Identity intelligence

Results: 296



#Item
271Internet privacy / Privacy / Computing / Espionage / HTTP cookie / Central Intelligence Agency / National Clandestine Service / Ethics / Identity management / Social issues

PRIVACY POLICY This document sets forth the Clandestine Development, LLC™ (“Clandestine”) Privacy Policy (the “Privacy Policy”) for the Lifeline Response mobile application (the “Application”), the www.llre

Add to Reading List

Source URL: www.llresponse.com

Language: English - Date: 2012-08-21 17:55:38
272Privacy / Ubiquitous computing / Internet privacy / Ambient intelligence / Paul Dourish / Equiveillance / Ethics / Identity management / Law

Department of Computer Science Series of Publications A Report A[removed]Exploring privacy for ubiquitous computing: Tools, methods and experiments

Add to Reading List

Source URL: mikie.iki.fi

Language: English - Date: 2007-05-21 03:34:06
273Artificial intelligence / Multi-agent systems / Ethology / Knowledge / Agent-based model / Complex adaptive system / Ant colony optimization algorithms / Artificial life / Intelligent agent / Complex systems theory / Scientific modeling / Science

Interaction-based Group Identity Detection via Reinforcement Learning and Artificial Evolution Corrado Grappiolo, Julian Togelius Georgios N. Yannakakis

Add to Reading List

Source URL: julian.togelius.com

Language: English - Date: 2013-08-26 11:58:55
274Sociology / Whiteness studies / Jared Taylor / Race and intelligence / White supremacy / Historical race concepts / Racial segregation / White people / Social interpretations of race / Racism / Ethics / Identity politics

THE RETURN OF THE REPRESSED SAMUEL FRANCIS The following essay is the introduction to Race and the American Prospect, a collection of essays that Sam Francis had finished editing shortly before his death in February 200

Add to Reading List

Source URL: toqonline.com

Language: English - Date: 2010-09-30 14:36:50
275Cognition / Mental processes / Collective intelligence / Neuropsychological assessment / Maurice Halbwachs / Socially distributed cognition / Memory / Collective memory / Collective identity / Mind / Cognitive science / Ethology

Cogn Process[removed]DOI[removed]s10339[removed]z R EV IE W Robert A. Wilson

Add to Reading List

Source URL: www.ualberta.ca

Language: English - Date: 2005-08-19 11:23:56
276Privacy / Internet privacy / Massachusetts Institute of Technology / MIT Computer Science and Artificial Intelligence Laboratory / Ethics / Identity management / Law

           

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-05-14 16:54:34
277Automatic identification and data capture / Automatic number plate recognition / Electronic toll collection / Optical character recognition / Surveillance / Identity document / Private investigator / Security / Identification / Artificial intelligence

Microsoft Word - OPIA LETTER.docx

Add to Reading List

Source URL: www.opia.com

Language: English - Date: 2014-04-07 09:32:38
278Privacy / Ambient intelligence / Internet privacy / Information privacy / Ubiquitous computing / Paul Dourish / Computer-supported collaboration / Ethics / Identity management / Law

Proceedings of the Third European Conference on Computer-Supported Cooperative Work[removed]September, 1993, Milan, Italy G. De Michelis, C. Simone and K Schmidt (Editors) Design for Privacy in Ubiquitous Computing Environ

Add to Reading List

Source URL: www.ecscw.org

Language: English - Date: 2006-12-04 07:58:28
279Statistical models / Insurance / Predictive analytics / Health informatics / Analytics / Electronic health record / Predictive modelling / Decision support system / Health care analytics / Statistics / Business intelligence / Data analysis

Healthcare Quality Catalyst - Corporate Identity Design White Paper Horizontal Format

Add to Reading List

Source URL: www.healthcatalyst.com

Language: English - Date: 2014-02-26 12:15:15
280Identity / Crime prevention / National security / Identity theft / Multi-factor authentication / Authentication / Identity management / Information privacy / Money laundering / Security / Computer security / Computer network security

Complying with rules for identity management An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
UPDATE