TY - GEN
T1 - Privacy in digital identity systems
T2 - 14th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2015
AU - Khatchatourov, Armen
AU - Laurent, Maryline
AU - Levallois-Barth, Claire
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2015.
PY - 2015/1/1
Y1 - 2015/1/1
N2 - The use of privacy protection measures is of particular importance for existing and upcoming users’ digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying how they should be implemented. The paper contributes to the discussion on pseudonyms and multiple identities, by (1) providing an original analysis grid that can be applied for privacy evaluation in any eID architecture, and (2) introducing the concept of eID deployer allowing virtually any case of the relationship between the user, the eID implementation and the user’s digital identities to be modelled. Based on these inputs, a comparative analysis of four exemplary eID architectures deployed in European countries is conducted. The paper also discusses how sensitive citizens of these countries are to the privacy argument while adopting these systems, and presents the “privacy adoption paradox”.
AB - The use of privacy protection measures is of particular importance for existing and upcoming users’ digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying how they should be implemented. The paper contributes to the discussion on pseudonyms and multiple identities, by (1) providing an original analysis grid that can be applied for privacy evaluation in any eID architecture, and (2) introducing the concept of eID deployer allowing virtually any case of the relationship between the user, the eID implementation and the user’s digital identities to be modelled. Based on these inputs, a comparative analysis of four exemplary eID architectures deployed in European countries is conducted. The paper also discusses how sensitive citizens of these countries are to the privacy argument while adopting these systems, and presents the “privacy adoption paradox”.
KW - Digital identity
KW - E-Government
KW - Multiple/partial identities
KW - Personal data
KW - Privacy
KW - Privacy adoption paradox
KW - Privacy by design
KW - Privacy impact assessment
KW - Pseudonymous authentication
KW - Selective disclosure
KW - Technology adoption
KW - eID
KW - eID deployer
KW - eIDAS
U2 - 10.1007/978-3-319-22479-4_21
DO - 10.1007/978-3-319-22479-4_21
M3 - Conference contribution
AN - SCOPUS:84944755068
SN - 9783319224787
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 273
EP - 290
BT - Electronic Government - 14th IFIP WG 8.5 International Conference, EGOV 2015, Proceedings
A2 - Tambouris, Efthimios
A2 - Parycek, Peter
A2 - Scholl, Hans Jochen
A2 - Tarabanis, Konstantinos
A2 - Klievink, Bram
A2 - Janssen, Marijn
A2 - Gasco, Mila
A2 - Lindgren, Ida
A2 - Wimmer, Maria A.
PB - Springer Verlag
Y2 - 30 August 2015 through 2 September 2015
ER -