Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
D5.1: A survey on legislation on ID theft in the EU and….
D5.2: ID Fraud Workshop.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
D5.2c: Identity related crime in the world of films.
D5.3: A Multidisciplinary Article on Identity-related Crime.
D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
D6.1: Forensic Implications of Identity Management Systems.
D6.5/D6.6: Second thematic Workshop forensic implications.
D6.7b: Workshop on Forensic Profiling.
D6.7c: Forensic Profiling.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Table Of Content
- Introduction
- Jeremy Bentham on the need for identification by governments
- Bentham on human rights and liberty
- The principle of utility
- Bentham on social control
- Bentham on identification and control
- Select bibliography
- Identity knowledge in the governmental provision of services
- Identification and anonymity in public service provision: Two case studies in the Netherlands
- Introduction
- Public service provision
- Case studies
- Case study 1: The application for a tree felling permit
- Case study 2: Border passage at Schiphol Airport
- Conclusion and discussion
- Bibliography
- Appendix
- Electronic signatures and pseudonymous certificates
- Introduction
- Paper-based and electronic signatures
- Approaches for privacy enhancement
- Limitations of the described approaches
- Pseudonymous signatures in e-government
- Conclusion
- Bibliography
- Identification in eGovernment: the Belgian federal case
- Introduction
- Some important distinctions: opacity and transparency tools
- Information is a strategic resource
- Identification in Belgian federal eGovernment
- Common authentication means: the Belgian electronic identity card
- pseudonymous
- Global identification and control in Belgian eGovenrment.
- Global identification versus sector or context-specific identifiers
- Pseudonymity and trusted agents
- Analysis
- Conclusion
- Bibliography
- Anonymization of official statistical data
- Introduction
- Anonymity and anonymization
- Statistical information in the health sector
- Ingredients for anonymization techniques
- Case study: a federal agency collecting health data
- Case study: international data collection for orthopedic evaluative research
- Conclusion
- Bibliography
- Conclusion
