Abstract
The emergence of identity management indicates that the process of identification has reached a stage where analog and digital environments converge. This is also reflected in the increased efforts of governments to introduce electronic ID systems, aiming at security improvements of public services and unifying identification procedures to contribute to administrative efficiency. Though privacy is an obvious core issue, its role is rather implicit compared to security. Based on this premise, this paper discusses a control dilemma: the general aim of identity management to compensate for a loss of control over personal data to fight increasing security and privacy threats could ironically induce a further loss of control. Potential countermeasures demand user-controlled anonymity and pseudonymity as integral system components and imply further concepts which are in their early beginnings, e.g., limiting durability of personal data and transparency enhancements with regard to freedom of information to foster user control.
Chapter PDF
Similar content being viewed by others
References
Rundle, M., Blakley, B., Broberg, J., Nadalin, A., Olds, D., Ruddy, M., Guimarares, M.T.M., Trevithick, P.: At a crossroads: ”Personhood” and digital identity in the information society, No. JT03241547, OECD (2008), http://www.oecd.org/dataoecd/31/6/40204773.doc
Halperin, R., Backhouse, J.: A roadmap for research on identity in the information society. Identity in the Information Society 1(1), 71–87 (2008)
Bennett, C.J., Lyon, D.: Playing the identity card - surveillance, security and identification in global perspective. Routledge, London (2008)
Comité Européen de Normalisation (CEN), CEN/ISSS Workshop eAuthentication - Towards an electronic ID for the European Citizen, a strategic vision, Brussels (2004), http://www.vaestorekisterikeskus.fi/vrk/fineid/files.nsf/files/EE116CC13DFC98D0C225708C002BA544/$file/WS-eAuth_Vision_document+V017.pdf
Kubicek, H., Noack, T.: The path dependency of national electronic identities - A comparison of innovation processes in four European countries. Identity in the Information Society (2010), doi:10.1007/s12394-010-0050-2
Kubicek, H.: Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries. Identity in the Information Society (2010), doi:10.1007/s12394-010-0052-0
Lyon, D.: Identifying citizens - ID cards as Surveillance. Polity Press, Cambridge (2009)
Hood, C.C., Margetts, H.Z.: The Tools of Government in the Digital Age, 2nd edn. Public Policy and Politics. Palgrave Mcmillan, Hampshire (2007)
EU Commission: i2010 eGovernment Action Plan: Accelerating eGovernment in Europe for the Benefit of All, No. SEC (2006) 511, Brussels (2006)
Aichholzer, G., Strauß, S.: Electronic identity management in e-Government 2.0: Exploring a system innovation exemplified by Austria. Information Polity 15(1-2), 139–152 (2010)
Lips, M., Pang, C.: Identity Management in Information Age Government. Exploring Concepts, Definitions, Approaches and Solutions. Research Report, Victoria University of Wellington (2008), http://www.e.govt.nz/services/authentication/library/docs/idm-govt-08.pdf
Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology version 0.33 (2010), http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.33.pdf
Clauß, S., Pfitzmann, A., Hansen, M., Herreweghen, E.V.: Privacy-Enhancing Identity Management, 67, Institute for Prospective Technological Studies, IPTS (2005)
De Hert, P.: Identity management of e-ID, privacy and security in Europe. A human rights view. Information Security Technical Report 13, 71–75 (2008)
Roßnagel, A.: Datenschutz im 21. Jahrhundert. In: Aus Politik und Zeitgeschichte Band 5-6 (Digitalisierung und Datenschutz), pp. 9–15 (2006)
Pfitzmann, A., Borcea-Pfitzmann, K.: Lifelong Privacy: Privacy and Identity Management for Life. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity Management for Life, 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/ PrimeLife, International Summer School. IFIP AICT, vol. 320, pp. 1–17. Springer, Heidelberg (2010)
FIDIS: Privacy modelling and identity. Deliverable-Report 13.6. Future of Identity in the Information Society (2007), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp13-del13.6_Privacy_modelling_and_identity.pdf
Naumann, I., Hobgen, G.: Privacy Features of European eID Card Specifications: European Network and Information Security Agency, ENISA (2009), http://tinyurl.com/2unj3la
Priglinger, S.: Auswirkungen der EU-DL Richtlinie auf die E-Gov-Welt. In: Jahnel, D. (ed.) Jahrbuch Datenschutzrecht und E-Government, Neuer wissenschaftl. Verlag, Graz, pp. 267–283 (2008)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
Eckersley, P.: How Unique Is Your Web Browser? Electronic Frontier Foundation, EFF (2010), https://panopticlick.eff.org/browser-uniqueness.pdf
Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-Anonymize Social Network Users. Technical report, iSecLab (2010), http://tinyurl.com/yccfqqd
Pounder, C.N.M.: Nine principles for assessing whether privacy is protected in a surveillance society. Identity in the Information Society (IDIS) 1(1), 1–22 (2008)
Lyon, D. (ed.): Surveillance as social sorting - privacy, risk and digital discrimination. Routledge, London (2003)
Mayer-Schönberger, V.: Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press, Princeton (2009)
Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing Data Privacy with Self-Destructing Data. In: Proceedings of the USENIX Security Symposium, Montreal, Canada (2009), http://tinyurl.com/nmwfg9
Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Halderman, J.A., Rossbach, C.J., Waters, B., Witchel, E.: Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs (2009), http://www.cse.umich.edu/~jhalderm/pub/papers/unvanish-ndss10-web.pdf , doi:10.1.1.161.6643
Hildebrandt, M.: Profiling and the rule of the law. Identity in the Information Society 1(1), 55–70 (2008)
Mendel, T.: Freedom of information – a comparative legal survey, 2nd edn. UNESCO, Paris (2008)
FIDIS: Behavioural Biometric Profiling and Transparency Enhancing Tools. Deliverable Report 7.12. Future of Identity in the Information Society (2009), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp7-del7.12_behavioural-biometric_profiling_and_transparency_enhancing_tools.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Strauß, S. (2011). The Limits of Control – (Governmental) Identity Management from a Privacy Perspective. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds) Privacy and Identity Management for Life. Privacy and Identity 2010. IFIP Advances in Information and Communication Technology, vol 352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20769-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-20769-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20768-6
Online ISBN: 978-3-642-20769-3
eBook Packages: Computer ScienceComputer Science (R0)