Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.3: Study on Mobile Identity Management
Outlook
This study (D3.3) will be extended in WP11 (D11.1), by gathering additional information on the state of the art of mobile concepts, such as the SIM, USIM or WIM (WAP Identity Module) as well as other identity standards from mobility related organisations (e.g. the Open Mobile Alliance, ETSI, etc.). The resulting issues will be extended from wireless and mobile to satellite communication and location based services (LBS).
The objectives of work package 11 (WP11), “Mobility and Identity”, for the FIDIS Network of Excellence are the identification, the description and the application of the concepts and elements in the fields of mobility and identity. The subject of research and discussion will be the identification and description of the term ‘mobile identity’.
Another major task of WP11 will be the economic evaluation of such systems and their influences on our everyday life. While technical aspects of mobility and identity are researched in depth, economic aspects seem to play a minor role in this domain. Nevertheless, from an economic point of view, these questions are important for decision making in a commercial set-up.
The assessment of new business models, such as they were presented in chapter 2.3 and mobile services will be the key factors to be analysed in this context. Furthermore, the market acceptance of the used technologies and other effects, such as legal, socio-cultural, and so on, will be taken into consideration. Especially for advanced data services, such as location based services (LBS), new identity management concepts are needed in order to enable secure communication and what information is need to provide a service.
Although being quite innovative, some of these services and products using mobile identity management systems disappeared, due to the fact that they were not profitable or they did not succeed in getting into the market. Possible reasons might be the lack of integration of the system, its usability, or the willingness of the customers to use an identity management solution. Consequently, looking from the standpoint of a for-profit organisation, it is crucial to ask for the profitability of mobile identity management systems and their usage. Especially looking at the variety of emerging and constantly changing technologies, it is difficult to find a generic model – “Technology changes; economic laws do not” (Shapiro and Varian, 1999).
Personalised services seem to improve the quality of people’s lives by acknowledging their needs, requirements and preferences and thus acting in some way on their behalf. In order to support such business processes in which services are acting on behalf of the user, mobile users have to be supported to confidentially delegate some of his authorisations or partial identities to strange service providers while protecting their privacy by usable mobile identity management. Furthermore, today’s anonymity mechanisms do not fully meet the requirements for mobile ad hoc networks. One approach is to develop an anonymous overlay network suited for mobile ad hoc networks.
Some of the arising questions to be answered in the context of the evaluation of the profitability of mobile identity management systems, which need to be addressed, are:
In which temporal context am I conducting an evaluation (ex ante or ex post)?
What is the composition of the market I am looking at (e.g. public or private customers)?
Who are the key players, which participate in the observed market (e.g. mobile operators or, customers, governments) and what are their goals?
What are the driving factors for the evaluation of the market for mobility and identity and how do they affect each other (e.g. technology acceptance, usability, market penetration, market competition, market share, etc.)?
How to model the environment and the interaction of the key-players among each other?
Furthermore, the complex nature of such markets and their parameters makes it difficult to come up with a generalised approach for an economic evaluation. Nevertheless, by using a combination of different methods, such as simulation approaches or economic theories, one can analyse the possible direction of the future development of such technologies and their diffusion into the market.
34 / 36 |