2010
DOI: 10.1007/s12394-010-0052-0
|View full text |Cite
|
Sign up to set email alerts
|

Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries

Abstract: This paper introduces the objectives and basic approach of a collaborative comparative research project on

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(27 citation statements)
references
References 20 publications
0
27
0
Order By: Relevance
“…E-IDs have been studied from many perspectives, including technological decision [45], trust and public value [40], surveillance [23], security [46], historical evolution [14], legal framework [22], innovation process [19,20], market governance [10], and life cycle [26]. In this body of research a variety of theories -such as innovation [19,20] and boundary object [13] theories -and methods -such as case studies [13,14], and surveys [40] -have been applied.…”
Section: Electronic Identification (E-id)mentioning
confidence: 99%
“…E-IDs have been studied from many perspectives, including technological decision [45], trust and public value [40], surveillance [23], security [46], historical evolution [14], legal framework [22], innovation process [19,20], market governance [10], and life cycle [26]. In this body of research a variety of theories -such as innovation [19,20] and boundary object [13] theories -and methods -such as case studies [13,14], and surveys [40] -have been applied.…”
Section: Electronic Identification (E-id)mentioning
confidence: 99%
“…The danger of function creep intensifies in the angle of recent political measures towards extended monitoring of online activity for preventing crime: e.g., European Data Retention Directive 5 , internet content-filtering plans 6 (i.e., against child abuse and copyright offense), or the INDECT project aiming to merge several surveillance technologies (e.g., CCTV, data mining, automatic threat detection) into one intelligent information system 7 .…”
Section: Function Creepmentioning
confidence: 99%
“…Identification is a core function of governments and thus the creation of national e-ID systems implies far reaching transformations with many different aspects involved (e.g., technological, organizational, legal, political) [6], which contribute "to alter the nature of citizenship itself" [7]. Thus, e-ID is more than a device for citizen identification; it becomes a policy instrument.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, in the information society, the protection of personalized data is of great concern and tightly linked to basic human rights, personal privacy, integrity concerns as well as different aspects of security. Moreover, the registration process, when the physical identity of the individual requiring the eID, is often described as a very crucial security parameter (Kubicek, 2010;Kubicek & Noack, 2010b). So, in order for a user's identity to be authenticated for access to a particular (physical or digital) service context, the user (1) presents an identification, the artefact, which shape or form varies depending on the context, physical or digital.…”
Section: On Identity Identification and Authenticationmentioning
confidence: 99%