Summary
While identity management systems for the Internet are debated intensively, identity management in mobile applications has grown silently over the last 17 years. Technologies, such as the still-growing Global System for Mobile Communication (GSM) with its Subscriber Identity Module (SIM) identification infrastructure, are foundations for many new mobile identity management related applications and services. This includes location-based services (LBS), offering customised and convenient services to users (e.g., friend finder applications) and new revenue opportunities for service providers (e.g., location-based advertising).
However, even though the opportunities seem to be endless and technology manageable, challenges arise when looking at advanced aspects of mobility and identity such as privacy, regulation, the socio-cultural aspects, and the economic impacts. To this regard, the interdisciplinary nature of mobility and identity is imminent and needs to be explored further. By learning from the diverse field of challenges, new mobile communication systems can be created, allowing for more privacy-preserving service provision and a more transparent handling of mobile identities.
This chapter presents three scenarios for mobile identities in life, work, and emergency situations: Mobile Communities, Traffic Monitoring, and Emergency Response via LBS. Based on these scenarios is an analysis of the specific properties of Mobile Identities, leading to a description of the FIDIS perspective on mobility and identity. Then a deeper analysis of the technological aspects of mobile networks gives the basis for the following closer look from the legal perspective on issues such as data protection and from the sociologic and economic perspectives. An outlook on the future challenges of mobility and identity concludes the chapter.
Over the last 20 years and to a large degree due to the mainstream usage of mobile communications (e.g., based on GSM networks), Mobility and Identity engaged in a special relation — precisely two special relations. On the one side, GSM technology, especially mobile devices, such as mobile phones and SIM cards, allowed the management of identity, which is now often termed mobile identity management. On the other side the properties of mobile communication networks and especially the administration of location and other context information with regard to mobile devices and the related users have added to the content of identity, which is reflected in the concept of ‘Mobile Identities’. Both aspects are illustrated in the first sections of this chapter. The following sections present different disciplines' perspectives on Mobility and Identity. These disciplines are technology, the law, sociology, and economics, as they contributed most actively on this topic in FIDIS. The chapter is concluded by a collection of requirements on mobile identity management systems and an outlook with further challenges and questions.
This chapter has been reviewed by Simone Fischer-Hübner (KU) and Martin Meints (ICPP). The authors thank the reviewers for their valuable comments and suggestions. This chapter is based on the work done in FIDIS Work Package 11 on Mobility and Identity. The respective deliverables can be found in the Annex of this book.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ajzen, I. (1980), Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood Cliffs, NJ.
Arvidsonn, A. (2004), ‘On the prehistory of the panoptic sort: mobility in market research’, Surveillance and Society 1 (4): 458.
Barnes, S.J. and Huff, S.L. (2003), ‘Rising Sun: iMode and the Wireless Internet’, Communications of the ACM 46 (11): 79–84.
Beyers, H. (2002), ‘Het internet en de informatiesamenleving — criteria voor de adoptie van nieuwe technologie’, tijdschrift voor sociologie 23 (3/4: 545– 570.
Büllingen,F. and Stamm, P. (2004), Mobile Multimedia-Dienste: Deutschlands Chance im globalen Wettbewerb, Bundesministerium für Wirtschaft und Arbeit.
Castells, M. (1996), The rise of the Network Society, Blackwell, New York.
Clarke, R. (2001), ‘Person-location and Person-tracking: technologies, risks and policy implications’, Information, Technology and People 14 (2): 206–231.
Collingridge, D. (1980), The Social Control of Technology. Pinter, London.
Cuijpers, C., Roosendaal, A., Koops, B. J. (eds.) (2007), FIDIS Deliverable D11.5: The legal framework for location-based services in Europe, Download: http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-WP11-del11.5-legal_framework_for_LBS.pdf.
Davis, F. D. (1989), ‘Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology’, MIS Quarterly 13 (3): 319–339.
Deuker, A. (ed.) (2008), FIDIS Deliverable D11.2: Mobility and LBS, Download: http://www. fidis.net/fileadmin/fidis/deliverables/fidis-wp11-del11.2_Mobility_and_LBS.pdf.
Dutton, W. H. (2001), Society on the Line. Information Politics in the Digital Age. A synthesis of research based on Britain's economic and social research council programme on information and communication technologies, Oxford University Press.
Fishbein, M., Ajzen, I. (1975), Belief, attitude, intention, and behavior : An introduction to theory and research, Addison-Wesley, Reading (Mass.).
Fung, R., Lee, M. (1999), EC-Trust (Trust in electronic commerce): Exploring the antecedent factors. In Proceedings of America Conference of Information System.
GIS Development (2006), Location Based Services, http://www.gisdevelopment.net/magazine/middleeast/2006/july-aug/22_2.htm, accessed February 2009.
GSM (2009), http://www.gsmworld.com/newsroom/market-data/ market_data_summary.htm, accessed February 2009.
Hansen, M., Berlich, P., Camenisch, J., Clauβ, S., Pfitzmann, A., Waidner, M. (2004), ‘Privacy-Enhancing Identity Management’, Information Security Technical Report (ISTR) 9 (1): 35–44.
Hildebrandt, M. and Gutwirth, S. (eds) (2005), FIDIS deliverable D7.4: Implications of profiling practices on democracy and rule of law, Download: http://www.fidis.net/filead-min/fidis/deliverables/fidis-wp7-del7.4.implication_profiling_practices.pdf.
Ludden et al (2002), Report on implementation issues related to access to location information by emergency services (E112) in the European Union, Coordination Group on Access to Location information for Emergency Services (C.G.A.L.I.E.S), Download: http://www.telematica.de/cgalies/.
Müller, G. and Wohlgemuth, S. (eds.) (2005), FIDIS deliverable D3.3: Study on Mobile Identity Management, Download: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.3.study_on_mobile_identity_management.pdf.
Ng-Kruelle, G., P. Swatman, D. Rebne and F. Hampe (2002), ‘The Price of Convenience: Privacy and Mobile Commerce’, Quarterly Journal of Electronic Commerce 3 (3): 273–385.
Nohria, N., Leestma, M. (2001), ‘A moving Target: The Mobile-Commerce Customer’, MIT Sloan Management Reviews, Spring Issue.
Nokia (2001), Mobile Location Services (White Paper), Download: http://nds2.ir.nokia.com/NOKIA_COM_1/About_Nokia/Press/White_Papers/pdf_files/mlbs.pdf.
Picot and Neuburger (2002), ‘Mobile Business — Erfolgsfaktoren und Voraussetzungen’, in: Reichwaldt (Hrsg.), Mobile Kommunikation Gabler, Wiesbaden, 55–69.
Rannenberg, K. (1994), ‘Recent Development in Information Technology Security Evaluation — The Need for Evaluation Criteria for multilateral Security’, in: Sizer, R. et al., Security and Control of Information Technology in Society — Proceedings of the IFIP TC9/WG 9.6 Working Conference August 12–17, 1993, St. Petersburg, Russia, North-Holland, Amsterdam, 113–128.
Rannenberg, K. (2000), ‘Multilateral Security — A concept and examples for balanced security’, Proceedings of the 9th ACM New Security Paradigms Workshop, Cork, Ireland: ACM Press, 151–162.
Rannenberg, K. (2004), ‘Identity management in mobile cellular networks and related applications’, Information Security Technical Report 9 (1): 77–85.
Rebne, D., G. Ng-Kruelle, P. Swatman and F. Hampe (2002), ‘Weberian Socioeconomic Behavioral Analysis and Price-of-convenience Sensitivity: Implications for MCom-merce and Location-based Applications’, 2002 CollECTeR (Europe) Conference on Electronic Commerce, Centre de Congres, Toulouse, France.
Reichwald, R., Meier, R., Fremuth, N. (2002), ‘Die Mobile Ökonomie — Definition und Spezifika’, in: Reichenwald, R., Mobile Kommunikation. Gabler, Wiesbaden, 4–15.
Ristola, A., Koivumaki, T., Kesti, M. (2005): ‘The Effect on Familiar Mobile Device and Usage Time on Creating Perceptions Towards Mobile Services’, International Conference on Mobile Business (ICMB'05), 384–391.
Rogers, E. M. (2003), The Diffusion of Innovations, 5th Edition, Free Press, New York.
Roussos, G., Peterson, D., Patel, U. (2003) ‘Mobile Identity Management: An Enacted View’, International Journal of E-Commerce, Vol. 8: 81–100.
Royer, D. (ed.) (2006), FIDIS Deliverable D11.1: Collection of Topics and Clusters of Mobility and Identity — Towards a Taxonomy of Mobility and Identity, Download: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp11-del11.1.mobility_and_identity.pdf
Royer, D. (ed.) (2008), FIDIS Deliverable D11.3: Economic aspects of mobility and identity, Download: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp11-del11.3.economic_aspects.pdf
Royer, D. and Meints, M. (2009; forthcoming): ‘Enterprise Identity Management — Towards a Decision Support Framework based on the Balanced Scorecard Approach’ Wirtschaftsinformatik 51 (3).
Royer, D. and Rannenberg, K. (2006) ‘Mobilität, mobile Technologie und Identität’ Datenschutz und Datensicherheit 30 (9): 571–575.
Saarenpää, A. (2002), ‘The constitutional state and digital identity’, Paper available on the website of the 2002 World Congress for Informatics and Law II Spain September 23rd to 27th 2002, http://www.ieid.org/congreso/ponencia_i.htm.
Schiller, J. H. (2003), Mobile Communications. 2nd ed., Addison-Wesley, London.
Schneberger, S. and Wade, M. (eds.) (2008), Theories Used in IS Research Wiki, http://www.fsc.yorku.ca/york/istheory/wiki/index.php/Main_Page, York (Canada), (Accessed on 30 June 2008).
Sheppard, B. H., Hartwick, J., Warshaw, P.R. (1988), ‘The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research’, Journal of Consumer Research 15: 325–343.
Siau, K. and Shen, Z. (2003), ‘Building Customer Trust in Mobile Commerce’, Communications of the ACM 46 (4): 91–94.
Sui, D.Z. (2004), ‘The media and the message of location-based services (LBS): Death of distance or the revenge of geography?’, Geoinformatics Proc. 12 th Int. Conf. on Geoinformatics — geospatial information research.
UN (2009), United Nations Member States, www.un.org/members/list.shtml, visited February 2009
Zibuschka, J., Fritsch, L., Radmacher, M., Scherner, T., Rannenberg, K. (2007) ‘Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning’, in: New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the 22nd IFIP TC-11 International Information Security Conference, Sandton, South Africa, 325–336.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Royer, D., Deuker, A., Rannenberg, K. (2009). Mobility and Identity. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-01820-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88480-4
Online ISBN: 978-3-642-01820-6
eBook Packages: Business and EconomicsBusiness and Management (R0)