You are here: Resources > FIDIS Deliverables > Mobility and Identity > D11.1: Mobility and Identity > 

D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity

Initial Scenarios for mobile Identity Management  Title:
INTRODUCTION
 Introduction of the Scenarios and Analysis

 

Introduction

This chapter uses the model of partial identities described in the FIDIS deliverable D2.1 (Nabeth, Hildebrandt, 2004). Following this model, the Me-related part of the identity of a person can be described as a number of various partial identities which are used in various communicational contexts. 

 

Figure : Identity of Alice composed of various partial identities (Clauß, Köhntopp, 2001).

 

Casassa Mont (Casassa Mont, 2004) describes identity using the formula “identity = data + policies”. In further developing this model by introducing identifiers we distinguish between three important factors having influence on partial identities:

 

  • Data including one or more identifiers (especially in the function of an address for communication) representing the partial identity 

  • The workflows or processes in which the data including the identifier(s) can be used 

  • The policy for the communicational context - how to use the identifier(s) and in which workflows or processes

 

Data in many cases is subject to modifications when used or processed in workflows and processes. While identifiers in their function as addresses are usually static at least for a certain time such as in the case of a phone or insurance numbers, workflows, processes and policies can differ widely. They are influenced on a macroscopic level by social systems and on a microscopic level by social structures such as the socio-cultural environment of the organisation they are used in. We observe in many cases interdependency between workflows and processes on the one hand and policies on the other hand. For example, when an organisation provides an infrastructure for its members for communication such as telephones for employees, it (in most cases) sets the policy dictating when and how this infrastructure can (or should) be used.

Data including an identifier can be used in many workflows, for example a mobile phone number that is used in both private and work related communicational contexts. The relationships between workflows and policies can be more complex. One workflow spanning two organisations for example can be subject to two policies. In turn a global communicational policy can be applied to different workflows within an organisation. The proper use of data and identifiers, the selection of an appropriate workflow and the compliance to the relevant communicational policy (or policies) is one of the challenges in identity management.

 

Using this model, we will describe the changes caused by the use of mobile communication and related partial identities in two general communicational contexts:

  • The private life and communicational contexts involved therein. 

  • The professional or work life and communicational contexts involved therein. 

 

Within these general communicational contexts we can distinguish specific communicational contexts, which are directed towards specific communication partners. For example, within the general private communicational context we have a number of specific personal contacts (and thus contexts) including for example Alice’s boyfriend Bob.

 

Traditionally, most people in Europe tend to stay for most of their lifetime in one village, town, or in a not too big region - their place of living. In these cases their private life is focused on personal contacts and specific locations such as a preferred pub, specific shops, the place of work, their home and so on, in that village, town or region.  

 

In most cases fundamental and frequent changes in that place of living is caused by work. For many centuries mobile work was carried out, for example by craftsmen such as stonemasons, by mobile traders, mercenaries and others. Currently we observe that mobile communication plays an increasing role in mobile work. Mobile communication in that context is mainly used to increase the productivity of mobile work. In addition mobile devices supporting mobile communication, while offering much more functionality compared to a mobile phone such as smartphones, PDAs and notebooks are increasingly available (Weiss, 2005).

 

Current literature describes at least ten areas where organisational requirements have to be met by organisations introducing or using mobile work (Hess, Weddige, 2005). At least the five organisational requirements highlighted (bold) in the list below can have an impact on partial identities and thus the identity of a person in total. The requirements are: 

 

  • (Flexible) Working hours 

  • Accomplishments and control 

  • Health and ergonomics 

  • (IT) Security 

  • Autonomy and flexibility 

  • Qualification 

  • Communication and contacts 

  • Private sphere and data protection legislation 

  • Use of equipment by mobile workers 

    • E.g.: Desk sharing, private equipment, etc. 

  • Liabilities and insurances 

 

The implementation of these organisational requirements can show a big variety leading to very different impacts on the identity of persons. To analyse the impact on the identity of the person using mobile communication we are going to use three scenarios. 

 

Initial Scenarios for mobile Identity Management  fidis-wp11-del11.1.mobility_and_identity_03.sxw  Introduction of the Scenarios and Analysis
Denis Royer 11 / 58