has downsized the 'pride of Korea' into 'the Hwang case'. Interpretations of this fraudulent forgery vary considerably. We demonstrate that new insights may be gained when discussing the Hwang case against the background of the establishment of a specific framing called 'ethicising'. This term implies that contemporary struggles over how to govern scientific and technological advances are framed as 'value conflicts' that are characterised by specific conflict patterns and modes of negotiation and can be differentiated from 'interest conflicts' and 'knowledge conflicts'. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
37. FORGERY AND MIRACLES IN THE REIGN OF HENRY VIII.
- Author
-
Marshall, Peter
- Subjects
- *
MIRACLES , *FORGERY ,REIGN of Henry VIII, England, 1509-1547 - Abstract
Discusses the forgery of miracles throughout the course of the Reformation during the reign of Henry VIII in England. Implications of the theme for understanding profound and long-term shifts in religious and political culture taking place from the 1530s; Questions about the intellectual parentage of Henrician religious policy, and its doctrinal and functional consistency.
- Published
- 2003
- Full Text
- View/download PDF
38. Discussion.
- Author
-
Pillow, Kirk, Kivy, Peter, and London, Justin
- Subjects
- *
FORGERY , *MUSIC - Abstract
Kirk Pillow, Versions and Forgeries: A Response to Kivy, p177. Peter Kivy, Versions and “Versions,” Forgeries and “Forgeries”: A Response to Kirk Pillow, p180. Justin London, A Cohenian Approach to Musical Expression, p182. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
39. IBN TAYMIYYA ON ASTROLOGY ANNOTATED TRANSLATION OF THREE FATWAS.
- Author
-
MICHOT, YAHYA J.
- Subjects
- *
FATWAS , *MUSLIM scholars , *MUFTIS (Muslim officials) , *ISLAMIC religious functionaries , *MUSLIM logicians , *ASTROLOGY , *FORGERY , *FRAUD - Abstract
The article discusses the three fatwas, the doctrinal positions of Islamic scholar and theologian Ibn Taymiyya on astrology. The form and content of the fatwa are dependent on the nature and detail of the questions submitted to the mufti. It states that the first fatwa indulges in messages about eclipses and the phenomenon of forgeries while the second is structured to the different aspects of the question it answers and the third is a short and direct answer to the raised question. It also mentions that the fatwas are informed by religious disciplines of Islam.
- Published
- 2000
- Full Text
- View/download PDF
40. From pillory to gallows: The punishment of forgery in the age of the financial revolution.
- Author
-
McGowen, Randall
- Subjects
- *
FORGERY , *LEGAL antiquities - Abstract
Focuses on the characterization of criminal law for forgery in the eighteenth-century in London, England. Origin of forgery statute of 1729; Account of a forgery case involving William Hales, a descendant from a Baron of the Exchequer under Henry VIII; Transition from pillory to gallows statute.
- Published
- 1999
- Full Text
- View/download PDF
41. On the Suspicion of an Art Forgery.
- Author
-
Cebik, L.B.
- Subjects
- *
FORGERY , *SUSPICION in literature , *SELF-esteem - Abstract
Examines the effect of forgery on aesthetic perception. Influence of forgery knowledge on judgment; Impact of suspicion on aesthetic perception; Significance of self-esteem on risk of suspicion.
- Published
- 1989
- Full Text
- View/download PDF
42. CHATTERTON'S PLANS FOR THE PUBLICATION OF THE FORGERY.
- Author
-
Haywood, Ian
- Subjects
FORGERY ,SCOTTISH Gaelic language ,SCOTTISH Gaelic poetry - Abstract
The article highlights the author Thomas Chatterton's plans for the publication of the forgery. The author has consciously used the term "forgery" and not "Rowley" in the title of this article. The latter has often been used as shorthand for the former, but Thomas Rowley is only one of several authors invented by Chatterton. The scope and versatility of Chatterton's forgery is one of his greatest advances on his predecessor James Macpherson, the creator of Ossian. Macpherson's forgery is Ossian's Erse poetry, translated and edited by Macpherson.
- Published
- 1985
- Full Text
- View/download PDF
43. GARDENS AS WORKS OF ART: THE PROBLEM OF UNIQUENESS.
- Author
-
Miller, Mara
- Subjects
GARDENS ,ARTS ,POETRY (Literary form) ,PAINTING ,ART forgeries ,FORGERY - Abstract
The article discusses gardens as works of art. It states that in the eighteenth century gardens were considered as an important kind of art work, equal in stature to poetry and painting. It mentions that eighteenth-century philosophers wrote about gardens frequently and saw vital relationships between them and politics and ethics while present-day philosophers ignore them completely. According to the article, there are no forgeries of gardens, there are no full-scale replicas and they cannot be mass produced. It adds that since change is inevitable in gardens, one can safely say that garden is too unique to be work of art.
- Published
- 1986
- Full Text
- View/download PDF
44. THE SOCIAL ORGANIZATION OF BURGLARY.
- Author
-
Shover, Neal
- Subjects
BURGLARY ,ROBBERY ,FORGERY ,CRIMINAL law ,BURGLARY protection ,BURGLARS ,SOCIAL structure ,SOCIAL interaction - Abstract
The social organization of systematic burglary is discussed and briefly compared to earlier work on systematic offenders. Salient aspects of both the internal and external social organization of burglary are presented, especially as these are related to the problems of burglary. It is suggested that burglary continues to be more like the social organization of professional theft, as this was presented by Sutherland, than check forgery and armed robbery, as these have been depicted in recent literature. Some possible reasons for this are presented. Finally, it is suggested that the social organization of burglary can be expected to continue to change as a result of macrolevel changes in the economy and in the nature of security forces. [ABSTRACT FROM AUTHOR]
- Published
- 1973
- Full Text
- View/download PDF
45. THE BEHAVIOR OF THE SYSTEMATIC CHECK FORGER.
- Author
-
Lemert, Edwin M.
- Subjects
FORGERY ,CRIMINAL law ,PROFESSIONAL employees ,OFFENSES against property ,LARCENY ,PRISONS - Abstract
This article focuses on the concept of behavior systems in crime in the U.S. Because this paper proposes to assess the usefulness of the behavior system in analyzing or understanding the behavior of the systematic check forger, the typology outlined in his study of the professional thief will be employed. Altogether seventy-two persons currently serving sentences for check forgery and writing checks with insufficient funds were studied. Three additional check offenders were contacted and interviewed outside of prison. The sample included eight women and sixty-seven men, all of whom served time in California correctional institutions. Projected against the typology of professional theft, the behavior of the persons falling into the systematic check forgery category qualified only in a very general way as professional crime. In other words, although it is possible to describe these forgeries as systematic, it is questionable whether more than a small portion of them can be subsumed as professional under the more general classification of professional theft. A point-by-point comparison is made in the article, to bring out the numerous significant differences between systematic forgery and professional theft.
- Published
- 1958
- Full Text
- View/download PDF
46. THE USE OF PRIVATE TOKENS FOR MONEY IN THE UNITED STATES.
- Author
-
Barnard, B.W.
- Subjects
TOKENS ,MONEY ,AMERICAN business enterprises ,COUNTERFEIT money ,COINS ,ADVERTISING ,FORGERY ,COINAGE - Abstract
The article focuses on the use of private tokens for money in the U.S. A token is defined as a medium of exchange unauthorized by law and issued by private persons or firms which have been recognized as a sort of money. The line of distinction between the issue of tokens and counterfeiting is not clear. The law in the U.S. clearly defines what constitutes counterfeiting. Coins are issued by private concerns or persons by authorization of a branch of government. The two classes of tokens that are issued include tradesmen's tokens and political tokens. Tradesmen's tokens are issued by firms. They generally carry an advertising legend which describes the nature of the issuer's business.
- Published
- 1917
- Full Text
- View/download PDF
47. William-Henry Ireland’s First Forgery.
- Author
-
Berkhout, Carl T.
- Subjects
- *
FORGERY , *SIGNATURES (Writing) , *AUTOGRAPH collecting , *AUTOGRAPHS , *FORGERS , *LITERARY forgeries & mystifications , *EXHIBITIONS - Abstract
The article discusses British forger William-Henry Ireland (1775-1835), focusing on an Elizabethan forgery he created in 1794 and its written description in the 1796 published account "An Authentic Account of the Shaksperian Manuscripts, &c." It was displayed at the Great Tudor Exhibition of 1889-1890 at the New Gallery on Regent Street in London, England and the exhibition description of the work indicates it is an English translation of a 1590 French work notable for bearing the signature of Queen Elizabeth I of England on its cover. The book was lent to the exhibition by the widow of collector Henry Cunliffe and was acquired by the British Museum.
- Published
- 2012
- Full Text
- View/download PDF
48. Reader's Query.
- Author
-
Gustard, Ann
- Subjects
- *
FORGERY of manuscripts , *FORGERY , *FORGERS ,WRITING - Abstract
The author focuses on an account of 17th-century historian Anthony Wood, who was visited at the end of the English Civil War in 1648 by Parliamentary Visitors. According to the author, although Wood includes this event in his autobiography, there is no evidence of it in the account written by the Visitors. Through an examination of the writing in the document, the author claims that Wood's name was changed by a forger, and requests more information on the topic.
- Published
- 2007
- Full Text
- View/download PDF
49. The Forger's Shadow: How Forgery Changed the Course of Literature.
- Author
-
Charles Benjamin
- Subjects
FORGERY ,LITERATURE - Abstract
Book Information The Forger's Shadow: How Forgery Changed the Course of Literature. The Forger's Shadow: How Forgery Changed the Course of Literature Nick Groom London Picador 2002 351 pp £20 By Nick Groom. Picador. London. Pp. 351 pp. £20, [ABSTRACT FROM AUTHOR]
- Published
- 2003
- Full Text
- View/download PDF
50. How to Forge a Musical Work.
- Author
-
Kivy, Peter
- Subjects
- *
MUSICAL composition , *FORGERY - Abstract
Describes a response to the position of philosopher Nelson Goodman on musical forgery. Proposal of a narrative describing forgery in an ordinary-language sense; Assertion of Goodman to the question of forgery into the position of a central concern for philosophers of art; Analysis of the ontological impossibility of forging musical works.
- Published
- 2000
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.