Gotowa bibliografia na temat „Identité numérique – Utilisation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Identité numérique – Utilisation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Identité numérique – Utilisation"
Valjavec, Emmanuel. "Internet, un nouvel espace de liberté sous surveillance". Études Tome 418, nr 3 (1.03.2013): 317–27. http://dx.doi.org/10.3917/etu.4183.0317.
Pełny tekst źródłaGalindo, Luis, i Jean-François Cerisier. "A new way of seeing collaboration in the process of designing interactive digital educational artifacts". Design d'oeuvres interactives & méthodologies de conception 7, nr 3 (11.03.2019). http://dx.doi.org/10.25965/interfaces-numeriques.3592.
Pełny tekst źródłaProfizi, Alexandra. "Les médiamorphoses de Chloé Delaume". Nouvelle Revue Synergies Canada, nr 12 (5.03.2020). http://dx.doi.org/10.21083/nrsc.vi12.4842.
Pełny tekst źródłaRozprawy doktorskie na temat "Identité numérique – Utilisation"
Mauger, Clémence. "Optimisation de l'utilité des données lors d'un processus de k-anonymisation". Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0076.
Pełny tekst źródłaSo that providing privacy guarantees to anonymized databases, anonymization models have emerged few decades ago. Among them, you can find k-anonymity, l-diversity, t-proximity or differential confidentiality. In this thesis, we mainly focused on the k-anonymity model through an in-depth analysis of the ways to produce databases that meet these confidentiality criteria while optimizing data utility. From a table, you can consider the set of its k-anonymous versions, which can be of exponential cardinality according to k. In a vacuum, these k-anonymous versions can be scored thanks to the amount of data modification that is correlated to the data utility. Thus, this work proposes a study of how to optimize the data utility during the process of k-anonymizing a database.First, we studied information loss metrics to estimate the amount of information lost in a table during a k-anonymization process. The metrics were used within a k-anonymization algorithm to guide equivalence class mergers leading to the production of a k-anonymous table. We tried to identify from this study characteristics in the definitions of information loss metrics allowing the production of good quality k-anonymous tables with regard to several criteria.Second, we were interested in the distribution of sensitive data into k-anonymous tables by using l-diversity and t- proximity models. More specifically, we proposed optimization strategies combining information loss metrics, l-diversity and t-proximity to be used during a k-anonymization process. The aim was then to preserv good levels of l-diversity and t-proximity of the k-anonymous tables produced, and this without sacrificing the data utility.Third, we tackled the question of the formulation of the problem of k-anonymization of a table. We relied on the original notion of generalization groups, to state the problem of k-anonymization of a table according to the incidence matrix of its associated hypergraph. Thanks to this new representation, we proposed an original procedure, declined to five algorithms, allowing to build a k-anonymous table by partitioning the equivalence classes of a k’-anonymous table with k′ >= k. Experiments carried out on two public tables have shown that the proposed algorithms outperfom the k-anonymization algorithm used previously in terms of information preservation
Zhang, Liping. "Utilisation des réseaux sociaux numériques par des étudiants chinois nouvellement arrivés en France : une étude comparative entre Facebook et Renren". Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE2082.
Pełny tekst źródłaThis research aims at comparing digital identity and nature of the peculiarities of interactive written language on two digital social networks (Facebook and Renren). We are interested in the difference between the digital identity of these two digital social networks, one is worldwide used (except a few countries such as China) and the other is mainly used by the Chinese. Is that the digital identity of one person is also the same on these two different social network sites? How the users interact and express vis-à-vis different friends in different digital context? Can the online interactions manifest emotional aspects? In order to respond to these problems, this research questions the digital identity and their function in the identity construction, the relational and social aspects of online interaction, the types of emotions expressed in the online interactions, and the role of emoticon in the expression of emotions of these two digital social networks. The data analysis enables to identify the linguistic, social and emotional phenomena in online interactions of the corpus of study. Interviews and questionnaires clarify the analysis of the experience and the feeling of the different actors. So throughout the description of case use of Facebook and Renren by four newly arrived Chinese students in France, this work attempts to better understand the features of digital identity and interactive exchange of these two digital social networks
Części książek na temat "Identité numérique – Utilisation"
Livingstone, Sonia, Giovanna Mascheroni i Maria Francesca Murru. "Utilisation des réseaux socionumériques par les jeunes Européens". W Identités numériques, 107–25. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20388.
Pełny tekst źródła