(redirected from Access Identifier)
AIDAssociation for India's Development
AIDAgency for International Development
AIDArkansas Insurance Department (Little Rock, AR)
AIDAmericans for Informed Democracy
AIDAgricultural and Industrial Development
AIDAmerica in Defense (martial arts)
AIDAcquired Immune Deficiency
AIDArchitecture in Development (Amsterdam, Netherlands)
AIDAuto-Immune Disease
AIDAnimals in Distress (various locations)
AIDAssociazione Italiana Dislessia (Italian: Italian Dyslexia Association)
AIDAlmost Ideal Demand (economic model)
AIDAccess Identifier (SONET)
AIDAlgemene Inspectiedienst (Dutch Governmental Agricultural Intelligence Service)
AIDApplication Identifier
AIDAddress Identifier (Telabs)
AIDAdvertiser Identifier
AIDAutomatic Initiate Descriptor
AIDAdvanced Interactive Debugger
AIDAttention Identifier
AIDAdvanced Input Devices
AIDAdvanced Internet Development
AIDAbsolute Iron Deficiency
AIDArchitectural and Interior Design
AIDAlmyta Inventory Distributor (software)
AIDAssociation Internationale de Développement (French: International Development Association)
AIDAlternative for India Development (Indian development organisation)
AIDAutomatic Incident Detection
AIDAusländer in Deutschland (newspaper)
AIDAnnual Information Document (finance)
AIDArnold Irrigation District (Oregon)
AIDArtificial Insemination Donor
AIDAutomatic Interaction Detector
AIDAmerican Institute of Decorators
AIDAccident Investigation Division (US and Hong Kong)
AIDAudio Intelligence Device
AIDAllergic Inhalant Dermatitis (aka Atopy)
AIDAutomatic in Decomposition (US DoD)
AIDAdvanced Image Direct (Fullerton, CA)
AIDAutomatic Implantable Defibrillator
AIDAudit Information System
AIDArmy Information Digest
AIDArbo Inspectie Dienst (Dutch: Health Inspection Service)
AIDAUTODIN Interface Device
AIDArmy Intelligence Department
AIDArmy Industrial Fund
AIDAuxiliary Input Device (Compaq)
AIDAltered Item Drawing
AIDAll Interactive Distribution (Australia)
AIDApplet Identifier (ISO7816-5)
AIDAcquisition Item Description
AIDAnimal Industries Division
AIDAppendix Irish Draught (horse breed)
AIDAnalog Input Differential
AIDAcquire, Identify, Determine, Shoot (US Air Force)
AIDAir Inlet Damper
AIDAssociation pour l'Innovation Didactique (French: Association for Educational Innovation)
AIDAssess, Improve, Decide
AIDArbitron Information on Demand
AIDAccident, Incident, Deficiency
AIDAttention Interrupt Device
AIDAdvertising Investigation Department
AIDAeronautical Information Distribution
AIDArtificial Intelligence Diagnostics
AIDAircraft Interface Device
AIDAvionics Integrated Development
AIDAerospace Information Division
AIDAccident Identification Display
AIDAmerican Institute of Development
AIDAlphanumeric Information Display
AIDAction Item Disposition
AIDADA Information Description
AIDAuthoring Instructional Materials Program
AIDAircraft Identification/Identifier
AIDAgenzia Internazionale Due
AIDASARS Interface Device
References in periodicals archive ?
With the statistical results it was possible to observe that the construct perceived ease of use of the TAM model has a significant positive influence (p-value <= 0.001) on two information security practices: use of single access identifier per user (mean 4.7) and clear rules of liability for misuse (mean 3.7).
Finally, the TAM construct with the biggest number of significant influences (p-value <= 0.05) on the perception of IS practices was the behavioral intention, having a positive effect on the practices: existence of a single access identifier per user (4.7), reactivation of password by means of a rigorous identification of the user (mean 3.7), and warning to avoid the writing of passwords on paper (mean 3.9); and a negative effect on the practice: special care for the use of mobile computing resources (mean 3.4).
The influence of the behavioral intention on the perception of the practice which provides for the existence of a single access identifier per user was emphasized with the answer to two questions: it I have access to the IS, I intend to use them, in which nearly all users (91.67%) who consider its use highly likely also fully agreed with the application of such practice; and having access to the IS rules, I would expect to use it, in which the majority (95%) of the individuals who affirmed to expect to use the rules also fully agreed with the existence of this practice.
The Geoplex[TM] features dedicated PCs for Net surfing and high-speed data cabling for Internet or home system access - complete with a secure access identifier. It's also a model for the network computing world, where telecommuters can use the latest software straight from the network.