Mobile Identity Management: An Enacted View

نویسندگان

  • George Roussos
  • Don Peterson
  • Uma Patel
چکیده

Growth of mobile business requires the ability to provide context aware services when and where needed, the development of trust relationships between trading partners and the ever-expanding capability for reconfiguration of value chains. These issues become even more prominent by the emergence of converged architectures for next generation public networks, a result of integration of the Internet, traditional telephony networks and consumer electronics, which brings mobile business to the forefront. In this context, mobile identity management can play a central role to address usability and trust issues in mobile business. For this reason, it is being established as a core service for next generation mobile telecommunications infrastructures. Mobile identity management is used to identify, acquire, access and pay for services that follow the user from device to device, location to location and context to context and thus, becomes the network component that holds together novel services on novel networks using innovative business models. In contrast to previous generation mobile business infrastructures, this represents a pivotal shift in focus from identification to identity. In this paper we advocate that this shift calls for the enacted view of technology since the level of involvement of human qualities is unprecedented when discussing identity. We introduce a view of identity in mobile business based on three principles and we find that this approach is useful in explaining some recent research findings in ubiquitous retailing. We expect that widening the discipline boundaries for future research on identity in

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Factors Affecting Mobile Handset (MH) Buying Decision: An Empirical Study

Mobile technology is getting changed very fast in commensurate with other technological hyper changes. Buyers’ expectation from a new cellular phone is also changing over time. Producers, thereby, have to keep themselves abreast of changes in customer taste and preferences to attract, capture, grow, and retain both existing and potential customers. This study is set to measure factors affecting...

متن کامل

Begetting Order to Usage of Context Information and Identity Management in Pervasive Ad-hoc Environments

Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. ...

متن کامل

A Unique Investigation of Knowledge Transfer Practices within the Muslim Business Community in Edinburgh

The aim of this research was to understand the dynamisms relating to knowledge transfer processes and practices, which exist within a business community in Edinburgh Scotland. The methodology used within this study was a uniquedesign methodology to include 20 in-depth interviews with participants from four local organizations. The sample group consisted of males aged between 20 and 70. The samp...

متن کامل

Context-Aware Identity Management in Pervasive Ad-hoc Environments

Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. ...

متن کامل

Privacy and Identity Management for Vehicular Communication Systems: a Position Paper

The emerging technology of vehicular communications (VC) raises a number of technical problems that need to be addressed. Among those, security and privacy concerns are paramount for the wide adoption of VC. In this position paper, we are concerned with privacy and identity management in the context of these systems. We identify VC-specific issues and challenges, considering the salient feature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Electronic Commerce

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2003