For almost every organization in the future, both public and private sector, identity management presents both significant opportunities and risks. Successfully managed, it will allow everyone to access products and services that are tailored to their needs and their behaviours. But successful management implies that organizations will have overcome the significant obstacles of security, individual human rights and social concern that could cause the whole process to become mired. Digital Identity Management, based on the work of the annual Digital Identity Forum in London, provides a wide perspective on the subject and explores the current technology available for identity management, its applications within business, and its significance in wider debates about identity, society and the law. This is an essential introduction for organizations seeking to use identity to get closer to customers; for those in government at all levels wrestling with online delivery of targeted services; as well as those concerned with the wider issues of identity, rights, the law, and the potential risks.
’I would recommend Digital Identity Management as a high level primer for senior managers who, without necessarily a background in IT, need to acquire an understanding of just how broad this topic is - and therefore that it does indeed have serious implications for almost all enterprises that deal with people and information about them.’ John Paschoud, Online Information Review
Contents: Foreword by Peter Cochrane. Part One Introduction: The identity vision, David G.W. Birch. Part Two Identity Technologies: Smart cards, smart identities, Andrew Henderson; A roadmap for biometrics, John Elliott; Identity directories and databases, Alexis Scorer; Common sense PKI, John Madelin; Radio-Frequency Identification, Cyrus Gilbert-Rolfe; Practical action - Federation and mobility, Paul Miller. Part Three Identity in Business and Government: A model for digital identity, David G.W. Birch and Neil A. McEvoy; Large-scale identity management, Paul Mackinnon; Two-factor authentication, Richard Allen and Anthony Pickup; The private life of things, David G.W. Birch; Authentication in business, John Skipper; Identity services infrastructure - Trust and privacy in communities of the twenty-first century, Jon Shamah; The US-VISIT Program, C. Maxine Most; Building privacy-friendly RFID, Toby Stevens. Part Four Digital Identity in Context: The ID problem, Gareth Crossman; Planning ID management in government, John Elliott; ID and the law, Steve Phillipsohn; This is not your father's ID card, David G.W. Birch, John Elliott and Neil A. McEvoy; Eavesdropping on the future of identity, David G.W. Birch and Aleks Krotoski; Cyborg identity, Kevin Warwick. Part Five Where Next?: Digital identity management implications, David G.W. Birch, John Elliot and Andrew Whitcombe. Case Studies: Estonian electronic identity cards, Taarvi Martens; UK visas, Steve Inkpen; US Department of Defense, Alexis Scorer; RDW, John Madelin; Manchester City Football Club, Duncan Martin; Hong Kong Smartics, Raymond Wong; US Department of Defense, Jon Shamah; A sample code of conduct, Toby Stevens. Index.