Identity in the Information Society

http://link.springer.com/journal/12394

List of Papers (Total 77)

A whole new... you? ‘Personal identity’, emerging technologies and the law

In this article, I argue that lawmakers must abandon their previous reluctance to engage with questions of personal identity (PI). While frequently seen as an esoteric subject, of limited interest outside of academic philosophy departments, I attempt to show that, in fact, assumptions about PI—and its durability in the face of certain psychological or genetic changes—underpin many ...

“The Map of the Mexican’s Genome”: overlapping national identity, and population genomics

This paper explores the intersections between national identity and the production of medical/population genomics in Mexico. The ongoing efforts to construct a Haplotype Map of Mexican genetic diversity offers a unique opportunity to illustrate and analyze the exchange between the historic-political narratives of nationalism, and the material culture of genomic science. Haplotypes ...

Genetic information: Important but not “exceptional”

Much legislation dealing with the uses of genetic information could be criticised for exceptionalising genetic information over other types of information personal to the individual. This paper contends that genetic exceptionalism clouds the issues, and precludes any real debate about the appropriate uses of genetic information. An alternative to “genetically exceptionalist” ...

Public sector engagement with online identity management

The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The ...

Reflexive marketing: the cultural circuit of loyalty programs

The amount of personal data now collected through contemporary marketing practices is indicative of the shifting landscape of contemporary capitalism. Loyalty programs can be seen as one exemplar of this, using the ‘add-ons’ of ‘points’ and ‘miles’ to entice consumers into divulging a range of personal information. These consumers are subject to surveillance practices that have ...

A persistent data tracking mechanism for user-centric identity governance

Identity governance is an emerging concept for fine-grained conditional disclosure of identity information and enforcement of corresponding data handling policies. Although numerous technologies underlying identity management have been developed, people still have difficulty obtaining a clear picture of how their identity information is maintained, used, and propagated. An identity ...

PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm

“Privacy as confidentiality” has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim ...

The Panopticon reaches within: how digital technology turns us inside out

The convergence of biomedical and information technology holds the potential to alter the discourses of identity, or as is argued here, to turn us inside out. The advent of digital networks makes it possible to ‘see inside’ people in ways not anticipated and thus create new performance arenas for the expression of identity. Drawing on the ideas of Butler and Foucault and theories ...

A framework for the lived experience of identity

This paper presents a framework for the design of human-centric identity management systems. Whilst many identity systems over the past few years have been labelled as human-centred, we argue that the term has been appropriated by technologists to claim moral superiority of their products, and by system owners who confuse administrative convenience with benefits for users. The ...

Towards inclusive identity management

The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements of modern identity management systems. The rationale for the traditional design of identity management systems and ...

Did you just say what I think you said? Talking about genes, identity and information

Genetic information is becoming increasingly used in modern life, extending beyond medicine to familial history, forensics and more. Following this expansion of use, the effect of genetic information on people’s identity and ultimately people’s quality of life is being explored in a host of different disciplines. While a multidisciplinary approach is commendable and necessary, ...

The rhetoric appeal to identity on websites of companies offering non-health-related DNA testing

During the last few years a large number of companies have emerged offering DNA testing via the Internet “direct-to-consumer”. In this paper, I analyse the rhetoric appeal to personal identity put forward on the websites of some of these consumer genomics companies. The investigation is limited to non-health-related DNA testing and focuses on individualistic and communitarian—in a ...

Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design

Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. ...

A pragmatic approach to privacy risk optimization: privacy by design for business practices

This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk ...

SmartData: Make the data “think” for itself

SmartData is a research program to develop web-based intelligent agents that will perform two tasks: securely store an individual’s personal and/or proprietary data, and protect the privacy and security of the data by only disclosing it in accordance with instructions authorized by the data subject. The vision consists of a web-based SmartData agent that would serve as an ...

Layering privacy on operating systems, social networks, and other platforms by design

Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context ...

SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation

The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ...

Extending the value chain to incorporate privacy by design principles

Morgan et al. (2009) examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, ...

Trust and privacy in the future internet—a research perspective

With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for ...

Privacy by design: delivering the promises

An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design: The Definitive Workshop. This presentation looks back at the origins of Privacy by Design, notably the publication of the first report on “Privacy Enhancing Technologies” by a joint team of the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data ...

Privacy by Design: essential for organizational accountability and strong business practices

An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the ...

Privacy by Design

In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems when ...