intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Digital identity

Xem 1-20 trên 22 kết quả Digital identity
  • Part 1 of ebook "Rethinking place branding: Comprehensive brand development for cities and regions" provides readers with contents including: Chapter 1 - The need to rethink place branding; Chapter 2 - Rethinking the place branding construct; Chapter 3 - Rethinking the place product from the perspective of the service-dominant logic of marketing; Chapter 4 - Rethinking sense of place sense of one and sense of many; Chapter 5 - Rethinking place identities; Chapter 6 - Rethinking virtual and online place branding; Chapter 7 - Rethinking strategic place branding in the digital age;...

    pdf126p giangmacvien 22-06-2024 2 1   Download

  • Part 1 book "Industrial engineering and management science" includes content: Design identity system based on product identity and its case studies, predicting the return of the Japanese stock market with artificial neural network, an information system of community home-based elderly service and its application on curriculum design, multiple-channel and intelligence digital diagnostic system for SFP optical transceiver,... and other contents.

    pdf55p muasambanhan05 16-01-2024 3 0   Download

  • This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.

    pdf8p vimarillynhewson 02-01-2024 6 3   Download

  • Part 1 of ebook "The Routledge companion to ethnic marketing" provides readers with contents including: why ethnic marketing; processes of ethnic cultural change, socialization and technology; identity, space and ethnic entrepreneurship; ethnic minority consumers’ responses to the web;...

    pdf149p mocthanhdao0210 19-11-2023 5 3   Download

  • To achieve this aim, the paper looks at how language and identity were defined by Norton and other poststructuralists. It then reviews some current debates on digital identity. Drawing on sociocultural line of inquiry, I then conclude the paper by highlighting some implications for foreign language teaching and a promising agenda for further research into thisfield in the digital age.

    pdf5p vipierre 30-09-2023 8 3   Download

  • Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 - national patient identifier and patient privacy in the digital era, chapter 21 - addressing social media security and privacy challenges,…

    pdf224p haojiubujain01 24-06-2023 10 5   Download

  • (bq) part 1 book "managing online risk apps, mobile, and social media security" has contents: risk management digital style, risk management digital style, reputation and identity, reputation and identity, big data.

    pdf131p bautroibinhyen19 02-03-2017 41 2   Download

  • Chapter 6 - Communications, networks, & cyberthreats. The topics discussed in this chapter are: From the analog to the digital age; networks; wired communications data; wireless communications media; cyberintruders: trolls, spies, hackers, & thieves; cyberattacks & malware; concerns about privacy & identity theft.

    ppt75p tangtuy11 20-05-2016 49 11   Download

  • Lecture Security + Guide to Network Security Fundamentals - Chapter 12 include objectives: Define identity management, harden systems through privilege management, plan for change management, define digital rights management, acquire effective training and education.

    pdf38p kiepnaybinhyen_04 15-12-2015 64 5   Download

  • This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory.

    pdf23p dunglh2013 02-04-2014 59 2   Download

  • In this chapter, i articulate some of the underlying motivations and actions that occur as people interact, focusing on face-to-face communication. In particular, i emphasize a multi -faceted approach to identity, Goffman’s notions of performance/perception, and the importance of and mechanisms for context awareness and regulation. I have chosen to explicitly consider these four aspects of social interaction for their relevance to the design of digital spaces.

    pdf56p thamgiacongdong 02-05-2013 52 5   Download

  • In order to provide users with appropriate mechanisms for presenting themselves, i propose a two-tiered approach. First, users should have tools to be aware of themselves and others. Second, they should have tools to manage their identity and presentation. Given this perspective, Chapter 4 introduces digital self-awareness tools. By presenting a selection of current tools, i discuss the motivations of designers in providing users with necessary feedback mechanisms, including visualization tools and data collection systems.

    pdf36p thamgiacongdong 02-05-2013 44 5   Download

  • Transitory messages are not intended to formalize or perpetuate knowledge and do not set policy, establish guidelines or procedures, certify a transaction, or become a receipt. The retention requirement for transitory messages is "retain until obsolete, superseded or administrative value is lost." Therefore, electronic communications that fall into this category can be disposed of at any time once they are no longer needed.

    pdf22p dacotaikhoan 26-04-2013 28 1   Download

  • Not long ago, in the nineties, no one doubted that a “digital revolution” was in the making—in architecture as in all aspects of life, science, and art. Today (early 2010) the very expression “digital revolution” has fallen into disuse, if not into disrepute; it sounds passé and archaic, at best the reminder of an age gone by. Yet digital technologies, now ubiquitous, have already significantly changed the way architecture is designed and made. They are changing how architecture is taught in schools, practiced, managed, even regulated.

    pdf182p namde01 07-03-2013 72 8   Download

  • The vast majority of U.S. residential consumers face a monopoly or duopoly in broadband Internet access. Until now, the Internet has been characterized by a regime of “net neutrality,” which means there has been no discrimination between the price of transmitting packets based on the identity of either the transmitter or the identity of the receiver, based on the application, or the type of content the packet contains.

    pdf25p doiroimavanchuadc 06-02-2013 58 3   Download

  • Article 8 of the Charter of Fundamental Rights of the European Union expressly recognises the fundamental right to the protection of personal data. However, since the adoption of the Data Protection Directive in 1995, broad technological changes have taken place1. The ability of organisations to collect, store and process personal data has increased Not many digital technologies are designed to obtain detailed logs of their usage by individuals, which are then accessible for surveillance and marketing purposes.

    pdf330p bin_pham 05-02-2013 44 3   Download

  • We have looked at confidentiality services, and also examined the information theoretic framework for security.

    ppt33p muathu_102 28-01-2013 71 3   Download

  • Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider than these novel organizational forms.

    pdf288p mymi0809 24-01-2013 39 8   Download

  • Given that thinking steps have been shown to be modestly correlated with the efficiency of working memory (measured by digit span; see Devetag and Warglien, 2003) and aging may reduce working memory or, potentially, some other cognitive process related to strategic reasoning, these changes could lead older subjects to use lower values of n, and to choose higher numbers than younger subjects.

    pdf28p taisaokhongthedung 01-01-2013 51 6   Download

  • Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with

    pdf254p trung254 01-04-2012 117 33   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2