Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Table Of Content
- Introduction
- Jeremy Bentham on the need for identification by governments
- Bentham on human rights and liberty
- The principle of utility
- Bentham on social control
- Bentham on identification and control
- Select bibliography
- Identity knowledge in the governmental provision of services
- Identification and anonymity in public service provision: Two case studies in the Netherlands
- Introduction
- Public service provision
- Case studies
- Case study 1: The application for a tree felling permit
- Case study 2: Border passage at Schiphol Airport
- Conclusion and discussion
- Bibliography
- Appendix
- Electronic signatures and pseudonymous certificates
- Introduction
- Paper-based and electronic signatures
- Approaches for privacy enhancement
- Limitations of the described approaches
- Pseudonymous signatures in e-government
- Conclusion
- Bibliography
- Identification in eGovernment: the Belgian federal case
- Introduction
- Some important distinctions: opacity and transparency tools
- Information is a strategic resource
- Identification in Belgian federal eGovernment
- Common authentication means: the Belgian electronic identity card
- pseudonymous
- Global identification and control in Belgian eGovenrment.
- Global identification versus sector or context-specific identifiers
- Pseudonymity and trusted agents
- Analysis
- Conclusion
- Bibliography
- Anonymization of official statistical data
- Introduction
- Anonymity and anonymization
- Statistical information in the health sector
- Ingredients for anonymization techniques
- Case study: a federal agency collecting health data
- Case study: international data collection for orthopedic evaluative research
- Conclusion
- Bibliography
- Conclusion