Auswahl der wissenschaftlichen Literatur zum Thema „Identité numérique – Utilisation“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Identité numérique – Utilisation" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Identité numérique – Utilisation"
Valjavec, Emmanuel. „Internet, un nouvel espace de liberté sous surveillance“. Études Tome 418, Nr. 3 (01.03.2013): 317–27. http://dx.doi.org/10.3917/etu.4183.0317.
Der volle Inhalt der QuelleGalindo, Luis, und Jean-François Cerisier. „A new way of seeing collaboration in the process of designing interactive digital educational artifacts“. Design d'oeuvres interactives & méthodologies de conception 7, Nr. 3 (11.03.2019). http://dx.doi.org/10.25965/interfaces-numeriques.3592.
Der volle Inhalt der QuelleProfizi, Alexandra. „Les médiamorphoses de Chloé Delaume“. Nouvelle Revue Synergies Canada, Nr. 12 (05.03.2020). http://dx.doi.org/10.21083/nrsc.vi12.4842.
Der volle Inhalt der QuelleDissertationen zum Thema "Identité numérique – Utilisation"
Mauger, Clémence. „Optimisation de l'utilité des données lors d'un processus de k-anonymisation“. Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0076.
Der volle Inhalt der QuelleSo that providing privacy guarantees to anonymized databases, anonymization models have emerged few decades ago. Among them, you can find k-anonymity, l-diversity, t-proximity or differential confidentiality. In this thesis, we mainly focused on the k-anonymity model through an in-depth analysis of the ways to produce databases that meet these confidentiality criteria while optimizing data utility. From a table, you can consider the set of its k-anonymous versions, which can be of exponential cardinality according to k. In a vacuum, these k-anonymous versions can be scored thanks to the amount of data modification that is correlated to the data utility. Thus, this work proposes a study of how to optimize the data utility during the process of k-anonymizing a database.First, we studied information loss metrics to estimate the amount of information lost in a table during a k-anonymization process. The metrics were used within a k-anonymization algorithm to guide equivalence class mergers leading to the production of a k-anonymous table. We tried to identify from this study characteristics in the definitions of information loss metrics allowing the production of good quality k-anonymous tables with regard to several criteria.Second, we were interested in the distribution of sensitive data into k-anonymous tables by using l-diversity and t- proximity models. More specifically, we proposed optimization strategies combining information loss metrics, l-diversity and t-proximity to be used during a k-anonymization process. The aim was then to preserv good levels of l-diversity and t-proximity of the k-anonymous tables produced, and this without sacrificing the data utility.Third, we tackled the question of the formulation of the problem of k-anonymization of a table. We relied on the original notion of generalization groups, to state the problem of k-anonymization of a table according to the incidence matrix of its associated hypergraph. Thanks to this new representation, we proposed an original procedure, declined to five algorithms, allowing to build a k-anonymous table by partitioning the equivalence classes of a k’-anonymous table with k′ >= k. Experiments carried out on two public tables have shown that the proposed algorithms outperfom the k-anonymization algorithm used previously in terms of information preservation
Zhang, Liping. „Utilisation des réseaux sociaux numériques par des étudiants chinois nouvellement arrivés en France : une étude comparative entre Facebook et Renren“. Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE2082.
Der volle Inhalt der QuelleThis research aims at comparing digital identity and nature of the peculiarities of interactive written language on two digital social networks (Facebook and Renren). We are interested in the difference between the digital identity of these two digital social networks, one is worldwide used (except a few countries such as China) and the other is mainly used by the Chinese. Is that the digital identity of one person is also the same on these two different social network sites? How the users interact and express vis-à-vis different friends in different digital context? Can the online interactions manifest emotional aspects? In order to respond to these problems, this research questions the digital identity and their function in the identity construction, the relational and social aspects of online interaction, the types of emotions expressed in the online interactions, and the role of emoticon in the expression of emotions of these two digital social networks. The data analysis enables to identify the linguistic, social and emotional phenomena in online interactions of the corpus of study. Interviews and questionnaires clarify the analysis of the experience and the feeling of the different actors. So throughout the description of case use of Facebook and Renren by four newly arrived Chinese students in France, this work attempts to better understand the features of digital identity and interactive exchange of these two digital social networks
Buchteile zum Thema "Identité numérique – Utilisation"
Livingstone, Sonia, Giovanna Mascheroni und Maria Francesca Murru. „Utilisation des réseaux socionumériques par les jeunes Européens“. In Identités numériques, 107–25. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20388.
Der volle Inhalt der Quelle