IDology

Results: 7



#Item
1Authentication / Notary / Packaging / Information Card / Identity document / Internet privacy / IDology / Identity theft / Two-factor authentication / Security / Cryptography / Access control

Age Verification for Children: A Survey of Tools and Resources Jules Polonetsky Self Verification

Add to Reading List

Source URL: www.futureofprivacy.org

Language: English - Date: 2011-09-30 12:44:21
2Ethics / Identity / Customer Identification Program / Deception / IDology / Identity theft / Fraud / Customer satisfaction / Know your customer / Crimes / Law / Financial regulation

Identity - Compliance - Fraud Customer Identification Program (CIP) The Old Way and the More Secure Way[removed]

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2014-06-30 02:28:59
3Yotsuya /  Tokyo / Tokyo / Ethnography / Astronomy / Science / Geography of Japan / Christianity in Japan / Sophia University / Aoyagi

Sophia University Institute of Comparative Culture Lecture Series 2014 An Oration on Idology Hiroshi Aoyagi

Add to Reading List

Source URL: icc.fla.sophia.ac.jp

Language: English - Date: 2014-05-14 03:49:14
4Computer security / Internet privacy / Identity management / OpenID / IDology / Authentication / Windows CardSpace / Identity document / Credit card / Security / Federated identity / Identity

Microsoft Word - OBSERVER_COMMENT_Poly_Symantec

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2008-12-22 15:12:24
5Internet privacy / Federated identity / IDology / Computer security / Identity verification service / Windows CardSpace / Authentication / Computing / Computer network security / Knowledge-based authentication / Security

Microsoft Word - IDology TAB submission rev 1.doc

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2008-09-12 13:35:19
6Access control / Authentication / Notary / Packaging / Identity theft / Identity management / Minors and abortion / Credential / IDology / Security / Identity / Law

TAB Observer Commentary Provided By Jeff Schmidt, TAB Observer Independent Consultant specializing in identity and authentication systems JAS Communications LLC [removed]

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2008-12-22 15:12:24
7Computer law / Information society / Social networking service / Family Online Safety Institute / Stephen Balkam / Donna Rice Hughes / Internet privacy / John Palfrey / IDology / Technology / Virtual communities / Internet ethics

PDF Document

Add to Reading List

Source URL: cyber.law.harvard.edu

Language: English - Date: 2009-01-13 16:16:51
UPDATE