Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Two types of end user control
End user control can take shape in two forms:
1. The end user constructs her own profile (data set) as input into her personal digital assistant (PDA) that is used as a privacy enhanced identity management device (IDM). Depending on the way the IMD is programmed, information is communicated to a specific environment. This environment can read the information and match it with its own predefined profile (data set), after which action will or will not be taken. In this case the profiles involved are not the result of profiling technologies, forming simple data sets.
2. The end user does not create predefined profiles, but allows itself to be profiled by intelligent device in the environment. However the profiles that are constructed are stored in the PDA of the data subject, thus creating a dynamic profile in the course of time. Neither behavioural data, nor the profile itself are stored at the level of the intelligent device in the environment (so, not at the level of the data controller, not at the level of the service provider), expect if permission is granted by the data subject (a decision that can be delegated for trusted environments to the PDA). In this case the profiles involved are the result of profiling technologies, forming correlated data sets.
The case study below will illustrate the use of both types of profiles.
24 / 62 |