Skip to main content

Summary

While identity management systems for the Internet are debated intensively, identity management in mobile applications has grown silently over the last 17 years. Technologies, such as the still-growing Global System for Mobile Communication (GSM) with its Subscriber Identity Module (SIM) identification infrastructure, are foundations for many new mobile identity management related applications and services. This includes location-based services (LBS), offering customised and convenient services to users (e.g., friend finder applications) and new revenue opportunities for service providers (e.g., location-based advertising).

However, even though the opportunities seem to be endless and technology manageable, challenges arise when looking at advanced aspects of mobility and identity such as privacy, regulation, the socio-cultural aspects, and the economic impacts. To this regard, the interdisciplinary nature of mobility and identity is imminent and needs to be explored further. By learning from the diverse field of challenges, new mobile communication systems can be created, allowing for more privacy-preserving service provision and a more transparent handling of mobile identities.

This chapter presents three scenarios for mobile identities in life, work, and emergency situations: Mobile Communities, Traffic Monitoring, and Emergency Response via LBS. Based on these scenarios is an analysis of the specific properties of Mobile Identities, leading to a description of the FIDIS perspective on mobility and identity. Then a deeper analysis of the technological aspects of mobile networks gives the basis for the following closer look from the legal perspective on issues such as data protection and from the sociologic and economic perspectives. An outlook on the future challenges of mobility and identity concludes the chapter.

Over the last 20 years and to a large degree due to the mainstream usage of mobile communications (e.g., based on GSM networks), Mobility and Identity engaged in a special relation — precisely two special relations. On the one side, GSM technology, especially mobile devices, such as mobile phones and SIM cards, allowed the management of identity, which is now often termed mobile identity management. On the other side the properties of mobile communication networks and especially the administration of location and other context information with regard to mobile devices and the related users have added to the content of identity, which is reflected in the concept of ‘Mobile Identities’. Both aspects are illustrated in the first sections of this chapter. The following sections present different disciplines' perspectives on Mobility and Identity. These disciplines are technology, the law, sociology, and economics, as they contributed most actively on this topic in FIDIS. The chapter is concluded by a collection of requirements on mobile identity management systems and an outlook with further challenges and questions.

This chapter has been reviewed by Simone Fischer-Hübner (KU) and Martin Meints (ICPP). The authors thank the reviewers for their valuable comments and suggestions. This chapter is based on the work done in FIDIS Work Package 11 on Mobility and Identity. The respective deliverables can be found in the Annex of this book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ajzen, I. (1980), Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood Cliffs, NJ.

    Google Scholar 

  • Arvidsonn, A. (2004), ‘On the prehistory of the panoptic sort: mobility in market research’, Surveillance and Society 1 (4): 458.

    Google Scholar 

  • Barnes, S.J. and Huff, S.L. (2003), ‘Rising Sun: iMode and the Wireless Internet’, Communications of the ACM 46 (11): 79–84.

    Article  Google Scholar 

  • Beyers, H. (2002), ‘Het internet en de informatiesamenleving — criteria voor de adoptie van nieuwe technologie’, tijdschrift voor sociologie 23 (3/4: 545– 570.

    Google Scholar 

  • Büllingen,F. and Stamm, P. (2004), Mobile Multimedia-Dienste: Deutschlands Chance im globalen Wettbewerb, Bundesministerium für Wirtschaft und Arbeit.

    Google Scholar 

  • Castells, M. (1996), The rise of the Network Society, Blackwell, New York.

    Google Scholar 

  • Clarke, R. (2001), ‘Person-location and Person-tracking: technologies, risks and policy implications’, Information, Technology and People 14 (2): 206–231.

    Article  Google Scholar 

  • Collingridge, D. (1980), The Social Control of Technology. Pinter, London.

    Google Scholar 

  • Cuijpers, C., Roosendaal, A., Koops, B. J. (eds.) (2007), FIDIS Deliverable D11.5: The legal framework for location-based services in Europe, Download: http://www.fidis.net/ fileadmin/fidis/deliverables/fidis-WP11-del11.5-legal_framework_for_LBS.pdf.

  • Davis, F. D. (1989), ‘Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology’, MIS Quarterly 13 (3): 319–339.

    Article  Google Scholar 

  • Deuker, A. (ed.) (2008), FIDIS Deliverable D11.2: Mobility and LBS, Download: http://www. fidis.net/fileadmin/fidis/deliverables/fidis-wp11-del11.2_Mobility_and_LBS.pdf.

  • Dutton, W. H. (2001), Society on the Line. Information Politics in the Digital Age. A synthesis of research based on Britain's economic and social research council programme on information and communication technologies, Oxford University Press.

    Google Scholar 

  • Fishbein, M., Ajzen, I. (1975), Belief, attitude, intention, and behavior : An introduction to theory and research, Addison-Wesley, Reading (Mass.).

    Google Scholar 

  • Fung, R., Lee, M. (1999), EC-Trust (Trust in electronic commerce): Exploring the antecedent factors. In Proceedings of America Conference of Information System.

    Google Scholar 

  • GIS Development (2006), Location Based Services, http://www.gisdevelopment.net/magazine/middleeast/2006/july-aug/22_2.htm, accessed February 2009.

  • GSM (2009), http://www.gsmworld.com/newsroom/market-data/ market_data_summary.htm, accessed February 2009.

  • Hansen, M., Berlich, P., Camenisch, J., Clauβ, S., Pfitzmann, A., Waidner, M. (2004), ‘Privacy-Enhancing Identity Management’, Information Security Technical Report (ISTR) 9 (1): 35–44.

    Article  Google Scholar 

  • Hildebrandt, M. and Gutwirth, S. (eds) (2005), FIDIS deliverable D7.4: Implications of profiling practices on democracy and rule of law, Download: http://www.fidis.net/filead-min/fidis/deliverables/fidis-wp7-del7.4.implication_profiling_practices.pdf.

  • Ludden et al (2002), Report on implementation issues related to access to location information by emergency services (E112) in the European Union, Coordination Group on Access to Location information for Emergency Services (C.G.A.L.I.E.S), Download: http://www.telematica.de/cgalies/.

  • Müller, G. and Wohlgemuth, S. (eds.) (2005), FIDIS deliverable D3.3: Study on Mobile Identity Management, Download: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.3.study_on_mobile_identity_management.pdf.

  • Ng-Kruelle, G., P. Swatman, D. Rebne and F. Hampe (2002), ‘The Price of Convenience: Privacy and Mobile Commerce’, Quarterly Journal of Electronic Commerce 3 (3): 273–385.

    Google Scholar 

  • Nohria, N., Leestma, M. (2001), ‘A moving Target: The Mobile-Commerce Customer’, MIT Sloan Management Reviews, Spring Issue.

    Google Scholar 

  • Nokia (2001), Mobile Location Services (White Paper), Download: http://nds2.ir.nokia.com/NOKIA_COM_1/About_Nokia/Press/White_Papers/pdf_files/mlbs.pdf.

  • Picot and Neuburger (2002), ‘Mobile Business — Erfolgsfaktoren und Voraussetzungen’, in: Reichwaldt (Hrsg.), Mobile Kommunikation Gabler, Wiesbaden, 55–69.

    Google Scholar 

  • Rannenberg, K. (1994), ‘Recent Development in Information Technology Security Evaluation — The Need for Evaluation Criteria for multilateral Security’, in: Sizer, R. et al., Security and Control of Information Technology in Society — Proceedings of the IFIP TC9/WG 9.6 Working Conference August 12–17, 1993, St. Petersburg, Russia, North-Holland, Amsterdam, 113–128.

    Google Scholar 

  • Rannenberg, K. (2000), ‘Multilateral Security — A concept and examples for balanced security’, Proceedings of the 9th ACM New Security Paradigms Workshop, Cork, Ireland: ACM Press, 151–162.

    Chapter  Google Scholar 

  • Rannenberg, K. (2004), ‘Identity management in mobile cellular networks and related applications’, Information Security Technical Report 9 (1): 77–85.

    Article  Google Scholar 

  • Rebne, D., G. Ng-Kruelle, P. Swatman and F. Hampe (2002), ‘Weberian Socioeconomic Behavioral Analysis and Price-of-convenience Sensitivity: Implications for MCom-merce and Location-based Applications’, 2002 CollECTeR (Europe) Conference on Electronic Commerce, Centre de Congres, Toulouse, France.

    Google Scholar 

  • Reichwald, R., Meier, R., Fremuth, N. (2002), ‘Die Mobile Ökonomie — Definition und Spezifika’, in: Reichenwald, R., Mobile Kommunikation. Gabler, Wiesbaden, 4–15.

    Google Scholar 

  • Ristola, A., Koivumaki, T., Kesti, M. (2005): ‘The Effect on Familiar Mobile Device and Usage Time on Creating Perceptions Towards Mobile Services’, International Conference on Mobile Business (ICMB'05), 384–391.

    Google Scholar 

  • Rogers, E. M. (2003), The Diffusion of Innovations, 5th Edition, Free Press, New York.

    Google Scholar 

  • Roussos, G., Peterson, D., Patel, U. (2003) ‘Mobile Identity Management: An Enacted View’, International Journal of E-Commerce, Vol. 8: 81–100.

    Google Scholar 

  • Royer, D. (ed.) (2006), FIDIS Deliverable D11.1: Collection of Topics and Clusters of Mobility and Identity — Towards a Taxonomy of Mobility and Identity, Download: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp11-del11.1.mobility_and_identity.pdf

  • Royer, D. (ed.) (2008), FIDIS Deliverable D11.3: Economic aspects of mobility and identity, Download: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp11-del11.3.economic_aspects.pdf

  • Royer, D. and Meints, M. (2009; forthcoming): ‘Enterprise Identity Management — Towards a Decision Support Framework based on the Balanced Scorecard Approach’ Wirtschaftsinformatik 51 (3).

    Google Scholar 

  • Royer, D. and Rannenberg, K. (2006) ‘Mobilität, mobile Technologie und Identität’ Datenschutz und Datensicherheit 30 (9): 571–575.

    Article  Google Scholar 

  • Saarenpää, A. (2002), ‘The constitutional state and digital identity’, Paper available on the website of the 2002 World Congress for Informatics and Law II Spain September 23rd to 27th 2002, http://www.ieid.org/congreso/ponencia_i.htm.

  • Schiller, J. H. (2003), Mobile Communications. 2nd ed., Addison-Wesley, London.

    Google Scholar 

  • Schneberger, S. and Wade, M. (eds.) (2008), Theories Used in IS Research Wiki, http://www.fsc.yorku.ca/york/istheory/wiki/index.php/Main_Page, York (Canada), (Accessed on 30 June 2008).

  • Sheppard, B. H., Hartwick, J., Warshaw, P.R. (1988), ‘The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research’, Journal of Consumer Research 15: 325–343.

    Article  Google Scholar 

  • Siau, K. and Shen, Z. (2003), ‘Building Customer Trust in Mobile Commerce’, Communications of the ACM 46 (4): 91–94.

    Article  Google Scholar 

  • Sui, D.Z. (2004), ‘The media and the message of location-based services (LBS): Death of distance or the revenge of geography?’, Geoinformatics Proc. 12 th Int. Conf. on Geoinformatics — geospatial information research.

    Google Scholar 

  • UN (2009), United Nations Member States, www.un.org/members/list.shtml, visited February 2009

  • Zibuschka, J., Fritsch, L., Radmacher, M., Scherner, T., Rannenberg, K. (2007) ‘Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning’, in: New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the 22nd IFIP TC-11 International Information Security Conference, Sandton, South Africa, 325–336.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Royer, D., Deuker, A., Rannenberg, K. (2009). Mobility and Identity. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_5

Download citation

Publish with us

Policies and ethics