Showing 21 - 40 results of 41 for search '"blackmail"', query time: 0.06s Refine Results
  1. 21

    A Novel Dense-Swish-CNN With Bi-LSTM Framework for Image Deepfake Detection by B. C. Soundarya, H. L. Gururaj

    Published 2025-01-01
    “…Advanced machine learning techniques can also generate highly realistic deepfake images, which can be exploited for harassment and blackmail. Furthermore, deepfakes can manipulate public sentiment and opinions about individuals or groups. …”
    Get full text
    Article
  2. 22

    Robust deepfake detection using Long Short-Term Memory networks for video authentication by Ravi Kishan Surapaneni, Hameed Syed, Harshitha Kakarala, Venkata Sai Srikar Yaragudipati

    Published 2025-03-01
    “…These threats encompass the manipulation of public opinion during electoral processes, perpetration of fraudulent activities, dissemination of disinformation to discredit individuals or entities, and the facilitation of blackmail schemes. Detecting fakes is tricky and difficult for viewers who are watching them, with studies showing that over 70 percent struggle to identify them accurately. …”
    Get full text
    Article
  3. 23

    Uma Teoria do Direito e da Informação: Direitos Autorais, Baços, Chantagem e Venda de Informações Privilegiadas by James Boyle

    Published 2025-05-01
    “…[Purpose]In this article, Professor Boyle analyzes how the law treats information in four seemingly disparate areas: copyright, genetic information, blackmail, and insider trading. He argues that issues of information regulation, commodification, and access are shaped by two neglected processes of interpretative construction.…”
    Get full text
    Article
  4. 24

    Family Chains: Kinship as a Mechanism of Labour Exploitation Among Bangladeshi Migrant Workers in Manufacturing and Labour-Intensive Sectors by Abdelaziz Abdalla Alowais, Abubakr Suliman

    Published 2025-06-01
    “…The findings of this study reveal six major themes: moral blackmail, isolation within the family, moral obligation and silence, familial control structures, abuse framed as duty, and informal hierarchies. …”
    Get full text
    Article
  5. 25

    Protection of personal data under martial law in Ukraine by V. A. Svitlychnyi

    Published 2023-09-01
    “…This can become the basis for blackmail and manipulation, which negatively affects the situation of individuals and the overall situation. …”
    Get full text
    Article
  6. 26

    Internet and female victimization by Žunić Natalija, Vilić Vida

    Published 2018-01-01
    “…Women can experience various forms of violence and privacy violations on the social networks, such as hate speech, spreading lies, stalking, photo montage, creating of false user profiles, the continuation of family violence, threats and blackmail, etc. The main topics discussed in this paper relate to general approach to the phenomenon of cyberspace and cyber violence; various types of cyber violence; cultural context and gender dimension of on-line victimization; various forms of cyber violence against women; specific characteristics of female victimization in on-line communication and the perception of preventing female victimization on the Internet, in the context of spreading gender- sensitive social norms and values through legal standardization and socialization of women‘ s rights.…”
    Get full text
    Article
  7. 27

    Reconceptualizing the HIV epidemiology and prevention needs of Female Sex Workers (FSW) in Swaziland. by Stefan Baral, Sosthenes Ketende, Jessie L Green, Ping-An Chen, Ashley Grosso, Bhekie Sithole, Cebisile Ntshangase, Eileen Yam, Deanna Kerrigan, Caitlin E Kennedy, Darrin Adams

    Published 2014-01-01
    “…Rape was common with nearly 40% (n = 123/314) reporting at least one rape; 17.4% (n = 23/314)reported being raped 6 or more times. Reporting blackmail (34.8%, n = 113/314) and torture(53.2%, n = 173/314) was prevalent.…”
    Get full text
    Article
  8. 28

    Toxic relationship behaviour sebagai perilaku komunikasi interpersonal pemain roleplayer K-Pop di Twitter by Putri Jumiati Chairunnisa, Awanis Akalili

    Published 2024-03-01
    “….; (2) Interpersonal communication carried out through media (CMC) meets the effective components of CMC, namely the use of language, delay messages, and aesthetic aspects; (3) The forms of toxic relationships that occur are domination, verbal attacks, emotional blackmail, character annihilation, gaslighting, excessive jealousy and possessiveness, manipulative and playing victim; (4) The response given by Kpop roleplayers on Twitter when experiencing toxic relationships when communicating is related to toxic relationship patterns, namely ambeven patterns and anxious patterns of avoidance Keywords : toxic relationship, roleplayer, interpersonal communication…”
    Get full text
    Article
  9. 29

    ENSURING PERSONNEL SECURITY OF INDUSTRIAL ENTERPRISES UNDER CONDITIONS OF ENVIRONMENTAL CONFLICTS by Tetiana Momot, Zhang Haoyuy, Daryna Momot

    Published 2017-09-01
    “…Personnel security is considered as a synthetic category of economic theory, personnel management, sociology of management and labor economics, and is defined as the activity to create conditions for the stable functioning and development of an enterprise, which ensures the protection of the interests of the enterprise from the risks and threats associated with its own personnel and the personnel themselves from internal and external threats such as blackmail, revenge on competitors, attacks on the lives and health of employees etc. …”
    Get full text
    Article
  10. 30

    Renewable energy transition in Europe in the context of renewable energy transition processes in the world. A review by Bartłomiej Igliński, Urszula Kiełkowska, Krzysztof Mazurek, Sebsstian Drużyński, Michał B. Pietrzak, Gopalakrishnan Kumar, Ashokkumar Veeramuthu, Mateusz Skrzatek, Marek Zinecker, Grzegorz Piechota

    Published 2024-12-01
    “…After the painful experiences of the last several months, Europe wants to become independent from energy raw materials and their unstable suppliers as soon as possible, securing markets against price fluctuations, blackmail and unfair practices of some sellers. The aim of the article is to describe the current situation of energy and heat production from RES in selected countries in the aspect of contemporary energy transition (ET) processes. …”
    Get full text
    Article
  11. 31

    Labyrinths and Tangled Paths. The Story of a Righteous One by Barbara Engelking

    Published 2017-12-01
    “…Accused after the war of blackmailing Jews (as I think, wrongly), he was convicted and spent several years in prison. …”
    Get full text
    Article
  12. 32

    International codes of archival ethics: an analytical comparative study by Ashraf Maklad

    Published 2024-12-01
    “…The codes of professional ethics are supposed to be a constitution between archivists and users that defines the duties and rights of each party to prevent blackmailing of users or Damage archives. By comparing and analyzing models of codes of archival ethics, it is possible to extract the most important issues that must be focused on when establishing or adopting any ethical code that regulates relationship between archivists and users, and between archivists and workers in related professions. …”
    Get full text
    Article
  13. 33

    Gendarmerie Railway Police of Russian Empire in Early 20th Century: Working with Political Agents by R. A. Arslanov, P. A. Kolpakov

    Published 2023-10-01
    “…It explores the establishment of intelligence work on railways, the monitoring of its effectiveness, the verification of the reliability of secret agents, and the identification of provocateurs and blackmailers among them. The materials for analysis are extracted from previously unpublished secret and top-secret case files of the gendarmerie police departments of the railways. …”
    Get full text
    Article
  14. 34

    Visual Deepfake Detection: Review of Techniques, Tools, Limitations, and Future Prospects by Naveed Ur Rehman Ahmed, Afzal Badshah, Hanan Adeel, Ayesha Tajammul, Ali Daud, Tariq Alsahfi

    Published 2025-01-01
    “…Though technology has primarily been utilized for beneficial purposes, such as education and entertainment, it is also used for malicious or unethical tasks to spread disinformation or ruin someone’s dignity, even if it encompasses harassing and blackmailing victims. Deepfakes refer to high-quality and realistic multimedia-manipulated content that has been digitally modified or synthetically generated. …”
    Get full text
    Article
  15. 35

    Zabiegi likwidujące skutki obrzezania wykonywane w Warszawie w czasie drugiej wojny światowej. Wstępna próba opisu zjawiska by Marta Ciesielska

    Published 2017-12-01
    “…During the Second World War the visible effects of circumcision became an indisputable evidence of being a Jew and were often used especially by the so-called szmalcownicy (blackmailers). Fear of the possibility of discovering as non-Aryan prompted many Jews hiding on the so-called Aryan side of Warsaw to seek medical practitioners who would restore the condition as it was before the circumcision. …”
    Get full text
    Article
  16. 36

    ANTROPOLOGIS TENTANG TRAFFICKING TKW DI MALAYSIA: ANTARA ADA DAN TIADA by Tri Marhaeni Pudji Astuti

    Published 2011-12-01
    “…Its meaning is broadening beyond human trading into the matters related to violence,blackmailing, and forcing. Trafficking happens not only within one specific area, but has crossed theborder of countries, indicating the existence of an international net. …”
    Get full text
    Article
  17. 37

    A CRITICAL DISCOURSE ANALYSIS OF PRESIDENT BIDEN’S REMARKS ON ‘PANDEMIC POLITICS by Emmanuel Adegbenro, Oluwakemi Olayemi

    Published 2025-02-01
    “…Thus, by appealing, educating and begging, vaccine shots were negotiated, and by condemning, blackmailing and threatening, compulsory vaccination compliance was legislated. …”
    Get full text
    Article
  18. 38

    Copy-Move Forgery Detection Technique Using Graph Convolutional Networks Feature Extraction by Varun Shinde, Vineet Dhanawat, Ahmad Almogren, Anjanava Biswas, Muhammad Bilal, Rizwan Ali Naqvi, Ateeq Ur Rehman

    Published 2024-01-01
    “…The CMF is widely utilized to alter the content of the original image to spread false information or to use such forged digital images for illegal purposes e.g. false evidence in the court of law, or to blackmailing any individual. This paper presents a new method for CMF Detection (CMFD) that uses the power of Graph Convolution Networks (GCNs) and its multiple layers with ReLU activation, for CMFD and analysis. …”
    Get full text
    Article
  19. 39

    Duchowieństwo Kościoła gorzowskiego represjonowane w trybie karno-administracyjnym. Analiza historyczna na przykładzie Zestawienia Biura „C” MSW z lat 1945–1963. Zarys problematyki... by Dariusz Śmierzchalski-Wachocz

    Published 2024-01-01
    “…After World War II, the communist security apparatus blackmailed, persecuted and murdered priests who resisted the government. …”
    Get full text
    Article
  20. 40

    Not Only about “Agents”!... Old and new decisions without theological vision? by Sándor FAZAKAS

    Published 2016-06-01
    “…On the other hand, it argues that sin and moral conflict of the self cannot only take place in situations where people driven by fear or suppressed by or giving in to blackmailing or driven by selfish interests collaborated with the regime, or were silent when they should have protested, or where they rejected solidarity with those persecuted, or failed to criticise the political system or the political compromises of the church. …”
    Get full text
    Article