Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity
Summary and Conclusions
When working hours in mobile work are used in a more flexible way and in combination with mobile communication, partial identities previously used only in a specific communicational context can move into the mobile working context as well. This leads to a change of borderlines between communicational contexts. In contrast to private communicational contexts where the user controls the mobile communication-related identities, the workflows and policies in the work context are controlled mainly by organisations (in this case the employer). Mobile work in combination with both mobile communication and flexible working hours may shift, through the change in control and management of the identities, partial identities from user controlled, own ones to assigned ones.
In the scenario where Alice is a collaborator in ICT projects, there is a big difference between the communicational policy of the employer and the private communicational policy of the mobile worker. A centralised management of employees who are on standby for the enterprise in combination with Personal Reachability Management (Reichenbach et al. 1997) could probably be used as a central part of a Mobile Identity Management System (MIMS) in addition to an extra payment described in scenario 3 to balance these different policies and to protect the private sphere of the employees. In this context, MIMS are understood as being management systems for partial identities where the importance of mobility is prevalent (see Roussos, Peterson, Patel, 2003).
Denis Royer | 15 / 58 |