Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity
Introduction of the Scenarios and Analysis
For the analysis we selected the following scenarios:
Scenario 1: Mobile communication in simple communicational contexts in private life (cp. section )
Scenario 2: Mobile communication used by a mobile working craftswoman with fixed working hours (cp. section )
Scenario 3: Mobile communication used by a mobile collaborator in information and communication technology (ICT) projects with flexible working hours (cp. section )
With respect to the management of identities these scenarios have a different focus. They refer to user controlled identity management (type 3 identity management, cp. Bauer, Meints, Hansen, 2005) through the use of mobile devices, management of mobile identities and reachability management as an important method for user controlled identity management.
| Denis Royer | 12 / 58 |
