| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Social distancing? Try a better way to work remotely on your online files. Dokkio, a new product from PBworks, can help your team find, organize, and collaborate on your Drive, Gmail, Dropbox, Box, and Slack files. Sign up for free.

View
 

Digital Identities Annotated Bibliography

Page history last edited by PBworks 12 years, 7 months ago

 

 

 

 

 

 

 

 

 

Baier, T., Zirpins, C., and Lamersdorf, W. "Digital Identity: How To Be Someone On The Net." IADIS Press. 2003: 815-820. e-Society. 19 March 2007.

 

          Baier et al. suggest that despite internet’s immense growth, not much evolution of infrastructure to directly support application-level communication have been made. They also outline the challenges that come with establishing digital identities such as authentication, semantics, security, and privacy. The question they pose is whether or not a system in today’s technology has shown to satisfy all the different areas of demand and maximize openness and efficiency.

 

Graham-Rowe, Duncan. “Privacy and prejudice: Whose ID is it anyway?” New Scientist. 2005;187:20-23. Academic Search Premier. 19 March 2007.

 

         This article analyzes the challenges and benefits of having a Biometric ID and how it has made personal information more effective and reliable. Duncan recognizes that the need for us to be able to securely and identify ourselves quickly and remotely reflects the current need to communicate constantly through the web. This makes rapid implementation of biometric technologies both necessary and inevitable.  

 

Greenfield, David. “Digital identity's hidden maestro.” Network Magazine. 2003;18:40. Academic Search Premier. 19 March 2007.

 

          This article seeks to define what “Digital Identities” are and what components are required to establish them. Greenfield also investigates some provisioning systems that are finally getting their due and how these systems differ in terms of their intercommunications with other applications in an attempt to aid organizations in finding a system that is most suited to their needs.

 

Grinter, R.E. & Palen, L. “Instant Messaging in Teen Life.” 2002;21-30. Computer Supported Cooperative Work. New Orleans: Louisiana. 19 March 2007.

 

         Grinter and Palen describe the technology of “Instant Messaging” as a tool that reinforces that social glue which ties people together. Aside from some concerns of unauthorized sharing of private information, their main focus was on the benefits of using IM. They point to how IM helps to maintain long-distance relationships and aid in group collaborations.

 

Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., Waidner, M. “Privacy-enhancing identity management.” Information Security Technical Report. 2004/0;9:35-44. Academic Search Premier. 19 March 2007.

 

          This article assesses how in order to ensure privacy and security, there needs to be better privacy-enhancing management systems which increase levels of surveillance, biometric recognition and universal identifiers. The system that Hansen et al. propose is PE-IMS which will enable people to assert their privacy rights in the online world.

 

Montfort, Nick. “Big technology.” Technology Review. 1999;102:99. Academic Search Premier. 19 March 2007.

 

          Montfort explains that the Internet have given rise to huge collaborations spanning numerous disciplines and national boundaries. Digital identities and virtual communities make it easy for large groups of people to collaborate together without much hierarchy and can also surpass national and language barriers.

 

Smith, M. & Kollock, P. “Communities in Cyberspace.” 1999. London: Routledge. 19 March 2007.

 

          This article illustrates that computer networks allow people to create a range of social spaces in which to meet and interact with one another. These spaces not only strip away differences which could cause bias and discrimination, such as gender, race, and age, but also allows exchanges between far-flung groups of people to be practical and convenient.

 

 

 

Comments (0)

You don't have permission to comment on this page.