Digital identity

Results: 1391



#Item
811Identity theft / Action-adventure games / Digital media / Grand Theft Auto IV / Application software / Fair and Accurate Credit Transactions Act / Crimes / Theft / Identity

Identity Theft Prevention Program Certification Deadline: This form must be completed and submitted to Red Flag Campus Contact by February 15th. Department Name: ________________________________________

Add to Reading List

Source URL: treasurer.indiana.edu

Language: English - Date: 2012-12-20 14:43:50
812Theft / Digital media / Grand Theft Auto IV / Law / Application software / Identity / Crimes / Identity theft

Your SCSFA Benefit Specialists: Ann Palmer Phone: [removed]Scott Brooks

Add to Reading List

Source URL: insurance.scfirefighters.org

Language: English - Date: 2014-05-30 11:37:11
813Mobile telecommunications / Digital wallet / Password / Mobile payment / Wallet / Near field communication / Identity theft / Google Wallet / Password manager / Electronic commerce / Payment systems / Technology

Mobile technology is changing the ways we pay, Digital wallets are generally designed to provide more including what we think of as a wallet. Soon, along with

Add to Reading List

Source URL: www.visasecuritysense.com

Language: English - Date: 2012-05-11 13:37:48
814Security / Federated identity / Identity assurance / Digital identity / Authentication / Security Assertion Markup Language / Interoperability / Online identity / Federated identity management / Identity management / Identity / Computer security

The Imperative for Digital Identity in the StatesPart II NASCIO All States Briefing August 10, 2010

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2010-08-11 11:53:45
815Identity politics / Anthropology / Irish diaspora / Cultural identity / Cultural studies / Diaspora politics in the United States / Diaspora studies / Culture / Diaspora

Cambridge University Press[removed]3 - Digital Diasporas: Identity and Transnational Engagement Jennifer M. Brinkerhoff Excerpt More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2009-02-27 05:00:04
816Computer network security / Identity / Federated identity / Gemalto / Identity management / Digital identity / Authentication / Digital security / Entrust / Security / Computer security / National security

World e-ID Congress[removed]Program Subject to further adjustments(as of Aug[removed]PROGRAM DAY 1 - Tuesday Sept[removed]Morning

Add to Reading List

Source URL: eurosmart.com

Language: English - Date: 2014-09-01 08:34:49
817Ethics / Computer security / Social issues / Identity theft / Internet privacy / Identity management / Cyberspace / Privacy / Digital credential / Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace

Governance Workshop June 9­10, 2011 Jeremy Grant What is NSTIC? Called for in President’s Cyberspace Policy Review (May 2009): 

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-10 09:23:34
818Computer crimes / Security / Information technology audit / Computer law / Secure communication / Identity theft / Computer Fraud and Abuse Act / Computer Crime and Intellectual Property Section / Data breach / Cybercrime / Computer network security / Crime

Privacy in the Digital Age: Preventing Data Breaches and Combating Cybercrime

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2014-02-07 13:16:28
819Cambridge University Press / Brinkerhoff / Diaspora

Cambridge University Press[removed]3 - Digital Diasporas: Identity and Transnational Engagement Jennifer M. Brinkerhoff Copyright Information More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2009-02-27 05:00:04
820Identity management / Computing / Standards organizations / OpenID / National Strategy for Trusted Identities in Cyberspace / National Institute of Standards and Technology / Janrain / Digital identity / Privacy / Federated identity / Identity / Computer security

Microsoft Word - Program_IDtrust2012.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-01 13:10:22
UPDATE