Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Identification

Management and Inter/Intra Organizational Relationships in the Textile and Apparel Industry
Process through which someone recognise to be similar to another one because they have the same beliefs, purposes, desires, ways of life, etc.
Published in Chapter:
Analysis of the Approach to Online Advertising of Leading Sportswear Brands
Álvaro Jiménez Sánchez (Technical University of Ambato, Ecuador), Eliza Carolina Vayas Ruiz (Technical University of Ambato, Ecuador), Víctor Hugo Guachimbosa Villalba (Technical University of Ambato, Ecuador), and María Rosa Frontera Sánchez (Universidad Tecnológica Indoamérica, Ecuador)
DOI: 10.4018/978-1-7998-1859-5.ch011
Abstract
Brands like Nike or Adidas are predominant in almost every country. One of the keys of their success is due to the investment in advertisement and to their different strategies of promotion. This research analyzed 117 ads of five important sports brands (Nike, Adidas, Puma, Reebok, and Converse) with the higher number of views in YouTube. Within the numerous variables, the study of the main important characters, the duration of the advertising, the year or decade of creation, the presence of violence, the context or environment where they were developed, the gender that is predominant (masculine or feminine), or the character's age stand out. The results showed that women still have a secondary role in sport advertisement and that younger and celebrities have the leading role, especially in the football scope, in the majority of the observed videos. It is concluded that brands are increasingly stand up for the feminine public and gradually are spreading out in the search of new market niches in order to keep innovation in promoting youth trends with this sport brands as promoters.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Face Recognition in Unconstrained Environment
Process of retrieving identity by one to many (1 to M) matching of an unknown biometric profile against a set of known profiles.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
As You Like It: What Media Psychology Can Tell Us About Educational Game Design
Identification is a psychological process that allows media users/players to feel like they experience the same like the media/game character they identify with.
Full Text Chapter Download: US $37.50 Add to Cart
Avatars: Portraying, Exploring, and Changing Online and Offline Identities
The process in which an individual relates to a model (e.g., an avatar) and feels that s/he is similar to the model, which may yield social influence and imitation of the model.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Security Using Face Recognition
In identification mode of biometric system, the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual.
Full Text Chapter Download: US $37.50 Add to Cart
Using Technology to Overcome the Password's Contradiction
It’s the process of discovering the identity of the user that tries to gain access to a system. It’s differs from authentication because in the identification process no identity is proposed to the system, while in authentication an identity is proposed and the system will only verify if that identity is plausible.
Full Text Chapter Download: US $37.50 Add to Cart
Road Map to Information Security Management
Identification is a mechanism by which the system asks the user, “Who are you?” user identifies himself or herself to the system by a user name or user number in the computer system.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Swarm Robotics
Sometimes called entity authentication , identification is a security service that identifies specific entities in isolation from any other activity the entity may want to perform.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Methods for Computer Systems Security
The activity of users who supply information to identify themselves, such as name, user name, and user ID.
Full Text Chapter Download: US $37.50 Add to Cart
Exploring New Handwriting Parameters for Writer Identification
The determination of the identity of a person, by a biometric system.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Trust in a Global Research Infrastructure
“Establishing that a given name of an individual or organization corresponds to a real-world identity of an individual or organization, and establishing that an individual or organization applying for or seeking access to something under that name is, in fact, the named individual or organization” (Chokhani, S., et al, 2003, section 2.) As an example, consider an application for a passport: if you have had one before, it may be sufficient to show it; otherwise a documented process is used to verify your name and the likeness of a recent photo. (Once the passport is issued, another process needs to ensure that it is delivered to you, the applicant.) An example of the second half of the definition is if you pick up a package (in your name) at the post office, and use the passport to prove that you are the person to whom the package is addressed.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Practices from Passwords to Biometrics
The activity of users who supply information to identify themselves, such as name, username, and user ID.
Full Text Chapter Download: US $37.50 Add to Cart
Human Ear Recognition System
In the identification mode, an individual recognizes by searching template of all the users in the database for a match. Hence a system conducts a one -to- many comparisons to establish an individual’s identity.
Full Text Chapter Download: US $37.50 Add to Cart
Using Student Profiles to Identify for Gifted and Talented Services
The systematic practice of determining student eligibility for gifted and talented services.
Full Text Chapter Download: US $37.50 Add to Cart
Newborn Recognition Using Multimodal Biometric
The process of trying to find out a person’s identity by comparing the person who is present against a biometric pattern/template database.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing a Sound Public Information Security Program
Identification is the process that enables the recognition of an entity (subject or object) by a computer system, generally by the use of unique machine-readable user names.
Full Text Chapter Download: US $37.50 Add to Cart
Search Space Reduction in Biometric Databases: A Review
The process of recognizing a user by comparing the captured biometric data with every individual biometric sample in the system.
Full Text Chapter Download: US $37.50 Add to Cart
Applications of Keystroke Dynamics Biometrics in Online Learning Environments: A Selective Study
The biometric system process in which a person can be identified by performing a one-to-many (1:n) search against the entire enrolled population.
Full Text Chapter Download: US $37.50 Add to Cart
Assessment of Students With Disabilities in the UAE Toward Thriving in Inclusive Classrooms: Reality and Vision
The process of judging or evaluating in relation to a standard or set of diagnostic criteria.
Full Text Chapter Download: US $37.50 Add to Cart
Comparison of Control Strategies by the Example of the Cooling Fan Control of a Mobile Machine
The process to model a plant by either pure mathematical methods or a combination of physical and mathematical methods.
Full Text Chapter Download: US $37.50 Add to Cart
Biometrics in Cloud Computing
Biometrics identification is used as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometrics identifiers are the distinctive, measurable characteristics used to label and describe individuals. Hair colour and height of a person are the simple examples of biometric information, but for identification purposes hair colour and height are not very useful, because those are change relatively rapidly (hair colour is changed by sunshine or by age and height of a person is varies in day by day).
Full Text Chapter Download: US $37.50 Add to Cart
Keystroke Dynamics and Graphical Authentication Systems
It is the process of discovering the identity of a user who tries to gain access to a system. It differs from authentication because in the identification process, no identity is proposed to the system, while in authentication, an identity is proposed and the system will only verify if that identity is plausible.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Brain Prints for Biometrics
A procedure to identify a user’s identity from a pool of users.
Full Text Chapter Download: US $37.50 Add to Cart
Behavioral Based Technologies for Enhancement of Login/Password Systems
The process of discovering the identity of the user that tries to gain access to a system. It’s differs from authentication because in the identification process no identity is proposed to the system, while in authentication an identity is proposed and the system will only verify if that identity is plausible.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Data in the EU (Reformed) Data Protection Framework and Border Management: A Step Forward or an Unsatisfactory Move?
Identification refers to the one-to-many process whereby the system compares the captured template with all the available templates to determine the individual’s identity.
Full Text Chapter Download: US $37.50 Add to Cart
Recognizing and Developing STEM Talent Among Diverse Populations
Process of identifying students who would benefit from programming or services designed to develop their gifts and talents.
Full Text Chapter Download: US $37.50 Add to Cart
Gifted and Talented Programming: A Continuum of Services
The methodical practice of determining student eligibility for gifted and talented services.
Full Text Chapter Download: US $37.50 Add to Cart
Requirements and Life Cycle Model-Based Assessment of NPP I&C Systems Cyber Security and Safety
The process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
Full Text Chapter Download: US $37.50 Add to Cart
Revealing New Hidden Curriculum and Pedagogy of Digital Games
Identification is an unconscious mental process, by which someone makes part of their personality conform to the personality of another who serves as a model.
Full Text Chapter Download: US $37.50 Add to Cart
An Interoperable Cross-Context Architecture to Manage Distributed Personal E-Health Information
Identification is the process of using claimed or observed attributes of an entity to deduce who the entity is. The term identification is also referred to as entity authentication. The identification of an entity within a certain context enables another entity to distinguish between the entities it interacts with.
Full Text Chapter Download: US $37.50 Add to Cart
Character Attachment in Games as Moderator for Learning
The act of putting oneself in the shoes of an “other,” and containing four dimensions—empathy, perspective taking, internalization of goals, and loss of self.
Full Text Chapter Download: US $37.50 Add to Cart
An Examination of Standardized Product Identification and Business Benefit
The GS1 numbering system that is commonly used for products, the GTIN and SGTIN – the global trade item number and the serialised version respectively. Both variants can be represented in GS1 data carriers.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR