Identity management policy and unlinkability: a comparative case study of the US and Germany
This study compares the privacy policies of Germany and the US in the field of identity management. It analyses the emergence of unlinkability within the countries’ electronic citizen identity initiatives. The study used qualitative research methods, including semi-structured interview and document...
| Main Author: | Rosner, Gilad L. |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/14358/ |
Similar Items
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Inter-social-networking: accounting for multiple identities
by: Price, Dominic, et al.
Published: (2015)
by: Price, Dominic, et al.
Published: (2015)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Understanding information disclosure behaviour in Australian facebook users
by: Newk-Fon Hey Tow, William, et al.
Published: (2008)
by: Newk-Fon Hey Tow, William, et al.
Published: (2008)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Young people's policy recommendations on algorithm fairness
by: Perez, Elvira, et al.
Published: (2017)
by: Perez, Elvira, et al.
Published: (2017)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Repacking ‘privacy’ for a networked world
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Reputation aware obfuscation for mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Living with interpersonal data: observability and accountability in the age of pervasive ICT
by: Goulden, Murray, et al.
Published: (2017)
by: Goulden, Murray, et al.
Published: (2017)
The Economic Context of Policy Analysis in Australia
by: Fenna, Alan
Published: (2015)
by: Fenna, Alan
Published: (2015)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The privacy concerns in location based services: protection approaches and remaining challenges
by: Basiri, Anahid, et al.
Published: (2016)
by: Basiri, Anahid, et al.
Published: (2016)
Digital privacy and personal, social and civic agency: refugees' experiences
by: Voigts, Matthew
Published: (2020)
by: Voigts, Matthew
Published: (2020)
Privacy and the Health Industry
by: Carew-Reid, Anne
Published: (2003)
by: Carew-Reid, Anne
Published: (2003)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Safeguarding privacy from criminal process
by: Purshouse, Joe
Published: (2017)
by: Purshouse, Joe
Published: (2017)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
Social gamers’ everyday (in)visibility tactics: playing within programmed constraints
by: Willson, Michele, et al.
Published: (2019)
by: Willson, Michele, et al.
Published: (2019)
Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings
by: Hattingh, H. Laetitia, et al.
Published: (2015)
by: Hattingh, H. Laetitia, et al.
Published: (2015)
Similar Items
-
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006) -
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006) -
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006) -
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006) -
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)