Inicio  /  Future Internet  /  Vol: 5 Par: 1 (2013)  /  Artículo
ARTÍCULO
TITULO

The Clean Privacy Ecosystem of the Future Internet

Lothar Fritsch    

Resumen

This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a larger context?an ecosystem of personal information and electronic identities. The article argues for an ecosystem view of personal information and electronic identities, as both personal information and identity information are basic required input for many applications. Therefore, for both application owners and users, a functioning ecosystem of personal information and electronic identification is important. For the future of the Internet, high-quality information and controlled circulation of such information is therefore argued as decisive for the value of future Internet applications.

 Artículos similares

       
 
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday    
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ... ver más
Revista: Future Internet

 
Izyan Ayuni Mohamad Selamat, Sreetheran Maruthaveeran, Mohd Johari Mohd Yusof and Mohd Fairuz Shahidan    
Urban vacant land availability offers revitalisation opportunities in the form of improving ecological functions. However, less is known about the available planning tools with which to mobilise this effort. Hence, this systematic review adopts ecologica... ver más
Revista: Urban Science

 
Bernardo Panichi and Alessandro Lazzeri    
This paper addresses the time-intensive task of assigning accurate account labels to invoice entries within corporate bookkeeping. Despite the advent of electronic invoicing, many software solutions still rely on rule-based approaches that fail to addres... ver más

 
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi    
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which... ver más

 
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más