-
21
A Novel Dense-Swish-CNN With Bi-LSTM Framework for Image Deepfake Detection
Published 2025-01-01“…Advanced machine learning techniques can also generate highly realistic deepfake images, which can be exploited for harassment and blackmail. Furthermore, deepfakes can manipulate public sentiment and opinions about individuals or groups. …”
Get full text
Article -
22
Robust deepfake detection using Long Short-Term Memory networks for video authentication
Published 2025-03-01“…These threats encompass the manipulation of public opinion during electoral processes, perpetration of fraudulent activities, dissemination of disinformation to discredit individuals or entities, and the facilitation of blackmail schemes. Detecting fakes is tricky and difficult for viewers who are watching them, with studies showing that over 70 percent struggle to identify them accurately. …”
Get full text
Article -
23
Uma Teoria do Direito e da Informação: Direitos Autorais, Baços, Chantagem e Venda de Informações Privilegiadas
Published 2025-05-01“…[Purpose]In this article, Professor Boyle analyzes how the law treats information in four seemingly disparate areas: copyright, genetic information, blackmail, and insider trading. He argues that issues of information regulation, commodification, and access are shaped by two neglected processes of interpretative construction.…”
Get full text
Article -
24
Family Chains: Kinship as a Mechanism of Labour Exploitation Among Bangladeshi Migrant Workers in Manufacturing and Labour-Intensive Sectors
Published 2025-06-01“…The findings of this study reveal six major themes: moral blackmail, isolation within the family, moral obligation and silence, familial control structures, abuse framed as duty, and informal hierarchies. …”
Get full text
Article -
25
Protection of personal data under martial law in Ukraine
Published 2023-09-01“…This can become the basis for blackmail and manipulation, which negatively affects the situation of individuals and the overall situation. …”
Get full text
Article -
26
Internet and female victimization
Published 2018-01-01“…Women can experience various forms of violence and privacy violations on the social networks, such as hate speech, spreading lies, stalking, photo montage, creating of false user profiles, the continuation of family violence, threats and blackmail, etc. The main topics discussed in this paper relate to general approach to the phenomenon of cyberspace and cyber violence; various types of cyber violence; cultural context and gender dimension of on-line victimization; various forms of cyber violence against women; specific characteristics of female victimization in on-line communication and the perception of preventing female victimization on the Internet, in the context of spreading gender- sensitive social norms and values through legal standardization and socialization of women‘ s rights.…”
Get full text
Article -
27
Reconceptualizing the HIV epidemiology and prevention needs of Female Sex Workers (FSW) in Swaziland.
Published 2014-01-01“…Rape was common with nearly 40% (n = 123/314) reporting at least one rape; 17.4% (n = 23/314)reported being raped 6 or more times. Reporting blackmail (34.8%, n = 113/314) and torture(53.2%, n = 173/314) was prevalent.…”
Get full text
Article -
28
Toxic relationship behaviour sebagai perilaku komunikasi interpersonal pemain roleplayer K-Pop di Twitter
Published 2024-03-01“….; (2) Interpersonal communication carried out through media (CMC) meets the effective components of CMC, namely the use of language, delay messages, and aesthetic aspects; (3) The forms of toxic relationships that occur are domination, verbal attacks, emotional blackmail, character annihilation, gaslighting, excessive jealousy and possessiveness, manipulative and playing victim; (4) The response given by Kpop roleplayers on Twitter when experiencing toxic relationships when communicating is related to toxic relationship patterns, namely ambeven patterns and anxious patterns of avoidance Keywords : toxic relationship, roleplayer, interpersonal communication…”
Get full text
Article -
29
ENSURING PERSONNEL SECURITY OF INDUSTRIAL ENTERPRISES UNDER CONDITIONS OF ENVIRONMENTAL CONFLICTS
Published 2017-09-01“…Personnel security is considered as a synthetic category of economic theory, personnel management, sociology of management and labor economics, and is defined as the activity to create conditions for the stable functioning and development of an enterprise, which ensures the protection of the interests of the enterprise from the risks and threats associated with its own personnel and the personnel themselves from internal and external threats such as blackmail, revenge on competitors, attacks on the lives and health of employees etc. …”
Get full text
Article -
30
Renewable energy transition in Europe in the context of renewable energy transition processes in the world. A review
Published 2024-12-01“…After the painful experiences of the last several months, Europe wants to become independent from energy raw materials and their unstable suppliers as soon as possible, securing markets against price fluctuations, blackmail and unfair practices of some sellers. The aim of the article is to describe the current situation of energy and heat production from RES in selected countries in the aspect of contemporary energy transition (ET) processes. …”
Get full text
Article -
31
Labyrinths and Tangled Paths. The Story of a Righteous One
Published 2017-12-01“…Accused after the war of blackmailing Jews (as I think, wrongly), he was convicted and spent several years in prison. …”
Get full text
Article -
32
International codes of archival ethics: an analytical comparative study
Published 2024-12-01“…The codes of professional ethics are supposed to be a constitution between archivists and users that defines the duties and rights of each party to prevent blackmailing of users or Damage archives. By comparing and analyzing models of codes of archival ethics, it is possible to extract the most important issues that must be focused on when establishing or adopting any ethical code that regulates relationship between archivists and users, and between archivists and workers in related professions. …”
Get full text
Article -
33
Gendarmerie Railway Police of Russian Empire in Early 20th Century: Working with Political Agents
Published 2023-10-01“…It explores the establishment of intelligence work on railways, the monitoring of its effectiveness, the verification of the reliability of secret agents, and the identification of provocateurs and blackmailers among them. The materials for analysis are extracted from previously unpublished secret and top-secret case files of the gendarmerie police departments of the railways. …”
Get full text
Article -
34
Visual Deepfake Detection: Review of Techniques, Tools, Limitations, and Future Prospects
Published 2025-01-01“…Though technology has primarily been utilized for beneficial purposes, such as education and entertainment, it is also used for malicious or unethical tasks to spread disinformation or ruin someone’s dignity, even if it encompasses harassing and blackmailing victims. Deepfakes refer to high-quality and realistic multimedia-manipulated content that has been digitally modified or synthetically generated. …”
Get full text
Article -
35
Zabiegi likwidujące skutki obrzezania wykonywane w Warszawie w czasie drugiej wojny światowej. Wstępna próba opisu zjawiska
Published 2017-12-01“…During the Second World War the visible effects of circumcision became an indisputable evidence of being a Jew and were often used especially by the so-called szmalcownicy (blackmailers). Fear of the possibility of discovering as non-Aryan prompted many Jews hiding on the so-called Aryan side of Warsaw to seek medical practitioners who would restore the condition as it was before the circumcision. …”
Get full text
Article -
36
ANTROPOLOGIS TENTANG TRAFFICKING TKW DI MALAYSIA: ANTARA ADA DAN TIADA
Published 2011-12-01“…Its meaning is broadening beyond human trading into the matters related to violence,blackmailing, and forcing. Trafficking happens not only within one specific area, but has crossed theborder of countries, indicating the existence of an international net. …”
Get full text
Article -
37
A CRITICAL DISCOURSE ANALYSIS OF PRESIDENT BIDEN’S REMARKS ON ‘PANDEMIC POLITICS
Published 2025-02-01“…Thus, by appealing, educating and begging, vaccine shots were negotiated, and by condemning, blackmailing and threatening, compulsory vaccination compliance was legislated. …”
Get full text
Article -
38
Copy-Move Forgery Detection Technique Using Graph Convolutional Networks Feature Extraction
Published 2024-01-01“…The CMF is widely utilized to alter the content of the original image to spread false information or to use such forged digital images for illegal purposes e.g. false evidence in the court of law, or to blackmailing any individual. This paper presents a new method for CMF Detection (CMFD) that uses the power of Graph Convolution Networks (GCNs) and its multiple layers with ReLU activation, for CMFD and analysis. …”
Get full text
Article -
39
Duchowieństwo Kościoła gorzowskiego represjonowane w trybie karno-administracyjnym. Analiza historyczna na przykładzie Zestawienia Biura „C” MSW z lat 1945–1963. Zarys problematyki...
Published 2024-01-01“…After World War II, the communist security apparatus blackmailed, persecuted and murdered priests who resisted the government. …”
Get full text
Article -
40
Not Only about “Agents”!... Old and new decisions without theological vision?
Published 2016-06-01“…On the other hand, it argues that sin and moral conflict of the self cannot only take place in situations where people driven by fear or suppressed by or giving in to blackmailing or driven by selfish interests collaborated with the regime, or were silent when they should have protested, or where they rejected solidarity with those persecuted, or failed to criticise the political system or the political compromises of the church. …”
Get full text
Article