Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Impersonation

Handbook of Research on Cyberbullying and Online Harassment in the Workplace
A workplace harassment that the bullies use as an act of pretending to be another person for the purpose of entertainment or fraud.
Published in Chapter:
Conceptualizing Causative Factors of Workplace Cyberbullying on Working Women
Karthikeyan C. (T. John College, Bengaluru, India)
DOI: 10.4018/978-1-7998-4912-4.ch015
Abstract
This chapter conceptualizes workplace cyberbullying, with special reference on workplace cyberbullying perpetrated on working women. It shares various causative factors that lead to workplace cyberbullying on women. The situation across the world and with special reference to Indian situations on the social menace of workplace cyberbullying on working women and the traumatizing causatives are discussed in detail. Research reports and survey reports conducted across the world and in India related to workplace cyberbullying are discussed in detail. The psychological issues, socio-psychological triggers that induce bullying on women is discussed with the methods the bullies are inflicting on the victim across the world and with special reference to Indian working situations are analyzed in detail.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security and Ethical Concerns of Affective Algorithmic Music Composition in Smart Spaces
The act of pretending to be another person for the purpose of fraud or entertainment.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Educating the Public to Combat Online Defamation, Doxing, and Impersonation
Impersonation of an individual involves pretending to be that individual. This can be done to harm their reputations, to gain personal information on them, to cause them to lose business, to cause them to lose friends, to write exams for them, to vote for them, to spread false information about them, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Voice Liveness Detection for Medical Devices
An impostor adapts his/her voice to mimic a target speaker’s voice timbre and prosody to spoof an ASV system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR