03.12.2012 Views

Results: RFID and Identity Management in everyday life - ITAS

Results: RFID and Identity Management in everyday life - ITAS

Results: RFID and Identity Management in everyday life - ITAS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Discussion: multiple identities <strong>in</strong> smart environments<br />

This research report will provide <strong>in</strong>put to several sessions tak<strong>in</strong>g place <strong>in</strong> the next phase of this project.<br />

Dur<strong>in</strong>g these sessions we will develop scenarios for the sett<strong>in</strong>gs described above: which identities are<br />

attributed to users of <strong>RFID</strong> environments by the owners of that environment <strong>and</strong> users themselves?<br />

Sometimes third parties are <strong>in</strong>volved too, such as governments or market<strong>in</strong>g organisations. As a kick<br />

off for these sessions, we draw an extraction from our case studies for each sett<strong>in</strong>g.<br />

Public Transport<br />

User: I am …<br />

Users’ identity def<strong>in</strong>ed by…<br />

Owner: this users is … 3 rd parties: this user is …<br />

• a ticket holder<br />

• a ticket holder<br />

• a potential crim<strong>in</strong>al (police)<br />

• a frequent user<br />

• travell<strong>in</strong>g dur<strong>in</strong>g peak • a potential witnesses of a<br />

• pretend<strong>in</strong>g to have paid hours<br />

crime scene (police)<br />

while I have not (fare • tak<strong>in</strong>g certa<strong>in</strong> routes • a potential customer<br />

dodg<strong>in</strong>g)<br />

frequently<br />

(market<strong>in</strong>g)<br />

• be<strong>in</strong>g an anonymous • specify<strong>in</strong>g trips before or • my unreliable spouse<br />

traveller<br />

afterwards<br />

• fare dodg<strong>in</strong>g<br />

• a customer for additional<br />

services<br />

(partner)<br />

Work<br />

User: I am …<br />

Users’ identity def<strong>in</strong>ed by…<br />

Owner: this users is … 3 rd parties: this user is …<br />

• Hav<strong>in</strong>g legitimate access • Hav<strong>in</strong>g legitimate access • In danger dur<strong>in</strong>g<br />

(place, time) to certa<strong>in</strong> (place, time) to certa<strong>in</strong> emergencies<br />

areas<br />

areas<br />

• Be<strong>in</strong>g at work<br />

• Present/productive<br />

• Ga<strong>in</strong><strong>in</strong>g higher access • In danger dur<strong>in</strong>g<br />

levels<br />

emergencies<br />

• Work<strong>in</strong>g overtime<br />

• Near colleagues or devices<br />

• In danger dur<strong>in</strong>g<br />

• In an area while not<br />

emergencies<br />

allowed<br />

• Hav<strong>in</strong>g entered but never<br />

exited the build<strong>in</strong>g<br />

• A guest<br />

• A guest<br />

Roads<br />

User: I am…<br />

Users’ identity def<strong>in</strong>ed by…<br />

Owner: this users is… 3 rd parties: this user is…<br />

• a pay<strong>in</strong>g customer hav<strong>in</strong>g • a pay<strong>in</strong>g customer<br />

• a potential customer for<br />

access<br />

• a potential customer for additional services<br />

• prevent<strong>in</strong>g others to use my additional services<br />

(bus<strong>in</strong>esses)<br />

account<br />

• Comb<strong>in</strong><strong>in</strong>g acquir<strong>in</strong>g gas • a potential crim<strong>in</strong>al (police)<br />

• prevent<strong>in</strong>g l<strong>in</strong>ks with other or toll with consumption of • an unreliable spouse<br />

purchases (fast food)<br />

certa<strong>in</strong> products<br />

(partner)<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!