Towards a trusted national identities framework

Emerald - Tập 15 Số 1 - Trang 48-60 - 2013
JosephKwame Adjei1
1Center for Communication, Media and Information Technologies (CMI), Aalborg University – Copenhagen, Copenhagen, Denmark

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.1109/MVT.2011.941894

Bélanger, F. and Crossler, R.E. (2011), “Privacy in the digital age: a review of information privacy research in information systems”,MIS Quarterly, Vol. 35 No. 4, pp. 1017‐41.

10.1016/0167-4048(88)90009-0

10.1287/isre.1060.0096

10.1108/09593849410076799

10.1007/s12394-009-0006-6

Crosby, S.J. (2008),Challenges and Opportunities in Identity Assurance, available at: www.hm‐treasury.gov.uk/media/6/7/identity_assurance060308.pdf.

10.2307/249775

10.2307/249008

10.1037/0021-9010.74.4.580

10.1287/isre.3.1.60

DeLone, W.H. and McLean, E.R. (2003), “The DeLone and McLean model of information systems success: a ten‐year update”,Journal of Management Information Systems, Vol. 19 No. 4, pp. 9‐30.

10.2979/ESJ.2006.4.3.25

EnCoRe (2012),Ensuring Consent and Revocation (EnCoRe), available at: www.encore‐project.info (accessed 5 June 2012).

10.1177/0032329203256954

FIDIS (2009),Trust and Identification in the Light of Virtual Persons, D17.4, WP 17, available at: www.fidis.net/fileadmin/fidis/deliverables/new_deliverables/fidis‐wp17‐del17.4_Trust_and_Identification_in_the_Light_of_Virtual_Persons.pdf.

10.1037/h0024833

10.1109/MIC.2011.160

10.1177/0032329293021004006

IBM_Research (2010),IDEMIX (Identity mixing) Project Overview, available at: available at: www.zurich.ibm.com/pri/projects/idemix.html (accessed 28 February 2012).

10.1037/0022-3514.43.6.1306

10.1177/0275074005282860

10.1146/annurev.psych.50.1.569

10.1080/10720530500508720

Mayer, R.C., Davis, J.H. and Schoorman, D.F. (1995), “An integrative model of organizational trust”,The Academy of Management Review, Vol. 20 3, July, pp. 709‐34.

Microsoft_Connect (2010),Microsoft U‐Prove Community Technology Preview R2, available at: https://connect.microsoft.com/site1188.

10.1287/orsc.11.1.35.12567

Milne, G.R.G.M.E. (1993), “Direct mail privacy‐efficiency trade‐offs within an implied social contract framework”,Journal of Public Policy & Marketing, Vol. 12 No. 2, pp. 206‐15.

OECD (2009),The Role of Digital Identity Management in the Internet Economy: a Primer for Policy Makers, available at: www.oecd.org/dataoecd/55/48/43091476.pdf.

OECD (2011),Digital Identity Management for Natural Persons: Enabling Innovation and Trust in the Internet Economy – Guidance for Government Policy Makers, available at: http://dx.doi.org/10.1787/5kg1zqsm3pns‐en.

Pavlou, P.A. (2011), “State of the information privacy literature: where are we now and where should we go?”,MIS Quarterly, Vol. 35 No. 4, pp. 977‐88.

Pavlou, P.A., Liang, H. and Xue, Y. (2007), “Understanding and mitigating uncertainty in online exchange relationships: a principal‐agent perspective”,MIS Quarterly, Vol. 31 No. 1, pp. 105‐36.

10.1057/ejis.2008.15

10.1080/13691180210159328

10.1037/0021-9010.62.5.628

Schaupp, L.C., Fan, W. and Belanger, F. (2006), “Determining success for different web site goals”,Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, pp. 1‐10.

Smith, J.A. (2004a), “Reflecting on the development of interpretative phenomenological analysis and its contribution to qualitative research in psychology”,Qualitative Research in Psychology, Vol. 1 No. 1, pp. 39‐54.

10.1177/1473325004045668

10.1037/0021-9010.68.3.459

10.2753/MIS0742-1222250303

10.1037/0021-9010.66.3.308

10.1109/52.143112

WHO (2012),World Health Statics 2012, available at: www.who.int/gho/publications/world_health_statistics/2012/en/.

10.1108/00483489810368549

10.1504/IJIPM.2008.021435