The future of identity in the information society challenges and opportunities

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Rannenberg, Kai 1964- (HerausgeberIn)
Format: Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2009
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV035499593
003 DE-604
005 20091116
007 t|
008 090520s2009 gw ad|| |||| 00||| eng d
015 |a 09,N15,0295  |2 dnb 
016 7 |a 993396127  |2 DE-101 
020 |a 9783540884804  |c GB. : EUR 171.15 (freier Pr.), sfr 265.50 (freier Pr.)  |9 978-3-540-88480-4 
024 3 |a 9783540884804 
028 5 2 |a 12547968 
035 |a (OCoLC)416294669 
035 |a (DE-599)DNB993396127 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-M382  |a DE-12  |a DE-473  |a DE-384 
050 0 |a QA76.9 
082 0 |a 323.4483  |2 22 
084 |a MS 1280  |0 (DE-625)123588:  |2 rvk 
084 |a PZ 4600  |0 (DE-625)141181:  |2 rvk 
084 |a 24,1  |2 ssgn 
084 |a 330  |2 sdnb 
245 1 0 |a The future of identity in the information society  |b challenges and opportunities  |c Kai Rannenberg ... , ed. 
264 1 |a Berlin [u.a.]  |b Springer  |c 2009 
300 |a XVI, 508 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 4 |a Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung 
650 4 |a Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung 
650 4 |a Data protection 
650 4 |a Identity theft  |x Prevention 
650 4 |a Information society 
650 4 |a Privacy, Right of 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenschutz  |0 (DE-588)4011134-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Identitätsverwaltung  |0 (DE-588)7546673-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerforensik  |0 (DE-588)4774034-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Informationsgesellschaft  |0 (DE-588)4114011-4  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
689 0 0 |a Informationsgesellschaft  |0 (DE-588)4114011-4  |D s 
689 0 1 |a Identitätsverwaltung  |0 (DE-588)7546673-9  |D s 
689 0 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 3 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Informationsgesellschaft  |0 (DE-588)4114011-4  |D s 
689 1 1 |a Identitätsverwaltung  |0 (DE-588)7546673-9  |D s 
689 1 2 |a Computerforensik  |0 (DE-588)4774034-6  |D s 
689 1 3 |a Datenschutz  |0 (DE-588)4011134-9  |D s 
689 1 |5 DE-604 
700 1 |a Rannenberg, Kai  |d 1964-  |0 (DE-588)132840103  |4 edt 
856 4 2 |m Digitalisierung BSBMuenchen  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017555837&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-017555837 

Datensatz im Suchindex

DE-473_call_number 31/MS 1280 WX 53543
DE-473_location 3
DE-BY-UBG_katkey 2643785
DE-BY-UBG_media_number 013107220723
_version_ 1824052463839215616
adam_text Table of Contents 1 Introduction 1 Kai Rannenberg, Denis Royer, and André Deuker I . I Identity in a Changing World 2 1 .1.1 One Identity or Many? Identity Unification vs. Identity Differentiation 2 1.1.2 Identity in Different Areas of the Information Society 3 1.2 The Role of FIDIS 5 1.3 On This Book 6 1.3.1 Basic Concepts 6 1.3.2 Identity and Advanced Technologies 7 1.3.3 Identity and Society 9 1.3.4 The Vignettes 10 1.3.5 The Annexes 11 Vignette 1 : Putting the Machines in Control 13 2 Identity of Identity 19 Thierry Nabeth 2. 1 Defining the Identity Concept 1 9 2.1.1 The Multidisciplinary Challenge 20 2.1.2 Identity: A Concept Subject to Major Evolutions 21 2.1.3 Addressing the Challenges 23 2.1 A Structure of This Chapter 24 2.2 Conceptualisation 24 2.2.1 Formal versus Informal Conceptualisation 25 2.2.2 Formal (or Explicit) Conceptualisation 26 2.2.3 Informal Conceptualisation with Narratives 29 2.2.4 Web 2.0 & Conceptualisation with Wikis, Blogs, Social Bookmarking and Other Tools 31 2.3 Identity of Identity Defined (Formal Conceptualisation) 35 2.3.1 The Concepts of Identity and Identification 36 2.3.2 (Self-)Identity Concepts. Some Models 39 2.3.3 Terminology of Identity 42 2.3.4 Profiles of the Person, and Overview 44 Table of Contents 2.4 Identity Use Cases and Scenarios 48 2.4.1 Virtual Online Social Environments, Real Identities Issues 49 2.4.2 Real Life in Virtual Worlds - Anthropological Analysis of MMO Games 52 2.4.3 Enjoy a Bar in 2012 53 2.4.4 Tracing the Identity of a Money Launderer 56 2.5 Making Use of the New (Web 2.0) Participatory Tools 59 2.5.1 Web 2.0 Initiatives 60 2.5.2 Discussion 60 2.6 Conclusion and Outlooks 61 References 62 Appendix: Table of FIDIS Web 2.0 Initiatives 66 Vignette 2: Virtually Living in Virtual Realities 71 3 Virtual Persons and Identities 75 David-Olivier Jaquet-Chiffelle, Emmanuel Benoist, RolfHaenni, Florent Wenger, and Harald Zwingelberg 3.1 Modelling New Forms of Identities 76 3.1.1 Partial Identities and Virtual Identities 77 3.1.2 The Case of Legal Persons 78 3.1.3 Identity and Privacy Issues 79 3.1.4 Unifying Model Based on Virtual Persons 80 3.1.5 Illustration of Our Model 83 3.1.6 Conclusion 84 3.2 Pseudonyms in the Light of Virtual Persons 85 3.2.1 Johnny Hallyday 88 3.2.2 Conclusion 91 3.3 Virtual Persons and the Law 92 3.3.1 Unborn Human Entities 92 3.3.2 New Challenges to Technology and Law 95 3.3.3 Conclusion 97 3.4 Trust in ι the Light of Virtual Persons 97 3.4.1 Research on Trust 98 3.4.2 Defining Trust 100 3.4.3 Trust Metrics and Trust Management Systems 111 3.4.4 Trust in the Light of Virtual Persons 115 3.4.5 Conclusion 116 References 117 Table of Contents XI Vignette 3: Use and Abuse of Biometric Data and Social Networks 123 4 High-Tech ID and Emerging Technologies 129 Martin Meints and Mark Gasson 4. 1 Identity Management and Identity Management Systems 1 30 4.2 Technologies and Technical Components 133 4.2.1 Public Key Infrastructure 133 4.2.2 Electronic Signatures 136 4.2.3 Biometrics 138 4.2.4 RFID 149 4.2.5 Credential Systems 154 4.3 Supporting Technologies 158 4.3.1 Trusted Computing 158 4.3.2 Protocols with Respect to Identity and Identification 162 4.3.3 Identity Management in Service Oriented Architectures 167 4.3.4 Digital Rights Management 171 4.4 Emerging Technologies 172 4.4.1 Ambient Intelligence 173 4.4.2 Human ICT Implants 175 4.5 Use Cases 176 4.5.1 ID Documents 176 4.5.2 CardSpace 181 4.6 Summary and Conclusions 183 References 185 Vignette 4: Powering the Profile: Plugging into the Mobile Grid 191 5 Mobility and Identity 195 Denis Royer, André Denker, and Kai Rannenberg 5.1 GSM - How Mobile Communication Achieved Its Special Role in Identity Management 196 5.2 Mobile Identities-Context Added 198 5.2.1 Context Extension via LBS and User Control 198 5.2.2 Mobile Identities in Action - A Scenario on Emergency Response 200 5.3 The FIDIS Perspectives on Mobility and Identity 202 XII Table of Contents 5.4 Technological Aspects 202 5.4.1 Management of Mobile Identities vs. Mobile Identity Management 203 5.4.2 Positioning Technologies and Methods 204 5.4.3 Accuracy of Positioning Technologies and Methods 211 5.4.4 Security and Privacy in Mobile Identity Management 211 5.5 Legal Aspects 215 5.5.1 Two European Directives on Data Protection 216 5.5.2 Location Data, Traffic Data, and Their Relation to Personal Data 217 5.5.3 Which Directives Apply to Which Types of Data? 219 5.5.4 Conclusion 220 5.6 Sociological Aspects 221 5.6.1 A Socio-technical View on Mobility and Identity 221 5.6.2 Price of Convenience (PoC) 223 5.7 Economic Aspects 225 5.7.1 Market Players 226 5.7.2 Building User Trust 227 5.7.3 Related Economic Theories 230 5.7.4 A Framework for Analysing the Economic Impacts of MIdM in Mobile Services and Applications 233 5.8 Requirements for Mobile Identity Management Systems 237 5.9 Outlook and Further Challenges and Questions 238 References 240 Vignette 5: Human Enhancement, Robots, and the Fight for Human Rights 243 6 Approaching Interoperability for Identity Management Systems 245 James Backhouse and Ruth Halperin 6.1 Introduction 245 6.1.1 Why Interoperability in ÍDMS: Relevance and Strategic Motivation 245 6.1.2 Interoperable Delivery of European eGovernment Services IDABC 246 6.1.3 Organization of This Chapter 247 6.2 Interoperable Identity Management Systems: Definitions and Framework 247 Table of Contents XIII 6.2.1 Conceptualizing Interoperability 247 6.2.2 The TFI Model 250 6.3 Stakeholders Perspectives on Interoperable iDMS 254 6.3.1 Expert Requirements for Interoperability 254 6.3.2 Citizens Perceptions on Interoperability 258 6.4 Conclusion 265 References 265 Appendix: Experts 267 Vignette 6: More Control for the Machines 269 7 Profiling and Ami 273 Mireille Hildebrandt 7.1 Profiling: Definitions, Applications and Risks 275 7.1.1 What Is Profiling? 275 7.1.2 Applications of Profiling 278 7.1.3 Profiling, Democracy and the Rule of Law 283 7.2 Profiling Technologies as the Enabling Technology for Ami 286 7.2.1 What about Ambient Intelligence? 286 7.2.2 Ami and Autonomie Profiling 287 7.2.3 Autonomie Profiling and Autonomous Action 288 7.2.4 Ami, Democracy and Rule of Law 290 7.3 When Idem Meets Ipse: The Identity of the European Citizen 292 7.3.1 Privacy and Identity 292 7.3.2 Idem (Sameness) and Ipse (Selfhood) 293 7.3.3 Freedom from and Freedom to 294 7.4 A Vision of Ambient Law 295 7.4.1 AmLawasLaw 296 7.4.2 Why Should Ami Require Another Type of Law? 296 7.4.3 From Written to Digital Law in Constitutional Democracy 300 7.4.4 Legal and Technological PETs and TETs 302 7.5 Conclusions 305 References 307 XIV Table of Contents Vignette 7: The Role of Forensics in Identity 311 б Identity-Related Crime and Forensics 315 Bert- Jaap Koops and Zeno Geradts 8.1 Introduction 315 8.2 Identity-Related Crime 316 8.2.1 The FIDIS Taxonomy of Identity-Related Crime 316 8.2.2 Aspects of Identity-Related Crime 322 8.3 Forensic Implications 329 8.3.1 Forensic Aspects 329 8.3.2 Example 1 : Mobile Networks 331 8.3.3 Example 2: Biometrie Devices 331 8.3.4 Conclusion 332 8.4 Forensic Profiling 333 8.4.1 Introduction 333 8.4.2 Definition of Forensic Profiling 334 8.4.3 Linkage Blindness and Limits of Profiling 334 8.4.4 Data Available 336 8.4.5 Structuring Evidence and Profiling 337 8.4.6 Forensic Profiling in an Investigative Perspective 337 8.4.7 Illicit Drug Profiling 341 8.4.8 Legal Aspects 342 8.5 Conclusion 344 Reference 345 Vignette 8: Dating 349 9 Privacy and Identity 351 Maike Gilliot, Vashek Maty as, and Sven Wohlgemuth 351 353 354 357 359 359 360 362 362 365 372 9.1 Introduction 9.2 Privacy Aware Concepts for ID Numbers 9.2.1 Legal Aspects 9.2.2 Sociological Aspects 9.2.3 Technical Aspects 9.2.4 European Approaches 9.2.5 Conclusions 9.3 Privacy Primitives and Applications 9.3.1 Privacy Primitives 9.3.2 Application Privacy 9.3.3 Summary Table of Contents XV 9.4 Privacy with Delegation of Personal Data 372 9.4.1 The One-Sided Trust Model in CRM 373 9.4.2 Delegation of Rights in CRM 374 9.4.3 Security Systems and Delegation of Rights 376 9.4.4 DREISAM: Protocols for Delegation of Rights 378 9.4.5 Proof-of-Concept Implementation of DREISAM for CRM 381 9.4.6 Properties of DREISAM 383 9.4.7 Conclusion 385 9.5 Towards Transparency 385 References 386 10 Open Challenges - Towards the (Not So Distant) Future of Identity 391 Kai Rannenberg and Denis Royer 10.1 Identity Reference Architectures 391 10.1.1 What Is to Be Done? 392 10.1.2 How Can It Be Done? 392 10.1.3 What Needs to Be Considered? 393 10.2 Identity Management and Privacy 393 10.2.1 What Is to Be Done? 393 10.2.2 How Can It Be Done? 395 10.2.3 What Needs to Be Considered? 396 10.3 Identity Management and Multilateral Security 396 10.3.1 What Is to Be Done? 397 10.3.2 How Can It Be Done? 397 10.3.3 What Needs to Be Considered? 397 10.4 Identity in the Internet of Things 398 10.4.1 What Needs to Be Done? 398 10.4.2 How Can It Be Done? 398 10.4.3 What Needs to Be Considered? 398 Appendix A. List of Deliverables 401 A. 1 Communication Infrastructure (WP 1 ) 401 A.2 Taxonomy: Identity of Identity (WP2) 402 A.3 HighTechID: Technologies to Support Identity and Identification (WP3) 404 A.4 Interoperability of Identity and Identification Concepts (WP4) 409 A.5 ID-Theft, Privacy and Security (WP5) 414 XVI Table of Contents A.6 Forensic Implications (WP6) 417 A.7 Profiling (WP7) 418 A.8 Integration of the NoE (WP8) 422 A.9 Mobility and Identity (WP 11) 423 A. 10 Emerging Technologies (WP12) 425 A.U Privacy Fundamentals (WP 13) 427 A. 12 Privacy in Business Processes (WP 14) 430 A. 13 eGovernment (WP 16) 432 A. 14 Abstract Persons ( WP 17) 432 Appendix B. Contributors 435 Appendix C. FIDIS Consortium 457 Appendix D. Proposal for a Common Identity Framework: A User-Centric Identity Metasystém 477 Kim Cameron, Reinhard Posch, and Kai Rannenberg D.I Introduction 477 D.2 Terminology 477 D.3 Scope 480 D.4 Metasystém Requirements in the Light of Multilateral Security 480 D.5 Abstract Model of the Identity Metasystém 485 D.6 Enabling Technologies 495 D.7 Administration 498 D.8 Standardisation 499 Glossary 50>1
any_adam_object 1
author2 Rannenberg, Kai 1964-
author2_role edt
author2_variant k r kr
author_GND (DE-588)132840103
author_facet Rannenberg, Kai 1964-
building Verbundindex
bvnumber BV035499593
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9
callnumber-search QA76.9
callnumber-sort QA 276.9
callnumber-subject QA - Mathematics
classification_rvk MS 1280
PZ 4600
ctrlnum (OCoLC)416294669
(DE-599)DNB993396127
dewey-full 323.4483
dewey-hundreds 300 - Social sciences
dewey-ones 323 - Civil and political rights
dewey-raw 323.4483
dewey-search 323.4483
dewey-sort 3323.4483
dewey-tens 320 - Political science (Politics and government)
discipline Rechtswissenschaft
Politologie
Soziologie
Wirtschaftswissenschaften
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02837nam a2200673 c 4500</leader><controlfield tag="001">BV035499593</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091116 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090520s2009 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N15,0295</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">993396127</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540884804</subfield><subfield code="c">GB. : EUR 171.15 (freier Pr.), sfr 265.50 (freier Pr.)</subfield><subfield code="9">978-3-540-88480-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540884804</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12547968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)416294669</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB993396127</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">323.4483</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 1280</subfield><subfield code="0">(DE-625)123588:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4600</subfield><subfield code="0">(DE-625)141181:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">330</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The future of identity in the information society</subfield><subfield code="b">challenges and opportunities</subfield><subfield code="c">Kai Rannenberg ... , ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 508 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity theft</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informationsgesellschaft</subfield><subfield code="0">(DE-588)4114011-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rannenberg, Kai</subfield><subfield code="d">1964-</subfield><subfield code="0">(DE-588)132840103</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=017555837&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017555837</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV035499593
illustrated Illustrated
indexdate 2025-02-14T17:50:01Z
institution BVB
isbn 9783540884804
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-017555837
oclc_num 416294669
open_access_boolean
owner DE-M382
DE-12
DE-473
DE-BY-UBG
DE-384
owner_facet DE-M382
DE-12
DE-473
DE-BY-UBG
DE-384
physical XVI, 508 S. Ill., graph. Darst.
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher Springer
record_format marc
spellingShingle The future of identity in the information society challenges and opportunities
Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung
Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung
Data protection
Identity theft Prevention
Information society
Privacy, Right of
Datensicherung (DE-588)4011144-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
Datenschutz (DE-588)4011134-9 gnd
Identitätsverwaltung (DE-588)7546673-9 gnd
Computerforensik (DE-588)4774034-6 gnd
Informationsgesellschaft (DE-588)4114011-4 gnd
subject_GND (DE-588)4011144-1
(DE-588)4274324-2
(DE-588)4011134-9
(DE-588)7546673-9
(DE-588)4774034-6
(DE-588)4114011-4
(DE-588)4143413-4
title The future of identity in the information society challenges and opportunities
title_auth The future of identity in the information society challenges and opportunities
title_exact_search The future of identity in the information society challenges and opportunities
title_full The future of identity in the information society challenges and opportunities Kai Rannenberg ... , ed.
title_fullStr The future of identity in the information society challenges and opportunities Kai Rannenberg ... , ed.
title_full_unstemmed The future of identity in the information society challenges and opportunities Kai Rannenberg ... , ed.
title_short The future of identity in the information society
title_sort the future of identity in the information society challenges and opportunities
title_sub challenges and opportunities
topic Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung
Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung
Data protection
Identity theft Prevention
Information society
Privacy, Right of
Datensicherung (DE-588)4011144-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
Datenschutz (DE-588)4011134-9 gnd
Identitätsverwaltung (DE-588)7546673-9 gnd
Computerforensik (DE-588)4774034-6 gnd
Informationsgesellschaft (DE-588)4114011-4 gnd
topic_facet Informationsgesellschaft - Identitätsverwaltung - Computerforensik - Datenschutz - Aufsatzsammlung
Informationsgesellschaft - Identitätsverwaltung - Computersicherheit - Datensicherung - Aufsatzsammlung
Data protection
Identity theft Prevention
Information society
Privacy, Right of
Datensicherung
Computersicherheit
Datenschutz
Identitätsverwaltung
Computerforensik
Informationsgesellschaft
Aufsatzsammlung
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017555837&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT rannenbergkai thefutureofidentityintheinformationsocietychallengesandopportunities