Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Conclusion and discussion
The two questions of this chapter were ‘To what extent does the application of new technologies in public service provision change the identification process of the citizen by the government?’ and ‘To what extent does the citizen become more anonymous or more known by the government?’ From the results of both case studies, it can be concluded that new technologies change the identification process. In the tree felling permit case, the sequence of the various parts of the identification process was changed. In the border passage case, personal information was stored in an additional database which could also be accessed by the KMar.
As to the identifiability of citizens, the cases produce mixed results. In the tree felling permit case, the citizen was equally identifiable when the identification process of the traditional application was compared with the identification process of the electronic application. So, there was no shift detected on the anonymity-identifiability continuum. In the border crossing case, however, a shift was detected on the anonymity-identifiability continuum towards identifiability. Using the electronic Privium border passage means that the personal data is stored in an extra database and more information is asked for, stored, and shared. In addition, using the electronic application (i.e., Privium) also enhances the identity knowledge capacity of the service provider (i.e., KMar).
Of course, no hard conclusions can be drawn from only two cases. To get more comprehensive answers, more cases should be studied, but this chapter can direct to future research. The identification process applied in the border passage application remains opaque and not transparent. For security reasons, information about the identification process is not easily given. The electronic identification process in the application for a tree felling permit is modelled after the traditional identification process and electronic application for public services is relatively new. So, the electronic identification process when applying for public services may change in time. When a similar study is conducted within a few years, the results can be different.
15 / 45 |