Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.6: Study on ID Documents
Scholars and professionals are more or less unified in the belief that pan-European eID interoperability from a pure technical point of view would be relatively easily achieved if wanted by the stakeholders (Cowcher 2005, Backhouse 2005, Leitold 2005, Martin 2005, Otter 2005b, Posch and Holzbach 2005). Basic legal/technical artefacts examining privacy issues are no concern either as basic agreement on human rights, data protection and privacy protection is enforced and guaranteed in all EU Member States (Bennett 1992, Bennett and Raab 1997).
In contrast to the technical level the formal notion of pan-European eID interoperability consists mainly of a legal perspective (c.f. ). This is because any integration of government systems, sharing of information and collaborative approaches have to be based on and supported by a valid legal framework. In general, government agencies should only have access to information if (1) the specific information is needed in order to complete the public assignment, (2) the gained access to the information is lawful and (3) a misuse of the access to information is highly unlikely or virtually impossible (Etzioni 1999). In the case of eID interoperability projects the formal level is represented by the legal framework in which the country is working. These legal frameworks aim to restrict the power for the purpose of protecting the citizen from government arbitrariness and ensuring their privacy (Stalder and Lyon 2002). All laws and regulations of a country are based on the country’s legal framework. This analysis is focused on six world legal systems being Civil law, Common law, Customary law, Muslim law, Talmudic law, and Mixed law systems, the latter referring not to a single system but to a combination of systems (University of Ottawa 2005).
On an informal level, the TFI model addresses socio-cultural aspects like culturally dependent differences such as meaning, intention, commitment, interpretation of law, and expectation of communication processes. In a nutshell, the model includes the “human factor” to the equation of collaborative data systems.
Denis Royer | 15 / 56 |