Identity and privacy in the digital age
暂无分享,去创建一个
Organisations and data subjects alike are all facing up to the new challenges of online identity and privacy. For all the activity in this field, there is still much confusion and argument over basic terms and concepts. Technologists, systems architects, business people and policy-makers, for example, all describe privacy in different and sometimes incompatible terms and yet, for any given system to work, the views of all these different stakeholders must be successfully translated into technical implementation and coherent policy enforcement. This paper sets out a simple data model to describe the different types of identity data and relates this to typical system architectures and then to privacy as an information systems policy objective. The aim is to provide a consistent framework for thinking about identity data so we can understand how privacy arises from the correct interaction of data and policy.
[1] Amartya Sen,et al. Identity and Violence: The Illusion of Destiny , 2006 .
[2] P. Thompson. Digital Identity , 2003 .
[3] Kim-Kwang Raymond Choo. Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 2008, The Computer Journal.
[4] Peter G. Neumann,et al. Risking Communications Security: Potential Hazards of the Protect America Act , 2008, IEEE Security & Privacy.
[5] J. Habermas. On Social Identity , 1974, Telos.