Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- D11.1: Mobility and Identity.
- D11.2: Mobility and LBS.
- D11.3: Economic aspects of mobility and identity.
- D11.4: Workshop on Mobility and Identity.
- D11.5: The legal framework for location-based services in Europe.
- D11.12: Mobile Marketing in the Perspective of Identity, Privacy and Transparency.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D11.6: Survey on Mobile Identity
The deliverable in hand provides the results of an explorative survey on the
control model for identity related data in location-based services (LBS)
presented in FIDIS deliverable D11.2.
The survey was performed to explore the influence of LBS characteristics (pull
vs. push based, indirect vs. direct profile creation) on the perceived amount of
control participants have about the disclosure of their identity.
Four scenarios, each reflected a different aspect of the control model, have been
designed and tested.
The technical framework
Chapter 3 of this report shows that different kinds of technologies can be used to provide Location Based Services (LBS). The categories of technologies distinguished are:
Satellite-based positioning systems;
Sensor-based systems;
Other wireless technologies, such as Radio Frequency Identification (RFID) based systems or wireless communication systems, such as WiFi or Bluetooth;
Cell-based mobile communication networks;
Chip-card-based systems
Since theses technologies differ a lot in the way they work, their characteristics and in their level of accuracy, they are all suitable for different kinds of LBS. Furthermore, there are differences with regard to the limitations and possibilities to disturb or manipulate these positioning technologies. Also the purpose for which location data is intended to be used will be of influence on the technology best suited to provide a certain LBS. As pointed out in the third chapter, location information typically is generated in location systems, which typically consist of two or three types of components:
One or more devices sending location information to sensors in case sensors do not operate optically.
Sensors to receive and transfer location and time information to static or mobile backend systems.
Backend systems interpreting and / or using location information.
In this respect, not only differences exist with regard to the technologies used to provide LBS, but also the parties involved in the process can differ to a large extent. This means that control issues regarding the data that will be generated within these location systems can be complex, as generating and processing of these data in many cases is not done by the same organisation (or data controller).
There are also differences regarding the way in which location and traffic data are generated within these systems. Processing may be done continuously or by request at a certain time. In addition the generation and processing may concern location data of the user of a location system himself, or of another person.
In view of these differences, it is difficult to give a general conclusion regarding the question as to whether the technologies used to provide LBS infringe upon human rights such as privacy. The technologies can offer security functions that provide some guarantees with regard to the fair processing of (personal) location data. However, the effectiveness of these guarantees depends to a large extent on the question whether or not the persons whose data are being processed can use these functions or are allowed to use these functions by the subscribers to the service, such as for example employers. The question as to whether LBS infringe upon personal freedoms such as privacy also depends on the way in which technology is used to provide these services. Besides technical specifications, the law plays an important role. As a general conclusion in view of the technical chapter it can be mentioned that there is a close relationship between technique and law in this respect. The law sets boundaries with regard to the legality of the processing of certain data and can also prescribe minimum (technical) security measures in order to protect human rights. On the one hand technology provides the opportunities to generate and process these data in accordance with the law; on the other hand it also provides opportunities to infringe upon rights guaranteed by law.
44 / 47 |