IAAC

Results: 335



#Item
321Consent / Criminal law / E-Government

IAAC 5 March 2008 Workshop Report[removed]

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:31:57
322Technology / Governance / Identity Cards Act / E-Government / Identity management / Identity theft / Identity document / Digital identity / Identity assurance / Identity / Government / Security

IAAC 4 April 2008 Workshop Report[removed]

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:31:49
323Informed consent / Data sharing / Pi / Consent / Privacy / Internet privacy / Social networking service / Secret sharing / Ethics / Mathematical analysis / Ethology

The Proportionate Sharing of Personal Information Results from IAAC’s PCIA Workshop of 16 February 2010 Introduction There are many areas within the operation of government where people‟s personal information (PI) is

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:32:28
324Government / Identity assurance / Digital identity / Identity theft / Identity document / Information security / Identity Cards Act / Transformational Government / Liberty Alliance / Security / Identity management / Identity

IAAC IdA Conclusion Report Sept 2008

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:31:37
325Computer network security / Computer security / Crime prevention / National security / Secure communication / Safety / Online shopping / Hacker / Computing / Electronic commerce / Ethics / Security

IAAC People-Centric Information Assurance research Paper 7 - People’s role in fending for themselves online Results from IAAC’s PCIA workshop of 12 October 2010 The aim of the current PCIA research is to understand h

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:32:16
326Ethics / Identity document / E-Government / Identity management / Risk / Digital identity / Identity assurance / Internet privacy / Identity / Security / Management

IAAC 4 Sept 07 Workshop Report

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:31:53
327Identity management / Identity document / Digital identity / Identity assurance / Identity / Security / Computer security

Summary of IAAC’s Report on the Conclusion of its Identity Assurance Programme[removed]

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:31:28
328IAAC / Josep Miàs Gifre / ACTAR / Aaron Betsky / Autonomous communities of Spain / Institute for Advanced Architecture of Catalonia / Catalonia / Michel Rojkind

PDF Document

Add to Reading List

Source URL: www.advancedarchitecturecontest.org

Language: English - Date: 2013-07-26 10:04:36
329IAAC / Josep Miàs Gifre / ACTAR / Aaron Betsky / Autonomous communities of Spain / Institute for Advanced Architecture of Catalonia / Catalonia / Michel Rojkind

PDF Document

Add to Reading List

Source URL: www.advancedarchitecturecontest.org

Language: English - Date: 2013-07-26 10:04:28
330IAAC / Josep Miàs Gifre / ACTAR / Aaron Betsky / Autonomous communities of Spain / Institute for Advanced Architecture of Catalonia / Catalonia / Michel Rojkind

PDF Document

Add to Reading List

Source URL: www.advancedarchitecturecontest.org

Language: English - Date: 2013-07-26 10:04:39
UPDATE