893 results on '"fake"'
Search Results
2. Digital Violence Against Women: Is There a Real Need for Special Criminalization?
- Author
-
Polyzoidou, Vagia
- Abstract
Social networking and rapid digital evolution have created a brand-new framework of human behaviours and habits. Of course, the majority of them already existed over the centuries but in a different form; as a result, conventional assaults towards legal interests of specific individuals have initially transformed into electronic and then into cyber(-)crimes (p.e. from conventional pornography to internet pornography or cyber/digital pornography including sometimes even virtual pornography via pseudo images and totally AI generated pictures). When discussion comes to gender-based violence, in particular violence against women and domestic violence, we realize that abuses and violations of their fundamental human rights could take place either online or offline; furthermore, both similarities and differences in old and new behaviours, and consequently in crime formations ("actus reus") and in perpetrators' "modus operandi" could easily be found and categorized. This paper will not discover the causes or the elements behind the various digital abuses against women; its first purpose is to gather the various crime behaviours against women and reach some conclusions by a methodically comparative bibliographic and legislative research. Besides, tackling gender-based violence –in particular violence against women and domestic violence- consists one of the main contemporary concerns of every liberal state. CoE's contribution to it –through Convention on Preventing and Combating Violence against Women and Domestic Violence (Istanbul Convention) and Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) but even via ECHR's case law- is indisputable. At the same time, European Union is trying to end gender-based violence through its member states with a new legal instrument (a proposed Directive on combating violence against women and domestic violence), whose results are expected to be more direct and -hopefully- more effective. The main target of this paper is to present and examine the specific form of digital crime against women and girls as long as the majority of crimes nowadays takes place digitally; notwithstanding the fact that pandemic and post pandemic era have definitely determined criminals' modus operandi. At the end of the day, someone has to answer: how Criminal Law faces the new aforementioned behaviours, based on the fundamental theory of legal interest and leading to a justified (extra) standardization? And even more: where does this "plus" in penalties (: aggravation) for behaviours that combine characteristics of digital and gender-based criminality come from? [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. The Falsifications of Isaac Babel's Manuscripts and Their Recognition
- Author
-
Petr A. Druzhinin
- Subjects
isaac babel ,judaica ,yiddish ,solomon mikhoels ,textual criticism ,manuscript ,signature ,fake ,counterfeit ,forgery ,falsifier ,language of writers ,Literature (General) ,PN1-6790 ,Slavic languages. Baltic languages. Albanian languages ,PG1-9665 - Abstract
The article is dedicated to the handwritten legacy of Isaac Babel and examines the writer’s letters, inscriptions, and drawings introduced into scientific circulation in the last decade. Based on the analysis of these findings, the article concludes that all these “autographs of Isaac Babel” are hoaxes of varying degrees of persuasiveness. These results confirm the effectiveness of philological methods for recognizing falsified manuscripts of the classics of literature. The article pays special attention to the analysis of Isaac Babel’s gift inscription to Solomon Mikhoels, written partly in Yiddish. The research establishes that the text of the inscription testifies to the writer’s poor command of Yiddish, which in turn refutes the possibility of the authenticity of such an inscription as a whole. The issues considered in the article correlate with the general problems of modern textual criticism.
- Published
- 2024
- Full Text
- View/download PDF
4. Otherness of individual existence in the context of fake reality
- Author
-
Abbood, Mohammed Wahhab Abbood
- Subjects
fake ,reality ,fake reality ,post-truth ,information ,ideology ,individual ,Language and Literature - Abstract
The article considers the phenomenon of fake and its infl uence on the individual existence of a person. In circumstances where public opinion is entirely manipulated, the freedom of thought is constrained. Overwhelmed by the excessive infl ux of information, an individual gradually loses the capacity to distinguish between what is true and false. Having embraced the ideological slogan “This is completely diff erent” and acknowledged the importance, the acceptability of double standards, opting for a fabricated reality becomes a choice of the lesser evil for an individual. On the one hand, there exists truth, liberty, and accountability, which necessitates considerable eff ort for a meaningful existence. On the other hand, the devaluation of these values to the level of “one’s own truth,” comfortable conformity, and a reduction in the degree of accountability to the status of “possessing” or “maintaining one’s reputation” enables an individual to seamlessly conform to the prevailing consensus, without stepping out of the comfort zone. The data from domestic and foreign researchers studying this phenomenon are analyzed. Key issues related to the nature of fake, the roles of mass media and new media are identified, the author’s defi nition of this concept is provided. In the context of this article, a “fake” is interpreted as a means of ideological manipulation, serving as a defi ning feature of a text regarding its deviation from the truth. The typical psychological traits of an “average” individual, who generates untruths and is open to accepting them as facts, his/her inclination to “avoid information”, attributing truthfulness to what is essentially an opinion, and showing unquestioning faith in diverse experts, enable contemporary information consumers to merge their personal perception of reality with the constructed reality presented by infl uential media sources. It is concluded that a fake, having various forms of existence, is an ideological tool for manipulating individual and supra-individual consciousness, while individuals fi nd themselves immersed in a new fake reality.
- Published
- 2024
- Full Text
- View/download PDF
5. Публикационные практики казахстанских ученых: анализ влияния хищнических журналов и государственной политики.
- Author
-
Казтаева, С. С.
- Abstract
The article analyzes the current publishing practices of Kazakhstani scientists in the context of the growing problem of predatory journals. It considers the impact of global trends, such as digitalization and economization of scientific knowledge, on the academic environment of Kazakhstan. The emphasis is on the problem of predatory journals, which, despite the use of modern metrics and open access, often publish low-quality materials. The article analyzes the causes and consequences of the growth of such journals, including the impact of government policy and publication requirements for the protection of scientific degrees. Based on the works of Shen K. and Bjork B.K., and Xia J. It is argued that the potential victims of predatory journals are young, inexperienced scientists, often from developing countries, remote from the production of scientific knowledge. An empirical study conducted among 139 scientists revealed that the main motive for publication is to comply with government requirements. The survey found that most respondents were aware of predatory journals, but some engaged in practices that could indicate potential risks, such as mailing list advertising and intermediary services. The results highlight the need for increased awareness and education on publication practices, as well as the necessity to improve standards for ensuring the quality of scientific publications in Kazakhstan [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Roman original or deliberate fake?
- Author
-
David Ojeda
- Subjects
portrait ,bronze ,fake ,forger ,Archaeology ,CC1-960 - Abstract
A private collection in Cordoba contains a previously unpublished bronze head. It is not a Roman original. Its iconographic incongruences and its intentional fractures suggest a malicious intention in its manufacture. It is possibly a fake that someone intended to introduce in the art market. A second bronze portrait of the same personage belongs to a private collection in Murcia. It has similarly never been made known. It is also a modern sculpture, confirming the non-ancient origin of the bronze in Cordoba. The joint study of the two objects can serve as a methodological example of the procedure to detect modern fakes of bronze portraits with an antique appearance.
- Published
- 2024
- Full Text
- View/download PDF
7. Comparative Analysis of Fake Comments Posted in Twitter Using Different Machine Learning Models
- Author
-
Jaiswal, Vivek, Suri, Akshat, Vishvakarma, Akanksha, Sabherwal, Suruchi, Alam, Mahboob, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Santosh, KC, editor, Nandal, Poonam, editor, Sood, Sandeep Kumar, editor, and Pandey, Hari Mohan, editor
- Published
- 2024
- Full Text
- View/download PDF
8. Performance of Hybrid Models with VGG16-XGBoost and VGG16-LightGBM on Fake Face Image Recognition
- Author
-
Tien, Vu Huu, Nam, Tran Quy, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Nguyen, Thi Dieu Linh, editor, Dawson, Maurice, editor, Ngoc, Le Anh, editor, and Lam, Kwok Yan, editor
- Published
- 2024
- Full Text
- View/download PDF
9. VGMFSN: Design of an Efficient Fused VARMA GRU Model for the Identification of Fake Profiles on Social Networks
- Author
-
Aditya, Bhrugumalla L. V. S., Mohanty, Sachi Nandan, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Castillo, Oscar, editor, Sudhakar Babu, Thanikanti, editor, and Aluvalu, Rajanikanth, editor
- Published
- 2024
- Full Text
- View/download PDF
10. Detection of Fake URLs Using Deep LSTM Architecture over Social Media
- Author
-
Kaur, Sawinder, Nancy, Kumar, Parteek, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Abraham, Ajith, editor, Pllana, Sabri, editor, Hanne, Thomas, editor, and Siarry, Patrick, editor
- Published
- 2024
- Full Text
- View/download PDF
11. Replicated Temporality. Time, Originality, and Rock Art Replicas
- Author
-
Mayer, Laura, Porr, Martin, Eerkens, Jelmer, Series Editor, Çakırlar, Canan, Editorial Board Member, Iizuka, Fumie, Editorial Board Member, Seetah, Krish, Editorial Board Member, Sugranes, Nuria, Editorial Board Member, Tushingham, Shannon, Editorial Board Member, Wilson, Chris, Editorial Board Member, Abadía, Oscar Moro, editor, Conkey, Margaret W., editor, and McDonald, Josephine, editor
- Published
- 2024
- Full Text
- View/download PDF
12. A Real Virtual Self
- Author
-
Mace, Rebecca, Setty, Emily, editor, Gordon, Faith, editor, and Nottingham, Emma, editor
- Published
- 2024
- Full Text
- View/download PDF
13. Towards Reliable App Marketplaces: Machine Learning-Based Detection of Fraudulent Reviews
- Author
-
Fiallos, Angel, Anton, Erika, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Florez, Hector, editor, and Leon, Marcelo, editor
- Published
- 2024
- Full Text
- View/download PDF
14. Identifying Fake Twitter Trends with Deep Learning
- Author
-
AlBuhairi, Thahab M., Alhakbani, Haya A., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Sharma, Harish, editor, Chakravorty, Antorweep, editor, Hussain, Shahid, editor, and Kumari, Rajani, editor
- Published
- 2024
- Full Text
- View/download PDF
15. A Story Too Good to Be True: The Manipulation of Truth Claims in Faked News
- Author
-
Schirrmacher, Beate, Bruhn, Jorgen, Series Editor, Schirrmacher, Beate, editor, and Mousavi, Nafiseh, editor
- Published
- 2024
- Full Text
- View/download PDF
16. Prevalence of substandard, falsified, unlicensed and unregistered medicine and its associated factors in Africa: a systematic review
- Author
-
Biset Asrade Mekonnen, Muluabay Getie Yizengaw, and Minichil Chanie Worku
- Subjects
Counterfeit ,falsified ,fake ,substandard ,unlicensed ,unregistered ,Therapeutics. Pharmacology ,RM1-950 ,Pharmacy and materia medica ,RS1-441 - Abstract
Background: Substandard, falsified, unlicensed, and unregistered medicines pose significant risks to public health in developed and developing countries. This systematic review provides an overview of the prevalence of substandard, falsified, unlicensed, and unregistered medicine and its associated factors in Africa.Methods: Articles published from April 2014 to March 2024 were searched in Google Scholar, Science Direct, PubMed, MEDLINE, and Embase. The search strategy focused on open-access articles published in peer-reviewed scientific journals and studies exclusively conducted in African countries. The quality of the studies was assessed according to the Medicine Quality Assessment Reporting Guidelines (MEDQUARG). This systematic review was reported according to the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA).Results: Of the 27 studies, 26 had good methodological quality after a quality assessment. Of the 7508 medicine samples, 1639 failed at least one quality test and were confirmed to be substandard/falsified medicines. The overall estimated prevalence of substandard/falsified medicines in Africa was 22.6% (1718/7592). The average prevalence of unregistered medicines was 34.6% (108/312). Antibiotics, antimalarial, and antihypertensive medicines accounted for 44.6% (712/1596), 15.6% (530/3530), 16.3% (249/1530), and 16.3% (249/1530), respectively. Approximately 60.7% (91/150) were antihelmintic and antiprotozoal medicines. Poor market regulatory permission, Free trade zones, poor registration, high demand, and poor importation standards contribute to the prevalence of these problems.Conclusion/Recommendations: Substandard, falsified, and unregistered medicines are highly prevalent in Africa, and attention has not been paid to the problem. Antibiotics, antimalarial, anthelmintic, and antiprotozoal are the most commonly reported substandard, falsified, and unregistered medicines. A consistent supply of high-quality products, enhancement of registration, market regulatory permission, and importation standards are essential to counter the problems in Africa. Preventing these problems is the primary duty of every responsible nation to save lives.
- Published
- 2024
- Full Text
- View/download PDF
17. Әлеуметтік желілердің қоғамдық санаға әсері.
- Author
-
Әшірбекова, Г., Берекетова, А., and Жақсылық, А.
- Abstract
Copyright of Bulletin of the L.N. Gumilyov Eurasian National University. Journalism Series is the property of L.N. Gumilyov Eurasian National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
18. ІНФОРМАЦІЙНА ТЕХНОЛОГІЯ РОЗПІЗНАВАННЯ ПРОПАГАНДИ, ФЕЙКІВ ТА ДЕЗІНФОРМАЦІЇ У ТЕКСТОВОМУ КОНТЕНТІ НА ОСНОВІ МЕТОДІВ NLP ТА МАШИННОГО НАВЧАННЯ.
- Author
-
В. А., Висоцька
- Subjects
MACHINE learning ,ARTIFICIAL intelligence ,WORD recognition ,PARTS of speech ,DISINFORMATION - Abstract
Context. The research is aimed at the application of artificial intelligence for the development and improvement of means of cyber warfare, in particular for combating disinformation, fakes and propaganda in the Internet space, identifying sources of disinformation and inauthentic behavior (bots) of coordinated groups. The implementation of the project will contribute to solving the important and currently relevant issue of information manipulation in the media, because in order to effectively fight against distortion and disinformation, it is necessary to obtain an effective tool for recognizing these phenomena in textual data in order to develop a further strategy to prevent the spread of such data. Objective of the study is to develop or automatic recognition of political propaganda in textual data, which is built on the basis of machine learning with a teacher and implemented using natural language processing methods. Method. Recognition of the presence of propaganda will occur at two levels: at the general level, that is, at the level of the document, and at the level of individual sentences. To implement the project, such feature construction methods as the TF-IDF statistical indicator, the “Bag of Words” vectorization model, the marking of parts of speech, the word2vec model for obtaining vector representations of words, as well as the recognition of trigger words (reinforcing words, absolute pronouns and “shiny” words). Logistic regression was used as the main modeling algorithm. Results. Machine learning models have been developed to recognize propaganda, fakes and disinformation at the document (article) and sentence level. Both model scores are satisfactory, but the model for document-level propaganda recognition performed almost 1.2 times better (by 20%). Conclusions. The created model shows excellent results in recognizing propaganda, fakes and disinformation in textual content based on NLP and machine learning methods. The analysis of the raw data showed that the propaganda recognition model at the document (article) level was able to correctly classify 6097 non-propaganda articles and 694 propaganda articles. 123 propaganda articles and 285 non-propaganda articles were misclassified. The obtained estimate of the model: 0.9433254618697041. The sentence-level propaganda recognition model successfully classified 205 propaganda articles and 1917 non-propaganda articles. The model score is: 0.7437784787942516 (but 731 articles were incorrectly classified). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. DISSEMINATION OF FAKE AND INCORRECT INFORMATION ON SOCIAL NETWORKS.
- Author
-
Sultanbaeva, G. S., Tolegen, B. Z., Lozhnikova, O. P., Buyenbayeva, Z. K., and Tyulepberdinova, G. A.
- Subjects
SOCIAL networks ,FAKE news ,INFORMATION dissemination ,MISINFORMATION ,INFORMATION literacy - Abstract
Copyright of Herald of Journalism / Habaršy Žurnalistika Seriâsy is the property of Al-Farabi Kazakh National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
20. ПОСТШЫНДЫҚ ДӘУІРІНДЕГІ МЕДИА: АНТИИНТЕЛЛЕКТУАЛИЗМ МЕН ПОПУЛИЗМ САЛДАРЫ
- Author
-
Есімова, Г., Әшірбекова, Г., and Ермағанбетова, З.
- Abstract
Copyright of Herald of Journalism / Habaršy Žurnalistika Seriâsy is the property of Al-Farabi Kazakh National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
21. رویکرد «از آن خودسازی هنری» در منتخبی از نمونه های تصویری قالی دستباف ایران.
- Author
-
محمد افروغ
- Abstract
Appropriation is a new art approach in the postmodern era, which appears in various ways in the form or content of the newly created work. Therefore, returning to the past works and consciously using them to the desired extent and in a new format, to create a new concept and express a new idea so that the created work is original and not forgery, because a fake artwork is made to deceive the audience, but such works do not deceive the audience. When appropriation takes place, a work is created that can be counted among the original works. Although this approach can be observed in visual arts, it happens in a more limited and different way in native arts, especially hand -woven carpets. Although this approach, due to mere representation, has lost its function today, except in carpet weaving in this way, the main question of this research is, how does the approach of appropriation in carpet weaving happen and what are its characteristics? Also, the purpose of this research is to explain the approach of appropriation in this native art and to analyze and examine its dimensions and mechanisms. Some of the findings of this research are as follow: the artist in this native art is a designer (for urban woven carpets) or a weaver (for rural and nomadic carpets), doesn't create a new concept, but out of taste and simply to represent or celebrating the personality and status of celebrities creates a work. In this approach, adaptation of various works (painting, photography, architecture, sculpture, tiling, reliefs, painting, nature and its elements) occurs. Most of the subjects of appropriation in the carpet are related to the faces and icons of mythical figures (Hoshang, Jamshid, Anoushirvan, Dariush, Shapur, Purandokht), political, religious, cultural or scientific men, the elements of nature, buildings, and historical monuments. This research is a descriptive -analytical research the data is collected using library resources. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. جعل آثار تاریخی فرهنگی در ایران.
- Author
-
محمد رضا زاهدی and حسن کریمیان
- Abstract
Since the onset of the Enlightenment in the early 18th century, and the subsequent establishment of museums, galleries, and private collections, the acquisition of cultural artifacts to populate these institutions became imperative. However, this period also witnessed the emergence of counterfeit works, crafted in collaboration with specialists across various disciplines. A crucial inquiry arises regarding the identification of the methods and techniques employed by forgers, the recent surge in counterfeit production, and the detrimental impact of such works on archaeological studies and museum activities. This paper aims to provide a comprehensive examination of counterfeit works, tracing their origins in Iran, elucidating the typology of counterfeit objects, detailing the methods of forgery, and analyzing their dissemination to target audiences. Through a combination of library research and field studies, this investigation reveals that counterfeit works exploit historical and cultural significance, often leveraging contemporary scientific knowledge. The lack of precise discernment by target groups regarding these counterfeit works has facilitated their creation and distribution across three primary levels: 1) individuals seeking to amass wealth, 2) domestic enthusiasts of historical and cultural artifacts, and 3) galleries and foreign museums. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Roman original or deliberate fake? On an unpublished bronze head in a private collection in Cordoba.
- Author
-
OJEDA, DAVID
- Subjects
ART industry ,SCULPTURE ,FORGERS ,INTENTION ,COLLECTIONS - Abstract
A private collection in Cordoba contains a previously unpublished bronze head. It is not a Roman original. Its iconographic incongruences and its intentional fractures suggest a malicious intention in its manufacture. It is possibly a fake that someone intended to introduce in the art market. A second bronze portrait of the same personage belongs to a private collection in Murcia. It has similarly never been made known. It is also a modern sculpture, confirming the non-ancient origin of the bronze in Cordoba. The joint study of the two objects can serve as a methodological example of the procedure to detect modern fakes of bronze portraits with an antique appearance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Fake Review Detection and Removal: A Comparative Analysis using ML and DL Models.
- Author
-
Garima, Vaibhavi, Singh, Yamini, Teotia, Rupika, Kadian, Karuna, Garhwal, Sunita, and Dwivedi, Vimal
- Subjects
MACHINE learning ,DECISION trees ,ONLINE social networks ,K-nearest neighbor classification ,RANDOM forest algorithms ,COMPARATIVE studies - Abstract
Reviews are increasingly used for purchase decisions by the customers, they are important for e-commerce and social networking sites. However, not every review is necessarily authentic. Researchers have put out a variety of machine learning techniques in the past to identify false product reviews. Finding the proper machine learning algorithm to spot fake reviews for a particular type of data is crucial, though. Consequently, in this research, algorithms such as SVC (Support Vector Classifier), Decision Tree Classifier, Logistic Regression, Random Forests Classifier, Multinomial Naive Bayes and k-Nearest Neighbors are compared on different kinds of datasets like Amazon dataset, Yelp Dataset and TripAdvisor Hotel Reviews Dataset. Accuracy, Recall, Precision, and F1-Measure evaluation findings are the basis for the comparison. The findings of this study indicate that, Support Vector classifier comes out to be the best performing algorithm for detecting fake reviews when compared with the other five techniques. While the k-Nearest Neighbors algorithm has the worst performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
25. HABER BÜLTENLERİ VE TARTIŞMA PROGRAMLARINDA YALAN HABER VE DEZENFORMASYONUN 6112 SAYILI KANUN BAKIMINDAN DEĞERLENDİRİLMESİ.
- Author
-
ALUÇ DEMİREL, Rümeysa
- Abstract
Copyright of ASBU Law Journal is the property of Social Sciences University of Ankara and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
26. نقدی بر فنجان زرّین پایهدار موزۀ تمدنهای آسیایی کشور سنگاپور.
- Author
-
داریوش اکبرزاده
- Abstract
1. Introduction Sasanian Empire was one of the most brilliant periods in ancient Iran. Cultural and artistic relations of the Sasanian Empire, from the East to the West, are perceptible through archeological evidences, Sasanian and Post-Sasanian texts. Meanwhile, China, as a significant attested toponym, has been a known territory in Persian texts. The collapse of the Sasanian Empire (651 AD.) was a very significant factor in the impact of Iranian art and culture on the Far East, specifically on China as well as Silla and Japan. However, this article deals with a golden piercing object at Asian Civilizations Museum of Singapore. This object, in the abroad, has been called as "Golden Shipwreck Tang" which means literary "the golden ship-form work." This golden object of the museum has been the subject of numerous articles, catalogs, conferences, and extensive media and political programs. The work interpreted as a combination of Sasanian (Persia) and Tang art in China. This dish reflects image of eight dancer-musicians with different musical instruments. Each musician is separated from the other one by a string of pearls. According to the published reports, the work has obtained from a sunken Chinese ship. In fact, the ship sank near Sumatra, Indonesia, but this artifact was discovered off the coast of Singapore. 2. Methodology This research was done by comparative and library study method with content analysis. The author has done the investigation by measuring this work with a number of known objects in different museums. Despite this, historical links between Iran and the Far East (China), artistic aspects, textology to metal studies have also been considered. 3. Discussion The golden object at Asian Civilizations Museum of Singapore, socalled the Tang Shipwreck, has been evaluated and approved by the Smithsonian Museum of America. The author believes: - The fictitious term "ship" in the title of this work was created to tie it to the Chinese shipwreck. - This golden work has no place in the detailed reports of all the underwater archaeologists, who have discovered, seen, photographed, and cleaned the "ceramics" on the sea floor (the first step). Therefore, any connection between this work and that ship is questionable. - Contradictory dates such as 6th century CE, sometimes 7-8 AD., contradictory destinations such as Persia and sometimes Baghdad, are proof of the confusion of fake stories (about that Chinese ship). - Although its octagonal shape (of the object) can be reminiscent of the Far East, the strings of pearls are undoubtedly a reflection of Sasanian art. The pearl strings can be frequently seen on the coins, potteries, bas-reliefs from Iran to Dunhuang. - The number of beads on the string of pearls (above, below, right and left of the musicians) is not only inconsistent with each other, but without background. In Sasanian and Tang art, the number of beads in this string of pearls follows a very clear regular order; especially in Sasanian art, which is subject to sacred religious numbers. - The form of the pearls, complete, incomplete, semi-complete is another part of the ignorance of the counterfeiters of this work. - The form of the performance of the dancer and her/his clothes are reminiscent of the "acrobatic" dancers in Chinese tombs. - The dress of these musicians, with wavy laces, is neither Sasanian nor has anything to do with the Tang period; the hairstyle, the face shape, the direction of the musician's eyes, how to control the instruments, the lack of connection between these instruments, and much more should be added. - The collection of such musical instruments together is an innovation in Tang art and has no precedent. Fortunately, we know many wellknown instruments and how to jointly play many of them in Dunhuang. - This cup is unlike of the artistic depiction of Tang period musicians, which (on jade) was supposedly used to decorate a belt and is currently kept in the Metropolitan Museum of America. I should add 12 musician-dancer's motifs at Miho Museum of Japan (cf. Hejiacun cups). - This work does not have any XRF reports; a topic that is important in museology studies; In the report of the Smithsonian Museum, even the weight of this work, is not mentioned; This issue is also important for gold and silver items. A report of the photos before the cleaning has not been published yet. - Although technical tests (i.e. X-rays) cannot determine this with certainty, it seems that the makers tried to cover their initial work with a layer of gilding where the handle joins the main body. - Between the figures of all the musicians and the main body, there seems to be a narrow identical and uniform seam (from bottom to top). This seam was intentionally placed to show its archaic nature and damage over time. - Oxidation (accidental corrosion) on the shoulders of some musicians and under the main body, etc. cannot be a natural process. - Although gold works (due to gold material) are the least vulnerable to water, why is only the main base corroded? It is obvious that in the creation of gold and silver objects, it is not possible to produce products with the help of pure gold and silver; combination with other alloys such as copper, zinc and iron and etc. is the "inevitable" part of this technique. Other metals (alloys) are, especially copper, unstable against moisture and humidity. - Among all the works sunk in the sands, how this one has tilted its course for kilometers, we need to ask the experts of oceanography about the level and slope of the sea floor, the strength of the waves, the type of sand - something that cannot be found in published reports. - Isn't, the story of the fishermen who found and sold such a magnificent work, a fake story to create a background and link it to history? Why does this one work have such a story? For the distance between the point where this golden work was found (kilometers away, near the border of Singapore) and the point where the Chinese ship was sunk (near Sumatra, Indonesia), this kind of story-telling is irresponsible and definitely unscientific.- Why are these kinds of work only found outside of Iran, sold to rich countries and fledgling museums? - Can I not refer to some of the works in Miho Museum? Isn't the treasure's necklace of Darius the Great another example of these forgeries. It is interesting that all these works are related to Iran's cultural heritage. 4. Conclusion The author evaluates this golden object as a "fake" work, based on the artistic features, historical relations between Iran and China, and political situation of Iran under the Arabs, Tang dancer-musician's figures, Sasanian music-dance background, metal studies, storytelling about how this work was discovered, etc. Challenging this work while calling it "fake", the author evaluates these background-conscious behaviors as a part of "attempts to distort, destroy, and generate income by (some specific) foreigners through the archaic heritage of Iran by using the tools of rich countries with fledgling museum." [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. Media effects and the impact of fake and anti-fake news on youth audiences: The use of eye-tracking technologies
- Author
-
Lidiya Lobodenko, Anna Krasavina, Anna Cheredniakova, Liudmila Shesterkina, Elena Sosnovskikh, and Nikolai Lobodenko
- Subjects
media effects ,framing ,agenda-setting ,fake ,anti-fake ,youth audiences ,Communication. Mass media ,P87-96 - Abstract
This paper analyzes media effects of fake and anti-fake journalistic materials and their impact on youth audiences. The paper deals with fake news as a relevant problem of the modern information society and defines the term “anti- fake” as a way to combat Internet fakes. A sample of fake and anti-fake news was formed from 100 informational political materials. The selected media texts were marked as “fake” and “anti-fake”. The research was based on the main provisions of the cognitive approach in the investigation of media effects within the framework of interrelated models: agenda-setting and framing (analysis of the content and form of presenting information). The main results of the research identified the key patterns of the respondents’ attention and areas of interest (“image”, “text”), as well as their attitude to the proposed stimuli. The research was based on eye-tracking and a survey. The results showed that anti-fake and fake news attract the respondents’ attention; however, anti-fake materials have the maximum impact on the respondents in terms of the number of fixations on the stimulus, the level of memorability, and the level of credibility. “Fake” and “anti-fake” warning labels affect significantly the perception process.
- Published
- 2023
- Full Text
- View/download PDF
28. Fake-talk as Concept and Method
- Author
-
Julia Hornberger and Sarah Hodges
- Subjects
fake ,pharmaceuticals ,health ,evidence ,suspicion ,Anthropology ,GN1-890 ,Medicine (General) ,R5-920 - Abstract
In a world seemingly awash with fakes—or at least accusations of fake-ness—it is not only difficult to discern what is ‘real’ but also to know what to make of such a proliferation of worries about fakes. In this article, a manifesto of sorts for the Special Section, we outline how the problem of ‘fake drugs’ in particular allows us to understand the phenomenon of fakes in general. We introduce the conceptual and methodological tool of ‘fake-talk’ as it allows us to make sense of claims about fake drugs and of the power these claims hold. We develop our argument through a close reading of specific ethnographic examples drawn from the work of our colleagues in the project ‘What’s at Stake in the Fake? Indian Pharmaceuticals, African Markets and Global Health’. We show that fake-talk thrives on a lack of evidence, imports urgency, and is expressive. Taking fakes seriously as a force in themselves enables us to see how fakes are freighted with—and deploy—everyday articulations of otherwise unfathomable discomforts, predicaments, and anxieties of our time.
- Published
- 2023
- Full Text
- View/download PDF
29. Fluid Fakes, Contested Counterfeits: The World Health Organization’s Engagement with Fake Drugs, 1948–2017
- Author
-
Christopher J. Sirrs
- Subjects
world health organization ,pharmaceuticals ,sub-standard ,counterfeit ,fake ,Anthropology ,GN1-890 ,Medicine (General) ,R5-920 - Abstract
In recent decades, the scientific and medical literature has routinely argued that ‘fake’ drugs present a pressing threat to global health. However, this article steps back from the chorus surrounding fake drugs to ask what wider issues have been at stake in efforts to control and combat them over the last seventy years. Focusing on the World Health Organization, I present a genealogy of its engagement with fake drugs as part of its work on pharmaceutical quality, from 1948 until 2017 when the latest nomenclature of ‘sub-standard and falsified medical products’ was adopted. From 2008, the seizure by EU customs authorities of shipments of Indian generic drugs on the basis that they infringed local patents and hence were ‘counterfeit’, underlines the view that the specific terms used to describe fake drugs in global health are not neutral technical objects, but highly-charged political devices that serve the interests of particular actors.
- Published
- 2023
- Full Text
- View/download PDF
30. F2PMSMD: Design of a Fusion Model to Identify Fake Profiles from Multimodal Social Media Datasets
- Author
-
Aditya, Bhrugumalla L. V. S., Rajaram, Gnanajeyaraman, Hole, Shreyas Rajendra, Mohanty, Sachi Nandan, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Nandan Mohanty, Sachi, editor, Garcia Diaz, Vicente, editor, and Satish Kumar, G. A. E., editor
- Published
- 2023
- Full Text
- View/download PDF
31. Fiction, Fake and Fact: A Set-Theoretic Modeling Together with a Discussion of Represented Worlds
- Author
-
Klimczak, Peter, Klimczak, Peter, editor, and Zoglauer, Thomas, editor
- Published
- 2023
- Full Text
- View/download PDF
32. Discrimination Between Fake and Real Emotion Using Modified CNN Model
- Author
-
Sunil, M. P., Hariprasad, S. A., Shrishti, S., Sriharshini, S., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Kaiser, M. Shamim, editor, Xie, Juanying, editor, and Rathore, Vijay Singh, editor
- Published
- 2023
- Full Text
- View/download PDF
33. Machine Learning: Fake Product Prediction System
- Author
-
Igbonagwam, Okey, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Latifi, Shahram, editor
- Published
- 2023
- Full Text
- View/download PDF
34. Cultural Heritage Meets the Art Forensics Enigma: Raman Spectroscopic Authentication and the Exposure of Fakes and Forgeries in Art Works
- Author
-
Edwards, Howell G. M., Vandenabeele, Peter, Colomban, Philippe, van den Berg, Klaas Jan, Series Editor, Burnstock, Aviva, Series Editor, Janssens, Koen, Series Editor, van Langh, Robert, Series Editor, Mass, Jennifer, Series Editor, Nevin, Austin, Series Editor, Lavedrine, Bertrand, Series Editor, Ormsby, Bronwyn, Series Editor, Strlic, Matija, Series Editor, Edwards, Howell G. M., Vandenabeele, Peter, and Colomban, Philippe
- Published
- 2023
- Full Text
- View/download PDF
35. Artificial Intelligence
- Author
-
Wishart, Eric, author
- Published
- 2024
- Full Text
- View/download PDF
36. Gaming the Metrics: Misconduct and Manipulation in Academic Research
- Subjects
gaming ,metric ,citation ,misconduct ,manipulation ,academic research ,gaming metrics ,peer review ,impact factor ,fraud ,fake ,predatory publishing ,impact assessment ,citation index ,open access ,journal impact factor ,JIF ,scholarly communication ,research evaluation ,publication pressure ,publish or perish ,education policy ,spam ,computer-generated articles ,altmetric ,data quality ,performance indicators - Abstract
How the increasing reliance on metrics to evaluate scholarly publications has produced new forms of academic fraud and misconduct. The traditional academic imperative to “publish or perish” is increasingly coupled with the newer necessity of “impact or perish”—the requirement that a publication have “impact,” as measured by a variety of metrics, including citations, views, and downloads. Gaming the Metrics examines how the increasing reliance on metrics to evaluate scholarly publications has produced radically new forms of academic fraud and misconduct. The contributors show that the metrics-based “audit culture” has changed the ecology of research, fostering the gaming and manipulation of quantitative indicators, which lead to the invention of such novel forms of misconduct as citation rings and variously rigged peer reviews. The chapters, written by both scholars and those in the trenches of academic publication, provide a map of academic fraud and misconduct today. They consider such topics as the shortcomings of metrics, the gaming of impact factors, the emergence of so-called predatory journals, the “salami slicing” of scientific findings, the rigging of global university rankings, and the creation of new watchdogs and forensic practices.
- Published
- 2020
37. Factuality and Testimony Denial: 11 Theses on Fakes and Verification
- Author
-
Dieter Mersch
- Subjects
truth ,falsity ,fake ,alternative facts ,justification ,verification ,Language and Literature ,Communication. Mass media ,P87-96 - Abstract
The question of alternative facts or fakes and fiction in social media is mostly discussed on the grounds of true-false discrimination. Central issue is the search for criteria, for the possibility of technical solutions, for justification or general verification procedures, or for possibilities of digital forensics, to name but few. This article takes a different approach by bringing the concept of witnessing into play in a new way. For what is being hurt or destroyed by the massive dissemination of lies, false facts, etc. is not the differentiation between truth and falsity, but the social function of testimonies. The consequence is a loss of social trust, "social faith" (Kant) or what can be paraphrased with the ancient concept of koinonia. machine vision in the shaping media of verification in popular culture, artistic, as well as surveillance contexts.Note: Download statistics restarted from zero effective January 1, 2024. Please follow this link to see cumulative download statistics from our previous publishing platform: CPO Download Statistics 2012 - 2023
- Published
- 2023
- Full Text
- View/download PDF
38. Enric Marco: los avatares del impostor que retrató Javier Cercas.
- Author
-
ESCANDELL-MONTIEL, DANIEL
- Subjects
- *
CONCENTRATION camps , *LITERATURE , *SOCIAL networks , *HEADLINES , *POPULARITY , *FICTION - Abstract
Enric Marco made it to the headlines when it was revealed that his story as a survivor of the Nazi concentration camps was a lie sustained for decades. Decorated, renowned, respected and even idolized: Marco had achieved social success and indisputable popularity with his discourse as a victim, which falls apart after knowing the truth. As a chameleonic character who managed to be someone else, Marco has generated societal interest and fascination: this article focuses on the conception of the fictionalized Enric Marco, not by himself, but by others. To do this, the article presents Marco's vision constructed from the book El impostor, published by Javier Cercas in 2014, and the appearance of a profile on the social network Twitter that had its period of greatest activity between 2013 and 2014. To build this approach, in these pages we also present an overview of related cases to better understand these chameleon-like characters in fiction and in reality; moreover, among those real cases special attention is devoted to examples linked to Spain. Thus, the article approaches Enric Marco from a multiple identity taxonomy: the authentic, the imposter, the faked and the portrayed Enric. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. LITERARY HISTORY AS BESTSELLER: THE LIFE AND OPINIONS OF A FRAUDULENT PHILOLOGUE.
- Author
-
Patraș, Roxana and Patraș, Antonio
- Subjects
LITERARY criticism ,BIOGRAPHIES of authors ,IMAGINATION ,MELODRAMA ,INTUITION ,ART forgeries ,LITERARY form ,CULTURAL literacy ,BUSINESSPEOPLE - Abstract
In this article we reveal the publishing ventures of Octav Minar (1886-1967), one of the Romanian authors that was disesteemed by fellow literary historians on account of his counterfeiting acts such as forgery, plagiarism, plastography or trick photography. Related to the book market of interbellum Romania, Minar was frequently branded as the “man-of-the-day” while his publications followed the logic of the “hand-in-glove” ephemerides Notwithstanding the challenges of the term “bestseller,” we turned to it so as to better describe Minar’s cultural products as multiple-layered offers, catering for both low-brow and high-brow readership and seizing signals from both public’s expectations (myth-making, melodrama, sensation, narrative simplicity) and enormous patrimonial gaps (editing the classics, writing the recent authors’ biographies). After a careful examination of Minar’s works, we reached the conclusion that he was an exceptional entrepreneur of letters and, nonetheless, a literary historian endowed with a “melodramatic imagination” as well as with a playwright’s and a genre novelist’s plume. A swift intuition of marketing basics helped him realize, quite rapidly, that historical facts and documents could be merchandized: this is how his impressive collection of Romanian writers’ miscellanea was wrapped as a commodity for the public. If the juridical and moral aspects of his literary ventures were put in between brackets, we would discover an astonishing and ingenious personality who glided between different speech registers, and popularized literary history as a genre belonging to the big tent of mass culture. We should thus take into consideration that the logic of the paraliterary circuit can also be applied to literary history. Boiled down to essentials, counting on citations and on minimal critical comments, spiced with images (facsimile and pictures), Minar’s literary histories had their share in speeding the process of cultural literacy of average Romanian readers and in institutionalizing literary ideas. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. A critical evaluation of physical and manufacturing properties of genuine and counterfeit rotary nickel–titanium endodontic instruments.
- Author
-
Madytianos, B, Liu, E, Marshall, A, Mahony, E, Liu, K, Manogaran, J, Liu, HH, Parashos, P, and Evans, M
- Subjects
FORGERY ,CYCLIC fatigue ,PRODUCT counterfeiting ,ENDODONTICS ,DENTAL pulp cavities - Abstract
Background: Rotary nickel–titanium (NiTi) instruments are made to exacting standards and are costly to manufacture, and quality control is paramount. Consequently, unauthorized factories make counterfeit instruments that are less expensive and may therefore be attractive to dentists. Little information exists about the metallurgy and manufacturing quality of such instruments. There is the potential for counterfeit instruments to be at higher risk of fracture during treatment, thereby compromising clinical outcomes. The aim of this study was to evaluate physical and manufacturing properties of genuine and counterfeit ProTaper Next™ and Mtwo® rotary NiTi instruments. Methods: This study investigated the metallurgical properties, manufacturing quality, microhardness and number of cycles to failure of two commonly used rotary NiTi systems and compared them with counterfeit products purporting to be genuine articles. Results: Counterfeit instruments were found to be inferior in manufacturing standards and were less resistant to cyclic fatigue when compared to genuine instruments. Conclusions: Counterfeit rotary NiTi instruments may be less efficient at preparing root canals and may be at higher risk of fracture during endodontic treatment. Dentists must be aware that, although less expensive, counterfeit instruments may be of dubious manufacturing quality and at higher risk of fracture if used in patients. © 2023 Australian Dental Association. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. ТРАНСФОРМАЦІЯ НАУКОВИХ ТРАДИЦІЙ У СФЕРІ УПРАВЛІННЯ В УМОВАХ ОНОВЛЕНОГО ПОВОЄННОГО УКРАЇНСЬКОГО СУСПІЛЬСТВА.
- Author
-
Андрушків, Богдан, Мельник, Лілія, Кирич, Наталія, Погайдак, Ольга, and Бойко, Остап
- Abstract
The article reveals the process of transformation of national traditions in the conditions of wartime and post-war Ukrainian society, as well as periodic changes in the scientific paradigms of its development. The role and place in these transformations of various forms of social activity, including scientific activity, are determined. The influence of science on the formation of public consciousness is studied, taking into account the influence of objective factors. The processes and methods of governance due to the post-Soviet traditions of voluntaristic lobbying for the interests of certain political groups, industry professionals, regionalists, i.e. stakeholders, are considered. The author analyzes the motives that guide the subjects of scientific interaction, depending on the level of their knowledge of the subject of research, important resources, etc. The sources of growth of the intellectual potential of the modern paradigm of science development and imitation of activities useful for society, stimulation of artificial needs, accompanied by exponential growth, crisis phenomena in a number of important spheres of society's life, are identified. The necessity of changing the paradigm of development, national and scientific traditions formed in the post-totalitarian period and reorienting them to the advanced development of productive cultural capital is established. The importance of defining long-term goals, developing strategies for their achievement and transferring national traditions from a reflexive response to problems and changes in consumer demand to making effective management decisions is actualized. The author proposes the formation the Moral Code of Behavior of scientist as a set of actions in accordance with the fastest possible achievement of the set goal with the most effective result. The article reveals the destructive content of neglecting the development of highly moral, humanistic scientific traditions based on the principles of truth, objectivity, historicism, scientific substantiation and reorientation not only to material goods, but also to the development of people's cultural potential. The characteristic features of manifestations of transformational, destructive and degradation processes in the state are identified. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Dependent self-employed individuals: are they different from paid employees?
- Author
-
Dvouletý, Ondřej and Nikulin, Dagmara
- Published
- 2023
- Full Text
- View/download PDF
43. Hoax, Fraud, Plagiarism, Forgery
- Author
-
Abramson, Julia Luisa
- Published
- 2023
- Full Text
- View/download PDF
44. Fakes within Context of Historical Knowledge Interacting with Language and Thought Structures: Interdisciplinary Model
- Author
-
A. A. Sharapkova and A. M. Merkulova
- Subjects
fake ,cognitive security ,cognitive linguistics ,historical knowledge ,Slavic languages. Baltic languages. Albanian languages ,PG1-9665 - Abstract
The phenomenon of fake news is considered as a multifaceted scientific problem that cannot be solved without using an interdisciplinary approach. The relevance of the study is due to the high degree of influence of falsifications on the information perception of a person, and consequently, on the cognitive safety of society. A fake is analyzed as a complex construct that does not have clear signs, but has an intentional effect on a person. Particular attention is paid to the characteristics of the interaction of cognitive mechanisms and language forms in the practice of interaction with fakes. The concept of “post-truth” is considered as an instrument of influence of multiple subjects on the audience by proclaiming the multiplicity of truths. The practices of combating illegal information content, based on the experience of various states are described. It is noted that in Russia, history is considered a key factor in the state policy of cognitive security. The article substantiates the need to find complementary resources in linguistic and historical sciences for effective countermeasures against information manipulation and presentation of unreliable information. The authors concluded that the priority task of interdisciplinary research at the present stage is the creation of a complementary empirical scientific base taking into account the methods of cognitive linguistics and the testing of theoretical models on recipients.
- Published
- 2023
- Full Text
- View/download PDF
45. The main tasks of a semiotics of artificial intelligence
- Author
-
Leone Massimo
- Subjects
fake ,generative adversarial networks ,simulation ,undecidability of the digital fake ,Philology. Linguistics ,P1-1091 - Abstract
The article indicates the essential tasks of a semiotics of artificial intelligence: studying the way it simulates the expression of intelligence; the way it produces content that is creatively endowed; the ideological assumptions of artificial intelligence within the culture that produces it. Artificial intelligence is, from a semiotic point of view, the predominant technology of fakery in the current era. On the strength of its studies on the false, semiotics can therefore also be applied to the analysis of the fake that, in increasingly sophisticated forms, is produced through artificial intelligence and through the deep learning of neural networks. The article focuses on the adversarial ones, trying to highlight their ideological assumptions and cultural developments, which seem to indicate the entry of human societies and cultures into the ‘realm of the absolute fake’.
- Published
- 2023
- Full Text
- View/download PDF
46. Dissociative Identity Disorder and Social Media
- Author
-
Deligent, Reginald, Klonaris, Sean, Tohid, Hassaan, editor, and Rutkofsky, Ian Hunter, editor
- Published
- 2023
- Full Text
- View/download PDF
47. How accurate are the references generated by ChatGPT in internal medicine?
- Author
-
Sebo, Paul
- Published
- 2024
- Full Text
- View/download PDF
48. Trafficking Fake ‘Ancient’ Torahs in Turkey: A Media Analysis.
- Author
-
Handby, Evie
- Abstract
Over the last decade, scores of supposedly ‘ancient’ manuscripts have been seized by police in Turkey. Although reports of the seizures regularly feature in the country’s media, the ‘ancient’ manuscript industry has received only sporadic scholarly attention. As a consequence, very little is currently known about the scope and scale of this persistent, peculiar, and now decade-old phenomenon. To understand the various factors that facilitate its growth, this article investigates how the trade, its participants, and the manuscripts themselves have been represented in the Turkish media over the past decade. Through a review of approximately ninety-three news articles published online between 2012 and 2022, I argue that the trade in ‘ancient’ biblical manuscripts in Turkey is legitimized by a narrative of the phenomenon that is fuelled by sensationalism, uncritical reporting, and an indifference to expert opinion. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Strategic communications as a component of state information security
- Author
-
Olha Antipova
- Subjects
communication ,information ,war ,narrative ,diplomacy ,politics ,disinformation ,fake ,Jurisprudence. Philosophy and theory of law ,K201-487 ,Public law ,K3150 ,Criminal law and procedure ,K5000-5582 ,Civil law ,K623-968 ,Private international law. Conflict of laws ,K7000-7720 ,Law of Europe ,KJ-KKZ ,Law of nations ,KZ2-6785 - Abstract
The formation of the information society at the current stage is defined by an active process of information exchange and communicative interaction at various levels - interpersonal, between social groups, strata, and countries. In addition to constructive characteristics, the specified process is characterized by a number of risks that face the information security of states and are aimed at violating human rights and freedoms, undermining established democratic traditions and authority on the geopolitical map of the world. This testifies to the relevance of the study of strategic communications as a guarantee of the reliability of the security sector. In view of the above, the purpose of the article is to study the features of communicative interaction at the strategic level in the context of information security of the state. The basis of the methodological toolkit was dialectical and sociocultural methods, as well as systemic, informational and functional approaches, thanks to which it was possible to present strategic communications as a living and open system, the elements of which interact with each other and depend on the cultural and historical conditions of society. The key threats facing information security in the context of communicative interaction at the strategic level are the use of aggressive rhetoric, the production of false information flows, the spread of fake content, myth-making and attempts to rewrite history. The essence of russian information campaigns, which are carried out by means of disinformation, and the experience of the EU and Baltic countries in countering them are considered. Ukrainian realities have proven the rationality of building strategic communications on the basis of public trust in the subjects of information production, given that, in addition to representatives of the diplomatic corps and representatives of the security sector, active participants in this process should be experts from among scientists and civil society in general. The practical value of the results is that they can be used to determine ways to build a national system of strategic communications and create an institution to coordinate this activity at the interagency level
- Published
- 2023
- Full Text
- View/download PDF
50. Heterogenous Social Media Analysis for Efficient Deep Learning Fake-Profile Identification
- Author
-
Bhrugumalla L. V. S. Aditya and Sachi Nandan Mohanty
- Subjects
Social ,media ,fake ,profile ,audio ,image ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The surge in e-scams attributed to an estimated 30% of fake social media accounts has highlighted the urgent need to identify such fraudulent profiles. Since the current model cannot handle multi-model networks, an attempt has been made to solve the real-time problems. This study introduced a cutting-edge deep-transfer learning model that streamlines fake-profile detection through a comprehensive analysis of diverse social media data samples. Our model gathers a wide range of data from various social media platforms, such as posts, likes, comments, multimedia content, user activity, login behaviors, etc. Each data type is individually processed to detect suspicious patterns synonymous with fake accounts—for instance, discrepancies like male profiles predominantly posting about or using images of females. Similarly, audio signals undergo 1D Fourier, Cosine, Convolutional, Gabor, and Wavelet Transforms. In contrast, image and video data are processed with their 2D counterparts. Text data is transformed using Word2Vec, aiding our binary Convolutional Neural Network (bCNN) to distinguish between genuine and fake profiles. Feature optimization is handled by the Grey Wolf Optimizer (GWO) for 2D data and the Elephant Herding Optimizer (EHO) for 1D data, ensuring minimal feature redundancy. Separate 1D CNN classifiers, then classify the refined features to pinpoint fake profiles. The results from these classifiers are amalgamated through a boosting mechanism. Our results reveal an 8.3% increase in accuracy, 5.9% in precision, and 6.5% in recall compared to conventional methods. Testing on initial login and signup processes further validated our model’s effectiveness, achieving a remarkable 93.5% accuracy in detecting illegitimate account activities, effectively mitigating cold-start challenges.
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.