A roadmap for research on identity in the information society

[1]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[2]  David Lyon,et al.  Surveillance, Power and Everyday Life , 2009 .

[3]  David-Olivier Jaquet-Chiffelle,et al.  A TYPOLOGY OF IDENTITY-RELATED CRIME , 2009 .

[4]  James Backhouse,et al.  Approaching Interoperability for Identity Management Systems , 2009, The Future of Identity in the Information Society.

[5]  Mireille Hildebrandt,et al.  Profiling and the rule of law , 2008 .

[6]  C. N. M. Pounder Nine principles for assessing whether privacy is protected in a surveillance society , 2008 .

[7]  T. Dowty Overlooking children: an experiment with consequences , 2008 .

[8]  John A. Taylor,et al.  Identification practices in government: citizen surveillance and the quest for public service improvement , 2008 .

[9]  James Backhouse,et al.  Security and Privacy Perceptions of E- ID: A Grounded Research , 2008, ECIS.

[10]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[11]  Anders Albrechtslund,et al.  Online Social Networking as Participatory Surveillance , 2008, First Monday.

[12]  Wanda J. Orlikowski,et al.  Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000, Theory in CSCW.

[13]  N. D. Meulen,et al.  D12.7 Identity-related crime in Europe : Big problem or big hype? , 2008 .

[14]  Janni Nielsen,et al.  European Conference on Information Systems (ECIS) , 2008 .

[15]  D. Marron,et al.  ‘Alter Reality’ Governing the Risk of Identity Theft , 2007 .

[16]  Sean Brennan,et al.  The biggest computer programme in the world ever! How's it going? , 2007, J. Inf. Technol..

[17]  Sarah Cotterill,et al.  Transformational Government? The role of information technology in delivering citizen-centric local public services , 2007 .

[18]  Nigel Gilbert,et al.  Dilemmas of privacy and surveillance: chaljenges of technological change , 2007 .

[19]  Benoît Otjacques,et al.  Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing , 2007, J. Manag. Inf. Syst..

[20]  Robin Mansell,et al.  The Oxford Handbook of Information and Communication Technologies , 2007 .

[21]  Richard Clayton,et al.  Children's databases - safety and privacy: a report for the information commissioner , 2007 .

[22]  M. Hildebrandt,et al.  A vision of ambient law , 2007 .

[23]  Ross Anderson,et al.  Under threat: patient confidentiality and NHS computing , 2006 .

[24]  Ross Anderson,et al.  Children's Databases - Safety and Privacy , 2006 .

[25]  Patrick Dunleavy,et al.  Digital Era Governance , 2006 .

[26]  Bert-Jaap Koops,et al.  Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.

[27]  Ruth Halperin Identity as an emerging field of study , 2006, Datenschutz und Datensicherheit - DuD.

[28]  James Backhouse Interoperability of identity and identity management systems , 2006, Datenschutz und Datensicherheit - DuD.

[29]  Daniel J. Solove The Digital Person and the Future of Privacy , 2006 .

[30]  Robert E. Holtfreter,et al.  Gauging the effectiveness of US identity theft legislation , 2006 .

[31]  Stephen Saxby eGovernment is dead: Long live transformation , 2006, Comput. Law Secur. Rev..

[32]  A. Lips,et al.  E-government under Construction : Challenging Traditional Conceptions of Citizenship , 2006 .

[33]  Katherine J. Strandburg,et al.  Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .

[34]  Claudio Ciborra,et al.  Interpreting e-government and development: Efficiency, transparency or governance at a distance? , 2005, Inf. Technol. People.

[35]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[36]  David Lyon,et al.  Surveillance as Social Sorting : Privacy, Risk and Automated Discrimination , 2005 .

[37]  C. Linn How terrorists exploit gaps in US anti‐money laundering laws to secrete plunder , 2005 .

[38]  Susanne Lace,et al.  The glass consumer : life in a surveillance society , 2005 .

[39]  Perri,et al.  Joined‐up government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II , 2005 .

[40]  Hans Jochen Scholl,et al.  Interoperability in E-Government: More than Just Smart Middleware , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[41]  Deborah Estrin,et al.  Habitat monitoring with sensor networks , 2004, CACM.

[42]  Elia Zureik,et al.  Governance, Security and Technology: the Case of Biometrics , 2004 .

[43]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[44]  A. Alterman,et al.  ``A piece of yourself'': Ethical issues in biometric identification , 2003, Ethics and Information Technology.

[45]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[46]  Robert D. Galliers,et al.  Change as Crisis or Growth? Toward a Trans-disciplinary View of Information Systems as a Field of Study: A Response to Benbasat and Zmud's Call for Returning to the IT Artifact , 2003, J. Assoc. Inf. Syst..

[47]  Tony Kinder,et al.  Mrs Miller Moves House: The Interoperability of Local Public Services in Europe , 2003 .

[48]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[49]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[50]  I. V. D. Ploeg,et al.  Biometrics and Privacy A note on the politics of theorizing technology , 2003 .

[51]  Paul A. Pavlou,et al.  Institution-Based Trust in Interorganizational Exchange Relationships: The Role of Online B2B Marketplaces on Trust Formation , 2002, J. Strateg. Inf. Syst..

[52]  M. Warner,et al.  Applying Market Solutions to Public Services , 2002 .

[53]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[54]  Amitai Etzioni,et al.  Implications of Select New Technologies For Individual Rights and Public Safety , 2002 .

[55]  International Journal of Image and Graphics , 2002 .

[56]  Chrisanthi Avgerou,et al.  The significance of context in information systems and organizational change , 2001, Inf. Syst. J..

[57]  James L. Wayman,et al.  Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..

[58]  Jane E. Fountain,et al.  Paradoxes of Public Sector Customer Service , 2001 .

[59]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[60]  Mark S. Nadel Code and Other Laws of Cyberspace , 2000 .

[61]  Rogers Brubaker,et al.  Beyond “identity” , 2000 .

[62]  R. Löfstedt,et al.  Social Trust and the Management of Risk , 1999 .

[63]  Roderick M. Kramer,et al.  Trust and distrust in organizations: emerging perspectives, enduring questions. , 1999, Annual review of psychology.

[64]  M. Felson,et al.  Crime and Everyday Life , 1998 .

[65]  S. Schwartzman,et al.  The New Production of Knowledge: The Dynamics of Science and Research in Contemporary Societies , 1994 .

[66]  L. Zucker Production of trust: Institutional sources of economic structure, 1840–1920. , 1986 .