You are here: Resources > FIDIS Deliverables > Other > D8.3: Database on Identity Management Systems and ID Law in the EU > 
Type 1 IMS attributes  Title:
TYPE 3 IMS ATTRIBUTES
 User Manual

 

Type 3 IMS attributes

 

This section is relevant for all IMS that are either type 3 or include type 3 functionality (e.g. a combination of 1 and 3). 

The Type 3 IMS attributes cover various topics:  

  1. Functionality  

  2. Security Control  

  3. Privacy Control 

  4. Support  

  5. Usability 

  6. Trustworthiness 

 

Functionality

 

Attribute Label 

Definition 

Values 

IMS category (*) 

Description of the purposes the IMS could be used for, and the operational areas such as access management, form filling, reachability management, automatic choice of identity and pseudonym management. Additionally interfaces to other systems or applications, protocols, plug-ins and gateways are listed. 

Text 

Representation of identities (*) 

Description of mechanisms, which the IMS uses for showing the user his/her different kinds of identities, especially the one he/she is acting in or the most probable identities to choose from. 

This includes all possible forms of identities, e.g., plain personal data, pseudonyms, credentials and their attributes.

Text 

Handling of identities (*) 

Description of the functionality of identity handling, meaning identity administration and choice. 

Identity administration comprises the definition of own identities and the verification of own or foreign identities. Identity choice consists of all possibilities for the user to choose explicitly his/her identities and decide on the re-use of identities and of everything where the IMS supports the user by seamless use of identities (implicit use) or giving information to help him/her.

Text 

History management (*) 

The history management applies to the logging of all transactions of the system. This includes details about what the system is logging and how this log file is represented to the user. In connection with the usability-category it is analysed how comprehensible this representation is and if it is useful.

Text 

Context detection (*) 

This functionality describes possibilities to detect the context of the user’s environment and makes suggestions for further activities or executes them autonomously. It has to be described further which contexts the system can detect and how the user can affect them. 

Text 

Rule handling (*) 

The rule handling affects the automatic decisions of the IMS. The analysis includes which parts of the system uses rules, which are default ones, how the user can influence them and if they can dynamically react in case of changing contexts. 

Text 

Identity recovery (*) 

This functionality helps to recover an identity after a system crash or a malfunction. This could be useful both for the user in case of using a deleted or destroyed identity again and for the law enforcement in case of prosecution. Identity brokers may play a crucial role for identity recovery. 

Text 

Digital evidence (*) 

Description if the system helps to preserve evidence for legal proceedings. This could be important for users in case of prosecution of claim as well as for law enforcement and criminal prosecution. The analysis includes how powerful the evidence would be in a legal proceeding that comes along with the difficulty of manipulate the evidence. E.g., digital signatures and digital time stamps could help to increase the value of the evidence. Another relevant issue is whether the user is aware of the digital evidence functionality and may even influence the kind of digital evidence or whether this is a hidden functionality with no possibility to affect it. 

Text 

 

Privacy Control

 

Attribute Label 

Definition 

Values 

Privacy control functionality (*) 

The user could be supported by privacy control functionality such as information about personal data stored at a server, allowing access to these data, give the means to correct these data, to remove them, or to grant or revoke consent.

Text 

Anonymity control (*) 

Can the user choose to be anonymous or not? 

Boolean: yes / no 

+ text 

Pseudonym control (*) 

Can the user choose a pseudonym with which to operate under or not? 

Boolean: yes / no 

+ text 

P3P (*) 

Platform for Privacy Preferences (P3P) enhances user control by putting privacy policies where users can find them in a form users can understand and most importantly, enables users to act on what they see. 

Boolean: yes / no 

+ text 

CPEX (*) 

 

Boolean: yes / no 

+ text 

Others (*) 

 

Text 

 

Self-service

 

Attribute Label 

Definition 

Values 

Change password (*) 

 

Boolean: yes / no 

+ text 

View profile details (*) 

Profiles can be changed without changing an account. Whereas the account details are private, the profile details may be public.  

Boolean: yes / no 

+ text 

View account 

information (*) 

 

Boolean: yes / no 

+ text 

Negotiation (*) 

Statement whether the system provides mechanisms to negotiate protection goals and configuration of what data may be transmitted under which conditions 

Boolean: yes / no 

+ text 

Choice of identity (*) 

 

Boolean: yes / no 

+ text 

 

Support to the user

 

Attribute Label 

Definition 

Values 

Identification of social situations (*) 

Statement whether the IMS helps the user to identify social situations. 

 

Boolean: yes / no 

+ text 

Adequate role taking (*) 

Statement whether the system helps the user to identify what is expected from him. 

Role taking is the process by which the individual person becomes linked with their relevant society. 

Boolean: yes / no 

+ text 

Adequate role making (*) 

Statement whether the system helps the user to identify what he is doing. 

Evolving notions of how the users themselves expect to act in a given position (role making). 

Boolean: yes / no 

+ text 

 

Usability

 

The usability aspect describes both the usability of the product and the documentation and external support. 

 

Attribute Label 

Definition 

Values 

Usefulness (*) 

The degree to which a person believes that using a particular system would benefit his or her tasks. The construct of perceived usefulness means a person’s perception of using an information system that benefits him or her in an organisational context.

Rate  

+ text 

Ease to use (*) 

The degree to which a person believes that using a particular system would be free of effort. 

Perceived usefulness and perceived ease of use have influence on the actual use of the IMS. 

Rate  

+ text 

Malfunction understanding (*) 

The degree of the system ability to present the risk of faulty operation to the user to warn him and help him to avoid it. This could be an additional warning request that the user has to reply or the ability to undo a malfunction after the user understood that he did something wrong.

Rate 

+ text 

Rating (*) 

Rating according to rules defined below 

Integer 

 

The following rules are used to determine a rating. The final score is divided by 1.5 in order to normalise scores on a scale of 10.

 

Usefulness (max. possible: 5 points): 

    1. Application benefits usage several times a month: (+1)

    2. Application benefits every day usage: (+1)

    3. Time for first time adjustment is less than time for action without IMS: (+1)

    4. After first time adjustment the action is faster as without IMS: (+1)

    5. After first time adjustment the action is more than twice as fast as without: (+1)

 

Ease of Use (max. possible: 5 points): 

    1. The help function is not needed for standard activities: (+0.5)

    2. The manual is not needed for standard activities: (+0.5)

    3. Help function, manual and support are not needed at all: (+1)

    4. After a period of vocational adjustment the user is able to use the function autonomously: (+1)

    5. It is not necessary to consult external support: (+0.5)

    6. No previous knowledge is needed: (+0.5)

    7. A complete and understandable help function is provided: (+0.5)

    8. A complete and understandable manual is provided: (+0.5)

 

Malfunction Understanding (max. possible: 5 points): 

    1. The user can recognise that an error occurred: (+1)

    2. In case of a malfunction the function presents a complete and understandable description of the error: (+2)

    3. There are suggestions for what to do next: (+1)

    4. The function makes a sensible suggestion about what to do next: (+1)

 

In the first version of the database there will not be great detail on the third party support. So it is sufficient to have only a general description which kinds of third parties help in which way in managing identities. But later on this part may be extended, e.g. by describing the protocols of data exchange with the third party, the security mechanisms and privacy controls applied, and evaluating usability aspects. 

 

 

 

 

Trustworthiness

 

Attribute Label 

Definition 

Values 

Multilateral security (*) 

Segregation of power, self-protection, open source etc. 

Boolean: yes / no 

+ text 

Seals (*) 

Privacy and other seals that certify that the IMS applies to law. 

Boolean: yes / no 

+ text 

 

 

 

Type 1 IMS attributes  fidis-wp8-del8.3.DB_IMS_Law.20060224.sxw  User Manual
18 / 53