03.12.2012 Views

Results: RFID and Identity Management in everyday life - ITAS

Results: RFID and Identity Management in everyday life - ITAS

Results: RFID and Identity Management in everyday life - ITAS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Aim <strong>and</strong> methodology<br />

This research aims to provide <strong>in</strong>sight <strong>in</strong>to how users <strong>and</strong> owners/ma<strong>in</strong>ta<strong>in</strong>ers of different<br />

environments manage identity. <strong>Identity</strong> <strong>Management</strong> is understood as how a person, <strong>in</strong>teract<strong>in</strong>g<br />

with an <strong>in</strong>formation system, def<strong>in</strong>es what is known <strong>and</strong> not known about him/her to the system <strong>and</strong><br />

how this relates to how this is def<strong>in</strong>ed by the owner of the system.<br />

Research questions<br />

In order to reach this aim, the follow<strong>in</strong>g research questions are formulated:<br />

• In what k<strong>in</strong>ds of sett<strong>in</strong>gs are <strong>RFID</strong> systems used to identify people?<br />

• What purposes do the <strong>RFID</strong> systems serve?<br />

• What k<strong>in</strong>d of <strong>in</strong>formation is stored on the chip <strong>and</strong> database of the <strong>RFID</strong> system?<br />

• How do users <strong>and</strong> owners of the system, consciously or unconsciously, <strong>in</strong>fluence what k<strong>in</strong>d of<br />

personal <strong>in</strong>formation is known?<br />

• What are the tradeoffs of provid<strong>in</strong>g more or less personal <strong>in</strong>formation?<br />

• What choices are available to the users <strong>and</strong> owners of the <strong>RFID</strong>-systems <strong>in</strong> <strong>in</strong>teract<strong>in</strong>g with the<br />

system?<br />

Methodology<br />

Be<strong>in</strong>g still relatively <strong>in</strong>visible <strong>in</strong> the public debate, <strong>RFID</strong> is difficult to <strong>in</strong>vestigate through quantitative<br />

methods. A survey by Cap Gem<strong>in</strong>i for example ‘<strong>RFID</strong> <strong>and</strong> Consumers’ (2005), showed very few<br />

European citizens even know what <strong>RFID</strong> is, let alone have formed an op<strong>in</strong>ion on it. Only 20% had<br />

ever heard of <strong>RFID</strong> <strong>and</strong> the respondents who could state an op<strong>in</strong>ion needed much additional technical<br />

explanation. As the awareness is still low <strong>and</strong> the net sample of actual experience will be too small,<br />

surveys can merely scratch the surface of how users actually deal with smart environments. The case<br />

study method therefore applies more to this issue, as it can both provide a broad view of the situation<br />

as well as a more <strong>in</strong>-depth analysis of what actually happens once people use <strong>RFID</strong> systems.<br />

A case study is def<strong>in</strong>ed as a qualitative description <strong>and</strong> analysis of an event, specified <strong>in</strong> time <strong>and</strong><br />

place, with specified actors (organisations or <strong>in</strong>dividuals). In theory, a s<strong>in</strong>gle case study can be the<br />

base of empirically based claims. In order to analyse the use of <strong>RFID</strong> <strong>in</strong> different contexts, we need a<br />

broader empirical base by perform<strong>in</strong>g a number of case studies. To strike a balance between both<br />

empirical depth <strong>and</strong> broadness, we use a funnel approach, which starts with a broad variety of lessdetailed<br />

case studies to survey the area <strong>and</strong> funnel down to a small number of cases to be <strong>in</strong>vestigated<br />

more thoroughly. In our research, we dist<strong>in</strong>guished four levels:<br />

Level 0 case: Description of function of a specific <strong>RFID</strong> application (e.g. access, payments), where<br />

<strong>and</strong> when it is used by who <strong>in</strong> what k<strong>in</strong>d of sett<strong>in</strong>g (e.g. public transport, leisure).<br />

Level 1 case: Level 0 + desk research (reports, websites, newspapers, etc.) to describe users <strong>and</strong><br />

ma<strong>in</strong>ta<strong>in</strong>ers <strong>and</strong> possible <strong>Identity</strong> <strong>Management</strong> issues.<br />

Level 2 case: Level 1 + additional <strong>in</strong>quiry through e-mail or phone contact.<br />

Level 3 case: Level 2 + site visit to observe users <strong>and</strong> hold <strong>in</strong>terviews with people <strong>in</strong>volved.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!