Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity
In the first scenario Alice buys her own mobile phone to use it for simple private communication only. The use of more complex communicational contexts such as the use of Location Based Services (LBS) will be analysed in Deliverable D11.2 “Location Based Services”.
Figure : Identity of Alice in mobile communication in private life scenario (scenario 1)
With her own phone Alice is able to manage this new partial identity on her own. She can decide to whom she releases her cell-phone number (in this case her boyfriend Bob) and thus is able to use it for communication. In addition she is able to decide who is able to reach her using the mobile phone – when called, she can decide to answer it or not. So she has control over the communicational policy and the workflows in which her mobile phone can be used. As the location of Alice in this scenario has no specific impact on the corresponding partial identities Alice performs type 3 identity management (user controlled identity management, cp. Bauer, Meints, Hansen 2005) using a mobile device (see also chapter ).
In this scenario there is little change in the identity of Alice. Her cell-phone and related data (including the cell-phone’s number) is now an additional partial identity (see ) under her control and used in communicational contexts of her choice. The responsibility for the security of the data stored on the mobile device clearly remains with Alice.
Denis Royer | 13 / 58 |