2011
DOI: 10.1007/978-3-642-20769-3_17
|View full text |Cite
|
Sign up to set email alerts
|

The Limits of Control – (Governmental) Identity Management from a Privacy Perspective

Abstract: Abstract. The emergence of identity management indicates that the process of identification has reached a stage where analog and digital environments converge. This is also reflected in the increased efforts of governments to introduce electronic ID systems, aiming at security improvements of public services and unifying identification procedures to contribute to administrative efficiency. Though privacy is an obvious core issue, its role is rather implicit compared to security. Based on this premise, this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 13 publications
0
20
0
Order By: Relevance
“…Most eID systems create the unique identity of a person through the linkage to one or more unique numbers (unique identifiers, UI). Nearly all present eID concepts of EU member states involve generating a unique identification number or resorting to existing public registers with unique numbers (Strauß, 2011). Most European eIDMS utilize UIs derived from national registers (e.g.…”
Section: Electronic Identitymentioning
confidence: 99%
See 1 more Smart Citation
“…Most eID systems create the unique identity of a person through the linkage to one or more unique numbers (unique identifiers, UI). Nearly all present eID concepts of EU member states involve generating a unique identification number or resorting to existing public registers with unique numbers (Strauß, 2011). Most European eIDMS utilize UIs derived from national registers (e.g.…”
Section: Electronic Identitymentioning
confidence: 99%
“…Primary digital identifiers directly connected to a person include, e.g., name, address, mobile phone number, password or eSig (Graux et al, 2009). These identifiers are stored in an encrypted form or -as is the case in Belgium -directly stored on the eID device (Strauß, 2011).…”
Section: Electronic Identitymentioning
confidence: 99%
“…e personal identity data in the eID IdMs has been identif [4], [21]. Some of the reasons were identified during mechanisms used by the system lack transparency ging technologies the EU regulations get obsolete recognition catalyzes ubiquitous adoption of the e y creates a threat to privacy.…”
Section: Ol Over Identity Datamentioning
confidence: 99%
“…Hence, the service personalisation we have seen in recent years in areas such as eGovernment digital services also requires the users to securely declare their identity (Corradini et al, 2006). As described, this need can, in turn, be traced back to being the equivalent of the traditional ways of identification in service relationships where the identity has to be securely established in order for correct and non-reputable service provision (Strauß, 2011). Guided by the notion of having an eID to cover a nation's entire population, an increasing number of countries have developed their own national eID solutions.…”
Section: An Egovernment Enablermentioning
confidence: 99%
“…Anderson, 2006;Hedström et al, 2016;Hedström et al, 2015). Accordingly, both pressures are examples of increasing needs of declaring users identity in a secure way in digital services (Corradini et al, 2006) for non-reputable service provision (Strauß, 2011). The pressures and barriers to negotiate in these cases are therefore some of the new challenges introduced when eIDs are getting increasingly important in organizations (e.g.…”
Section: Characterization Of Pressuresmentioning
confidence: 99%