Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Conclusion
Business processes are becoming increasingly oriented to the interests of a customer. In addition to the collection of personal data, its delegation and usage by service providers in place of the customer as far as further service providers are concerned is necessary. An example for business processes with delegation is an application making use of customers’ profiles hosted externally by a data service provider. Profiles are thereby desired, so that the principle of data economy does not fit anymore with regard to privacy. The use of personal data leads, however, to privacy problems that are considered to be an important acceptance factor. The following chapter focuses on privacy of customers and security interests of service provider in business processes with personalised services.
11 / 38 |