IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Protecting Identity without Comprising Privacy: Privacy Implications of Identity Protection

Protecting Identity without Comprising Privacy: Privacy Implications of Identity Protection
View Sample PDF
Author(s): Ioannis Iglezakis (Aristotle University of Thessaloniki, Greece)
Copyright: 2009
Pages: 27
Source title: Socioeconomic and Legal Implications of Electronic Intrusion
Source Author(s)/Editor(s): Dionysios Politis (Aristotle University of Thessaloniki, Greece), Phaedon-John Kozyris (Aristotle University of Thessaloniki, Greece)and Ioannis Iglezakis (Aristotle University of Thessaloniki, Greece)
DOI: 10.4018/978-1-60566-204-6.ch004

Purchase

View Protecting Identity without Comprising Privacy: Privacy Implications of Identity Protection on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, a specific issue is addressed that concerns the protection of privacy vis-à-vis the efforts to combat identity theft and protect personal identifying information. There are, in particular, measures undertaken by legislators that involve penal sanctions and the introduction of new technological means for identity verification. Also, identity management schemes are introduced, which are utilized by service providers, mainly in the e-business sector, in order to support controlled access to resources. The solutions undertaken to protect identity are seen as measures enhancing privacy, which is endangered by identity theft. Personal information is largely available in the information society and its collection by identity fraudsters is also possible. Therefore, an effective protection of information protection should also include the protection of identity. The downside of the identity protection approach is that identity management actually presents risks to privacy, since the processing of personal data takes place in this context and it is argued that there are certain implications concerning the lawfulness of the processing. The use of electronic authentication through electronic cards or biometrics on passports and identity cards pose privacy issues, too. Subsequently, the legislation concerning identity theft and identity related crime is outlined. This is followed by specific analysis of privacy issues concerning identity management and identity verification methods, with particular reference to biometrics.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom