Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Bibliography
Koops, Bert-Jaap & Ronald Leenes (2005), ‘“Code” and the Slow Erosion of Privacy’, Michigan Telecommunications & Technology Law Review 12 (1), p. 115-188, http://www.mttlr.org/voltwelve/koops&leenes.pdf.
Marx, G.T. (2005). Varieties of Personal Information as Influences on Attitudes towards Surveillance. In K. D. Haggerty & R. V. Ericson (eds.), The New Politics of Surveillance and Visibility. Toronto: University of Toronto Press.
Prins, J.E.J. (ed.) (2006), Designing E-Government, 2nd Edition, Kluwer Law International 2006.
Rule, J.B. (1973). Private Lives and Public Surveillance. New York: Schocken Books.
45 / 45 |