Gotowa bibliografia na temat „Identités numériques”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Identités numériques”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Identités numériques"
Ollier-Malaterre, Ariane. "La compétence numérique de gestion des frontières sur les réseaux sociaux numériques : un capital culturel technologique à la Bourdieu". Section 2 – Les nouveaux espaces et les nouvelles temporalités : flexibilisation, invisibilité et brouillage des frontières, nr 81 (19.02.2019): 121–37. http://dx.doi.org/10.7202/1056307ar.
Pełny tekst źródłaMathias, Paul. "Note introductive aux identités numériques". Cités 39, nr 3 (2009): 59. http://dx.doi.org/10.3917/cite.039.0059.
Pełny tekst źródłaGeorges, Fanny. "Pratiques informationnelles et identités numériques". Études de communication, nr 35 (1.12.2010): 105–20. http://dx.doi.org/10.4000/edc.2226.
Pełny tekst źródłaPinède, Nathalie. "Du site web aux identités numériques organisationnelles". Questions de communication, nr 34 (31.12.2018): 75–94. http://dx.doi.org/10.4000/questionsdecommunication.15587.
Pełny tekst źródłaGeorges, Fanny. "« A l'image de l'Homme » : cyborgs, avatars, identités numériques". Le Temps des médias 18, nr 1 (2012): 136. http://dx.doi.org/10.3917/tdm.018.0136.
Pełny tekst źródłaLabbé, Stéphane. "La médiation du livre à l’ère du numérique : l’enjeu des algorithmes de recommandation". Documentation et bibliothèques 61, nr 1 (9.03.2015): 15–21. http://dx.doi.org/10.7202/1029000ar.
Pełny tekst źródłaKhatchatourov, Armen. "La question des identités numériques à l’ère du RGPD : privacy ou protection des données ?" I2D - Information, données & documents 1, nr 1 (2019): 34. http://dx.doi.org/10.3917/i2d.191.0034.
Pełny tekst źródłaBlot, Coline. "Jean-Paul Pinte (dir.), Enseignement préservation et diffusion des identités numériques, Traité des sciences et techniques de l’information". Communication et organisation, nr 45 (1.06.2014): 311–14. http://dx.doi.org/10.4000/communicationorganisation.4670.
Pełny tekst źródłaBoyadjian, Julien, i Stéphanie Wojcik. "Militer dans et aux lisières des organisations partisanes". Politiques de communication N° 19, nr 2 (21.09.2023): 153–86. http://dx.doi.org/10.3917/pdc.019.0153.
Pełny tekst źródłaGrevisse, YENDE RAPHAEL, LOWEMBO A. TSHOTSHO Raymond-Albert, KABIENA KABASELE Emmanuel, MUKENDI MALUNDA Cedrick, KENA MULUMBA Clovis, KANDA KABAMBA Isaac i BUKASA MUKENGESHAYI Jean-Claude. "DEMATERIALISATION ET FRAUDE NUMERIQUE DES DOCUMENTS DANS LE SECTEUR DE L’ENSEIGNEMENT SUPERIEUR ET UNIVERSITAIRE EN RDC : Enjeux et Contraintes des TIC." International Journal of Electrical and Electronics Engineering Studies 8, nr 2 (15.02.2022): 30–45. http://dx.doi.org/10.37745/ijeees.13/vol8n23045.
Pełny tekst źródłaRozprawy doktorskie na temat "Identités numériques"
Ates, Mikaël. "Identités numériques : gestion inter-organisationnelle centrée sur l'utilisateur et respectueuse de la vie privée". Phd thesis, Université Jean Monnet - Saint-Etienne, 2009. http://tel.archives-ouvertes.fr/tel-00443910.
Pełny tekst źródłaPajard, Anne. "L'héritage malgré soi ? Le couple patrimoine/territoire à l'épreuve de la Caraïbe". Thesis, Antilles, 2017. http://www.theses.fr/2017ANTI0215/document.
Pełny tekst źródłaThis thesis explores the complexity of the notion of heritage from a Caribbean context, both specific and intimately linked to world movements since the sixteenth century. It examines the in-between that characterizes heritage, between the inherited dimension-perceived as an inalienable given, and the dimension constructed in the present for a becoming, manifested by what one wishes to transmit to the future generations. The heritage unfolds in the singular-collective relationship of which it invokes the imaginary world, the connections between spaces and different temporalities. It can be perceived as a barometer of the capacity of societies to fit into a communication order envisaged as an act of sharing. The proposed multidirectional perspective confronts historicized mobilizations of a patrimony that is a tool of the powers taken up in political, economic and technical convergences, in which the order of knowledge is also forged, to the social functions of heritage which refer to a quest for meaning, social bonding, resources and is part of complex territorialities. The Caribbean, a polythetic territory, presents an unprecedented point of view to question this heritage / territory couple and the problematic paradigms that its institutionalization naturalized during the period of formation of European national identities, a period correlated with the emergence of Modernity. The Transatlantic Slave Trade, the slave system based on race and then colonization, is a history associated with suffering, a complex transnational past, the sharing of which is still problematic, a legacy that no one wishes to accept, but which still impact social relations. The capacity to perform, to cope with the contribution of each one, to transmit know-how has been deployed in the Caribbean societies with and against the systems of oppression, as a form of resistance and survival, an essential vital resource from a practical and symbolic point of view. Long ago rejected from the normative space of the heritage, these legagy incorporate perceptions that are incompatible with the definitions and the fixed treatment methods of the institutional heritage articulated around the material productions. The Caribbean poetic and intellectual discourse from the years 1960-1970 was forged in a double dynamic, associating the critical deconstruction of the instituted order initiated by the first generation with an imaginary of the common space inspired by the will to revalorize the heritages, their creativity and the ability of Men to reinvent the imaginations of the world based on the Relation. This Caribbean project is here read as the proposal of a creative heritage break linked to the maling of a territory in breach with the superposition-fusion of the political, physical and cultural space imposed by the prism of the national imagination. This thesis takes as its starting point the traces of these relational dimensions in which historical constructions, multiple trajectories and territorialities intervene, and then tries to bring to light the naturalized paradigms, the inheritances and the contemporary constraints which participate in this heritage impediment which is not unrelated to conflicts arising from the treatment of the past in public space. The last movement puts this research in perspective of the observation of effective projects: the digital libraries of the Caribbean. The author analyzes the methods of construction, questions the individual and collective contexts and the multiple territorialities that intervene in these ultimate heterotopies of the Caribbean, manifestations of the Caribbean utopia. This observation makes it possible to measure the obstacles of all kinds facing actors engaged in projects that aim to shape or reveal relations between territories that are both distinct and connected and to treat the heritage both as traces of the past and as a living, dynamic phenomenon, constantly enriched by contemporary experiences
Masmoudi, Souha. "Malleable privacy-enhancing-technologies for privacy-preserving identity management systems". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS023.
Pełny tekst źródłaDigital identities are, nowadays, used at a large scale (i.e., in public services, social medias, at work, online shopping, etc.). This brings usability issues as users are constrained to deal with multiple identities and attributes for access control and data sharing objectives. In addition, security and privacy challenges have arisen as the interacting entities, those that issue, process and collect these identities can, due to their behavior or security deficiencies, lead to identity theft, massive data collection and tracking of users' behaviors on the Internet.This thesis aims at finding the best trade-off between security, privacy and usability for identity management systems, based on cryptographic primitives. The first two contributions focus on identity management for access control and consider real identities and attributes that contain personal (e.g., age) and sensitive (e.g., biometric traits) information.The first contribution proposes a user-centric and privacy-preserving identity management system in which users keep control over their attributes. A user, that receives attributes certified by an identity provider, is able to interact, in a pseudonymized manner, with a service provider and prove the authenticity of the provided attributes while ensuring that he discloses only the minimum number of attributes. This solution is based on a new malleable signature scheme that allows users to modify the certificate issued by the identity provider on his attributes in a restricted and controlled manner. It also preserves privacy by satisfying the unlinkability property between curious service providers that try to link different transactions to the same user.The second contribution presents a new biometric authentication scheme that offers robustness and privacy guarantees. Three steps are required. First, the user physically visits the identity provider that pushes an encrypted and certified biometric template onto his smartphone. Then he remotely enrolls at a service provider, in an anonymous manner. Finally, he authenticates offline to the service provider that captures a new biometric template in order to be locally verified via the smartphone. By relying on malleable signatures, the proposed solution prevents the use of fake biometric identities and guarantees the authentication soundness. Unlinkability and anonymity are also preserved.The third contribution provides a solution to meet the need of data sharing in an identity management system. In particular, it studies the management of users ephemeral attributes in the context of proximity tracing for e-healthcare systems. The proposed solution ensures data consistency and integrity and preserves the privacy of users who share their contact information with people in proximity. Alerts are issued to users who have been in contact with infected persons. The use of a hybrid architecture, which relies on a centralized server and decentralized proxies, allows to prevent malicious users from injecting false alerts, and to prevent the linkability of contact information to the same user and the re-identification of users involved in contact with an infected person
Marillonnet, Paul. "La gestion des données personnelles par l'usager au sein des collectivités locales". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS011.
Pełny tekst źródłaThis Ph.D. addresses the user-centric management of Personally Identifiable Information (PII) within local collectivities. It has been realized as part of a CIFRE program between SAMOVAR and Entr’ouvert. There is a strong need to provide the users of the collectivities' online service with some PII management tools for respecting their privacy when submitting online requests to their collectivities. This need is also coupled with the challenges of free software (including open access to the code, and possibility to evaluate the software's security), which is part of Entr’ouvert’s philosophy. For illustration, a realistic use case is identified for the specific context of territorial collectivities and the public administration (TCPA). It enables to establish a list of useful functional requirements, and a set of users capabilities regarding the management of their own PII. The first contribution is about a technical comparative survey of academic and industrial solutions. This survey identifies thirteen solutions belonging to four different categories, and evaluates them according to eighteen functional criteria. Eventually, the survey provides per-category synthesis and identifies an optimal solution for our use case. The second contribution proposes a solution for supporting PII management, which respects the guidelines identified earlier as part of the survey's optimal solution. It also takes into consideration the PII retrieval from third-party sources. The solution, called the PII manager, operates thanks to its three main components: [i] the Source Backend (SB), [ii] the PII Query Interface (PQI) and [iii] the PII Management User Interface (PMUI). A detailed description of each of these three components is given in the manuscript. Additionally, the user-identifier mapping performed by the PQI is identified as a critical part of the solution. It requires security considerations, as failing to verify the consistency of this mapping can enable four types of attacks. The third contribution proposes an identity-matching solution to counteract the previously identified attacks. Indeed, there is a need to verify the validity of user identity information retrieved across several PII sources. This identity-matching solution requires to identify which components of the architecture is involved in that processing, the workflow across these components to support the full processing, and to perform a security analysis of the workflow that proves its strength against identified attempted attacks. The fourth contribution is the software validation of the proposed solutions through a proof of concept. The identity-matching solution is implemented thanks to the Django template filters and Entr’ouvert’s existing User-Relationship Management (URM) tool. The PII manager is also implemented as a new component to the existing software platform. Eventually, new perspectives are drawn. For instance, this research work could benefit from upcoming protocols such as the Grant Negotiation & Authorization Protocol (GNAP). Other new perspectives include the integration of the System for Cross-domain Identity Management (SCIM) into the platform and a larger-scale software validation
Randimbiarisoa, Ravaka. "Les fans de marques et les réseaux sociaux numériques : approche par le concept d'identité sociale". Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM5902.
Pełny tekst źródłaThe spread of the Internet and the simultaneous development of Web 2.0 have led to the emergence of a digital presence for internet users which is an extension of the identities of the Internet users. In the Internet, identity is characterized by various highly patterns of self-expression on the social networks websites and on Facebook in particular. Simultaneously, the emancipation of the individual from traditional social frameworks leads that individual to construct and re-shape his or her identity which is now seen as a process of identity construction based on a search for benchmarks and relationships. The results show that in the context of brand - fan interactions, social networks websites allow new spaces for individual and collective expression that are implementing unprecedented social groups and coconstruction process. By relating distant fans, the multiplication of such links creates a social identity that can be described as "digital" and a particular form of digital capital. Through their interactions, the fans contribute to the maintenance of this capital. Fan pages and become a shared social territory, a space for co-building and their identity but also a place of confrontation identity for the fans. Depending on the brand they are fans, individuals have tendencies to intra- groupal or intergroupal comparisons
Vincent, Johann. "Identité numérique en contexte Télécom". Phd thesis, Université de Caen, 2013. http://tel.archives-ouvertes.fr/tel-01007682.
Pełny tekst źródłaHoward, Nouara. "La reconnaissance constitutionnelle d'un droit à la protection de l'identité numérique". Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0201.
Pełny tekst źródłaWith the lightening development ouf World wide web, the violations and abuses against datas about citizen’s digital identity are threatens due to insufficient legislativs provisions and légal textile outdated. That’s why this study supports the thesis that the légitimity of constitutionnal protection of a rigotte of digital identity which it will be considered the fundments, the outlines but also the limits
Dufour, Baïdouri Armelle. "L'identité numérique : un levier d'innovation pour les marques ?" Thesis, Paris 2, 2013. http://www.theses.fr/2013PA020057/document.
Pełny tekst źródłaThe spread of the Internet and the simultaneous development of Web 2.0 together with the advent of digital social networks (DSN) have led to the emergence of a digital presence for internet users: digital identity (DI). Consisting of a superposition of identities born from personal, declarative and behavioral data, this new form of identity is characterized by various highly patterns of self-expression on the DSN and in particular on Facebook. Simultaneously, the emancipation of the individual from traditional social frameworks leads that individual to construct and re-shape his or her identity which is now seen as a process of identity construction (IC) based on a search for benchmarks and relationships. These new identity issues lead to a modification in the relationship between IC and consumption. Indeed, this modification appears to have a major effect on IC through the self-image (or images) consumers are able to project. These changes are forcing companies to rethink the branding strategies they laid down back in the 50s. These strategies, focusing on the quest for consumer’s attention, endeavor to set up personalized rapports and create content that generates interaction with their targets. To this end, through its characteristics and in all its forms, DI could very well open the path to new ways of brand presence being taken into account. In the light of three theoretical proposals, DI is considered as being central to brand innovation perspectives; qualitative and quantitative analysis of data collected from young adults resulted in three theoretical contributions related to the IC modes of the contemporary individual and to three managerial input on the development of new strategies for communication on the Internet
Perez, Charles. "Approche comportementale pour la sécurisation des utilisateurs de réseaux sociaux numériques mobiles". Thesis, Troyes, 2014. http://www.theses.fr/2014TROY0019/document.
Pełny tekst źródłaOur society is facing many changes in the way it communicates. The emergence of mobile terminals alongside digital social networks allows information to be shared from almost anywhere with the option of all parties being connected simultaneously. The growing use of smartphones and digital social networks in a professional context presents an opportunity, but it also exposes businesses and users to many threats, such as leakage of sensitive information, spamming, illegal access to personal data, etc.Although a significant increase in malicious activities on social platforms can be observed, currently there is no solution that ensures a completely controlled usage of digital social networks. This work aims to make a major contribution in this area through the implementation of a methodology (SPOTLIGHT) that not only uses the behaviour of profiles for evaluation purposes, but also to protect the user. This methodology relies on the assumption that smartphones, which are closely related to their owners, store and memorise traces of activity (interactions) that can be used to better protect the user online.This approach is implemented in a mobile prototype called SPOTLIGHT 1.0, which analyses traces stored in users’ smartphone to help them make the right decisions to protect their data
Akoury, Paula. "Les pratiques culturelles des Libanais à l'ère numérique : une question d'identité". Thesis, Paris, EHESS, 2017. http://www.theses.fr/2017EHES0154.
Pełny tekst źródłaStarting from the question : what cultural matters do Lebanese people use in their free time ? This PhD thesis relies on the idea of the existence of a relationship between the structure of society and cultural practices, developed by Pierre Bourdieu in the theory of cultural legitimacy. The hybrid structure of society, a concept borrowed from Melhem Chaoul, constitutes the specificity of the Lebanese context : the existence of a francophone, multicultural and provided with a large diaspora country, as well as the contemporary diffusion of digital practices, raise questions related to the definition of cultural identity. Promoting the concept of « degree of cultural adhesion » seems necessary in order to find an answer. Based on a survey of 1,200 respondents in Lebanon, 120 respondents in France and 36 in depth interviews, the study shows that young people, as opposed to the older ones, tend most towards Western culture and digital practices. The most educated people consume both Lebanese and Western cultural goods simultaneously. As a matter of fact, the consumption of Western cultural goods is facilitated by trilingualism, which is mastered by almost half of the Lebanese. Additionally it has been shown that the regional inequality of the cultural offer is not homologous to a regional inequality of cultural practices. Religious commitment as well as the position in the life cycle impact cultural practices
Książki na temat "Identités numériques"
préface de Jacques Perriault Coordonné par Alexandre Coutant et Thomas Stenger. Identités numériques. Paris: Editions L'Harmattan, 2013.
Znajdź pełny tekst źródłaIdentité numérique: Roman. Paris: Fallois, 2011.
Znajdź pełny tekst źródłaIteanu, Olivier. L'identité numérique en question: [10 scénarios pour la maîtrise juridique de son identité sur Internet]. Paris: Eyrolles, 2008.
Znajdź pełny tekst źródłaLes liaisons numériques: Vers une nouvelle sociabilité? Paris: Éd. du Seuil, 2010.
Znajdź pełny tekst źródłaRace, sex, and identity online. New York: Pearson Custom Pub., 2009.
Znajdź pełny tekst źródłaStories and social media: Identities and interaction. New York: Routledge, 2012.
Znajdź pełny tekst źródłaM, Gallagher Ann, i Kaufman James C, red. Gender differences in mathematics: An integrative psychological approach. Cambridge, U.K: Cambridge University Press, 2005.
Znajdź pełny tekst źródłaFourmentraux, Jean-Paul, red. Identités numériques. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20352.
Pełny tekst źródłaBouzefrane, Samia, i Maryline Laurent-Maknavicius. Gestion des Identités Numériques. ISTE Editions Ltd., 2015.
Znajdź pełny tekst źródłaPloeg, Irma van der, i Jason Pridmore. Digitizing Identities. Taylor & Francis Group, 2020.
Znajdź pełny tekst źródłaCzęści książek na temat "Identités numériques"
Fourmentraux, Jean-Paul. "Présentation générale. Identités et liaisons numériques". W Identités numériques, 9–23. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20358.
Pełny tekst źródła"(Dé)jouer les identités numériques : Net art et médiactivisme". W Identités numériques, 25–32. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20361.
Pełny tekst źródłaDoueihi, Milad. "L’identité à l’ère des Digital Humanities". W Identités numériques, 33–52. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20364.
Pełny tekst źródłaCoutant, Alexandre. "Des techniques de soi ambivalentes". W Identités numériques, 53–65. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20370.
Pełny tekst źródłaParmentier, Marc. "Philosophie des sites de rencontres". W Identités numériques, 67–80. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20373.
Pełny tekst źródłaBeau, Frank. "Une figure du double numérique : l’avatar". W Identités numériques, 81–96. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20379.
Pełny tekst źródłaCardon, Dominique. "L’identité comme stratégie relationnelle". W Identités numériques, 97–106. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20385.
Pełny tekst źródłaLivingstone, Sonia, Giovanna Mascheroni i Maria Francesca Murru. "Utilisation des réseaux socionumériques par les jeunes Européens". W Identités numériques, 107–25. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20388.
Pełny tekst źródłaPerriault, Jacques. "Géolocalisation et incertitude". W Identités numériques, 127–31. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20397.
Pełny tekst źródłaMerzeau, Louise. "Du signe à la trace : l’information sur mesure". W Identités numériques, 133–50. CNRS Éditions, 2015. http://dx.doi.org/10.4000/books.editionscnrs.20400.
Pełny tekst źródłaRaporty organizacyjne na temat "Identités numériques"
Gariépy, Félix, Benoit Dupont, Céline Castets-Renard, Hugo Loiseau, Lyse Langlois, Nadia Tawbi, Pierre-Martin Tardif, Sébastien Gambs i Steve Jacob. Guide sur les conditions et bonnes pratiques pour la mise en place d’une identité numérique nationale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, luty 2024. http://dx.doi.org/10.61737/afqc2028.
Pełny tekst źródłaRousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, grudzień 2022. http://dx.doi.org/10.54932/wodt6646.
Pełny tekst źródłaLanglois, Lyse, Réjean Roy, Guillaume Macaux, Eve Gaumond, Céline Castets-Renard, Pierre-Luc Déziel, Benoit Dupont i in. Analyse sur l’application de notification de contacts COVI et commentaires de l’équipe de Mila. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, czerwiec 2020. http://dx.doi.org/10.61737/fxut5417.
Pełny tekst źródła