Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
D5.1: A survey on legislation on ID theft in the EU and….
D5.2: ID Fraud Workshop.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
D5.2c: Identity related crime in the world of films.
D5.3: A Multidisciplinary Article on Identity-related Crime.
D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
D6.1: Forensic Implications of Identity Management Systems.
D6.5/D6.6: Second thematic Workshop forensic implications.
D6.7b: Workshop on Forensic Profiling.
D6.7c: Forensic Profiling.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Bibliography
Koops, Bert-Jaap & Ronald Leenes (2005), ‘“Code” and the Slow Erosion of Privacy’, Michigan Telecommunications & Technology Law Review 12 (1), p. 115-188, http://www.mttlr.org/voltwelve/koops&leenes.pdf.
Marx, G.T. (2005). Varieties of Personal Information as Influences on Attitudes towards Surveillance. In K. D. Haggerty & R. V. Ericson (eds.), The New Politics of Surveillance and Visibility. Toronto: University of Toronto Press.
Prins, J.E.J. (ed.) (2006), Designing E-Government, 2nd Edition, Kluwer Law International 2006.
Rule, J.B. (1973). Private Lives and Public Surveillance. New York: Schocken Books.
| 45 / 45 |
