You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.2: Set of use cases and scenarios > 

D2.2: Set of use cases and scenarios

Scope and objectives  Title:
 Results, conclusion and future work


A summary of the content


This document first start with two contributions providing a process and identity oriented perspective.

The first contribution “Scenarios and a story on Identity, Anonymity and Pseudonymity” from ICPP, uses a story to explore anonymity services in the Internet and then illustrates with a scenario of an idealized web-based shopping system, the use of pseudonyms in various pseudonym domains. The second contribution “Virtual? Identity” from VIP, uses practical scenarios as a way to provide a comprehensible illustration of a unifying model for identities for the Information Society.

The next four contributions provide some examples and cases that belong more to the field of criminal investigation, law and society.

Tracing the Identity of a Money Launderer” and “Tracing the Identity of a Terrorist Financer” from LSE, provide very concrete examples, illustrating the different issues related to money laundering and the financing of terrorism. The contribution “Identity and Privacy in the Context of Civil Law: Case law on Recoverable Anonymity” from VUB, is about some case law related to identity and anonymity, and in the domain of the management of the protection of copyright in the music industry, and about the protection of anonymity and right to freedom of expression on the Internet. The next contribution, “Identity and Privacy” from KU-Leuven, provides a more society oriented perspective of anonymity and privacy, and in particular underlines and anticipates the consequences on privacy of the future developments of the Information Society.

The next two contributions explore a probable future of the Information Society with the Ambient Intelligent Environments, and the potentially invasiveness of the technology.

 “Ubiquitous Computing Scenario” from University of Reading, first describes the scenario of the loyalty cards as it exists today, and the risks that it already put on the privacy of the citizens. It then provides a more futuristic vision, describing the advent and the consequences of RFID on people identity. “Identity in the Ambient Intelligence Environment” from IPTS, illustrates very concretely some of the experiences people will have in ambient intelligent environments, and in particular how a bar might look like in 2012 and how people might interact within this environment with “smart objects” and with people.

The last two contributions provide a perspective of identity in the existing digital environments of today, as well as some outlook about how they will evolve in the future.

The Role of Reputation and Privacy for Identities in Digital Communities” from TU-Dresden, explores the role of reputation (a particular facet of people identity) in digital communities and its consequence on the management of the identity in these environments. It illustrates this with the example of eBay. Finally “Understanding the Identity Concept in the Context of Digital Social Environments” from INSEAD, provides the even broader view of concept of Identity in the Digital Social Environments, with a strong sociological orientation. Besides illustrating the different categories of digital social environments and identity issues with examples, it indicates the benefit of integrating social mechanisms in the management of identity.


Scope and objectives  fidis-wp2-del2.2.Cases_stories_and_Scenario_04.sxw  Results, conclusion and future work
4 / 69