Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity
Introduction of the Scenarios and Analysis
For the analysis we selected the following scenarios:
Scenario 1: Mobile communication in simple communicational contexts in private life (cp. section )
Scenario 2: Mobile communication used by a mobile working craftswoman with fixed working hours (cp. section )
Scenario 3: Mobile communication used by a mobile collaborator in information and communication technology (ICT) projects with flexible working hours (cp. section )
With respect to the management of identities these scenarios have a different focus. They refer to user controlled identity management (type 3 identity management, cp. Bauer, Meints, Hansen, 2005) through the use of mobile devices, management of mobile identities and reachability management as an important method for user controlled identity management.
Denis Royer | 12 / 58 |