Abstract
Electronic devices get more and more involved in many of our communication processes for personal and professional activities. Each communication process may implicitly affect our privacy. An example may be the location trace of mobile phones. Experts present identity management systems to preserve the user’s1 privacy [2]. In digital correspondence users should decide about disclosure of personally identifiable information (in the following simply called “data”). However, identity management for Everyman is not yet a commonplace.
In the context of this paper, the term “user” describes the person who is using the digital equipment related to the identity management sensitive activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acquisti A, Dingledine R, Syverson P (2003) On the Economics of Anonymity. Proc of Financial Cryptography (FC’ 03) LNCS 2742. http://freehaven.net/doc/fc03/ econymics.pdf
Clauß S, Köhntopp M (2001) Identity Management and its Support of Multilateral Security. Computer Networks, no 37, pp 205–219
Cooper A (1999) The Inmates are Running the Asylum. SAMS
Cooper A, Reimann R (2003) About Face 2.0 The Essentials of Interaction Design. Wiley Publishing USA
Gerd tom Markotten D (2003) Benutzbare Sicherheit fur informationstechnische Systeme. Dissertation an der Albert-Ludwigs-Universitat Freiburg
Gerd tom Markotten D, Kaiser J (2000) Benutzbare Sicherheit — Herausforderungen und Modell fur E-Commerce-Systeme. Wirtschaftsinformatik, vol 42, no 6, pp 531–538
Hansen M, Berlich P (2003) Identity Management Systems: Gateway and Guardian for Virtual Residences. EMTEL Conference New Media, Technology and Everyday Life in Europe Conference London
Pettersson JS, Fischer-Hübner S (eds) (2004) PRIME Deliverable D6.1.b Evaluation of Early Prototypes. www.prime-project.eu.org/public/primejlroducts/deliverables/
Leenes R, Lips M (2004) Social Evaluation of Early Prototypes. In: Pettersson JS, Fischer-Hubner S (eds) PRIME Deliverable D6.1.b; see [8].
NN (2004) Metaphorically Speaking. The Economist 373 (8399) Survey of Information Technology. Oct. 28, pp 16–17
van Rossum H, Gardeniers H, Borking J et al (1995) Privacy-Enhancing Technologies: The Path to Anonymity. Registrierkamer The Netherlands, and Information & Privacy Commissioner/Ontario Canada
Rost M (2004) Leben mit der Landkarte — Make Identity-Management Easy. www.maroki.de/pub/privacy/tm.html
Hillenbrand, Th (2004) Melindas Mutantenzoo. Spiegel Online. www.spiegel.de/netzwelt/netzkultur/O.1518,329307,00.html
Wohlgemuth S, Jendricke U, Gerd tom Markotten D, Domer F, Müller G (2003) Sicherheit und Benutzbarkeit durch Identitätsmanagement. Proc of Aktuelle Trends in der Softwareforschung — Tagungsband zum doITForschungstag 2003 IRB Verlag Stuttgart
Wolf G, Pfitzmann A (2000) Properties of Protection Goals and their Integration into a User Interface. Computer Networks, no 32, pp 685–699
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science-Business Media, LLC
About this paper
Cite this paper
Bergmann, M., Rost, M., Petterssorr, J.S. (2006). Exploring the Feasibility of a Spatial User Interface Paradigm for Privacy-Enhancing Technoloqy. In: Nilsson, A.G., Gustas, R., Wojtkowski, W., Wojtkowski, W.G., Wrycza, S., Zupančič, J. (eds) Advances in Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36402-5_37
Download citation
DOI: https://doi.org/10.1007/978-0-387-36402-5_37
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30834-0
Online ISBN: 978-0-387-36402-5
eBook Packages: Computer ScienceComputer Science (R0)