Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
Author, Corporation
Subjects(RVK)
  • 1
    ISBN: 3540884807
    Language: English
    Pages: Online Ressource (14639 KB, 514 S.)
    Edition: 1. Aufl.
    Edition: Online-Ausg. 2011 Electronic reproduction; Available via World Wide Web
    Parallel Title: Erscheint auch als The Future of Identity in the Information Society : Challenges and Opportunities
    DDC: 303.483
    RVK:
    Keywords: Data protection ; Identity theft Prevention ; Information society ; Privacy, Right of
    Abstract: Digitising personal information is changing our ways of identifying persons and managing relations, e.g. over the Internet. What used to be a `natural` identity, e.g. the personal appearance of an individual at a counter, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents answers from the EU funded research project FIDIS (Future of Identity in the Information Society), a multidisciplinary endeavor of 24 leading institutions from research, government, and industry. Research from states with different cultures on e.g. the identification of citizens and ID cards is combined towards a well-founded analysis of HighTechIDs and Virtual Identities, considering aspects, such as privacy, mobility, interoperability, profiling, forensics, and identity related crime. `FIDIS has put Europe on the global map as a place for high quality identity management research.` Viviane Reding, Member of the European Commission, Responsible for Information Society and Media
    Description / Table of Contents: CONTENTS; 1 Introduction; 1.1 Identity in a Changing World; 1.2 The Role of FIDIS; 1.3 On This Book; VIGNETTE 1: PUTTING THE MACHINES IN CONTROL; 2 Identity of Identity; 2.1 Defining the Identity Concept; 2.2 Conceptualisation; 2.3 Identity of Identity Defined (Formal Conceptualisation); 2.4 Identity Use Cases and Scenarios; 2.5 Making Use of the New (Web 2.0) Participatory Tools; 2.6 Conclusion and Outlooks; References; Appendix: Table of FIDIS Web 2.0 Initiatives; VIGNETTE 2: VIRTUALLY LIVING IN VIRTUAL REALITIES; 3 Virtual Persons and Identities; 3.1 Modelling New Forms of Identities
    Description / Table of Contents: 3.2 Pseudonyms in the Light of Virtual Persons3.3 Virtual Persons and the Law; 3.4 Trust in the Light of Virtual Persons; References; VIGNETTE 3: USE AND ABUSE OF BIOMETRIC DATA AND SOCIAL NETWORKS; 4 High-Tech ID and Emerging Technologies; 4.1 Identity Management and Identity Management Systems; 4.2 Technologies and Technical Components; 4.3 Supporting Technologies; 4.4 Emerging Technologies; 4.5 Use Cases; 4.6 Summary and Conclusions; References; VIGNETTE 4: POWERING THE PROFILE: PLUGGING INTO THE MOBILE GRID; 5 Mobility and Identity
    Description / Table of Contents: 5.1 GSM - How Mobile Communication Achieved Its Special Role inIdentity Management5.2 Mobile Identities - Context Added; 5.3 The FIDIS Perspectives on Mobility and Identity; 5.4 Technological Aspects; 5.5 Legal Aspects; 5.6 Sociological Aspects; 5.7 Economic Aspects; 5.8 Requirements for Mobile Identity Management Systems; 5.9 Outlook and Further Challenges and Questions; References; VIGNETTE 5: HUMAN ENHANCEMENT, ROBOTS, AND THE FIGHT FOR HUMAN RIGHTS; 6 Approaching Interoperability for IdentityManagement Systems; 6.1 Introduction
    Description / Table of Contents: 6.2 Interoperable Identity Management Systems: Definitions andFramework6.3 Stakeholders Perspectives on Interoperable iDMS; 6.4 Conclusion; References; Appendix: Experts; VIGNETTE 6: MORE CONTROL FOR THE MACHINES; 7 Profiling and AmI; 7.1 Profiling: Definitions, Applications and Risks; 7.2 Profiling Technologies as the Enabling Technology for AmI; 7.3 When Idem Meets Ipse: The Identity of the European Citizen; 7.4 A Vision of Ambient Law; 7.5 Conclusions; References; VIGNETTE 7: THE ROLE OF FORENSICS IN IDENTITY; 8 Identity-Related Crime and Forensics; 8.1 Introduction
    Description / Table of Contents: 8.2 Identity-Related Crime8.3 Forensic Implications; 8.4 Forensic Profiling; 8.5 Conclusion; Reference; VIGNETTE 8: DATING; 9 Privacy and Identity; 9.1 Introduction; 9.2 Privacy Aware Concepts for ID Numbers; 9.3 Privacy Primitives and Applications; 9.4 Privacy with Delegation of Personal Data; 9.5 Towards Transparency; References; 10 Open Challenges - Towards the (Not So Distant) Future of Identity; 10.1 Identity Reference Architectures; 10.2 Identity Management and Privacy; 10.3 Identity Management and Multilateral Security; 10.4 Identity in the Internet of Things
    Description / Table of Contents: Appendix A. List of Deliverables
    Note: Includes bibliographical references , Electronic reproduction; Available via World Wide Web
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...