20 resultados para Fake

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Examining what might be described as Nasdijj’s "fake magical realist memoir" The Blood Runs Like a River Through My Dreams, this paper is interested in how Nasdijj's text might be useful in contesting our understanding of the postcolonial literature of magical realism. Drawing attention to Nasdijj’s utilization of the “primitivist” conventions of magical realism, this paper will illustrate how fakery might be seen as essential not only to Nasdijj's text but also to magical realism. In fact, this paper argues that magical realist novels might be productively read as hoaxes, mobilizing what Graham Huggan describes as the "postcolonial exotic" in order to engage in a subversive act of “culture jamming”. The objective of the analysis is not to condemn magical realism along with Nasdijj’s opportunistic memoir, but rather to rescue magical realism from ideas about authenticity, celebrating its ironies and its challenges to colonial discourses of identity and history.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When job applicants lie in job interviews, they can deprive a more honest candidate of a job and deprive an organisation of the best employees. To better understand job interview faking, the present study examined the effect of general dispositions and domain-specific beliefs on the intention to fake job interviews. A community sample of 313 participants completed measures of personality (i.e., extraversion, neuroticism, conscientiousness) and self-monitoring, and a domain-specific measure of beliefs about faking job interviews based on the theory of planned behaviour, which measured attitudes, subjective norms, and perceived behavioural control. Results indicated that the measure of attitudes was the strongest predictor of intention to fake. In line with the compatibility principle, the domain-specific measures based on the theory of planned behaviour correlated much more strongly with intentions to fake job interviews than did the general measures of personality or self-monitoring. Of the dispositional measures, lower conscientiousness, higher neuroticism, and higher self-monitoring was associated with greater intention to fake job interviews. The findings support a model whereby the effect of personality on intentions is partially mediated by domain-specific beliefs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The fake presupposes the genuine. The fake author implies the real author, and fake literature presupposes real literature. But literature itself is often about— perhaps fundamentally about—successfully faking it. However, the concern and hostility with which literary public culture has responded to fake authors and what is deemed to be their “fake” literature suggests that the notions of real authors and literature remain centrally important.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The fiction of Peter Carey is peopled by the unhallowed; by ghosts and the ghostly. In Bliss (1981), Carey presents us with the Dantesque trials of an advertising executive after he has a heart attack on his front lawn. In The Unusual Life of Tristan Smith (1994), phantom nations are inhabited by simulacra. In True History of the Kelly Gang (2001), a dead bushranger talks. Carey's My Life as a Fake (2003), the subject of this essay, gives us an apotheosis of this literary habit of bringing the unliving to life. It presents us with the flesh-and-blood, machete-wielding, gladiatorial figure of Bob McCorkle, a poet created as a literary hoax.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Jean Baudrillard suggests that the supremacy of the simulacra is a modern development, reality a construction of the U.S. His argument, given the U.S. penchant for breaking and remaking the world in its own image (it is, in the language of Baudrillard, both iconoclast and iconolater), is strong. However, writers, artists, and philosophers have been pondering the reign of illusion for millennia. Plato described the world as a place of simulations that left us wanting. For Shakespeare, the world was a stage of fools; the play was that of an idiot. Goya presented the world as a dream of reason that gave birth to the monsters he painted. Borges (like Shakespeare and also perhaps Goya and Plato) was obsessed with what he refers to in "Tlön, Uqbar, Orbis Tertius" as the "atrocious or banal" idea that reality, as we know it (which is, of course, the only perspective of it that we can have), is fake. The three books under review here, Ian Miller's Faking It, Penny Cousineau-Levine's Faking Death: Canadian Art Photography and the Canadian Imagination, and Paul Matthew St Pierre's A Portrait of the Artist as Australian: L'Oeuvre bizarre de Barry Humphries, can be considered additions to the oeuvre fascinated and troubled by what Borges calls the "phantasmagorias" of our world

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This conceptual paper discusses the investigation of the recall of brand associations of consumer for brands of high and low salience, as well as for fabricated brands. There has been research on brand associations for "fake" or counterfeit brands, and also for brands with low residual awareness, but there has been little research on the role of brand associations for fabricated brands. This study will investigate the role of brand associations and the propensity of consumers to recall brand associations for brands that do not exist. It is proposed that consumers may revel1 to recalling associations for the product category when they are confronted with a brand name that does not exist. It is proposed to test this with an experimental method, utilising high salience, low salience and fabricated brands from a fastmoving consumer good and a service category. This study will have implications for the manner in which respondents utilise information related to a brand, and also the manner in which marketers advertise their brands, in order to differentiate the brand from others.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Little Miss Perfect, otherwise known as the Supreme or High Point title pageant winner stands in line with five ‘full glitz’ runners-up. These Perfect Misses all have fake tans, false eyelashes, hairpieces, flippers (a dental plate of fake teeth), acrylic nails and a full face of stage make-up. Before the pageant they have had their legs, eyebrows and armpits waxed, many have had facials and pedicures and a few mothers have even injected their daughters with Botox. Finally, these little girls have been coached on the perfect way for a female to walk and talk and have had classes to hone their ‘talent’, which is most often dancing or singing. Displayed within a portfolio of photoshopped photographs, these Stepford children are touted as the epitome of female perfection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Examining hoax memoirs by James Frey (2003), Dave Pelzer (1995) and Kathy O’Beirne (2006), this paper illustrates how anxieties about the inability of representation to provide a direct access to truth are mitigated via an emotional connection with the text. While the degree of faking varies, each scandal reveals concerns about authenticity and the need to find—or feel—something that can be accepted as unquestionably ‘true’. The mimicking performed by a fake unsettles the boundaries between fact and fiction to reveal a public investment in an undisturbed effect of the real, a willingness to accept a blurring of ‘truth’ in the interests of the sensational experience of literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networks have become a convenient and effective means of communication in recent years. Many people use social networks to communicate, lead, and manage activities, and express their opinions in supporting or opposing different causes. This has brought forward the issue of verifying the owners of social accounts, in order to eliminate the effect of any fake accounts on the people. This study aims to authenticate the genuine accounts versus fake account using writeprint, which is the writing style biometric. We first extract a set of features using text mining techniques. Then, training of a supervised machine learning algorithm to build the knowledge base is conducted. The recognition procedure starts by extracting the relevant features and then measuring the similarity of the feature vector with respect to all feature vectors in the knowledge base. Then, the most similar vector is identified as the verified account.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A widescale phenomenon permeates contemporary online culture: graphically explicit images of very famous people are made available. These images are advertised as fake and fabrications; nonetheless, the reconstruct our field of recognisable personalities into the cultural economy of online pornography. The article debates why these kinds of sites and images are not prosecuted by celebrities and continue to form an intriguing conduit into online pornography.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

 Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics of being an open medium with dynamic topology, there is neither a centralized management nor clear lines of defence. A packet dropping attack is one of the major security threats in OppNets as neither source nodes nor destination nodes have any knowledge of when or where a packet will be dropped. In this paper, we present a novel attack and detection mechanism against a special type of packet dropping where the malicious node drops one packet or more and injects a new fake packet instead. Our novel detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea; the creation time of each packet. Significant results show this robust mechanism achieves a very high accuracy and detection rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, the Big Data paradigm has received considerable attention since it gives a great opportunity to mine knowledge from massive amounts of data. However, the new mined knowledge will be useless if data is fake, or sometimes the massive amounts of data cannot be collected due to the worry on the abuse of data. This situation asks for new security solutions. On the other hand, the biggest feature of Big Data is "massive", which requires that any security solution for Big Data should be "efficient". In this paper, we propose a new identity-based generalized signcryption scheme to solve the above problems. In particular, it has the following two properties to fit the efficiency requirement. (1) It can work as an encryption scheme, a signature scheme or a signcryption scheme as per need. (2) It does not have the heavy burden on the complicated certificate management as the traditional cryptographic schemes. Furthermore, our proposed scheme can be proven-secure in the standard model. © 2014 Elsevier Inc. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is anemerging technology for automating object identification. TheNetworked RFID System (NRS) is a component of a distributedobject identification network which facilitates automated supplychain management. It also makes the Internet of Things (IoT)concept a reality. To increase the business feasibility of NRSimplementation, the system should be able to ensure the visibilityand traceability of the object throughout the chain using achecker protocol. By doing so, the protocol will check thegenuineness of the object and the genuineness of the object’sprevious travel path on-site. While doing so, the protocol needs toensure the security requirement of the system. To this end, wepropose a secure checker protocol for NRS which will use a PUF(Physically Unclonable Function) and simple cryptographicprimitives. The protocol provides security (protect privacy of thepartners, injection of fake objects, non-repudiation, andunclonability), visibility and traceability for NRS. It is alsosuitable for passive tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Networked systems have adapted Radio Frequency identification technology (RFID) to automate their business process. The Networked RFID Systems (NRS) has some unique characteristics which raise new privacy and security concerns for organizations and their NRS systems. The businesses are always having new realization of business needs using NRS. One of the most recent business realization of NRS implementation on large scale distributed systems (such as Internet of Things (IoT), supply chain) is to ensure visibility and traceability of the object throughout the chain. However, this requires assurance of security and privacy to ensure lawful business operation. In this paper, we are proposing a secure tracker protocol that will ensure not only visibility and traceability of the object but also genuineness of the object and its travel path on-site. The proposed protocol is using Physically Unclonable Function (PUF), Diffie-Hellman algorithm and simple cryptographic primitives to protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability. The tag only performs a simple mathematical computation (such as combination, PUF and division) that makes the proposed protocol suitable to passive tags. To verify our security claims, we performed experiment on Security Protocol Description Language (SPDL) model of the proposed protocol using automated claim verification tool Scyther. Our experiment not only verified our claims but also helped us to eliminate possible attacks identified by Scyther.