Identity in the Information Society

http://link.springer.com/journal/12394

List of Papers (Total 77)

A whole new... you? ‘Personal identity’, emerging technologies and the law

In this article, I argue that lawmakers must abandon their previous reluctance to engage with questions of personal identity (PI). While frequently seen as an esoteric subject, of limited interest outside of academic philosophy departments, I attempt to show that, in fact, assumptions about PI—and its durability in the face of certain psychological or genetic changes—underpin...

“The Map of the Mexican’s Genome”: overlapping national identity, and population genomics

This paper explores the intersections between national identity and the production of medical/population genomics in Mexico. The ongoing efforts to construct a Haplotype Map of Mexican genetic diversity offers a unique opportunity to illustrate and analyze the exchange between the historic-political narratives of nationalism, and the material culture of genomic science...

Genetic information: Important but not “exceptional”

Much legislation dealing with the uses of genetic information could be criticised for exceptionalising genetic information over other types of information personal to the individual. This paper contends that genetic exceptionalism clouds the issues, and precludes any real debate about the appropriate uses of genetic information. An alternative to “genetically exceptionalist...

Public sector engagement with online identity management

The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The...

Reflexive marketing: the cultural circuit of loyalty programs

The amount of personal data now collected through contemporary marketing practices is indicative of the shifting landscape of contemporary capitalism. Loyalty programs can be seen as one exemplar of this, using the ‘add-ons’ of ‘points’ and ‘miles’ to entice consumers into divulging a range of personal information. These consumers are subject to surveillance practices that have...

A persistent data tracking mechanism for user-centric identity governance

Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An...

PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm

“Privacy as confidentiality” has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim...

A framework for the lived experience of identity

This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The...

Towards inclusive identity management

The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and...

Did you just say what I think you said? Talking about genes, identity and information

Genetic information is becoming increasingly used in modern life, extending beyond medicine to familial history, forensics and more. Following this expansion of use, the effect of genetic information on people’s identity and ultimately people’s quality of life is being explored in a host of different disciplines. While a multidisciplinary approach is commendable and necessary...

The rhetoric appeal to identity on websites of companies offering non-health-related DNA testing

During the last few years a large number of companies have emerged offering DNA testing via the Internet “direct-to-consumer”. In this paper, I analyse the rhetoric appeal to personal identity put forward on the websites of some of these consumer genomics companies. The investigation is limited to non-health-related DNA testing and focuses on individualistic and communitarian—in...

A pragmatic approach to privacy risk optimization: privacy by design for business practices

This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk...

Layering privacy on operating systems, social networks, and other platforms by design

Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal...

SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation

The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and...

Extending the value chain to incorporate privacy by design principles

Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems...

Privacy by Design: essential for organizational accountability and strong business practices

An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the...

Privacy by Design

In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems...

Built-in privacy—no panacea, but a necessary condition for effective privacy protection

Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin...

Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries

This paper introduces the objectives and basic approach of a collaborative comparative research project on the introduction of national electronic Identity Management Systems (eIDMS) in Member States of the European Union. Altogether eight country case studies have been produced in two waves by researchers in the respective countries, which will be presented in the following...

The Austrian case: multi-card concept and the relationship between citizen ID and social security cards

National electronic identity (e-ID) card schemes and electronic identity management systems (e-IDMS) in Europe are characterised by considerable diversity. This contribution analyses the creation of a national e-IDMS in Austria with the aim of improving our understanding of the reasons behind the genesis of particular designs of national e-IDMS. It seeks to explain how the system...

The Belgian e-ID and its complex path to implementation and innovational change

This article provides a critical view on the development and deployment phase of the e-ID in Belgium since 1999. It is based on extensive desk research and fifteen in depth-interviews with experts and stakeholders from government, administration, academia and industry who have been key in the development of the e-ID. The article identifies different elements that influenced, both...