Skip to main content

Privacy and Digital Identity

  • Chapter
  • First Online:
Architecting User-Centric Privacy-as-a-Set-of-Services

Part of the book series: Springer Theses ((Springer Theses))

Abstract

Privacy is a human right and an important need for societies to progress. It is considered as a requirement for maintaining the human condition with dignity and respect (Schneier in The eternal value of privacy, 2006).

Civilization is the progress toward a society of privacy.

Ayn Rand (Writer and Novelist, 1905–1982)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.google.com/dashboard

References

  1. B. Schneier, The eternal value of privacy (2006), Available: http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886. Accessed 5 May 2010

  2. R. Clarke, Introduction to dataveillance and information privacy, and definitions and terms (1999), Available: http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html. Accessed 6 May 2010

  3. R. Clarke, What’s Privacy? [Workshop at the Australian Law Reform Commission] (2006), Available: http://www.anu.edu.au/people/Roger.Clarke/DV/Privacy.html. Accessed 6 May 2010

  4. M.H. Kamali, The Dignity of Man: An Islamic Perspective, 2nd edn. (Islamic Texts Society, 2002)

    Google Scholar 

  5. U. Nations, The universal declaration of human rights (1948), Available: http://www.un.org/en/documents/udhr/index.shtml. Accessed 1 April 2011

  6. The Office of the United Nations High Commissioner for Human Rights, International Covenant on Civil and Political Rights (1966), Available: http://www2.ohchr.org/english/law/ccpr.htm. Accessed 1 April 2011

  7. European Convention on Human Rights (1950), Available: http://conventions.coe.int/Treaty/en/Treaties/Html/005.htm. Accessed 1 April 2011

  8. European Union, The charter of fundamental rights of the European Union (2000), Available: http://ec.europa.eu/justice_home/fsj/rights/charter/fsj_rights_charter_en.htm. Accessed 1 April 2011

  9. G. Hosein, Politics of information society: the bordering and restraining of global data flows (2004), Available: http://www.privacyinternational.org/survey/censorship/unesco.pdf. Accessed 6 May 2010

  10. K. O’Hara, N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oneworld Publications, 2008)

    Google Scholar 

  11. L.S. Nelson, Constructing policy: the unsettled question of biometric technology and privacy, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 151–172

    Google Scholar 

  12. Privacy, in Stanford Encyclopedia of Philosophy (2006)

    Google Scholar 

  13. G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)

    Google Scholar 

  14. J. Cas, Privacy in pervasive computing environments—a contradiction in terms? IEEE Technol. Soc. Mag. 24(1), 24–33 (Spring, 2005)

    Google Scholar 

  15. D.J. Solove, A taxonomy of privacy. J. Univ. PA Law Rev. 154, 477 (2006)

    Article  Google Scholar 

  16. A. Pfitzmann, M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management—a consolidated proposal for terminology (2008), Available: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.31.pdfIdentity. Accessed: 21 May 2010

  17. PRIME, PRIME glossary related to privacy and identity management, Available: https://prime.inf.tu-dresden.de/prime/space/Dictionary. Accessed: 11 May 2008

  18. P.J. Windley, Digital Identity: Unmasking identity management architecture (IMA) (O’Reilly Media, 2005)

    Google Scholar 

  19. International Telecommunication Union, Digital life. ITU internet report (2006), Available: http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf. Accessed 21 May 2010

  20. M.C. Mont et al., Towards accountable management of privacy and identity information. LNCS (Springer, Berlin, 2003)

    Google Scholar 

  21. M. Gardiner, The business value of identity federation (2007), Available: http://whitepaper.techworld.com/authentication/4818/the-business-value-of-identity-federation. Accessed: 21 May 2010

  22. D. Boyd, Why youth (heart) social network sites: the role of networked publics in teenage social life. MacArthur Foundation Series on digital learning—youth, identity, and digital media volume (2007), Available: http://www.danah.org/papers/WhyYouthHeart.pdf. Accessed 27 Aug 2010

  23. Organizing Committee of Digital Identity & Privacy (Human Capital & Social Innovation Technology Summit), Call for controbution to managing digital identities for education, employment and business development (2007), Available: http://events.eife-l.org/HCSIT2007/overview/dip/dip2007. Accessed 11 May 2010

  24. K. Cukier, The data deluge: businesses, governments and society are only starting to tap its vast potential. The economist (February 23–March 5) (2010), Available: http://www.economist.com/opinion/displaystory.cfm?story_id=15579717. Accessed 13 May 2010

  25. Center for Democracy & Technology, Privacy principles for identity in the digital age [draft for comment—version 1.4] (2007), Available: http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf. Accessed 28 May 2010

  26. H. Noonan, Identity, in Stanford Encyclopedia of Philosophy (2009)

    Google Scholar 

  27. K.J. Strandburg, Social norms, self control, and privacy in the online world, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 31–54

    Google Scholar 

  28. T.Z. Zarsky, Online privacy, tailoring, and persuasion, in Privacy and Technologies of Identity: A Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 209–224

    Google Scholar 

  29. B. Otjacques et al., Identity management and data sharing in the European Union, in Proceedings of the 39th Hawaii International Conference on System Sciences, 2006

    Google Scholar 

  30. A.R. Galloway, E. Thacker, The Exploit—A Theory of Networks (University of Minnesota Press, 2008)

    Google Scholar 

  31. V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, Princeton, 2009)

    Google Scholar 

  32. J. Madelin, L. Razzell, Towards the Identity Society, Available: http://www.identitysociety.org/files/identitysociety.pdf. Accessed 7 Sept 2009

  33. A. Juels, RFID privacy: a technical primer for the non-technical reader, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 57–74

    Google Scholar 

  34. Google, Google privacy principles, Available: http://www.google.com/intl/en/corporate/privacy_principles.html. Accessed 14 May 2010

  35. Google Privacy Center, Privacy FAQ. Available: http://www.google.com/intl/en/privacy_faq.html#serverlogs. Accessed 14 May 2010

  36. Ofcom: Office of Communication, Social networking: a quantitative and qualitative research report into attitudes, behaviours and use (2008), Available: http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/report1.pdf. Accessed 27 Aug 2010

  37. N. Reichenthal, Une identité connectée. Bulletin HEC—Le Magazine des Gradués (2007), Available: http://www.gradueshec.ch/bulletins/documents/75nadine.pdf. Accessed 13 May 2010

  38. S. Davies, Opt-Out control. Scientific American (2007)

    Google Scholar 

  39. S. Lloyd, Privacy and the Quantum Internet Scientific American Magazine (2009)

    Google Scholar 

  40. Google—Centre de confidentialité, Publicité et confidentialité (2010), Available: http://www.google.com/privacy_ads.html. Accessed 28 Aug 2010

  41. Google—Centre de confidentialité, Règles de confidentialité (2009), Available: http://www.google.com/intl/fr/privacypolicy.html. Accessed 28 Aug 2010

  42. Google—Centre de confidentialité, FAQ relative à la confidentialité (2010), Available: http://www.google.com/intl/fr/privacy_faq.html#toc-terms-personal-info. Accessed 28 Aug 2010

  43. Google—Centre de confidentialité, Principes applicables à la confidentialité (2010), Available: http://www.google.com/intl/fr/corporate/privacy_principles.html. Accessed 28 Aug 2010

  44. Y. Duan, J. Canny, Protecting user data in ubiquitous computing: towards trustworthy environments. LNCS (Springer, Berlin, 2005)

    Google Scholar 

  45. V. Bellotti, What you don’t know can hurt you: privacy in collaborative computing, in British Computer Society Conference on Human-Computer Interaction (1996), pp. 241–261

    Google Scholar 

  46. Organization for Economic Co-operation and Development (OECD), Guidelines on the protection of privacy and transborder flows of personal data (1980), Available: http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html. Accessed 6 May 2010

  47. Organization for Economic Co-operation and Development (OECD), At crossroads: personhood and digital identity in the information society. The working paper series of the OECD directorate for science, technology and industry (2008), Available: http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html. Accessed 21 May 2010

  48. European Union, Directive 95/46/EC of the European Parliament and of the Council (1995), Available: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML. Accessed 26 March 2010

  49. Wikipedia, Data protection directive (2011), Available: http://en.wikipedia.org/wiki/Data_Protection_Directive. Accessed 26 March 2010

  50. P. Brown, Privacy in an age of terabytes and terror. Sci. Am. Mag. 299, 46–47 (2008)

    Google Scholar 

  51. Overview of the Privacy Act of 1974, United States Department of Justice’s Office of Privacy and Civil Liberties (OPCL), 2010

    Google Scholar 

  52. R. Agrawal et al., Hippocratic databases, in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong-China 2002, pp. 143–154

    Google Scholar 

  53. J.J. Luna, How to be invisible: a step-by-step guide to protecting your assets, your identity, and your life. New York, 2012

    Google Scholar 

  54. CSA Model Code for the Protection of Personal Information, The Canadian Standards Association, 2000

    Google Scholar 

  55. Personal Information Protection and Electronic Documents Act, Government of Canada—Department of Justice, 2000

    Google Scholar 

  56. The Canadian Standards Association, Privacy code, Available: http://www.csa.ca/cm/ca/en/privacy-code. Accessed 12 May 2010

  57. Privacy Act, 1985, Available: http://laws-lois.justice.gc.ca/eng/acts/P-21/

  58. The Japanese Act on the Protection of Personal Information, The Government of Japan, 2003

    Google Scholar 

  59. Hewlett-Packard, Japan Personal Information Protection Act (JPIPA)—legislative summary, Available: http://h71028.www7.hp.com/ERC/cache/571127-0-0-0-121.html. Accessed 12 May 2010

  60. ZL Technologies Inc., Regulation overview of the Japanese Act on the protection of personal information, Available: http://www.zlti.com/resources/docs/Rules%20and%20Regulations/ZL.RR.Japan-PIPA.pdf. Accessed 12 May 2010

  61. Australian Government—Office of the Privacy Commissioner. Information Privacy Principles under the Privacy Act 1988—Plain English Summary, Available: http://www.privacy.gov.au/materials/types/law/view/6892. Accessed 12 May 2010

  62. L. Baeriswyl, G. Mangeat, Protection des données personnelles sur Internet: la situation en Suisse (2000), Available: http://www.juriscom.net/chr/2/ch20000621.htm. Accessed 10 Nov 2011

  63. Commission nationale de l’informatique et des libertés (CNIL), Security guide of personal data (2010), Available: http://www.cnil.fr/fileadmin/documents/en/Guide_Security_of_Personal_Data-2010.pdf. Accessed 10 Nov 2011

  64. La loi de la protection des données à caractère personnelles de la Tunisie, 2004

    Google Scholar 

  65. United States Department of Health & Human Services, Office for civil right privacy brief: summary of the HIPAA privacy rule (2003), Available: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/privacysummary.pdf. Accessed 28 May 2010

  66. Wikipedia, The Health Insurance Portability and Accountability Act (HIPAA) of 1996 (2011), Available: http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act#Privacy_Rule. Accessed 26 April 2010

  67. Wikipedia, The Gramm–Leach–Bliley Act (GLB) (2011), Available: http://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act. Accessed 26 April 2010

  68. G. Ben Ayed, S. Ghernaouti-Hélie, Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy, in 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011

    Google Scholar 

  69. M. Rotenberg, The privacy law sourcebook 2004: United States law, international law, and recent developments: Electronic Privacy Information Center, 2004

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghazi Ben Ayed .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ben Ayed, G. (2014). Privacy and Digital Identity. In: Architecting User-Centric Privacy-as-a-Set-of-Services. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-08231-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08231-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08230-1

  • Online ISBN: 978-3-319-08231-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics