Skip to main content
Top

2014 | OriginalPaper | Chapter

4. Privacy and Digital Identity

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy is a human right and an important need for societies to progress. It is considered as a requirement for maintaining the human condition with dignity and respect (Schneier in The eternal value of privacy, 2006).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference M.H. Kamali, The Dignity of Man: An Islamic Perspective, 2nd edn. (Islamic Texts Society, 2002) M.H. Kamali, The Dignity of Man: An Islamic Perspective, 2nd edn. (Islamic Texts Society, 2002)
10.
go back to reference K. O’Hara, N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oneworld Publications, 2008) K. O’Hara, N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oneworld Publications, 2008)
11.
go back to reference L.S. Nelson, Constructing policy: the unsettled question of biometric technology and privacy, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 151–172 L.S. Nelson, Constructing policy: the unsettled question of biometric technology and privacy, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 151–172
12.
go back to reference Privacy, in Stanford Encyclopedia of Philosophy (2006) Privacy, in Stanford Encyclopedia of Philosophy (2006)
13.
go back to reference G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001) G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)
14.
go back to reference J. Cas, Privacy in pervasive computing environments—a contradiction in terms? IEEE Technol. Soc. Mag. 24(1), 24–33 (Spring, 2005) J. Cas, Privacy in pervasive computing environments—a contradiction in terms? IEEE Technol. Soc. Mag. 24(1), 24–33 (Spring, 2005)
15.
18.
go back to reference P.J. Windley, Digital Identity: Unmasking identity management architecture (IMA) (O’Reilly Media, 2005) P.J. Windley, Digital Identity: Unmasking identity management architecture (IMA) (O’Reilly Media, 2005)
20.
go back to reference M.C. Mont et al., Towards accountable management of privacy and identity information. LNCS (Springer, Berlin, 2003) M.C. Mont et al., Towards accountable management of privacy and identity information. LNCS (Springer, Berlin, 2003)
26.
go back to reference H. Noonan, Identity, in Stanford Encyclopedia of Philosophy (2009) H. Noonan, Identity, in Stanford Encyclopedia of Philosophy (2009)
27.
go back to reference K.J. Strandburg, Social norms, self control, and privacy in the online world, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 31–54 K.J. Strandburg, Social norms, self control, and privacy in the online world, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 31–54
28.
go back to reference T.Z. Zarsky, Online privacy, tailoring, and persuasion, in Privacy and Technologies of Identity: A Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 209–224 T.Z. Zarsky, Online privacy, tailoring, and persuasion, in Privacy and Technologies of Identity: A Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 209–224
29.
go back to reference B. Otjacques et al., Identity management and data sharing in the European Union, in Proceedings of the 39th Hawaii International Conference on System Sciences, 2006 B. Otjacques et al., Identity management and data sharing in the European Union, in Proceedings of the 39th Hawaii International Conference on System Sciences, 2006
30.
go back to reference A.R. Galloway, E. Thacker, The Exploit—A Theory of Networks (University of Minnesota Press, 2008) A.R. Galloway, E. Thacker, The Exploit—A Theory of Networks (University of Minnesota Press, 2008)
31.
go back to reference V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, Princeton, 2009) V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, Princeton, 2009)
33.
go back to reference A. Juels, RFID privacy: a technical primer for the non-technical reader, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 57–74 A. Juels, RFID privacy: a technical primer for the non-technical reader, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 57–74
38.
go back to reference S. Davies, Opt-Out control. Scientific American (2007) S. Davies, Opt-Out control. Scientific American (2007)
39.
go back to reference S. Lloyd, Privacy and the Quantum Internet Scientific American Magazine (2009) S. Lloyd, Privacy and the Quantum Internet Scientific American Magazine (2009)
44.
go back to reference Y. Duan, J. Canny, Protecting user data in ubiquitous computing: towards trustworthy environments. LNCS (Springer, Berlin, 2005) Y. Duan, J. Canny, Protecting user data in ubiquitous computing: towards trustworthy environments. LNCS (Springer, Berlin, 2005)
45.
go back to reference V. Bellotti, What you don’t know can hurt you: privacy in collaborative computing, in British Computer Society Conference on Human-Computer Interaction (1996), pp. 241–261 V. Bellotti, What you don’t know can hurt you: privacy in collaborative computing, in British Computer Society Conference on Human-Computer Interaction (1996), pp. 241–261
50.
go back to reference P. Brown, Privacy in an age of terabytes and terror. Sci. Am. Mag. 299, 46–47 (2008) P. Brown, Privacy in an age of terabytes and terror. Sci. Am. Mag. 299, 46–47 (2008)
51.
go back to reference Overview of the Privacy Act of 1974, United States Department of Justice’s Office of Privacy and Civil Liberties (OPCL), 2010 Overview of the Privacy Act of 1974, United States Department of Justice’s Office of Privacy and Civil Liberties (OPCL), 2010
52.
go back to reference R. Agrawal et al., Hippocratic databases, in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong-China 2002, pp. 143–154 R. Agrawal et al., Hippocratic databases, in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong-China 2002, pp. 143–154
53.
go back to reference J.J. Luna, How to be invisible: a step-by-step guide to protecting your assets, your identity, and your life. New York, 2012 J.J. Luna, How to be invisible: a step-by-step guide to protecting your assets, your identity, and your life. New York, 2012
54.
go back to reference CSA Model Code for the Protection of Personal Information, The Canadian Standards Association, 2000 CSA Model Code for the Protection of Personal Information, The Canadian Standards Association, 2000
55.
go back to reference Personal Information Protection and Electronic Documents Act, Government of Canada—Department of Justice, 2000 Personal Information Protection and Electronic Documents Act, Government of Canada—Department of Justice, 2000
58.
go back to reference The Japanese Act on the Protection of Personal Information, The Government of Japan, 2003 The Japanese Act on the Protection of Personal Information, The Government of Japan, 2003
64.
go back to reference La loi de la protection des données à caractère personnelles de la Tunisie, 2004 La loi de la protection des données à caractère personnelles de la Tunisie, 2004
68.
go back to reference G. Ben Ayed, S. Ghernaouti-Hélie, Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy, in 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011 G. Ben Ayed, S. Ghernaouti-Hélie, Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy, in 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011
69.
go back to reference M. Rotenberg, The privacy law sourcebook 2004: United States law, international law, and recent developments: Electronic Privacy Information Center, 2004 M. Rotenberg, The privacy law sourcebook 2004: United States law, international law, and recent developments: Electronic Privacy Information Center, 2004
Metadata
Title
Privacy and Digital Identity
Author
Ghazi Ben Ayed
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-08231-8_4