Identity intelligence

Results: 296



#Item
161Identity management / Information technology / Business intelligence / Computing / Cognos / Sso / Business

*Form Valid Until[removed]State Security Access Form Cognos Group Manager SSO Establishes the manager with the ability to assign Cognos group membership in SSO for users on the local level.

Add to Reading List

Source URL: adedata.arkansas.gov

Language: English - Date: 2014-12-09 10:59:53
162Cryptographic hash functions / Computing / Information retrieval / Artificial intelligence / Hash function / Hash list / Hash / Associative array / Error detection and correction / Hashing / Search algorithms

Identity%20Resolution%20and%20Query%20Execution%20Process%20Overview.pdf

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2012-11-09 14:29:17
163Crime / Criminal record / Federal Bureau of Investigation / Background check / Fingerprint / Central Intelligence Agency / Identity theft / Canadian Undergraduate Mathematics Conference / Security / Government / Biometrics

Administrative Procedures for Obtaining Unescorted Access to Radioactive Materials of Concern Background: The Nuclear Regulatory Commission Order EA[removed]and the New York City Department of Health Notice ORH[removed], h

Add to Reading List

Source URL: ehs.columbia.edu

Language: English - Date: 2014-07-23 15:03:55
164Law / Internet privacy / Usability / Information privacy / Ambient intelligence / Lorrie Cranor / Ethics / Privacy / Identity management

A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
165Context awareness / Appear / Ambient intelligence / Identity management / Context management / Service-oriented architecture / Spatial contextual awareness / EnComPAs-2 / Technology / Computing / User interface techniques

Context Acquisition, Representation and Employment in Mobile Service Platforms Anna V. Zhdanova, Josip Zoric, Marco Marengo, Herma van Kranenburg, Niels Snoeck, Michael Sutterer, Christian Räck, Olaf Droegehorn, Stefan

Add to Reading List

Source URL: www.ist-spice.org

Language: English - Date: 2006-08-01 06:07:48
166Social issues / Law / Ambient intelligence / Information privacy / Internet privacy / Ethics / Privacy / Identity management

PRivacy Enabled Capability In Co-Operative Systems and Safety Applications Deliverable 3 Material for Dissemination

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2009-04-15 04:28:22
167Security / Ethics / Identity theft / Theft / Business intelligence / Data breach / Identity fraud / Credit card / Analytics / Identity / Crimes / Fraud

Written Testimony of ID Analytics Corporation Before the Subcommittee on Financial Institutions and Consumer Credit Hearing on H.R. 3997, the "Financial Data Protection Act of 2005."

Add to Reading List

Source URL: democrats.financialservices.house.gov

Language: English - Date: 2007-02-11 23:00:00
168Technology / Cloud computing / Infrastructure optimization / Identity management / Access control / Provisioning / Mobilecho / Mobile business intelligence / Computing / Consumerization / Security

the consumerization of IT: security challenges of the new world order

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-26 08:32:26
169Abstraction / Social information processing / Digital identity / Digital technology / Identity management / Online community / Judith Donath / Philosophy of self / Ambient intelligence / Identity / Federated identity / Computer security

FACETED ID/ENTITY: Managing representation in a digital world by danah boyd A.B. Computer Science

Add to Reading List

Source URL: smg.media.mit.edu

Language: English - Date: 2002-10-07 17:46:37
170Software / Electronics / International Mobile Equipment Identity / Malware / Android / Rooting / IPhone / Mobile business intelligence / Mobile phone features / Smartphones / Computing / Cloud clients

Smartphone Security Report 2014

Add to Reading List

Source URL: smartphones.netsafe.org.nz

Language: English - Date: 2014-05-28 07:44:32
UPDATE