The future of identity in the information society challenges and opportunities
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035499593 | ||
003 | DE-604 | ||
005 | 20091116 | ||
007 | t| | ||
008 | 090520s2009 gw ad|| |||| 00||| eng d | ||
015 | |a 09,N15,0295 |2 dnb | ||
016 | 7 | |a 993396127 |2 DE-101 | |
020 | |a 9783540884804 |c GB. : EUR 171.15 (freier Pr.), sfr 265.50 (freier Pr.) |9 978-3-540-88480-4 | ||
024 | 3 | |a 9783540884804 | |
028 | 5 | 2 | |a 12547968 |
035 | |a (OCoLC)416294669 | ||
035 | |a (DE-599)DNB993396127 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-M382 |a DE-12 |a DE-473 |a DE-384 | ||
050 | 0 | |a QA76.9 | |
082 | 0 | |a 323.4483 |2 22 | |
084 | |a MS 1280 |0 (DE-625)123588: |2 rvk | ||
084 | |a PZ 4600 |0 (DE-625)141181: |2 rvk | ||
084 | |a 24,1 |2 ssgn | ||
084 | |a 330 |2 sdnb | ||
245 | 1 | 0 | |a The future of identity in the information society |b challenges and opportunities |c Kai Rannenberg ... , ed. |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XVI, 508 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung | |
650 | 4 | |a Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung | |
650 | 4 | |a Data protection | |
650 | 4 | |a Identity theft |x Prevention | |
650 | 4 | |a Information society | |
650 | 4 | |a Privacy, Right of | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |D s |
689 | 0 | 1 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informationsgesellschaft |0 (DE-588)4114011-4 |D s |
689 | 1 | 1 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 1 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | 3 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Rannenberg, Kai |d 1964- |0 (DE-588)132840103 |4 edt | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017555837&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017555837 |
Datensatz im Suchindex
DE-473_call_number | 31/MS 1280 WX 53543 |
---|---|
DE-473_location | 3 |
DE-BY-UBG_katkey | 2643785 |
DE-BY-UBG_media_number | 013107220723 |
_version_ | 1824052463839215616 |
adam_text | Table
of Contents
1
Introduction
1
Kai
Rannenberg, Denis
Royer,
and
André
Deuker
I
.
I Identity in a Changing World
2
1
.1.1
One Identity or Many? Identity Unification vs. Identity
Differentiation
2
1.1.2
Identity in Different Areas of the Information Society
3
1.2
The Role of FIDIS
5
1.3
On This Book
6
1.3.1
Basic Concepts
6
1.3.2
Identity and Advanced Technologies
7
1.3.3
Identity and Society
9
1.3.4
The Vignettes
10
1.3.5
The Annexes
11
Vignette
1 :
Putting the Machines in Control
13
2
Identity of Identity
19
Thierry Nabeth
2.
1 Defining the Identity Concept 1
9
2.1.1
The Multidisciplinary Challenge
20
2.1.2
Identity: A Concept Subject to Major Evolutions
21
2.1.3
Addressing the Challenges
23
2.1
A Structure of This Chapter
24
2.2
Conceptualisation
24
2.2.1
Formal versus Informal Conceptualisation
25
2.2.2
Formal (or Explicit) Conceptualisation
26
2.2.3
Informal Conceptualisation with Narratives
29
2.2.4
Web
2.0 &
Conceptualisation with Wikis, Blogs,
Social Bookmarking and Other Tools
31
2.3
Identity of Identity Defined (Formal Conceptualisation)
35
2.3.1
The Concepts of Identity and Identification
36
2.3.2
(Self-)Identity Concepts. Some Models
39
2.3.3
Terminology of Identity
42
2.3.4
Profiles of the Person, and Overview
44
Table
of
Contents
2.4
Identity Use Cases and Scenarios
48
2.4.1
Virtual Online Social Environments, Real
Identities Issues
49
2.4.2
Real Life in Virtual Worlds
-
Anthropological Analysis
of MMO Games
52
2.4.3
Enjoy a Bar in
2012 53
2.4.4
Tracing the Identity of a Money Launderer
56
2.5
Making Use of the New (Web
2.0)
Participatory Tools
59
2.5.1
Web
2.0
Initiatives
60
2.5.2
Discussion
60
2.6
Conclusion and Outlooks
61
References
62
Appendix: Table of FIDIS Web
2.0
Initiatives
66
Vignette
2:
Virtually Living in Virtual Realities
71
3
Virtual Persons and Identities
75
David-Olivier Jaquet-Chiffelle, Emmanuel Benoist, RolfHaenni,
Florent
Wenger, and
Harald Zwingelberg
3.1
Modelling New Forms of Identities
76
3.1.1
Partial Identities and Virtual Identities
77
3.1.2
The Case of Legal Persons
78
3.1.3
Identity and Privacy Issues
79
3.1.4
Unifying Model Based on Virtual Persons
80
3.1.5
Illustration of Our Model
83
3.1.6
Conclusion
84
3.2
Pseudonyms in the Light of Virtual Persons
85
3.2.1
Johnny Hallyday
88
3.2.2
Conclusion
91
3.3
Virtual
Persons and the Law
92
3.3.1
Unborn Human Entities
92
3.3.2
New Challenges to Technology and Law
95
3.3.3
Conclusion
97
3.4
Trust in
ι
the Light of Virtual Persons
97
3.4.1
Research on Trust
98
3.4.2
Defining Trust
100
3.4.3
Trust Metrics and Trust Management Systems
111
3.4.4
Trust in the Light of Virtual Persons
115
3.4.5
Conclusion
116
References
117
Table
of
Contents
XI
Vignette 3:
Use and Abuse of Biometric Data and
Social Networks
123
4
High-Tech ID and Emerging Technologies
129
Martin Meints and Mark Gasson
4.
1 Identity Management and Identity Management Systems 1
30
4.2
Technologies and Technical Components
133
4.2.1
Public Key Infrastructure
133
4.2.2
Electronic Signatures
136
4.2.3
Biometrics
138
4.2.4
RFID
149
4.2.5
Credential Systems
154
4.3
Supporting Technologies
158
4.3.1
Trusted Computing
158
4.3.2
Protocols with Respect to Identity and Identification
162
4.3.3
Identity Management in Service Oriented Architectures
167
4.3.4
Digital Rights Management
171
4.4
Emerging Technologies
172
4.4.1
Ambient Intelligence
173
4.4.2
Human ICT Implants
175
4.5
Use Cases
176
4.5.1
ID Documents
176
4.5.2
CardSpace
181
4.6
Summary and Conclusions
183
References
185
Vignette
4:
Powering the Profile: Plugging into the
Mobile Grid
191
5
Mobility and Identity
195
Denis Royer,
André
Denker,
and
Kai Rannenberg
5.1
GSM
-
How Mobile Communication Achieved Its Special Role in
Identity Management
196
5.2
Mobile Identities-Context Added
198
5.2.1
Context Extension via LBS and User Control
198
5.2.2
Mobile Identities in Action
-
A Scenario on
Emergency Response
200
5.3
The FIDIS Perspectives on Mobility and Identity
202
XII Table of
Contents
5.4
Technological Aspects
202
5.4.1
Management of Mobile Identities vs. Mobile Identity
Management
203
5.4.2
Positioning Technologies and Methods
204
5.4.3
Accuracy of Positioning Technologies and Methods
211
5.4.4
Security and Privacy in Mobile Identity Management
211
5.5
Legal Aspects
215
5.5.1
Two European Directives on Data Protection
216
5.5.2
Location Data, Traffic Data, and Their Relation to
Personal Data
217
5.5.3
Which Directives Apply to Which Types of Data?
219
5.5.4
Conclusion
220
5.6
Sociological Aspects
221
5.6.1
A Socio-technical View on Mobility and Identity
221
5.6.2
Price of Convenience (PoC)
223
5.7
Economic Aspects
225
5.7.1
Market Players
226
5.7.2
Building User Trust
227
5.7.3
Related Economic Theories
230
5.7.4
A Framework for Analysing the Economic Impacts of
MIdM in Mobile Services and Applications
233
5.8
Requirements for Mobile Identity Management Systems
237
5.9
Outlook and Further Challenges and Questions
238
References
240
Vignette
5:
Human Enhancement, Robots, and the
Fight for Human Rights
243
6
Approaching Interoperability for Identity
Management Systems
245
James Backhouse and Ruth Halperin
6.1
Introduction
245
6.1.1
Why Interoperability in
ÍDMS:
Relevance and Strategic
Motivation
245
6.1.2
Interoperable Delivery of European eGovernment
Services IDABC
246
6.1.3
Organization of This Chapter
247
6.2
Interoperable Identity Management Systems: Definitions and
Framework
247
Table
of
Contents XIII
6.2.1
Conceptualizing Interoperability
247
6.2.2
The TFI Model
250
6.3
Stakeholders Perspectives on Interoperable iDMS
254
6.3.1
Expert Requirements for Interoperability
254
6.3.2
Citizens Perceptions on Interoperability
258
6.4
Conclusion
265
References
265
Appendix: Experts
267
Vignette
6:
More Control for the Machines
269
7
Profiling and Ami
273
Mireille
Hildebrandt
7.1
Profiling: Definitions, Applications and Risks
275
7.1.1
What Is Profiling?
275
7.1.2
Applications of Profiling
278
7.1.3
Profiling, Democracy and the Rule of Law
283
7.2
Profiling Technologies as the Enabling Technology for Ami
286
7.2.1
What about Ambient Intelligence?
286
7.2.2
Ami and
Autonomie
Profiling
287
7.2.3 Autonomie
Profiling and Autonomous Action
288
7.2.4
Ami, Democracy and Rule of Law
290
7.3
When Idem Meets
Ipse:
The Identity of the European Citizen
292
7.3.1
Privacy and Identity
292
7.3.2
Idem (Sameness) and
Ipse
(Selfhood)
293
7.3.3
Freedom from and Freedom to
294
7.4
A Vision of Ambient Law
295
7.4.1
AmLawasLaw
296
7.4.2
Why Should Ami Require Another Type of Law?
296
7.4.3
From Written to Digital Law in Constitutional
Democracy
300
7.4.4
Legal and Technological PETs and TETs
302
7.5
Conclusions
305
References
307
XIV Table of
Contents
Vignette 7:
The Role of Forensics in Identity
311
б
Identity-Related Crime and Forensics
315
Bert-
Jaap
Koops and
Zeno
Geradts
8.1
Introduction
315
8.2
Identity-Related Crime
316
8.2.1
The FIDIS Taxonomy of Identity-Related Crime
316
8.2.2
Aspects of Identity-Related Crime
322
8.3
Forensic Implications
329
8.3.1
Forensic Aspects
329
8.3.2
Example
1 :
Mobile Networks
331
8.3.3
Example
2:
Biometrie
Devices
331
8.3.4
Conclusion
332
8.4
Forensic Profiling
333
8.4.1
Introduction
333
8.4.2
Definition of Forensic Profiling
334
8.4.3
Linkage Blindness and Limits of Profiling
334
8.4.4
Data Available
336
8.4.5
Structuring Evidence and Profiling
337
8.4.6
Forensic Profiling in an Investigative Perspective
337
8.4.7
Illicit Drug Profiling
341
8.4.8
Legal Aspects
342
8.5
Conclusion
344
Reference
345
Vignette
8:
Dating
349
9
Privacy and Identity
351
Maike Gilliot, Vashek Maty as, and
Sven Wohlgemuth
351
353
354
357
359
359
360
362
362
365
372
9.1
Introduction
9.2
Privacy Aware Concepts for ID Numbers
9.2.1
Legal Aspects
9.2.2
Sociological Aspects
9.2.3
Technical Aspects
9.2.4
European Approaches
9.2.5
Conclusions
9.3
Privacy Primitives and Applications
9.3.1
Privacy Primitives
9.3.2
Application Privacy
9.3.3
Summary
Table of
Contents
XV
9.4
Privacy with Delegation of Personal Data
372
9.4.1
The One-Sided Trust Model in CRM
373
9.4.2
Delegation of Rights in CRM
374
9.4.3
Security Systems and Delegation of Rights
376
9.4.4
DREISAM: Protocols for Delegation of Rights
378
9.4.5
Proof-of-Concept Implementation of DREISAM
for CRM
381
9.4.6
Properties of DREISAM
383
9.4.7
Conclusion
385
9.5
Towards Transparency
385
References
386
10
Open Challenges
-
Towards the (Not So Distant)
Future of Identity
391
Kai Rannenberg
and
Denis Royer
10.1
Identity Reference Architectures
391
10.1.1
What Is to Be Done?
392
10.1.2
How Can It Be Done?
392
10.1.3
What Needs to Be Considered?
393
10.2
Identity Management and Privacy
393
10.2.1
What Is to Be Done?
393
10.2.2
How Can It Be Done?
395
10.2.3
What Needs to Be Considered?
396
10.3
Identity Management and Multilateral Security
396
10.3.1
What Is to Be Done?
397
10.3.2
How Can It Be Done?
397
10.3.3
What Needs to Be Considered?
397
10.4
Identity in the Internet of Things
398
10.4.1
What Needs to Be Done?
398
10.4.2
How Can It Be Done?
398
10.4.3
What Needs to Be Considered?
398
Appendix A. List of Deliverables
401
A.
1
Communication Infrastructure (WP
1 ) 401
A.2 Taxonomy: Identity of Identity (WP2)
402
A.3 HighTechID: Technologies to Support Identity and
Identification (WP3)
404
A.4 Interoperability of Identity and Identification Concepts (WP4)
409
A.5 ID-Theft, Privacy and Security (WP5)
414
XVI Table of
Contents
A.6
Forensic Implications (WP6)
417
A.7 Profiling (WP7)
418
A.8 Integration of the NoE (WP8)
422
A.9 Mobility and Identity (WP
11) 423
A.
10
Emerging Technologies (WP12)
425
A.U Privacy Fundamentals (WP
13) 427
A.
12
Privacy in Business Processes (WP
14) 430
A.
13
eGovernment (WP
16) 432
A.
14
Abstract Persons
(
WP
17) 432
Appendix B. Contributors
435
Appendix C. FIDIS Consortium
457
Appendix D. Proposal for a Common Identity
Framework: A User-Centric Identity
Metasystém
477
Kim Cameron,
Reinhard Posch,
and
Kai Rannenberg
D.I Introduction
477
D.2 Terminology 477
D.3 Scope 480
D.4
Metasystém
Requirements in the Light of Multilateral Security
480
D.5 Abstract Model of the Identity
Metasystém
485
D.6 Enabling Technologies
495
D.7 Administration 498
D.8 Standardisation
499
Glossary 50>1
|
any_adam_object | 1 |
author2 | Rannenberg, Kai 1964- |
author2_role | edt |
author2_variant | k r kr |
author_GND | (DE-588)132840103 |
author_facet | Rannenberg, Kai 1964- |
building | Verbundindex |
bvnumber | BV035499593 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9 |
callnumber-search | QA76.9 |
callnumber-sort | QA 276.9 |
callnumber-subject | QA - Mathematics |
classification_rvk | MS 1280 PZ 4600 |
ctrlnum | (OCoLC)416294669 (DE-599)DNB993396127 |
dewey-full | 323.4483 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 323 - Civil and political rights |
dewey-raw | 323.4483 |
dewey-search | 323.4483 |
dewey-sort | 3323.4483 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Rechtswissenschaft Politologie Soziologie Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02837nam a2200673 c 4500</leader><controlfield tag="001">BV035499593</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091116 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090520s2009 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N15,0295</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">993396127</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540884804</subfield><subfield code="c">GB. : EUR 171.15 (freier Pr.), sfr 265.50 (freier Pr.)</subfield><subfield code="9">978-3-540-88480-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540884804</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12547968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)416294669</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB993396127</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">323.4483</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 1280</subfield><subfield code="0">(DE-625)123588:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4600</subfield><subfield code="0">(DE-625)141181:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">330</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The future of identity in the information society</subfield><subfield code="b">challenges and opportunities</subfield><subfield code="c">Kai Rannenberg ... , ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 508 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity theft</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rannenberg, Kai</subfield><subfield code="d">1964-</subfield><subfield code="0">(DE-588)132840103</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017555837&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017555837</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035499593 |
illustrated | Illustrated |
indexdate | 2025-02-14T17:50:01Z |
institution | BVB |
isbn | 9783540884804 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017555837 |
oclc_num | 416294669 |
open_access_boolean | |
owner | DE-M382 DE-12 DE-473 DE-BY-UBG DE-384 |
owner_facet | DE-M382 DE-12 DE-473 DE-BY-UBG DE-384 |
physical | XVI, 508 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
spellingShingle | The future of identity in the information society challenges and opportunities Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung Data protection Identity theft Prevention Information society Privacy, Right of Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Computerforensik (DE-588)4774034-6 gnd Informationsgesellschaft (DE-588)4114011-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4011134-9 (DE-588)7546673-9 (DE-588)4774034-6 (DE-588)4114011-4 (DE-588)4143413-4 |
title | The future of identity in the information society challenges and opportunities |
title_auth | The future of identity in the information society challenges and opportunities |
title_exact_search | The future of identity in the information society challenges and opportunities |
title_full | The future of identity in the information society challenges and opportunities Kai Rannenberg ... , ed. |
title_fullStr | The future of identity in the information society challenges and opportunities Kai Rannenberg ... , ed. |
title_full_unstemmed | The future of identity in the information society challenges and opportunities Kai Rannenberg ... , ed. |
title_short | The future of identity in the information society |
title_sort | the future of identity in the information society challenges and opportunities |
title_sub | challenges and opportunities |
topic | Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung Data protection Identity theft Prevention Information society Privacy, Right of Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Computerforensik (DE-588)4774034-6 gnd Informationsgesellschaft (DE-588)4114011-4 gnd |
topic_facet | Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung Data protection Identity theft Prevention Information society Privacy, Right of Datensicherung Computersicherheit Datenschutz Identitätsverwaltung Computerforensik Informationsgesellschaft Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017555837&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rannenbergkai thefutureofidentityintheinformationsocietychallengesandopportunities |