- Berghel, H. Identity theft, Social Security numbers, and the Web. Commun. ACM 43, 2 (Feb. 2000), 17--21. Google ScholarDigital Library
- Crosby, J. Challenges and Opportunities in Identity Assurance. HM Treasury, 2008; www.hm-treasury.gov.uk/media/6/7/identity_assurance060308.pdf.Google Scholar
- Dunleavy, P., Margetts, H., Bastow, S., and Tinkler, J. Digital Era Governance: IT Corporations, the State, and E-Government. Oxford University Press, Oxford, 2006. Google ScholarDigital Library
- Garfinkel, S.L. Risks of social security numbers. Commun. ACM 38, 10 (Oct. 1995), 146. Google ScholarDigital Library
- Guizzo, E. Loser: Britain's identity crisis. IEEE Spectrum (2006). Google ScholarDigital Library
- LSE Identity Project. LSE Identity Project (Main Report), London School of Economics and Political Science 2005; identityproject.lse. ac.u.k./identityreport.pdf.Google Scholar
- Owen, K., Keats, G., and Gill, M. The Fight Against Identity Fraud: A Brief Study of the EU, the U.K., France, Germany and the Netherlands. Perpetuity Research & Consultancy International (PRCI) Ltd 2006; www.perpetuitygroup.com/prci/publications.html#euid.Google Scholar
- Whitley, E.A., Hosein, I.R., Angell, I.O., and Davies, S. Reflections on the academic policy analysis process and the U.K. Identity Cards Scheme. The Information Society 23, 1 (2007), 51--58. Google ScholarDigital Library
Index Terms
- Departmental influences on policy design
Recommendations
Policy change analysis based on "policy target---policy instrument" patterns: a case study of China's nuclear energy policy
Policy documents are the carriers of policy and provide a channel for researchers to observe the main contents of a policy and the policy process. Policy documents are different from traditional scientific texts (including papers and patents) because ...
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically ...
Conflicts in Policy-Based Distributed Systems Management
Modern distributed systems contain a large number of objects and must be capable of evolving, without shutting down the complete system, to cater for changing requirements. There is a need for distributed, automated management agents whose behavior also ...
Comments