81 Search Results for Fake news detection
An overview of several honeypots and their respective applications, their level of involvement, and demonstrated value to date are provided in Table 1 below.
Table 1.
Types of honeypots by level of involvement.
Honeypot Name/Type
Description
Ba Continue Reading...
The web camera interactions also reflect a minimal degree of actuality. The individuals meetings after virtual interactions are highly likely to experience a difference in the personal and communicative nature. The habits, preferences, and human li Continue Reading...
DNA Analysis
Abstract
This paper discusses the history of DNA analysis, how it came about, how it was first used in a criminal case, and some of the limitations of DNA analysis as shown by later criminal cases. It looks at how DNA analysis is current Continue Reading...
Catfish Dating
The objective of this study is to examine what is known as 'catfish dating'. According to the 'Urban Dictionary' a catfish is "someone who pretends to be someone they're not using Facebook or other social media to create false identit Continue Reading...
Computer Fraud and Abuse Act
Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data t Continue Reading...
Spot a Liar, a presentation given by Pamela Meyer (2011) as part of the TedTalks series, Meyer provides a lecture on the different types of lies individuals are exposed to everyday and the signals that present when an individual is not telling the t Continue Reading...
Scientific Objectivity and Scientific Irascibility:
Melvin Harris' rhetoric on the perpetration of the fraud of the Maybrick Ink test
According to author Melvin Harris, one of the most infamous hoaxes ever perpetrated against the community of scien Continue Reading...
According to an article entitled "Three Vulnerability Assessment Tools Put to the Test"
Vulnerability assessment systems scan operating systems and applications for potential problems, such as the use of default passwords or configurations and open Continue Reading...
Small Business' Need for a CPA
One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper Continue Reading...
With the growth of VoIP, new requirements are brought forwarded, such as providing communication between a PC-based soft phone and a phone on PSTN. Such requirements strengthen the need for a standard for IP telephony. Same as other technologies, th Continue Reading...
Leadership: Leader Motivation and ContingencyA leader needs to behave proactively without losing the trust of his employees as employee hiring as well as retention of the talented ones is a serious strategic decision. Leaders specific personality tra Continue Reading...
Social Engineering as it Applies to Information Systems Security
The research takes into account several aspects that better create an overview of the term and the impact it has on security systems. In this sense, the first part of the analysis revi Continue Reading...
According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability. China's military force and computer intelligence has rea Continue Reading...
Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitatio Continue Reading...
False PersonasIn the case of Jesse Gullickson of Brown Country Minnesota, a clear example of the online use of false personas can be seen: Gullickson impersonated a professional wedding photographer through the creation of fake profiles in order to l Continue Reading...
Screwtape and Lear: What Both Say About Duty and Christian Love
The underlying perspective that both King Lear and The Screwtape Letters share may be called a Christian perspective, in which duty, humility and sacrifice are indirectly valued as the Continue Reading...
Evidence-Based Project Proposal
Graduate Project in Nursing
The incidence of sexually transmitted diseases has been increasing among adolescents in countries around the world, but there remains a dearth of timely and relevant studies concerning sal Continue Reading...
Biometric Controls
Biometric Cost Analysis
There are some questions that will help determine the cost benefit analysis of a new biometric system (Cooper). The level of security, the level of reliability, need of backup, the acceptable time for enro Continue Reading...
This process of prescreening travelers before they board the plane is one of the most important parts of the security system. Electronic Privacy Information Center, 2008); (United States Government Accountability Office, 2007) Another system which w Continue Reading...
The survivors might even be annoyed with a society which disgraces them. Anger is an important segment of the interrogation procedure, a procedure which is extremely important to the survivors. (Rubel, 1999)
The psychological effect of death by sui Continue Reading...
Organized crime presents certain unique challenges for law enforcement in the 21st century. As noted by Bjelopera & Finklea (2012) in their report to Congress on the history of organized criminal activity in the United States, modern organized cr Continue Reading...
OMMERCE
E-Commerce
E- Commerce
E- Commerce
E-commerce revolution has immensely affected all the industries, including the real estate industry. By using websites the real estate agents can transmit the information about the properties to a wide r Continue Reading...
Profession of Auditing
Evaluation of the Profession:
The profession of accounting has undergone vast changes over the years, and the traditional accountant concerned himself or herself only with recording the financial transactions of individuals, Continue Reading...
It is well-known that men and women typically experience migration differently, and the challenges of balancing work and care in a new setting often leads to the feminization of women's roles. This is because they find themselves taking up more trad Continue Reading...
Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax pa Continue Reading...
Fannie Mae Scandal
Fannie Mae is the second largest government sponsored U.S. financial institution engaged in mortgage finance after Citigroup Inc. An investigation lasting for eight long months by the Office of Federal Housing Enterprise Oversight Continue Reading...
Odyssey
Throughout the text of the Odyssey, Odysseus finds recourse to rely on his inner resource to surmount incredible odds in order to finish his journey home. Indeed, often we think of epic heroes using their enormous physical strength to solve Continue Reading...
The Rationale for and the Efficacy of Torture during Interrogation
Although information from interrogational torture is unreliable, it is likely to be used frequently and harshly. ==John W. Schiemann, 2012
Introduction
The epigraph above is indica Continue Reading...
Honeypot and Honeynet Emerging Technologies
In the present IT environment, individuals and businesses are becoming more dependent an open network that includes the Internet where business transactions, government services and commercial activities Continue Reading...
However, eventually people stopped paying much attention to the color of the threat level for that day, and the news media stopped talking about it. Now, it is not discussed at all. Was it effective? Perhaps as a short-term measure, but certainly no Continue Reading...
companies operating inside the United States attempt to conduct this business legally have become far and few between. The issues that will be investigated will include outsourcing the work offshore by these to places such as Pakistan, the Ukraine a Continue Reading...
Ethical Case Analysis
A productive organization is one that ensures customer satisfaction and protects the interests of its workers, thereby enhancing the welfare of the society and business.There is a growing belief that good ethics mean good busi Continue Reading...
A small but vigorous Communist party already experienced with underground work was the first to initiate clandestine operations. They set up front organizations and recruited members. By April 1942, they had recruited enough people to form a guerril Continue Reading...
Health Care Quality Management as it Applies to Managed Care
In the current age of improved answerability for quality of care, every healthcare expert should be conversant in the theory and paraphernalia of quality management) Quality Management-QM Continue Reading...
Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Curren Continue Reading...
Emergency Management
The recent mass shooting event at a public school in Broward County, Florida, has brought up the issue once more of how emergence management teams can work together to address these kinds of issues. This paper will discuss the ev Continue Reading...
Policy Recommendation for Collaboration and TSA Privatization
The objective of this study is to evaluate the benefits of collaboration between the federal government and non-profit organizations. The study cites different examples of collaborations Continue Reading...
Assurance and Security (IAS) Digital forensics (DF)
In this work, we take a look at three laboratory-based training structures that afford practical and basic knowledge needed for forensic evaluation making use of the latest digital devices, softwa Continue Reading...
, 2006). He visualized and described the malignancy process. He suggested that early that "cells of tumors with unlimited growth" would develop with the elimination of chromosomes, which inhibit the growth. The multiple genetic alterations in these i Continue Reading...