Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
Introduction
We consider here two scenarios that highlight the privacy and anonymity issues we anticipate in the future development of the Information Society.
First, we describe a scenario to which no privacy enhancing techniques have been added, and analyse the potential impact of the lack of privacy protection on individuals. We present a second scenario with infrastructural anonymity and privacy enhancing mechanisms. We balance anonymity control requirements with accountability and law enforcement. We conclude with an analysis of the tradeoffs of privacy protection and accountability.
38 / 69 |