Identity 2.0

Results: 599



#Item
171Web 2.0 / Social media / Graphic design / Subtitling / Social information processing / Twitter / Avatar / Facebook / YouTube / World Wide Web / Film / Technology

The European Commission visual identity manual

Add to Reading List

Source URL: ec.europa.eu.

Language: English - Date: 2013-06-13 03:44:00
172Web 2.0 / Cross-platform software / Concurrency control / Monitor / Gmail / Unix signal / Google / AOL / Identity / Computing / World Wide Web / Internet

Shared  Signals   Sharing significant account events to inform identity fraud decision evaluation [removed]

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
173Software / Social media / Web 2.0 / Social networks / Facebook Platform / Federated identity / Like button / Social graph / Framing / World Wide Web / Facebook / Computing

PDF Document

Add to Reading List

Source URL: www.sbms.org.au

Language: English - Date: 2012-02-01 21:55:12
174Electronics / Mobile phone / Subscriber identity module / Universal Serial Bus / Mobile phone features / IPhone / Technology / Smartphones / Electronic engineering

Nokia Lumia 900 User Guide Issue 1.0 2

Add to Reading List

Source URL: www.wireless.att.com

Language: English - Date: 2012-04-25 09:45:59
175Design / Advertising / Trademark law / Typography / Wordmark / Pantone / University at Albany /  SUNY / Minerva / Graphic design / Logos / Visual arts

University at Albany Graphic Identity Manual Version 2.0 University at Albany Graphic Identity Manual

Add to Reading List

Source URL: www.designerstalk.com

Language: English - Date: 2004-06-23 06:00:50
176Web 2.0 / Human rights / Identity management / Law / Privacy / Internet privacy / Social networking service / Facebook / Privacy regulation theory / World Wide Web / Software / Computing

Unpicking the Privacy Paradox: Can Structuration Theory Help to Explain Location-Based Privacy Decisions? Aristea M. Zafeiropoulou1 David E. Millard1 1 Electronics and Computer Science

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2013-04-24 11:13:47
177System software / Federated identity / Data management / Directory services / Radiant Logic / Virtual directory / Metadirectory / SAML 2.0 / Security Assertion Markup Language / Identity management / Computer security / Computing

TM RADIANTONE: BUYER’S GUIDE Toward a Federated Identity Service Based on Virtualization

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-03-04 09:45:33
178Human rights / World Wide Web / Web 2.0 / Internet privacy / Consumer privacy / Mass surveillance / Facebook / Identity theft / Password / Ethics / Privacy / Computing

ACCAN Magazine The Privacy Issue Winter 2012 Message from the CEO: This Winter, we’ve dedicated ACCAN Magazine to privacy following a spate of hacking of high-profile websites (see our story on page 3). This again high

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-01-23 00:34:16
179Social information processing / Virtual communities / Dating / Blog hosting services / Web 2.0 / Social networking service / Online dating service / Internet privacy / Identity theft / Technology / World Wide Web / Computing

Online dating: Staying safe online Online dating is a form of online social networking. It can be a great way to meet new people, make new friends, and maybe even find that special connection. •

Add to Reading List

Source URL: www.acma.gov.au

Language: English - Date: 2010-02-04 19:16:38
180Human rights / World Wide Web / Web 2.0 / Internet privacy / Consumer privacy / Mass surveillance / Facebook / Identity theft / Password / Ethics / Privacy / Computing

ACCAN Magazine The Privacy Issue Winter 2012 Message from the CEO: This Winter, we’ve dedicated ACCAN Magazine to privacy following a spate of hacking of high-profile websites (see our story on page 3). This again high

Add to Reading List

Source URL: accan.org.au

Language: English - Date: 2015-01-23 00:34:16
UPDATE