Hof / Groothuis | Innovating Government | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 20, 466 Seiten

Reihe: Information Technology and Law Series

Hof / Groothuis Innovating Government

Normative, Policy and Technological Dimensions of Modern Government
1. Auflage 2011
ISBN: 978-90-6704-731-9
Verlag: T.M.C. Asser Press
Format: PDF
Kopierschutz: 1 - PDF Watermark

Normative, Policy and Technological Dimensions of Modern Government

E-Book, Englisch, Band 20, 466 Seiten

Reihe: Information Technology and Law Series

ISBN: 978-90-6704-731-9
Verlag: T.M.C. Asser Press
Format: PDF
Kopierschutz: 1 - PDF Watermark



The aim of this book is to analyze four dimensions of innovating government and the use of new technologies: legal, ethical, policy and technological dimensions. By joining authors from a diversity of backgrounds (law, ethics, public administration, political science, sociology, communications science, information science, and computer science) in one book, readers (academics, policy makers, legislators and others) are confronted with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management, that are central to today's evolution of new modes of modern government.

Hof / Groothuis Innovating Government jetzt bestellen!

Weitere Infos & Material


1;Contents;6
2;About the Authors;9
3;1 Innovating Government: An Introduction to the Book;17
3.1;1.1…Background---the Tale of Reinventing and Innovating Government;18
3.2;1.2…Crossing Borders in Studying and Designing New Modes of Government;20
3.2.1;1.2.1 Crossing State Borders;20
3.2.2;1.2.2 Crossing Disciplinary Borders;21
3.2.3;1.2.3 Crossing Policy Borders;21
3.3;1.3…Structure of the Book---Various Dimensions;22
3.4;1.4…Normative and Ethical Dimensions---Part I;22
3.5;1.5…Policy Dimensions---Parts II and III;24
3.5.1;1.5.1 Democracy;24
3.5.2;1.5.2 Surveillance;25
3.6;1.6…Legal Dimensions---Parts IV, V and VI;26
3.6.1;1.6.1 EU Law Perspectives;26
3.6.2;1.6.2 Techno-legal Perspectives;28
3.6.3;1.6.3 Law and Philosophy Perspective;29
3.7;1.7…Technological Dimensions---Part VII;29
3.8;References;30
4;Part I Normative and Ethical Dimensions;31
4.1;2 Privacy 3.0;32
4.1.1;2.1…Introduction;32
4.1.2;2.2…The Public Debate;33
4.1.3;2.3…The Meaning of Privacy as a State of Affairs;34
4.1.4;2.4…The Meaning of Privacy as a Value;37
4.1.5;2.5…Normative Impact of Ambient Intelligence and Converging Technologies;38
4.1.6;2.6…Conclusion;40
4.1.7;References;41
4.2;3 Normative Assumptions in Biometrics: On Bodily Differences and Automated Classifications;44
4.2.1;3.1…Introduction;44
4.2.2;3.2…Human Differences and the Biometric Body;45
4.2.3;3.3…Sensitive Categories, ‘‘Partial Identities’’ and Soft Biometrics;48
4.2.4;3.4…A Transparent and Unobtrusive Future?;51
4.2.5;3.5…Conclusion: Critiquing Normativities in the Informatization of the Body;53
4.2.6;Acknowledgments;53
4.2.7;References;53
4.3;4 Electronic Exchange of Signals on Youth at Risk: A Value Perspective;56
4.3.1;4.1…Introduction;57
4.3.2;4.2…Value-Sensitive Design;59
4.3.3;4.3…Methodology: The Framework;61
4.3.4;4.4…Methodology Applied: Values and VIR---Case Description;63
4.3.4.1;4.4.1 Informal Institutions;63
4.3.4.2;4.4.2 Formal Institutions;65
4.3.4.3;4.4.3 Institutional Arrangements;66
4.3.4.4;4.4.4 Interactions by Actors;67
4.3.4.5;4.4.5 Technology;67
4.3.5;4.5…Methodology Applied: Values and VIR---Value-Sensitive Design;68
4.3.6;4.6…Conclusions and Reflections;69
4.3.7;References;70
4.4;5 Regulating Invisible Harms;72
4.4.1;5.1…Introduction;73
4.4.2;5.2…The Epistemic Gains of Identity Management;74
4.4.2.1;5.2.1 Power;75
4.4.2.2;5.2.2 Fecundity;75
4.4.2.3;5.2.3 Speed;76
4.4.2.4;5.2.4 Efficiency;76
4.4.2.5;5.2.5 Reliability;76
4.4.3;5.3…Accumulative Harm;77
4.4.4;5.4…Regulating Invisible Harms;84
4.4.5;5.5…Conclusion;86
4.4.6;References;86
5;Part II Policy Dimensions: Democracy;89
5.1;6 The Single Point of Failure;90
5.1.1;6.1…The Closed Model of Decision-Making;91
5.1.2;6.2…New Technologies and Civic Life;94
5.1.3;6.3…Participatory Democratic Theory in the Age of Networks;99
5.1.3.1;6.3.1 The Failure of Direct Democracy;100
5.1.3.2;6.3.2 The Timidity of Deliberative Democracy;101
5.1.3.3;6.3.3 Distinguishing Deliberative and Collaborative Democracy;103
5.1.3.4;6.3.4 The Argument for an Open and Collaborative Democracy;105
5.1.3.5;6.3.5 Challenges for Collaborative Democracy;107
5.1.4;References;110
5.2;7 Electronic Voting: Approaches, Strategies, and Policy Issues---A Report from Switzerland;113
5.2.1;7.1…Introduction;114
5.2.2;7.2…Overview;114
5.2.2.1;7.2.1 Approach;114
5.2.2.2;7.2.2 Pilot Projects;116
5.2.2.2.1;7.2.2.1 Geneva;116
5.2.2.2.2;7.2.2.2 Zurich;117
5.2.2.2.3;7.2.2.3 Neuchatel;118
5.2.2.3;7.2.3 Basel-Stadt;119
5.2.2.4;7.2.4 Conclusions;119
5.2.3;7.3…Policy Issues: Theory and Practice;120
5.2.3.1;7.3.1 Participation;120
5.2.3.1.1;7.3.1.1 Opportunities;120
5.2.3.1.2;7.3.1.2 Challenges;122
5.2.3.2;7.3.2 Autonomy;124
5.2.3.2.1;7.3.2.1 Opportunities;124
5.2.3.2.2;7.3.2.2 Challenges;125
5.2.3.3;7.3.3 Quality;126
5.2.3.3.1;7.3.3.1 Opportunities;126
5.2.3.3.2;7.3.3.2 Challenges;127
5.2.3.4;7.3.4 Conclusions;128
5.2.4;7.4…Institutional Framework for e-voting Systems;129
5.2.4.1;7.4.1 Design Challenge;129
5.2.4.2;7.4.2 Design Elements;130
5.2.4.2.1;7.4.2.1 Legal Factors;130
5.2.4.2.2;7.4.2.2 System Design;133
5.2.4.2.3;7.4.2.3 Social Norms;136
5.2.5;7.5…Conclusion;138
5.2.6;Acknowledgments;138
5.2.7;References;139
5.3;8 Striving Behind the Shadow: The Dawn of Spanish Politics 2.0;141
5.3.1;8.1…Introduction;142
5.3.2;8.2…A Definition of ‘Politics 2.0’;143
5.3.3;8.3…The Spanish e-Readiness Level and Web 2.0;144
5.3.4;8.4…Spanish Online Politics;145
5.3.4.1;8.4.1 An Introduction to Online Politics;145
5.3.4.2;8.4.2 Spanish Parties and Online Politics;146
5.3.5;8.5…Political Blogging;149
5.3.6;8.6…Campaigning;150
5.3.7;8.7…Some Practical Examples to Pave Future Ways;152
5.3.7.1;8.7.1 The Power of Cyberactivism;153
5.3.7.2;8.7.2 The Acknowledgment and Naturalization of Cyberactivism;153
5.3.7.3;8.7.3 Blogging to Build and Weaved Blogging;154
5.3.7.4;8.7.4 Open Government, Open Parliaments;155
5.3.8;8.8…Conclusion;155
5.3.9;References;157
6;Part III Policy Dimensions: Surveillance;160
6.1;9 The Normality of Living in Surveillance Societies;161
6.1.1;9.1…Introduction;162
6.1.2;9.2…Global Surveillance and the Domestication of Security;163
6.1.3;9.3…Normalizing Surveillance Society;165
6.1.4;9.4…Everyday Life in Surveillance Societies;167
6.1.4.1;9.4.1 Aspect 1: Contrasting Perceptions of Surveillance;168
6.1.4.2;9.4.2 Aspect 2: Depth of Surveillance;169
6.1.4.3;9.4.3 Aspect 3: Exposure to Surveillance;169
6.1.4.4;9.4.4 The Emergence of Surveillance Societies;170
6.1.5;9.5…Concluding Discussion;171
6.1.6;References;172
6.2;10 The Evolution of New Technologies of Surveillance in Children’s Services in England;175
6.2.1;10.1…Introduction;176
6.2.2;10.2…Thinking about Surveillance;176
6.2.3;10.3…Case Study: ContactPoint;182
6.2.3.1;10.3.1 A Counter-Productive Move?;184
6.2.3.2;10.3.2 Opposition;184
6.2.3.3;10.3.3 Implementation;186
6.2.4;10.4…Conclusion;188
6.2.5;References;190
6.3;11 Electronic Child Records in The Netherlands: A Legitimate Path to Right Wrongs?;193
6.3.1;11.1…Introduction;193
6.3.2;11.2…Social Paradigms;194
6.3.3;11.3…From Simple Records to a Pervasive Monitoring System;195
6.3.4;11.4…The Potential Impact of ECRs;198
6.3.5;11.5…Legal Assessment I: A Human Rights-Based Approach;200
6.3.6;11.6…Legal Assessment II: General Principles of Administrative Law;202
6.3.7;11.7…Conclusions;205
6.3.8;References;205
6.4;12 Legitimacy Issues Regarding Citizen Surveillance: The Case of ANPR Technology in Dutch Policing;207
6.4.1;12.1…Introduction;208
6.4.1.1;12.1.1 Nodal Orientation as a New Police Strategy;208
6.4.1.2;12.1.2 Legitimacy Problems as a Reason and a Result;209
6.4.1.3;12.1.3 Chapter Outline;211
6.4.2;12.2…Legitimacy: Indicators, Relevance and Dilemmas for Nodal Policing;211
6.4.2.1;12.2.1 Assessing Legitimacy;211
6.4.2.1.1;12.2.1.1 Legality;212
6.4.2.1.2;12.2.1.2 Moral Justification;212
6.4.2.1.3;12.2.1.3 Social Acceptance;212
6.4.2.2;12.2.2 Relevance to Nodal Policing;213
6.4.2.3;12.2.3 Legitimacy Dilemmas;213
6.4.2.3.1;12.2.3.1 Variability;214
6.4.2.3.2;12.2.3.2 The Idea(l) of Legitimacy;214
6.4.2.3.3;12.2.3.3 Legitimacy Scale;215
6.4.2.3.4;12.2.3.4 Dilemmas: Contradictions Between Dimensions;215
6.4.3;12.3…Research Methods;216
6.4.3.1;12.3.1 Position of the Researcher;217
6.4.3.2;12.3.2 Informants;217
6.4.3.3;12.3.3 Observation;218
6.4.3.4;12.3.4 Interviews;218
6.4.3.5;12.3.5 Document Study;219
6.4.4;12.4…The Power of ANPR;219
6.4.4.1;12.4.1 Technological Power;219
6.4.4.2;12.4.2 The Nodalville ANPR System;220
6.4.4.3;12.4.3 ANPR Applications;221
6.4.4.3.1;12.4.3.1 Direct Pursuit;221
6.4.4.3.2;12.4.3.2 Further Investigation;221
6.4.5;12.5…Legitimacy Issues in ANPR Policy-Making;222
6.4.5.1;12.5.1 Legality;222
6.4.5.1.1;12.5.1.1 Consciousness of the Need for Legal Legitimation;222
6.4.5.1.2;12.5.1.2 Instrumental Legality;223
6.4.5.1.3;12.5.1.3 Legality as a Risk;223
6.4.5.2;12.5.2 Moral Justification;223
6.4.5.2.1;12.5.2.1 Effectiveness and Efficiency;223
6.4.5.2.2;12.5.2.2 Nodal Orientation;223
6.4.5.2.3;12.5.2.3 Frontrunner Position;224
6.4.5.3;12.5.3 Social Acceptance;224
6.4.5.3.1;12.5.3.1 Remaining Informed;224
6.4.5.3.2;12.5.3.2 Strategic Consideration;224
6.4.5.3.3;12.5.3.3 Cautious Communication;224
6.4.5.3.4;12.5.3.4 Influencing Social Acceptance;225
6.4.6;12.6…Final Remarks;225
6.4.7;References;225
6.5;13 The Introduction of Biometrics in The Netherlands: An Evaluation Under Data Protection and Administrative Law;227
6.5.1;13.1…Introduction;228
6.5.2;13.2…‘Classic’ and ‘Second Generation’ Biometrics;228
6.5.3;13.3…Biometric Applications in the Private and the Public Domain;229
6.5.4;13.4…Some Observations on Unintentional Side Effects of Dutch Government Policy on Biometrics;232
6.5.5;13.5…A Data Protection Approach;233
6.5.6;13.6…An Administrative Law Approach;235
6.5.7;13.7…Conclusion;237
6.5.8;References;238
7;Part IV Legal Dimensions:EU Law Perspectives;239
7.1;14 The Use of Biometrics at the Borders: A European Policy and Law Perspective;240
7.1.1;14.1…Introduction;241
7.1.2;14.2…Migration Control and the Use of Biometrics;242
7.1.2.1;14.2.1 Eurodac;242
7.1.2.2;14.2.2 SIS and SIS II;243
7.1.2.3;14.2.3 VIS;244
7.1.2.4;14.2.4 Biometrics in Identity Documents and Residence Permits;246
7.1.3;14.3…Extended Use of Biometrics for Law Enforcement Purposes;247
7.1.3.1;14.3.1 Eurodac;247
7.1.3.2;14.3.2 SIS II;248
7.1.3.3;14.3.3 VIS;249
7.1.4;14.4…Right to Privacy Right to Data Protection;250
7.1.4.1;14.4.1 Biometrics and Interference of the Right to Privacy;250
7.1.4.2;14.4.2 Necessary in a Democratic Society;251
7.1.4.3;14.4.3 In Accordance with the Law;252
7.1.4.4;14.4.4 Right to Data Protection: A Fundamental Right;253
7.1.5;14.5…‘Strike the Right Balance?’;254
7.1.5.1;14.5.1 The Value of Impact Assessment;254
7.1.5.2;14.5.2 European Data Protection Supervisor and National Data Protection Authorities;256
7.1.5.3;14.5.3 European Parliament;256
7.1.6;14.6…Conclusion;257
7.1.7;References;258
7.2;15 Privacy and Data Protection Aspects of e-Government Identity Management;259
7.2.1;15.1…Introduction;260
7.2.2;15.2…Application of the Legal Data Protection Framework to e-Government;261
7.2.2.1;15.2.1 Legitimacy of Processing;261
7.2.2.2;15.2.2 Finality;262
7.2.2.3;15.2.3 Data Accuracy;264
7.2.2.4;15.2.4 Confidentiality and Security of Processing;265
7.2.2.5;15.2.5 Transparency of Processing and Related Data Subject Rights;269
7.2.2.6;15.2.6 Determination of Tasks, Responsibilities, and Roles;270
7.2.2.7;15.2.7 Use of Unique Identifiers;272
7.2.3;15.3…Current Practices;273
7.2.3.1;15.3.1 Internal Market Information System;274
7.2.3.1.1;15.3.1.1 Definition of Roles and Responsibilities;275
7.2.3.1.2;15.3.1.2 Legitimacy of Processing;276
7.2.3.1.3;15.3.1.3 Data Quality;277
7.2.3.1.4;15.3.1.4 Transparency and Accommodation of Data Subject Rights;278
7.2.3.1.5;15.3.1.5 ID Number Policy;280
7.2.3.2;15.3.2 The Increasing Use of Biometric Data;281
7.2.3.2.1;15.3.2.1 Large-Scale Biometric Applications: Some Examples;281
7.2.3.2.2;15.3.2.2 Legitimacy of the Processing;283
7.2.3.2.3;15.3.2.3 Re-purposing of Biometric Data;284
7.2.3.2.4;15.3.2.4 Data Quality;285
7.2.3.2.5;15.3.2.5 The Risks of Biometric Identifiers;286
7.2.3.2.6;15.3.2.6 Security Flaws;286
7.2.4;15.4…Conclusion;287
7.2.5;References;288
7.3;16 eHealth from a Dutch Perspective;291
7.3.1;16.1…Introduction;292
7.3.2;16.2…Developments Related to eHealth;293
7.3.2.1;16.2.1 Introduction;293
7.3.2.2;16.2.2 European Policy Developments;294
7.3.2.2.1;16.2.2.1 eHealth Action Plan;294
7.3.2.2.2;16.2.2.2 i2010;294
7.3.2.2.3;16.2.2.3 Lead Market Area;294
7.3.2.2.4;16.2.2.4 Patient Safety;296
7.3.2.2.5;16.2.2.5 Interoperability of Health Records and Health Services (Patient Safety);296
7.3.2.2.6;16.2.2.6 Prague Declaration;297
7.3.2.2.7;16.2.2.7 eHealth on the Political Agenda of Sweden’s Presidency;297
7.3.2.3;16.2.3 eHealth Developments in the Netherlands;297
7.3.2.3.1;16.2.3.1 Examples of Dutch eHealth Applications;299
7.3.2.3.2;16.2.3.2 TCCN (‘Stichting Teledermatologisch Consultatie Centrum’);299
7.3.2.3.3;16.2.3.3 Virtual Thrombosis Service;300
7.3.2.3.4;16.2.3.4 ZorgDomein;300
7.3.2.3.5;16.2.3.5 Portal Website for Invitro Fertilization Treatment;300
7.3.2.3.6;16.2.3.6 I.COM: Mental eHealth;301
7.3.2.3.7;16.2.3.7 National Electronic Health Record;301
7.3.3;16.3…The European Legal Framework for eHealth;302
7.3.3.1;16.3.1 Introduction;302
7.3.3.2;16.3.2 The European Legal Framework;303
7.3.3.2.1;16.3.2.1 Patient Data Protection, Privacy and Confidentiality;304
7.3.3.2.2;16.3.2.2 Product and Services Liability;305
7.3.3.2.3;16.3.2.3 General Contract Law and Consumer Protection;306
7.3.3.2.4;16.3.2.4 Product Safety;306
7.3.3.2.5;16.3.2.5 Liability for Damages by an eHealth Device;307
7.3.3.2.5.1;Products;307
7.3.3.2.5.2;Services;307
7.3.3.2.6;16.3.2.6 European Competition Law;308
7.3.3.2.7;16.3.2.7 What does European Competition Law Imply?;309
7.3.3.2.8;16.3.2.8 Patient’s Rights, Patient Safety and Quality of Care;310
7.3.3.2.8.1;Cross-Border Healthcare;310
7.3.3.2.8.2;Medical Devices;312
7.3.3.2.8.3;Professional Qualifications;313
7.3.4;16.4…A Dutch Analysis of the European Legal Issues;313
7.3.4.1;16.4.1 Introduction;313
7.3.4.2;16.4.2 Patient Data Protection, Privacy, and Confidentiality;314
7.3.4.3;16.4.3 Product, Services, and Professional Liabilities;316
7.3.4.4;16.4.4 Competition Law;317
7.3.4.5;16.4.5 Patient Safety and Quality of Care;318
7.3.5;16.5…Conclusion;319
7.3.6;References;320
7.4;17 Implementation of the EU Services Directive: On eGovernment in a Decentralized Unitary State;322
7.4.1;17.1…Introduction;323
7.4.2;17.2…Point of Single Contact---Legal and Organizational Framework;324
7.4.2.1;17.2.1 Basis of EU Law;324
7.4.2.2;17.2.2 Legal and Organizational Implementation in the Netherlands;324
7.4.3;17.3…Challenges from a Constitutional Point of View;326
7.4.4;17.4…Legal Assessment: Principles of Good Governance Applied in a Digital Context;328
7.4.5;17.5…Conclusion;332
7.4.6;References;333
7.5;18 The Impact of Europe on Geo-Information;335
7.5.1;18.1…Introduction;336
7.5.2;18.2…What is Geo-Information?;337
7.5.3;18.3…European Rules in the Context of Geo-Information;338
7.5.3.1;18.3.1 Directive 96/9/EC on the Legal Protection of Databases;338
7.5.3.2;18.3.2 Directive 2003/98/EC on the Reuse of Public Sector Information;339
7.5.3.3;18.3.3 Directive 2007/2/EC Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE);340
7.5.4;18.4…The Directives Evaluated: Is there an Impact on Geo-Information?;341
7.5.4.1;18.4.1 Directive 96/9/EC on the Legal Protection of Databases;341
7.5.4.2;18.4.2 Directive 2003/98/EC on the Reuse of Public Sector Information;342
7.5.4.3;18.4.3 Directive 2007/2/EC Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE);343
7.5.5;18.5…The Landmark Case: A Landmark Decision for Geo-Information;344
7.5.6;18.6…Other Initiatives to Improve Dissemination of Geo-Information in The Netherlands;346
7.5.7;18.7…Conclusion;347
7.5.8;References;349
8;Part V Legal Dimensions:Techno-legal Perspectives;350
8.1;19 Sharing Information between Government Agencies: Some Legal Challenges Associated with Semantic Interoperability;351
8.1.1;19.1…One Word, a Bundle of Definitions;352
8.1.2;19.2…Local, Regional, and Global Legal Concepts;353
8.1.3;19.3…‘Live-in Partner’ as an Example;355
8.1.4;19.4…The Problem of Bad Drafting;358
8.1.5;19.5…Fixing Problems Administratively;360
8.1.6;19.6…Court Decisions: Distinguishing the Case;361
8.1.7;19.7…The Problem of Political Control;362
8.1.8;19.8…Conclusion;363
8.1.9;References;365
8.2;20 Public Information Infrastructures and Identity Fraud;366
8.2.1;20.1…Introduction;367
8.2.2;20.2…Chains and Chain Cooperation;367
8.2.2.1;20.2.1 Chain Issues;367
8.2.2.2;20.2.2 Concepts of ‘Chain’, ‘Dominant Chain Problem’ and ‘Chain Level’;368
8.2.2.3;20.2.3 Chain Thinking;369
8.2.2.4;20.2.4 The Scientific Relevance of the Chain Concept: Fallacy of the Wrong Level;369
8.2.2.5;20.2.5 Example: The European Union’s Biometric Visa System;370
8.2.2.6;20.2.6 Remedies Offered by the Doctrine of Chain Computerization;371
8.2.2.7;20.2.7 Chain Research Results in the Chain Dimension;372
8.2.3;20.3…Identity Fraud (Identity Theft);373
8.2.3.1;20.3.1 The Concept of Identity Fraud (Identity Theft);373
8.2.3.2;20.3.2 Identity Fraud, a Growing Problem;374
8.2.3.2.1;20.3.2.1 More Traces, Less Evidence;374
8.2.3.2.2;20.3.2.2 Identity Fraud Spreading Unnoticed;374
8.2.3.2.3;20.3.2.3 Balance of Power Shift in a Digitized Environment;375
8.2.3.2.4;20.3.2.4 ID-Checking Involves Blind Spots;375
8.2.3.3;20.3.3 Chain Research Results in the Identity Fraud Dimension;376
8.2.4;20.4…Identity Fraud in the Criminal Law Enforcement Chain;376
8.2.4.1;20.4.1 Identity Fraud in the Dutch Criminal Law Enforcement Chain;376
8.2.4.2;20.4.2 Identity Fraud in the Criminal Law Enforcement Chain at EU Level;379
8.2.5;20.5…Some Conclusions and Challenges;382
8.2.5.1;20.5.1 Conclusions;382
8.2.5.2;20.5.2 Challenges;382
8.2.6;References;383
8.3;21 Access to Law in Europe;385
8.3.1;21.1…Introduction;386
8.3.2;21.2…Access to Law in Europe;387
8.3.2.1;21.2.1 Access to Legal Information at the Dawn of the Internet Age;387
8.3.2.2;21.2.2 Access to Legal Information from 1999;388
8.3.2.3;21.2.3 A Case Study: The Netherlands;389
8.3.3;21.3…A Right of Access to Legal Information;391
8.3.3.1;21.3.1 Levels of Accessibility;391
8.3.3.2;21.3.2 Accessibility of EUR-Lex;392
8.3.3.3;21.3.3 Accessibility of Officielebekendmakingen.nl;393
8.3.3.4;21.3.4 Legal Framework for a Right of Access;394
8.3.4;21.4…Conclusion;399
8.3.5;Acknowledgments;399
8.3.6;References;399
9;Part VI Legal Dimensions:Law and Philosophy Perspective;401
9.1;22 Identity Theft and Fraud;402
9.1.1;22.1…Introduction;403
9.1.2;22.2…A Definition of Identity;404
9.1.2.1;22.2.1 Locke;404
9.1.2.1.1;22.2.1.1 Identity;404
9.1.2.1.2;22.2.1.2 Persons;405
9.1.2.1.3;22.2.1.3 Personal Identity;405
9.1.2.2;22.2.2 Internal Identity;406
9.1.2.3;22.2.3 External Identity;406
9.1.3;22.3…Identification;407
9.1.3.1;22.3.1 Identifiers;407
9.1.3.2;22.3.2 Control Over External Identity;408
9.1.4;22.4…Identity Fraud and Theft;409
9.1.4.1;22.4.1 Switched Identities;409
9.1.4.2;22.4.2 Motives;410
9.1.4.3;22.4.3 Means;411
9.1.4.4;22.4.4 Definitions;411
9.1.5;22.5…Illegality Under Dutch Law;411
9.1.5.1;22.5.1 Criminal Law---Fraud;412
9.1.5.2;22.5.2 Criminal Law---Theft;413
9.1.6;22.6…A Recent Case of Identity Theft;414
9.1.7;22.7…Conclusions;416
9.1.8;References;417
10;Part VIITechnological Dimensions;418
10.1;23 Biometrics and Smart Cards in Identity Management;419
10.1.1;23.1…Introduction;420
10.1.2;23.2…The Smart Card Landscape;420
10.1.2.1;23.2.1 Smart Cards and e-Government;421
10.1.3;23.3…Biometrics;422
10.1.3.1;23.3.1 Performance and Quality;423
10.1.3.2;23.3.2 Performance of Face and Fingerprint Recognition;424
10.1.4;23.4…Smart Card and RFID Technology;425
10.1.4.1;23.4.1 Smart Cards;425
10.1.4.1.1;23.4.1.1 The Terminal Problem;427
10.1.4.2;23.4.2 RFID;427
10.1.5;23.5…e-Passports;428
10.1.5.1;23.5.1 Accessing the Passport Chip;430
10.1.5.2;23.5.2 Drawbacks of the ICAO Standards;430
10.1.5.3;23.5.3 Tracking;431
10.1.5.4;23.5.4 Digitally Signed Passport Data;432
10.1.5.5;23.5.5 Function Creep;432
10.1.5.6;23.5.6 Lessons Learnt;433
10.1.6;23.6…Privacy Issues in Using Biometrics and Smart Cards;434
10.1.6.1;23.6.1 Privacy Implications of Biometrics;435
10.1.6.2;23.6.2 Use of Smart Cards;436
10.1.7;References;437
10.2;24 How Devices Transform Voting;439
10.2.1;24.1…Introduction;440
10.2.2;24.2…Voting Requirements;440
10.2.3;24.3…e-Voting in the Netherlands;441
10.2.4;24.4…Implicit Requirements;442
10.2.5;24.5…The Theory of Technological Mediation;444
10.2.6;24.6…Technology Mediates Voting;445
10.2.7;24.7…Challenges;446
10.2.7.1;24.7.1 Voting System;446
10.2.7.2;24.7.2 Autonomy;447
10.2.7.3;24.7.3 Secret Ballot/Privacy;448
10.2.7.4;24.7.4 Verifiability;449
10.2.7.5;24.7.5 Example: Estonia;450
10.2.8;24.8…Conclusions;451
10.2.9;Acknowledgments;451
10.2.10;References;451
11;Part VIIISynthesis;453
11.1;25 A Brave New Government?;454
11.1.1;25.1…Introduction;455
11.1.2;25.2…The Concept e-Government;455
11.1.3;25.3…Making e-Government Work;457
11.1.3.1;25.3.1 Getting Connected;457
11.1.3.2;25.3.2 Identity Construction;460
11.1.3.3;25.3.3 Efficient Big Brother;462
11.1.3.4;25.3.4 IT as a Tool for European Integration;463
11.1.4;25.4…Redefining Government;463
11.1.4.1;25.4.1 Changing the Face of Government: Seeing it in a Different Light;463
11.1.4.2;25.4.2 Accountability;464
11.1.5;25.5…Conclusion;465
11.1.6;Reference;465



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.