Identity control theory

Results: 18



#Item
1

Perceptions Of Leadership In Groups: An  Empirical Test Of Identity Control Theory Peter J. Burke

Add to Reading List

Source URL: wat2146.ucr.edu

- Date: 2006-10-31 19:06:00
    2Security / Prevention / Identity management / Law / Privacy / Milind Tambe / Internet privacy / Computer security / Mathematical optimization / Resilient control systems

    7th Conference on Decision and Game Theory for Security – GameSec 2016 New York, NY, USA Recent advances in information and communication technologies pose significant security challenges that impact all aspects of mod

    Add to Reading List

    Source URL: www.gamesec-conf.org

    Language: English - Date: 2016-08-07 16:15:36
    3Software engineering / Computing / Programming language theory / Computer access control / Subscriber identity module / C

    Personal Identification Information in Property Data Code of Conduct Application to become a Code Subscriber When completed this application, together with an executed copy of the ‘Deed of Agreement to the Personal Ide

    Add to Reading List

    Source URL: www.propertydatacodeofconduct.com.au

    Language: English - Date: 2016-05-23 01:44:02
    4Social psychology / Personality traits / Personality / Construals / Conscientiousness / Construal level theory / Organizational behavior / Big Five personality traits / Self-control / Revised NEO Personality Inventory / Identity / Personality psychology

    Microsoft Word - Fixed figures.docx

    Add to Reading List

    Source URL: labs.psy.ohio-state.edu

    Language: English
    5Computer access control / Computer security / Cryptography / Identity management / Cybercrime / Password / Salt / Passwd / One-time password / Password policy / Random password generator / Multi-factor authentication

    contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-13 14:29:05
    6Social psychology / Conformity / Group processes / Construals / Construal level theory / Identity / Self-control / The Experiment / Deindividuation / Norm / Solomon Asch / Group dynamics

    Social Psychological and Personality Science http://spp.sagepub.com/ The Motivational Dynamics of Dissent Decisions: A Goal-Conflict Approach Dominic J. Packer, Kentaro Fujita and Alison L. Chasteen

    Add to Reading List

    Source URL: labs.psy.ohio-state.edu

    Language: English - Date: 2014-07-29 09:59:33
    7Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

    Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 20:42:08
    8Computer security / Constraint programming / Datalog / Cryptography / Role-based access control / Credential / Digital credential / Trust negotiation / Constraint logic programming / Security / Identity management / Access control

    RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2003-11-04 15:32:03
    9Credential / Access control / PERMIS / Computer security / Identity management / Security / Simple public key infrastructure

    Distributed Credential Chain Discovery in Trust Management ∗ William H. Winsborough Network Associates Laboratories

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2002-09-12 20:01:20
    10Social philosophy / Metaphysics / Identity / Personal identity / Philosophy of self / Jean-Jacques Rousseau / Person / Will / Identity control theory / Self / Mind / Philosophy

    Copyrighted Material | To Begin Take a nightmare situation evoked by Jean-Paul Sartre to image his childhood sense that he was a fraud, lacking all authenticity. He has sneaked onto a train from Paris to Dijon and falle

    Add to Reading List

    Source URL: press.princeton.edu

    Language: English - Date: 2013-10-22 16:04:06
    UPDATE