Results: RFID and Identity Management in everyday life - ITAS
Results: RFID and Identity Management in everyday life - ITAS
Results: RFID and Identity Management in everyday life - ITAS
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Discussion: multiple identities <strong>in</strong> smart environments<br />
This research report will provide <strong>in</strong>put to several sessions tak<strong>in</strong>g place <strong>in</strong> the next phase of this project.<br />
Dur<strong>in</strong>g these sessions we will develop scenarios for the sett<strong>in</strong>gs described above: which identities are<br />
attributed to users of <strong>RFID</strong> environments by the owners of that environment <strong>and</strong> users themselves?<br />
Sometimes third parties are <strong>in</strong>volved too, such as governments or market<strong>in</strong>g organisations. As a kick<br />
off for these sessions, we draw an extraction from our case studies for each sett<strong>in</strong>g.<br />
Public Transport<br />
User: I am …<br />
Users’ identity def<strong>in</strong>ed by…<br />
Owner: this users is … 3 rd parties: this user is …<br />
• a ticket holder<br />
• a ticket holder<br />
• a potential crim<strong>in</strong>al (police)<br />
• a frequent user<br />
• travell<strong>in</strong>g dur<strong>in</strong>g peak • a potential witnesses of a<br />
• pretend<strong>in</strong>g to have paid hours<br />
crime scene (police)<br />
while I have not (fare • tak<strong>in</strong>g certa<strong>in</strong> routes • a potential customer<br />
dodg<strong>in</strong>g)<br />
frequently<br />
(market<strong>in</strong>g)<br />
• be<strong>in</strong>g an anonymous • specify<strong>in</strong>g trips before or • my unreliable spouse<br />
traveller<br />
afterwards<br />
• fare dodg<strong>in</strong>g<br />
• a customer for additional<br />
services<br />
(partner)<br />
Work<br />
User: I am …<br />
Users’ identity def<strong>in</strong>ed by…<br />
Owner: this users is … 3 rd parties: this user is …<br />
• Hav<strong>in</strong>g legitimate access • Hav<strong>in</strong>g legitimate access • In danger dur<strong>in</strong>g<br />
(place, time) to certa<strong>in</strong> (place, time) to certa<strong>in</strong> emergencies<br />
areas<br />
areas<br />
• Be<strong>in</strong>g at work<br />
• Present/productive<br />
• Ga<strong>in</strong><strong>in</strong>g higher access • In danger dur<strong>in</strong>g<br />
levels<br />
emergencies<br />
• Work<strong>in</strong>g overtime<br />
• Near colleagues or devices<br />
• In danger dur<strong>in</strong>g<br />
• In an area while not<br />
emergencies<br />
allowed<br />
• Hav<strong>in</strong>g entered but never<br />
exited the build<strong>in</strong>g<br />
• A guest<br />
• A guest<br />
Roads<br />
User: I am…<br />
Users’ identity def<strong>in</strong>ed by…<br />
Owner: this users is… 3 rd parties: this user is…<br />
• a pay<strong>in</strong>g customer hav<strong>in</strong>g • a pay<strong>in</strong>g customer<br />
• a potential customer for<br />
access<br />
• a potential customer for additional services<br />
• prevent<strong>in</strong>g others to use my additional services<br />
(bus<strong>in</strong>esses)<br />
account<br />
• Comb<strong>in</strong><strong>in</strong>g acquir<strong>in</strong>g gas • a potential crim<strong>in</strong>al (police)<br />
• prevent<strong>in</strong>g l<strong>in</strong>ks with other or toll with consumption of • an unreliable spouse<br />
purchases (fast food)<br />
certa<strong>in</strong> products<br />
(partner)<br />
29