Skip to main content

2014 | OriginalPaper | Buchkapitel

4. Privacy and Digital Identity

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy is a human right and an important need for societies to progress. It is considered as a requirement for maintaining the human condition with dignity and respect (Schneier in The eternal value of privacy, 2006).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat M.H. Kamali, The Dignity of Man: An Islamic Perspective, 2nd edn. (Islamic Texts Society, 2002) M.H. Kamali, The Dignity of Man: An Islamic Perspective, 2nd edn. (Islamic Texts Society, 2002)
10.
Zurück zum Zitat K. O’Hara, N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oneworld Publications, 2008) K. O’Hara, N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oneworld Publications, 2008)
11.
Zurück zum Zitat L.S. Nelson, Constructing policy: the unsettled question of biometric technology and privacy, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 151–172 L.S. Nelson, Constructing policy: the unsettled question of biometric technology and privacy, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 151–172
12.
Zurück zum Zitat Privacy, in Stanford Encyclopedia of Philosophy (2006) Privacy, in Stanford Encyclopedia of Philosophy (2006)
13.
Zurück zum Zitat G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001) G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)
14.
Zurück zum Zitat J. Cas, Privacy in pervasive computing environments—a contradiction in terms? IEEE Technol. Soc. Mag. 24(1), 24–33 (Spring, 2005) J. Cas, Privacy in pervasive computing environments—a contradiction in terms? IEEE Technol. Soc. Mag. 24(1), 24–33 (Spring, 2005)
15.
Zurück zum Zitat D.J. Solove, A taxonomy of privacy. J. Univ. PA Law Rev. 154, 477 (2006)CrossRef D.J. Solove, A taxonomy of privacy. J. Univ. PA Law Rev. 154, 477 (2006)CrossRef
18.
Zurück zum Zitat P.J. Windley, Digital Identity: Unmasking identity management architecture (IMA) (O’Reilly Media, 2005) P.J. Windley, Digital Identity: Unmasking identity management architecture (IMA) (O’Reilly Media, 2005)
20.
Zurück zum Zitat M.C. Mont et al., Towards accountable management of privacy and identity information. LNCS (Springer, Berlin, 2003) M.C. Mont et al., Towards accountable management of privacy and identity information. LNCS (Springer, Berlin, 2003)
26.
Zurück zum Zitat H. Noonan, Identity, in Stanford Encyclopedia of Philosophy (2009) H. Noonan, Identity, in Stanford Encyclopedia of Philosophy (2009)
27.
Zurück zum Zitat K.J. Strandburg, Social norms, self control, and privacy in the online world, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 31–54 K.J. Strandburg, Social norms, self control, and privacy in the online world, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 31–54
28.
Zurück zum Zitat T.Z. Zarsky, Online privacy, tailoring, and persuasion, in Privacy and Technologies of Identity: A Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 209–224 T.Z. Zarsky, Online privacy, tailoring, and persuasion, in Privacy and Technologies of Identity: A Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 209–224
29.
Zurück zum Zitat B. Otjacques et al., Identity management and data sharing in the European Union, in Proceedings of the 39th Hawaii International Conference on System Sciences, 2006 B. Otjacques et al., Identity management and data sharing in the European Union, in Proceedings of the 39th Hawaii International Conference on System Sciences, 2006
30.
Zurück zum Zitat A.R. Galloway, E. Thacker, The Exploit—A Theory of Networks (University of Minnesota Press, 2008) A.R. Galloway, E. Thacker, The Exploit—A Theory of Networks (University of Minnesota Press, 2008)
31.
Zurück zum Zitat V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, Princeton, 2009) V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, Princeton, 2009)
33.
Zurück zum Zitat A. Juels, RFID privacy: a technical primer for the non-technical reader, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 57–74 A. Juels, RFID privacy: a technical primer for the non-technical reader, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 57–74
38.
Zurück zum Zitat S. Davies, Opt-Out control. Scientific American (2007) S. Davies, Opt-Out control. Scientific American (2007)
39.
Zurück zum Zitat S. Lloyd, Privacy and the Quantum Internet Scientific American Magazine (2009) S. Lloyd, Privacy and the Quantum Internet Scientific American Magazine (2009)
44.
Zurück zum Zitat Y. Duan, J. Canny, Protecting user data in ubiquitous computing: towards trustworthy environments. LNCS (Springer, Berlin, 2005) Y. Duan, J. Canny, Protecting user data in ubiquitous computing: towards trustworthy environments. LNCS (Springer, Berlin, 2005)
45.
Zurück zum Zitat V. Bellotti, What you don’t know can hurt you: privacy in collaborative computing, in British Computer Society Conference on Human-Computer Interaction (1996), pp. 241–261 V. Bellotti, What you don’t know can hurt you: privacy in collaborative computing, in British Computer Society Conference on Human-Computer Interaction (1996), pp. 241–261
50.
Zurück zum Zitat P. Brown, Privacy in an age of terabytes and terror. Sci. Am. Mag. 299, 46–47 (2008) P. Brown, Privacy in an age of terabytes and terror. Sci. Am. Mag. 299, 46–47 (2008)
51.
Zurück zum Zitat Overview of the Privacy Act of 1974, United States Department of Justice’s Office of Privacy and Civil Liberties (OPCL), 2010 Overview of the Privacy Act of 1974, United States Department of Justice’s Office of Privacy and Civil Liberties (OPCL), 2010
52.
Zurück zum Zitat R. Agrawal et al., Hippocratic databases, in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong-China 2002, pp. 143–154 R. Agrawal et al., Hippocratic databases, in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong-China 2002, pp. 143–154
53.
Zurück zum Zitat J.J. Luna, How to be invisible: a step-by-step guide to protecting your assets, your identity, and your life. New York, 2012 J.J. Luna, How to be invisible: a step-by-step guide to protecting your assets, your identity, and your life. New York, 2012
54.
Zurück zum Zitat CSA Model Code for the Protection of Personal Information, The Canadian Standards Association, 2000 CSA Model Code for the Protection of Personal Information, The Canadian Standards Association, 2000
55.
Zurück zum Zitat Personal Information Protection and Electronic Documents Act, Government of Canada—Department of Justice, 2000 Personal Information Protection and Electronic Documents Act, Government of Canada—Department of Justice, 2000
58.
Zurück zum Zitat The Japanese Act on the Protection of Personal Information, The Government of Japan, 2003 The Japanese Act on the Protection of Personal Information, The Government of Japan, 2003
64.
Zurück zum Zitat La loi de la protection des données à caractère personnelles de la Tunisie, 2004 La loi de la protection des données à caractère personnelles de la Tunisie, 2004
68.
Zurück zum Zitat G. Ben Ayed, S. Ghernaouti-Hélie, Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy, in 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011 G. Ben Ayed, S. Ghernaouti-Hélie, Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy, in 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011
69.
Zurück zum Zitat M. Rotenberg, The privacy law sourcebook 2004: United States law, international law, and recent developments: Electronic Privacy Information Center, 2004 M. Rotenberg, The privacy law sourcebook 2004: United States law, international law, and recent developments: Electronic Privacy Information Center, 2004
Metadaten
Titel
Privacy and Digital Identity
verfasst von
Ghazi Ben Ayed
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-08231-8_4

Neuer Inhalt