Online identity

Results: 1811



#Item
121

Protecting Face in Virtual Life: An Ethnographic Analysis of Identity Categories and Informal Systems of Social Control in Massively Multiplayer Online Worlds Oskar Milik School of Sociology University College Dublin

Add to Reading List

Source URL: www.fdg2013.org

Language: English - Date: 2013-05-13 11:42:23
    122

    Online Identity & Networking Tools BUSINESS NETWORKING LinkedIn (www.linkedin.com) Is an online network of more than 100 million experienced professionals from around the world. When you join, you create a profile that s

    Add to Reading List

    Source URL: vsip.syr.edu

    Language: English - Date: 2015-07-15 13:47:43
      123Social engineering / Cybercrime / Identity theft / Crime / Computing / Phishing / Spamming / Cyberspace / SMS phishing / Voice phishing / Online banking / Malware

      Fraud Trends HSBCnet Online Security Controls En français | En Español | 繁體中文 | 简体中文 | ‫اﻟﻌرﺑﯾﺔ‬ PUBLIC

      Add to Reading List

      Source URL: connect-content.us.hsbc.com

      Language: English - Date: 2015-11-24 16:06:57
      124

      Online Inspiration and Exploration for Identity Reinvention

      Add to Reading List

      Source URL: oliverhaimson.com

      Language: English - Date: 2015-04-29 19:18:26
        125Spamming / Social information processing / Identity management / Spam filtering / Email / Internet privacy / Sockpuppet / Pseudonymous remailer / Anonymity / Anti-spam techniques / User / Email spam

        Pseudonym Parties: An Offline Foundation for Online Accountability (PRELIMINARY DRAFT) Bryan Ford Massachusetts Institute of Technology March 27, 2007

        Add to Reading List

        Source URL: www.brynosaurus.com

        Language: English - Date: 2010-09-29 09:18:52
        126Reputation management / Collaboration / Computing / EigenTrust / Reputation system / Peer-to-peer / Sybil attack / Online identity / Reputation / Social peer-to-peer processes / Trust metric

        Electron Commer Res: 239–270 DOIs10660y The design of a reliable reputation system Gayatri Swamynathan · Kevin C. Almeroth · Ben Y. Zhao

        Add to Reading List

        Source URL: www.cs.ucsb.edu

        Language: English - Date: 2010-12-04 23:25:19
        127

        RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication Tiffany Hyun-Jin Kim1 , Akira Yamada2 , Virgil Gligor1 , Jason Hong1 , and Adrian Perrig1 1

        Add to Reading List

        Source URL: fc13.ifca.ai

        Language: English - Date: 2013-03-27 20:41:00
          128

          The Generational Shift in Citizen Identity: Implications for Civic Learning Online 1 The Generational Shift in Citizen Identity: Implications for Civic Learning Online

          Add to Reading List

          Source URL: www.engagedyouth.org

          Language: English - Date: 2008-05-19 13:39:00
            129

            March 2009: Identity readergirlz is an online book community PRESENTS

            Add to Reading List

            Source URL: www.readergirlz.com

            - Date: 2010-02-21 18:04:00
              130

              Security Transaction Passcodes Customer Guide Product Information As a security measure, some online banking actions will require a passcode as a second layer of identity verification to ensure that you are the user auth

              Add to Reading List

              Source URL: www.stonegatebank.com

              Language: English - Date: 2015-10-01 09:16:28
                UPDATE