The full text of this article
Identity and privacy in the digital age
by Robin Wilton
International Journal of Intellectual Property Management (IJIPM), Vol. 2, No. 4, 2008
Abstract: Organisations and data subjects alike are all facing up to the new challenges of online identity and privacy. For all the activity in this field, there is still much confusion and argument over basic terms and concepts. Technologists, systems architects, business people and policy-makers, for example, all describe privacy in different and sometimes incompatible terms and yet, for any given system to work, the views of all these different stakeholders must be successfully translated into technical implementation and coherent policy enforcement. This paper sets out a simple data model to describe the different types of identity data and relates this to typical system architectures and then to privacy as an information systems policy objective. The aim is to provide a consistent framework for thinking about identity data so we can understand how privacy arises from the correct interaction of data and policy.
Online publication date: Wed, 26-Nov-2008
is only available to individual subscribers or to users at subscribing institutions.
Go to Inderscience Online Journals to access the Full Text of this article.
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Intellectual Property Management (IJIPM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable).
See our Orders page to subscribe.
If you still need assistance, please email email@example.com