Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- D4.1: Structured account of approaches on interoperability.
- D4.2: Set of requirements for interoperability of Identity Management Systems.
- D4.4: Survey on Citizen's trust in ID systems and authorities.
- D4.5: A Survey on Citizen’s trust in ID systems and authorities.
- D4.6: Draft best practice guidelines.
- D4.7: Review and classification for a FIDIS identity management model.
- D4.8: Creating the method to incorporate FIDIS research for generic application.
- D4.9: An application of the management method to interoperability within e-Health.
- D4.10: Specification of a portal for interoperability of identity management systems.
- D4.11: eHealth identity management in several types of welfare states in Europe.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
A requirements model for e-Commerce is shown in Figure 8.
Operational / application activities include:
Manage the identity of the customer to ensure that it is secure and strictly confidential to those who are authorised to see the information
Create and execute financial accounts with organisations such as banks, building societies, insurers and retailers
Manage accounts within banks, building society and insurance companies, credit and debit cards
Perform financial and other transactions with organisations and individuals using cheques and Internet payments of bills for services, products and taxes
Apply for, and fulfil employment with organisations utilising application forms, CVs, qualifications, salary/pension details
Carry out personal activities such as leisure and travel using such items as club membership cards and airline tickets
Management activities include:
Management activities include:
The requirements for management activities should specify the management tools, techniques and procedures, which have to be employed to ensure that all the information, roles and responsibilities, processes and technologies are in place to manage identity activities. These should cover the management of project, finance, human and technology resources.
A stakeholder model for e-Commerce is shown in Figure 9 which represents a “typical” structure of a commercial sector. All types of information, documents, products and currencies flow, within and between organisations and customers, throughout supply chains within the commercial sector
A stakeholder model for e-Commerce is shown in Figure 9 which represents a “typical” structure of a commercial sector. All types of information, documents, products and currencies flow, within and between organisations and customers, throughout supply chains within the commercial sector
Figure 9: Typical stakeholders within commerce sector
Figure 9: Typical stakeholders within commerce sector
4.4.3
5 / 6 |