Avoidance, Causes and Possible Cures
Buch, Englisch, 184 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 477 g
ISBN: 978-0-387-34589-5
Verlag: Springer US
Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest. There is a collision occurring in identity management. Identity technologies are problematic, and many see light at the end of the identity theft tunnel. Yet the innovation is driven by individual tendencies to seek convenience and business imperatives to minimize risk with maximized profit. The light is an oncoming identity train wreck of maximum individual exposure, social risk and minimal privacy. The primary debate over identity technologies is happening on the issue of centralization. RealID is effectively a centralized standard with a slightly distributed back-end (e.g., fifty servers). RealID is a national ID card. Many mechanisms for federated identities, such as OpenID or the Liberty Alliance, imagine a network of identifiers shared on an as-needed or ad-hoc process. These systems accept the limits of human information processing, and thus use models that work on paper. Using models that work on paper results in systematic risk of identity theft in this information economy. There are alternatives to erosions of privacy and increasing fraud. There is an ideal where individuals have multiple devices, including computers, smart cards, and cell phones. Smart cards are credit card devices that are cryptographically secure. This may be shared and misused, or secure and privacy enhancing. Yet such a system requires coordinated investment.
Zielgruppe
Computer Communication Networks, Data Structures, Cryptology and Information Theory, Data Encryption, Coding and Information Theory, Economics/Management Science, general, Economic Systems, Camp, Economics, Identity, Theft, Good name, value, privacy
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftssysteme, Wirtschaftsstrukturen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
Weitere Infos & Material
Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and Trusting Hardware.- Technologies of Identity.- Anonymous Identifiers.- Digital Signatures.- Strengths and Weaknesses of Biometrics.- Reputation.- Scenario I: Your Credentials Please.- Scenario II: Universal National Identifier.- Scenario III: Sets of attributes.- Scenario IV: Ubiquitous Identity Theft.- Closing.