![](images/graphics/blank.gif)
Digital identity
-
Part 1 of ebook "Rethinking place branding: Comprehensive brand development for cities and regions" provides readers with contents including: Chapter 1 - The need to rethink place branding; Chapter 2 - Rethinking the place branding construct; Chapter 3 - Rethinking the place product from the perspective of the service-dominant logic of marketing; Chapter 4 - Rethinking sense of place sense of one and sense of many; Chapter 5 - Rethinking place identities; Chapter 6 - Rethinking virtual and online place branding; Chapter 7 - Rethinking strategic place branding in the digital age;...
126p
giangmacvien
22-06-2024
2
1
Download
-
Part 1 book "Industrial engineering and management science" includes content: Design identity system based on product identity and its case studies, predicting the return of the Japanese stock market with artificial neural network, an information system of community home-based elderly service and its application on curriculum design, multiple-channel and intelligence digital diagnostic system for SFP optical transceiver,... and other contents.
55p
muasambanhan05
16-01-2024
3
0
Download
-
This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.
8p
vimarillynhewson
02-01-2024
6
3
Download
-
Part 1 of ebook "The Routledge companion to ethnic marketing" provides readers with contents including: why ethnic marketing; processes of ethnic cultural change, socialization and technology; identity, space and ethnic entrepreneurship; ethnic minority consumers’ responses to the web;...
149p
mocthanhdao0210
19-11-2023
5
3
Download
-
To achieve this aim, the paper looks at how language and identity were defined by Norton and other poststructuralists. It then reviews some current debates on digital identity. Drawing on sociocultural line of inquiry, I then conclude the paper by highlighting some implications for foreign language teaching and a promising agenda for further research into thisfield in the digital age.
5p
vipierre
30-09-2023
8
3
Download
-
Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 - national patient identifier and patient privacy in the digital era, chapter 21 - addressing social media security and privacy challenges,…
224p
haojiubujain01
24-06-2023
10
5
Download
-
(bq) part 1 book "managing online risk apps, mobile, and social media security" has contents: risk management digital style, risk management digital style, reputation and identity, reputation and identity, big data.
131p
bautroibinhyen19
02-03-2017
41
2
Download
-
Chapter 6 - Communications, networks, & cyberthreats. The topics discussed in this chapter are: From the analog to the digital age; networks; wired communications data; wireless communications media; cyberintruders: trolls, spies, hackers, & thieves; cyberattacks & malware; concerns about privacy & identity theft.
75p
tangtuy11
20-05-2016
49
11
Download
-
Lecture Security + Guide to Network Security Fundamentals - Chapter 12 include objectives: Define identity management, harden systems through privilege management, plan for change management, define digital rights management, acquire effective training and education.
38p
kiepnaybinhyen_04
15-12-2015
64
5
Download
-
This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory.
23p
dunglh2013
02-04-2014
59
2
Download
-
In this chapter, i articulate some of the underlying motivations and actions that occur as people interact, focusing on face-to-face communication. In particular, i emphasize a multi -faceted approach to identity, Goffman’s notions of performance/perception, and the importance of and mechanisms for context awareness and regulation. I have chosen to explicitly consider these four aspects of social interaction for their relevance to the design of digital spaces.
56p
thamgiacongdong
02-05-2013
52
5
Download
-
In order to provide users with appropriate mechanisms for presenting themselves, i propose a two-tiered approach. First, users should have tools to be aware of themselves and others. Second, they should have tools to manage their identity and presentation. Given this perspective, Chapter 4 introduces digital self-awareness tools. By presenting a selection of current tools, i discuss the motivations of designers in providing users with necessary feedback mechanisms, including visualization tools and data collection systems.
36p
thamgiacongdong
02-05-2013
44
5
Download
-
Transitory messages are not intended to formalize or perpetuate knowledge and do not set policy, establish guidelines or procedures, certify a transaction, or become a receipt. The retention requirement for transitory messages is "retain until obsolete, superseded or administrative value is lost." Therefore, electronic communications that fall into this category can be disposed of at any time once they are no longer needed.
22p
dacotaikhoan
26-04-2013
28
1
Download
-
Not long ago, in the nineties, no one doubted that a “digital revolution” was in the making—in architecture as in all aspects of life, science, and art. Today (early 2010) the very expression “digital revolution” has fallen into disuse, if not into disrepute; it sounds passé and archaic, at best the reminder of an age gone by. Yet digital technologies, now ubiquitous, have already significantly changed the way architecture is designed and made. They are changing how architecture is taught in schools, practiced, managed, even regulated.
182p
namde01
07-03-2013
72
8
Download
-
The vast majority of U.S. residential consumers face a monopoly or duopoly in broadband Internet access. Until now, the Internet has been characterized by a regime of “net neutrality,” which means there has been no discrimination between the price of transmitting packets based on the identity of either the transmitter or the identity of the receiver, based on the application, or the type of content the packet contains.
25p
doiroimavanchuadc
06-02-2013
58
3
Download
-
Article 8 of the Charter of Fundamental Rights of the European Union expressly recognises the fundamental right to the protection of personal data. However, since the adoption of the Data Protection Directive in 1995, broad technological changes have taken place1. The ability of organisations to collect, store and process personal data has increased Not many digital technologies are designed to obtain detailed logs of their usage by individuals, which are then accessible for surveillance and marketing purposes.
330p
bin_pham
05-02-2013
44
3
Download
-
We have looked at confidentiality services, and also examined the information theoretic framework for security.
33p
muathu_102
28-01-2013
71
3
Download
-
Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider than these novel organizational forms.
288p
mymi0809
24-01-2013
39
8
Download
-
Aging and Decision Making: A Comparison between Neurologically Healthy Elderly and Young Individuals
Given that thinking steps have been shown to be modestly correlated with the efficiency of working memory (measured by digit span; see Devetag and Warglien, 2003) and aging may reduce working memory or, potentially, some other cognitive process related to strategic reasoning, these changes could lead older subjects to use lower values of n, and to choose higher numbers than younger subjects.
28p
taisaokhongthedung
01-01-2013
51
6
Download
-
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with
254p
trung254
01-04-2012
117
33
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)