Identity intelligence

Results: 296



#Item
11Identity management / Law / Privacy / Computer security / Internet privacy / Ambient intelligence

No Backup Arthur B. Robinson, Ph.D. As I write my monthly newsletter, Access to Energy, I continually copy the text to an external hard drive—manually, not automatically. Also, I continually make printed copies of the

Add to Reading List

Source URL: www.jpands.org

Language: English - Date: 2012-03-02 02:12:21
12Computer access control / Access control / Directory services / Federated identity / Distributed Common Ground System / Equipment of the United States Air Force / DCGS-A / XACML / Single sign-on / DCGS / Authentication / Active Directory

Identity and Access Management (IdAM) Security Framework for DCGS-Army The Distributed Common Ground System-Army (DCGS-Army) is a data system that supports field intelligence, surveillance information, and situational aw

Add to Reading List

Source URL: www.jerichosystems.com

Language: English - Date: 2016-02-10 13:54:31
13Identity management / Digital rights / Human rights / Law / Privacy / Internet privacy / Email / Ambient intelligence / Helen Nissenbaum / Reputation

International Workshop on Web Intelligence and Virtual EnterprisesHandling Privacy as Contextual Integrity in Virtual Communities

Add to Reading List

Source URL: wic.litislab.fr

Language: English - Date: 2013-12-09 08:25:56
14Economy / Law / Money / Financial regulation / Civil procedure / Identity document / Letter of credit / Money laundering / Authentication / Service of process / Permanent account number / Patriot Act /  Title III /  Subtitle A

IMPLEMENTING PROCEDURES ISSUED BY THE FINANCIAL INTELLIGENCE ANALYSIS UNIT IN TERMS OF THE PROVISIONS OF THE PREVENTION OF MONEY LAUNDERING AND FUNDING OF TERRORISM REGULATIONS

Add to Reading List

Source URL: www.fiumalta.org

Language: English - Date: 2016-03-05 01:54:26
15Crime / Economy / Business / Theft / Car theft / Crime prevention / Identity theft / Cargo / Motor vehicle theft / Anti-theft system / Organized crime / Pharmaceutical industry in China

Pharmaceutical Cargo Theft in Europe A REALISTIC VIEW OF THE CURRENT TRENDS, CHALLENGES, AND FINANCIAL IMPACTS Helmut Brüls Head of EMEA Intelligence, FreightWatch International, Brussels Daniel Wyer EMEA Intelligence A

Add to Reading List

Source URL: www.sensitech.com

Language: English - Date: 2016-02-01 16:04:12
16Privacy / Identity management / Internet privacy / Law / Information privacy / Medical privacy / Personally identifiable information / P3P / Privacy concerns with social networking services

Terms & Conditions and Privacy Policy Updated April 20, 2016. Welcome to Beauty.AI, The First Beauty Contest Judged by Artificial Intelligence conducted by Wayco International Limited, Hong Kong (including its affiliates

Add to Reading List

Source URL: beauty.ai

Language: English
17Technology / Digital media / Identity management / Law / Privacy / Paul Dourish / Videoconferencing / Internet privacy / Computer network / Ambient intelligence / Computing / Social media

Culture and Control in a Media Space Paul Dourish Rank Xerox EuroPARC, Cambridge, UK Abstract: Media spaces integrate audio, video and computer networking technology in

Add to Reading List

Source URL: www.dourish.com

Language: English - Date: 2008-06-14 12:49:07
18Computer security / Computer access control / Security / Prevention / Authentication / Multi-factor authentication / Identity theft / Money laundering / Security token / Information security / Internet security / Identity management

Complying with rules for identity management An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
19Computer access control / E-commerce / Supply chain management / Distribution / Computer network security / Authentication / Multi-factor authentication / Supply chain / Identity theft / Biometrics / Smart card / Security token

The global supply chain Challenges for small and midsize enterprises An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
20Knowledge engineering / Semantic Web / Social information processing / Fraud / Identity theft / Ontology / Online identity / Identity / Social web / Social network / Social search / Identity management

Identifying Individuals using Identity Features and Social Information Matthew Rowe Web Intelligence Technologies Lab Department of Computer Science University of Sheffield, UK

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-04-27 08:09:44
UPDATE