Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- D13.1: Identity and impact of privacy enhancing technologie.
- D13.1 Addendum: Identity and impact of privacy enhancing technologies.
- D13.3: Study on ID number policies.
- D13.6 Privacy modelling and identity.
- D13.7: Workshop Privacy.
- D14.1: Workshop on Privacy in Business Processes.
- D14.2: Study on Privacy in Business Processes by Identity Management.
- D14.3: Study on the Suitability of Trusted Computing to support Privacy in Business Processes.
- D14.4: Workshop on “From Data Economy to Secure.
- D16.3: Towards requirements for privacy-friendly identity management in eGovernment.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Conclusion
Business processes are becoming increasingly oriented to the interests of a customer. In addition to the collection of personal data, its delegation and usage by service providers in place of the customer as far as further service providers are concerned is necessary. The use of personal data leads, however, to privacy problems that are considered to be an important acceptance factor. Privacy is violated when a customer’s data is collected, processed, stored or delegated without his consent. Service providers desire an accountability of their customers though so that transactions can be related to them and they can be identified in the case of fraud. In the following chapter, process models for introducing privacy in business processes are introduced and the suitability of identity management as a security mechanism for private data in single-stage and multi-stage business processes is investigated.
20 / 38 |