National identities

Results: 332



#Item
71Who Owns the Ethiopian Nation-State? Part I: Definition, theories and a model for the nation-state ©1 Dr. Udub M. Mukhtar, PhD2 November 6, 2012 “[T]he goal of nation building should not be to impose common identities

Who Owns the Ethiopian Nation-State? Part I: Definition, theories and a model for the nation-state ©1 Dr. Udub M. Mukhtar, PhD2 November 6, 2012 “[T]he goal of nation building should not be to impose common identities

Add to Reading List

Source URL: gadaa.com

Language: English - Date: 2012-11-25 14:43:51
72NSTIC: Facts at a Glance 1. What is the NSTIC?  The National Strategy for Trusted Identities in Cyberspace (NSTIC) is an Obama administration initiative

NSTIC: Facts at a Glance 1. What is the NSTIC? The National Strategy for Trusted Identities in Cyberspace (NSTIC) is an Obama administration initiative

Add to Reading List

Source URL: www.smartcardalliance.org

Language: English - Date: 2011-09-01 10:37:00
73Open Research Online The Open University’s repository of research publications and other research outputs Choice and the relationship between identities and behaviour for mothers with pre-school children: some implicat

Open Research Online The Open University’s repository of research publications and other research outputs Choice and the relationship between identities and behaviour for mothers with pre-school children: some implicat

Add to Reading List

Source URL: oro.open.ac.uk

Language: English - Date: 2011-01-21 02:30:32
74FirstNet ICAM Summit - Recommended Principles and Actions Report

FirstNet ICAM Summit - Recommended Principles and Actions Report

Add to Reading List

Source URL: ise.gov

Language: English - Date: 2015-01-27 16:24:41
75Testimony of  Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-01-27 16:21:14
76Open Identity Exchange (OIX) Response to: “Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace” Notice of Inquiry National Institute of Standards and Technology [Docket No

Open Identity Exchange (OIX) Response to: “Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace” Notice of Inquiry National Institute of Standards and Technology [Docket No

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
77TRUSTMARKS IN THE  IDENTITY ECOSYSTEM Definitions, Use, and Governance 	
  

TRUSTMARKS IN THE IDENTITY ECOSYSTEM Definitions, Use, and Governance  

Add to Reading List

Source URL: oixuk.org

Language: English - Date: 2014-09-16 07:10:42
78THE WHITE HOUSE Office of the Press Secretary For Immediate Release  October 3, 2011

THE WHITE HOUSE Office of the Press Secretary For Immediate Release October 3, 2011

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:33:00
79IDEAS AND IDENTITIES 1 Review of Educational Research June 2009, Vol. 79, No. 2, pp. 1008–1043 DOI: [removed][removed] © 2009 AERA. http://rer.aera.net

IDEAS AND IDENTITIES 1 Review of Educational Research June 2009, Vol. 79, No. 2, pp. 1008–1043 DOI: [removed][removed] © 2009 AERA. http://rer.aera.net

Add to Reading List

Source URL: tspace.library.utoronto.ca

Language: English - Date: 2012-11-02 22:46:49
80The National Counterterrorism Center (NCTC) -- Responsibilities and Potential Congressional Concerns

The National Counterterrorism Center (NCTC) -- Responsibilities and Potential Congressional Concerns

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 13:19:17