Identity intelligence

Results: 296



#Item
1

DATASHEET Starling Identity Analytics & Risk Intelligence Actionable Insights – Get smarter about risk

Add to Reading List

Source URL: www.oneidentity.com

Language: English - Date: 2017-09-15 15:50:09
    2Economy / Information technology / Business intelligence / Marketing / Data management / Data warehousing / Information technology management / Identity management / Single customer view / Customer

    -- 5 MarchRoyal Society of Chemistry chooses DataSalon for a fully-integrated ‘single customer view’ Flexible web-based solution integrates data from 12 different systems to provide management, sales and ma

    Add to Reading List

    Source URL: datasalon.com

    Language: English - Date: 2009-03-05 05:34:22
    3Face recognition / Surveillance / Artificial intelligence / Learning / Biometrics / Identity documents / Facial recognition system / Video surveillance / FERET / Facial composite / Anil K. Jain / Face

    Mideast Iraq Vice President

    Add to Reading List

    Source URL: openbiometrics.org

    Language: English - Date: 2016-08-02 16:53:35
    4Humancomputer interaction / Usability / Identity management / Technology / Academia / Human communication / Law / Privacy / Internet privacy / User interface design / Software agent / Ambient intelligence

    Microsoft Word - abstract.doc

    Add to Reading List

    Source URL: dimacs.rutgers.edu

    Language: English - Date: 2004-05-13 09:10:28
    5Cybercrime / Security / IID / Crime / Phishing / Computer security

    New identity for new markets, new products IID adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into

    Add to Reading List

    Source URL: www.voxuspr.com

    Language: English - Date: 2016-01-20 18:07:01
    6Computer security / Security / Computer access control / Open standards / Internet of Things / Ambient intelligence / Authentication / Open Connectivity Foundation / Identity management

    Identity and Access Management for Smart Home Devices

    Add to Reading List

    Source URL: nccoe.nist.gov

    Language: English - Date: 2016-06-03 07:49:14
    7Computing / Software / Security / Identity management / Law / Privacy / Internet privacy / Ubiquitous computing / Usability / Information privacy / Ambient intelligence / Medical privacy

    A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2007-06-22 15:47:38
    8Digital rights / Human rights / Identity management / Law / Privacy / Internet privacy / Nissenbaum

    4th workshop on Web Intelligence & Communities, Lyon, 16th AprilDesigning  Privacy-­‐Aware  Social  Networks:   A  Mul:-­‐Agent  Approach   Andrei  Ciortea1,  Yann  Krupa2,  

    Add to Reading List

    Source URL: wic.litislab.fr

    Language: English - Date: 2013-12-09 08:25:58
    9Government / Security / Prevention / Identity documents / Privacy / United States intelligence agencies / United States Department of Homeland Security / Crime prevention / Privacy Act / Marc Rotenberg / Fusion center / Automated Targeting System

    NoIN THE STATE OF UTAH, v.

    Add to Reading List

    Source URL: epic.org

    Language: English - Date: 2016-01-28 16:36:36
    10Central Intelligence Agency / Collective intelligence / Intelligence gathering disciplines / Group processes / International relations / Sociology / Politics / Foreign Broadcast Information Service / Ingroups and outgroups / Social identity theory / Outgroup / Open-source intelligence

    Microsoft Word - althaus_leetaru_ISA2011.docx

    Add to Reading List

    Source URL: www.clinecenter.illinois.edu

    Language: English - Date: 2015-03-27 10:41:19
    UPDATE