E-Book, Englisch, Band 20, 466 Seiten
Hof / Groothuis Innovating Government
1. Auflage 2011
ISBN: 978-90-6704-731-9
Verlag: T.M.C. Asser Press
Format: PDF
Kopierschutz: 1 - PDF Watermark
Normative, Policy and Technological Dimensions of Modern Government
E-Book, Englisch, Band 20, 466 Seiten
Reihe: Information Technology and Law Series
ISBN: 978-90-6704-731-9
Verlag: T.M.C. Asser Press
Format: PDF
Kopierschutz: 1 - PDF Watermark
The aim of this book is to analyze four dimensions of innovating government and the use of new technologies: legal, ethical, policy and technological dimensions. By joining authors from a diversity of backgrounds (law, ethics, public administration, political science, sociology, communications science, information science, and computer science) in one book, readers (academics, policy makers, legislators and others) are confronted with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management, that are central to today's evolution of new modes of modern government.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;6
2;About the Authors;9
3;1 Innovating Government: An Introduction to the Book;17
3.1;1.1…Background---the Tale of Reinventing and Innovating Government;18
3.2;1.2…Crossing Borders in Studying and Designing New Modes of Government;20
3.2.1;1.2.1 Crossing State Borders;20
3.2.2;1.2.2 Crossing Disciplinary Borders;21
3.2.3;1.2.3 Crossing Policy Borders;21
3.3;1.3…Structure of the Book---Various Dimensions;22
3.4;1.4…Normative and Ethical Dimensions---Part I;22
3.5;1.5…Policy Dimensions---Parts II and III;24
3.5.1;1.5.1 Democracy;24
3.5.2;1.5.2 Surveillance;25
3.6;1.6…Legal Dimensions---Parts IV, V and VI;26
3.6.1;1.6.1 EU Law Perspectives;26
3.6.2;1.6.2 Techno-legal Perspectives;28
3.6.3;1.6.3 Law and Philosophy Perspective;29
3.7;1.7…Technological Dimensions---Part VII;29
3.8;References;30
4;Part I Normative and Ethical Dimensions;31
4.1;2 Privacy 3.0;32
4.1.1;2.1…Introduction;32
4.1.2;2.2…The Public Debate;33
4.1.3;2.3…The Meaning of Privacy as a State of Affairs;34
4.1.4;2.4…The Meaning of Privacy as a Value;37
4.1.5;2.5…Normative Impact of Ambient Intelligence and Converging Technologies;38
4.1.6;2.6…Conclusion;40
4.1.7;References;41
4.2;3 Normative Assumptions in Biometrics: On Bodily Differences and Automated Classifications;44
4.2.1;3.1…Introduction;44
4.2.2;3.2…Human Differences and the Biometric Body;45
4.2.3;3.3…Sensitive Categories, ‘‘Partial Identities’’ and Soft Biometrics;48
4.2.4;3.4…A Transparent and Unobtrusive Future?;51
4.2.5;3.5…Conclusion: Critiquing Normativities in the Informatization of the Body;53
4.2.6;Acknowledgments;53
4.2.7;References;53
4.3;4 Electronic Exchange of Signals on Youth at Risk: A Value Perspective;56
4.3.1;4.1…Introduction;57
4.3.2;4.2…Value-Sensitive Design;59
4.3.3;4.3…Methodology: The Framework;61
4.3.4;4.4…Methodology Applied: Values and VIR---Case Description;63
4.3.4.1;4.4.1 Informal Institutions;63
4.3.4.2;4.4.2 Formal Institutions;65
4.3.4.3;4.4.3 Institutional Arrangements;66
4.3.4.4;4.4.4 Interactions by Actors;67
4.3.4.5;4.4.5 Technology;67
4.3.5;4.5…Methodology Applied: Values and VIR---Value-Sensitive Design;68
4.3.6;4.6…Conclusions and Reflections;69
4.3.7;References;70
4.4;5 Regulating Invisible Harms;72
4.4.1;5.1…Introduction;73
4.4.2;5.2…The Epistemic Gains of Identity Management;74
4.4.2.1;5.2.1 Power;75
4.4.2.2;5.2.2 Fecundity;75
4.4.2.3;5.2.3 Speed;76
4.4.2.4;5.2.4 Efficiency;76
4.4.2.5;5.2.5 Reliability;76
4.4.3;5.3…Accumulative Harm;77
4.4.4;5.4…Regulating Invisible Harms;84
4.4.5;5.5…Conclusion;86
4.4.6;References;86
5;Part II Policy Dimensions: Democracy;89
5.1;6 The Single Point of Failure;90
5.1.1;6.1…The Closed Model of Decision-Making;91
5.1.2;6.2…New Technologies and Civic Life;94
5.1.3;6.3…Participatory Democratic Theory in the Age of Networks;99
5.1.3.1;6.3.1 The Failure of Direct Democracy;100
5.1.3.2;6.3.2 The Timidity of Deliberative Democracy;101
5.1.3.3;6.3.3 Distinguishing Deliberative and Collaborative Democracy;103
5.1.3.4;6.3.4 The Argument for an Open and Collaborative Democracy;105
5.1.3.5;6.3.5 Challenges for Collaborative Democracy;107
5.1.4;References;110
5.2;7 Electronic Voting: Approaches, Strategies, and Policy Issues---A Report from Switzerland;113
5.2.1;7.1…Introduction;114
5.2.2;7.2…Overview;114
5.2.2.1;7.2.1 Approach;114
5.2.2.2;7.2.2 Pilot Projects;116
5.2.2.2.1;7.2.2.1 Geneva;116
5.2.2.2.2;7.2.2.2 Zurich;117
5.2.2.2.3;7.2.2.3 Neuchatel;118
5.2.2.3;7.2.3 Basel-Stadt;119
5.2.2.4;7.2.4 Conclusions;119
5.2.3;7.3…Policy Issues: Theory and Practice;120
5.2.3.1;7.3.1 Participation;120
5.2.3.1.1;7.3.1.1 Opportunities;120
5.2.3.1.2;7.3.1.2 Challenges;122
5.2.3.2;7.3.2 Autonomy;124
5.2.3.2.1;7.3.2.1 Opportunities;124
5.2.3.2.2;7.3.2.2 Challenges;125
5.2.3.3;7.3.3 Quality;126
5.2.3.3.1;7.3.3.1 Opportunities;126
5.2.3.3.2;7.3.3.2 Challenges;127
5.2.3.4;7.3.4 Conclusions;128
5.2.4;7.4…Institutional Framework for e-voting Systems;129
5.2.4.1;7.4.1 Design Challenge;129
5.2.4.2;7.4.2 Design Elements;130
5.2.4.2.1;7.4.2.1 Legal Factors;130
5.2.4.2.2;7.4.2.2 System Design;133
5.2.4.2.3;7.4.2.3 Social Norms;136
5.2.5;7.5…Conclusion;138
5.2.6;Acknowledgments;138
5.2.7;References;139
5.3;8 Striving Behind the Shadow: The Dawn of Spanish Politics 2.0;141
5.3.1;8.1…Introduction;142
5.3.2;8.2…A Definition of ‘Politics 2.0’;143
5.3.3;8.3…The Spanish e-Readiness Level and Web 2.0;144
5.3.4;8.4…Spanish Online Politics;145
5.3.4.1;8.4.1 An Introduction to Online Politics;145
5.3.4.2;8.4.2 Spanish Parties and Online Politics;146
5.3.5;8.5…Political Blogging;149
5.3.6;8.6…Campaigning;150
5.3.7;8.7…Some Practical Examples to Pave Future Ways;152
5.3.7.1;8.7.1 The Power of Cyberactivism;153
5.3.7.2;8.7.2 The Acknowledgment and Naturalization of Cyberactivism;153
5.3.7.3;8.7.3 Blogging to Build and Weaved Blogging;154
5.3.7.4;8.7.4 Open Government, Open Parliaments;155
5.3.8;8.8…Conclusion;155
5.3.9;References;157
6;Part III Policy Dimensions: Surveillance;160
6.1;9 The Normality of Living in Surveillance Societies;161
6.1.1;9.1…Introduction;162
6.1.2;9.2…Global Surveillance and the Domestication of Security;163
6.1.3;9.3…Normalizing Surveillance Society;165
6.1.4;9.4…Everyday Life in Surveillance Societies;167
6.1.4.1;9.4.1 Aspect 1: Contrasting Perceptions of Surveillance;168
6.1.4.2;9.4.2 Aspect 2: Depth of Surveillance;169
6.1.4.3;9.4.3 Aspect 3: Exposure to Surveillance;169
6.1.4.4;9.4.4 The Emergence of Surveillance Societies;170
6.1.5;9.5…Concluding Discussion;171
6.1.6;References;172
6.2;10 The Evolution of New Technologies of Surveillance in Children’s Services in England;175
6.2.1;10.1…Introduction;176
6.2.2;10.2…Thinking about Surveillance;176
6.2.3;10.3…Case Study: ContactPoint;182
6.2.3.1;10.3.1 A Counter-Productive Move?;184
6.2.3.2;10.3.2 Opposition;184
6.2.3.3;10.3.3 Implementation;186
6.2.4;10.4…Conclusion;188
6.2.5;References;190
6.3;11 Electronic Child Records in The Netherlands: A Legitimate Path to Right Wrongs?;193
6.3.1;11.1…Introduction;193
6.3.2;11.2…Social Paradigms;194
6.3.3;11.3…From Simple Records to a Pervasive Monitoring System;195
6.3.4;11.4…The Potential Impact of ECRs;198
6.3.5;11.5…Legal Assessment I: A Human Rights-Based Approach;200
6.3.6;11.6…Legal Assessment II: General Principles of Administrative Law;202
6.3.7;11.7…Conclusions;205
6.3.8;References;205
6.4;12 Legitimacy Issues Regarding Citizen Surveillance: The Case of ANPR Technology in Dutch Policing;207
6.4.1;12.1…Introduction;208
6.4.1.1;12.1.1 Nodal Orientation as a New Police Strategy;208
6.4.1.2;12.1.2 Legitimacy Problems as a Reason and a Result;209
6.4.1.3;12.1.3 Chapter Outline;211
6.4.2;12.2…Legitimacy: Indicators, Relevance and Dilemmas for Nodal Policing;211
6.4.2.1;12.2.1 Assessing Legitimacy;211
6.4.2.1.1;12.2.1.1 Legality;212
6.4.2.1.2;12.2.1.2 Moral Justification;212
6.4.2.1.3;12.2.1.3 Social Acceptance;212
6.4.2.2;12.2.2 Relevance to Nodal Policing;213
6.4.2.3;12.2.3 Legitimacy Dilemmas;213
6.4.2.3.1;12.2.3.1 Variability;214
6.4.2.3.2;12.2.3.2 The Idea(l) of Legitimacy;214
6.4.2.3.3;12.2.3.3 Legitimacy Scale;215
6.4.2.3.4;12.2.3.4 Dilemmas: Contradictions Between Dimensions;215
6.4.3;12.3…Research Methods;216
6.4.3.1;12.3.1 Position of the Researcher;217
6.4.3.2;12.3.2 Informants;217
6.4.3.3;12.3.3 Observation;218
6.4.3.4;12.3.4 Interviews;218
6.4.3.5;12.3.5 Document Study;219
6.4.4;12.4…The Power of ANPR;219
6.4.4.1;12.4.1 Technological Power;219
6.4.4.2;12.4.2 The Nodalville ANPR System;220
6.4.4.3;12.4.3 ANPR Applications;221
6.4.4.3.1;12.4.3.1 Direct Pursuit;221
6.4.4.3.2;12.4.3.2 Further Investigation;221
6.4.5;12.5…Legitimacy Issues in ANPR Policy-Making;222
6.4.5.1;12.5.1 Legality;222
6.4.5.1.1;12.5.1.1 Consciousness of the Need for Legal Legitimation;222
6.4.5.1.2;12.5.1.2 Instrumental Legality;223
6.4.5.1.3;12.5.1.3 Legality as a Risk;223
6.4.5.2;12.5.2 Moral Justification;223
6.4.5.2.1;12.5.2.1 Effectiveness and Efficiency;223
6.4.5.2.2;12.5.2.2 Nodal Orientation;223
6.4.5.2.3;12.5.2.3 Frontrunner Position;224
6.4.5.3;12.5.3 Social Acceptance;224
6.4.5.3.1;12.5.3.1 Remaining Informed;224
6.4.5.3.2;12.5.3.2 Strategic Consideration;224
6.4.5.3.3;12.5.3.3 Cautious Communication;224
6.4.5.3.4;12.5.3.4 Influencing Social Acceptance;225
6.4.6;12.6…Final Remarks;225
6.4.7;References;225
6.5;13 The Introduction of Biometrics in The Netherlands: An Evaluation Under Data Protection and Administrative Law;227
6.5.1;13.1…Introduction;228
6.5.2;13.2…‘Classic’ and ‘Second Generation’ Biometrics;228
6.5.3;13.3…Biometric Applications in the Private and the Public Domain;229
6.5.4;13.4…Some Observations on Unintentional Side Effects of Dutch Government Policy on Biometrics;232
6.5.5;13.5…A Data Protection Approach;233
6.5.6;13.6…An Administrative Law Approach;235
6.5.7;13.7…Conclusion;237
6.5.8;References;238
7;Part IV Legal Dimensions:EU Law Perspectives;239
7.1;14 The Use of Biometrics at the Borders: A European Policy and Law Perspective;240
7.1.1;14.1…Introduction;241
7.1.2;14.2…Migration Control and the Use of Biometrics;242
7.1.2.1;14.2.1 Eurodac;242
7.1.2.2;14.2.2 SIS and SIS II;243
7.1.2.3;14.2.3 VIS;244
7.1.2.4;14.2.4 Biometrics in Identity Documents and Residence Permits;246
7.1.3;14.3…Extended Use of Biometrics for Law Enforcement Purposes;247
7.1.3.1;14.3.1 Eurodac;247
7.1.3.2;14.3.2 SIS II;248
7.1.3.3;14.3.3 VIS;249
7.1.4;14.4…Right to Privacy Right to Data Protection;250
7.1.4.1;14.4.1 Biometrics and Interference of the Right to Privacy;250
7.1.4.2;14.4.2 Necessary in a Democratic Society;251
7.1.4.3;14.4.3 In Accordance with the Law;252
7.1.4.4;14.4.4 Right to Data Protection: A Fundamental Right;253
7.1.5;14.5…‘Strike the Right Balance?’;254
7.1.5.1;14.5.1 The Value of Impact Assessment;254
7.1.5.2;14.5.2 European Data Protection Supervisor and National Data Protection Authorities;256
7.1.5.3;14.5.3 European Parliament;256
7.1.6;14.6…Conclusion;257
7.1.7;References;258
7.2;15 Privacy and Data Protection Aspects of e-Government Identity Management;259
7.2.1;15.1…Introduction;260
7.2.2;15.2…Application of the Legal Data Protection Framework to e-Government;261
7.2.2.1;15.2.1 Legitimacy of Processing;261
7.2.2.2;15.2.2 Finality;262
7.2.2.3;15.2.3 Data Accuracy;264
7.2.2.4;15.2.4 Confidentiality and Security of Processing;265
7.2.2.5;15.2.5 Transparency of Processing and Related Data Subject Rights;269
7.2.2.6;15.2.6 Determination of Tasks, Responsibilities, and Roles;270
7.2.2.7;15.2.7 Use of Unique Identifiers;272
7.2.3;15.3…Current Practices;273
7.2.3.1;15.3.1 Internal Market Information System;274
7.2.3.1.1;15.3.1.1 Definition of Roles and Responsibilities;275
7.2.3.1.2;15.3.1.2 Legitimacy of Processing;276
7.2.3.1.3;15.3.1.3 Data Quality;277
7.2.3.1.4;15.3.1.4 Transparency and Accommodation of Data Subject Rights;278
7.2.3.1.5;15.3.1.5 ID Number Policy;280
7.2.3.2;15.3.2 The Increasing Use of Biometric Data;281
7.2.3.2.1;15.3.2.1 Large-Scale Biometric Applications: Some Examples;281
7.2.3.2.2;15.3.2.2 Legitimacy of the Processing;283
7.2.3.2.3;15.3.2.3 Re-purposing of Biometric Data;284
7.2.3.2.4;15.3.2.4 Data Quality;285
7.2.3.2.5;15.3.2.5 The Risks of Biometric Identifiers;286
7.2.3.2.6;15.3.2.6 Security Flaws;286
7.2.4;15.4…Conclusion;287
7.2.5;References;288
7.3;16 eHealth from a Dutch Perspective;291
7.3.1;16.1…Introduction;292
7.3.2;16.2…Developments Related to eHealth;293
7.3.2.1;16.2.1 Introduction;293
7.3.2.2;16.2.2 European Policy Developments;294
7.3.2.2.1;16.2.2.1 eHealth Action Plan;294
7.3.2.2.2;16.2.2.2 i2010;294
7.3.2.2.3;16.2.2.3 Lead Market Area;294
7.3.2.2.4;16.2.2.4 Patient Safety;296
7.3.2.2.5;16.2.2.5 Interoperability of Health Records and Health Services (Patient Safety);296
7.3.2.2.6;16.2.2.6 Prague Declaration;297
7.3.2.2.7;16.2.2.7 eHealth on the Political Agenda of Sweden’s Presidency;297
7.3.2.3;16.2.3 eHealth Developments in the Netherlands;297
7.3.2.3.1;16.2.3.1 Examples of Dutch eHealth Applications;299
7.3.2.3.2;16.2.3.2 TCCN (‘Stichting Teledermatologisch Consultatie Centrum’);299
7.3.2.3.3;16.2.3.3 Virtual Thrombosis Service;300
7.3.2.3.4;16.2.3.4 ZorgDomein;300
7.3.2.3.5;16.2.3.5 Portal Website for Invitro Fertilization Treatment;300
7.3.2.3.6;16.2.3.6 I.COM: Mental eHealth;301
7.3.2.3.7;16.2.3.7 National Electronic Health Record;301
7.3.3;16.3…The European Legal Framework for eHealth;302
7.3.3.1;16.3.1 Introduction;302
7.3.3.2;16.3.2 The European Legal Framework;303
7.3.3.2.1;16.3.2.1 Patient Data Protection, Privacy and Confidentiality;304
7.3.3.2.2;16.3.2.2 Product and Services Liability;305
7.3.3.2.3;16.3.2.3 General Contract Law and Consumer Protection;306
7.3.3.2.4;16.3.2.4 Product Safety;306
7.3.3.2.5;16.3.2.5 Liability for Damages by an eHealth Device;307
7.3.3.2.5.1;Products;307
7.3.3.2.5.2;Services;307
7.3.3.2.6;16.3.2.6 European Competition Law;308
7.3.3.2.7;16.3.2.7 What does European Competition Law Imply?;309
7.3.3.2.8;16.3.2.8 Patient’s Rights, Patient Safety and Quality of Care;310
7.3.3.2.8.1;Cross-Border Healthcare;310
7.3.3.2.8.2;Medical Devices;312
7.3.3.2.8.3;Professional Qualifications;313
7.3.4;16.4…A Dutch Analysis of the European Legal Issues;313
7.3.4.1;16.4.1 Introduction;313
7.3.4.2;16.4.2 Patient Data Protection, Privacy, and Confidentiality;314
7.3.4.3;16.4.3 Product, Services, and Professional Liabilities;316
7.3.4.4;16.4.4 Competition Law;317
7.3.4.5;16.4.5 Patient Safety and Quality of Care;318
7.3.5;16.5…Conclusion;319
7.3.6;References;320
7.4;17 Implementation of the EU Services Directive: On eGovernment in a Decentralized Unitary State;322
7.4.1;17.1…Introduction;323
7.4.2;17.2…Point of Single Contact---Legal and Organizational Framework;324
7.4.2.1;17.2.1 Basis of EU Law;324
7.4.2.2;17.2.2 Legal and Organizational Implementation in the Netherlands;324
7.4.3;17.3…Challenges from a Constitutional Point of View;326
7.4.4;17.4…Legal Assessment: Principles of Good Governance Applied in a Digital Context;328
7.4.5;17.5…Conclusion;332
7.4.6;References;333
7.5;18 The Impact of Europe on Geo-Information;335
7.5.1;18.1…Introduction;336
7.5.2;18.2…What is Geo-Information?;337
7.5.3;18.3…European Rules in the Context of Geo-Information;338
7.5.3.1;18.3.1 Directive 96/9/EC on the Legal Protection of Databases;338
7.5.3.2;18.3.2 Directive 2003/98/EC on the Reuse of Public Sector Information;339
7.5.3.3;18.3.3 Directive 2007/2/EC Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE);340
7.5.4;18.4…The Directives Evaluated: Is there an Impact on Geo-Information?;341
7.5.4.1;18.4.1 Directive 96/9/EC on the Legal Protection of Databases;341
7.5.4.2;18.4.2 Directive 2003/98/EC on the Reuse of Public Sector Information;342
7.5.4.3;18.4.3 Directive 2007/2/EC Establishing an Infrastructure for Spatial Information in the European Community (INSPIRE);343
7.5.5;18.5…The Landmark Case: A Landmark Decision for Geo-Information;344
7.5.6;18.6…Other Initiatives to Improve Dissemination of Geo-Information in The Netherlands;346
7.5.7;18.7…Conclusion;347
7.5.8;References;349
8;Part V Legal Dimensions:Techno-legal Perspectives;350
8.1;19 Sharing Information between Government Agencies: Some Legal Challenges Associated with Semantic Interoperability;351
8.1.1;19.1…One Word, a Bundle of Definitions;352
8.1.2;19.2…Local, Regional, and Global Legal Concepts;353
8.1.3;19.3…‘Live-in Partner’ as an Example;355
8.1.4;19.4…The Problem of Bad Drafting;358
8.1.5;19.5…Fixing Problems Administratively;360
8.1.6;19.6…Court Decisions: Distinguishing the Case;361
8.1.7;19.7…The Problem of Political Control;362
8.1.8;19.8…Conclusion;363
8.1.9;References;365
8.2;20 Public Information Infrastructures and Identity Fraud;366
8.2.1;20.1…Introduction;367
8.2.2;20.2…Chains and Chain Cooperation;367
8.2.2.1;20.2.1 Chain Issues;367
8.2.2.2;20.2.2 Concepts of ‘Chain’, ‘Dominant Chain Problem’ and ‘Chain Level’;368
8.2.2.3;20.2.3 Chain Thinking;369
8.2.2.4;20.2.4 The Scientific Relevance of the Chain Concept: Fallacy of the Wrong Level;369
8.2.2.5;20.2.5 Example: The European Union’s Biometric Visa System;370
8.2.2.6;20.2.6 Remedies Offered by the Doctrine of Chain Computerization;371
8.2.2.7;20.2.7 Chain Research Results in the Chain Dimension;372
8.2.3;20.3…Identity Fraud (Identity Theft);373
8.2.3.1;20.3.1 The Concept of Identity Fraud (Identity Theft);373
8.2.3.2;20.3.2 Identity Fraud, a Growing Problem;374
8.2.3.2.1;20.3.2.1 More Traces, Less Evidence;374
8.2.3.2.2;20.3.2.2 Identity Fraud Spreading Unnoticed;374
8.2.3.2.3;20.3.2.3 Balance of Power Shift in a Digitized Environment;375
8.2.3.2.4;20.3.2.4 ID-Checking Involves Blind Spots;375
8.2.3.3;20.3.3 Chain Research Results in the Identity Fraud Dimension;376
8.2.4;20.4…Identity Fraud in the Criminal Law Enforcement Chain;376
8.2.4.1;20.4.1 Identity Fraud in the Dutch Criminal Law Enforcement Chain;376
8.2.4.2;20.4.2 Identity Fraud in the Criminal Law Enforcement Chain at EU Level;379
8.2.5;20.5…Some Conclusions and Challenges;382
8.2.5.1;20.5.1 Conclusions;382
8.2.5.2;20.5.2 Challenges;382
8.2.6;References;383
8.3;21 Access to Law in Europe;385
8.3.1;21.1…Introduction;386
8.3.2;21.2…Access to Law in Europe;387
8.3.2.1;21.2.1 Access to Legal Information at the Dawn of the Internet Age;387
8.3.2.2;21.2.2 Access to Legal Information from 1999;388
8.3.2.3;21.2.3 A Case Study: The Netherlands;389
8.3.3;21.3…A Right of Access to Legal Information;391
8.3.3.1;21.3.1 Levels of Accessibility;391
8.3.3.2;21.3.2 Accessibility of EUR-Lex;392
8.3.3.3;21.3.3 Accessibility of Officielebekendmakingen.nl;393
8.3.3.4;21.3.4 Legal Framework for a Right of Access;394
8.3.4;21.4…Conclusion;399
8.3.5;Acknowledgments;399
8.3.6;References;399
9;Part VI Legal Dimensions:Law and Philosophy Perspective;401
9.1;22 Identity Theft and Fraud;402
9.1.1;22.1…Introduction;403
9.1.2;22.2…A Definition of Identity;404
9.1.2.1;22.2.1 Locke;404
9.1.2.1.1;22.2.1.1 Identity;404
9.1.2.1.2;22.2.1.2 Persons;405
9.1.2.1.3;22.2.1.3 Personal Identity;405
9.1.2.2;22.2.2 Internal Identity;406
9.1.2.3;22.2.3 External Identity;406
9.1.3;22.3…Identification;407
9.1.3.1;22.3.1 Identifiers;407
9.1.3.2;22.3.2 Control Over External Identity;408
9.1.4;22.4…Identity Fraud and Theft;409
9.1.4.1;22.4.1 Switched Identities;409
9.1.4.2;22.4.2 Motives;410
9.1.4.3;22.4.3 Means;411
9.1.4.4;22.4.4 Definitions;411
9.1.5;22.5…Illegality Under Dutch Law;411
9.1.5.1;22.5.1 Criminal Law---Fraud;412
9.1.5.2;22.5.2 Criminal Law---Theft;413
9.1.6;22.6…A Recent Case of Identity Theft;414
9.1.7;22.7…Conclusions;416
9.1.8;References;417
10;Part VIITechnological Dimensions;418
10.1;23 Biometrics and Smart Cards in Identity Management;419
10.1.1;23.1…Introduction;420
10.1.2;23.2…The Smart Card Landscape;420
10.1.2.1;23.2.1 Smart Cards and e-Government;421
10.1.3;23.3…Biometrics;422
10.1.3.1;23.3.1 Performance and Quality;423
10.1.3.2;23.3.2 Performance of Face and Fingerprint Recognition;424
10.1.4;23.4…Smart Card and RFID Technology;425
10.1.4.1;23.4.1 Smart Cards;425
10.1.4.1.1;23.4.1.1 The Terminal Problem;427
10.1.4.2;23.4.2 RFID;427
10.1.5;23.5…e-Passports;428
10.1.5.1;23.5.1 Accessing the Passport Chip;430
10.1.5.2;23.5.2 Drawbacks of the ICAO Standards;430
10.1.5.3;23.5.3 Tracking;431
10.1.5.4;23.5.4 Digitally Signed Passport Data;432
10.1.5.5;23.5.5 Function Creep;432
10.1.5.6;23.5.6 Lessons Learnt;433
10.1.6;23.6…Privacy Issues in Using Biometrics and Smart Cards;434
10.1.6.1;23.6.1 Privacy Implications of Biometrics;435
10.1.6.2;23.6.2 Use of Smart Cards;436
10.1.7;References;437
10.2;24 How Devices Transform Voting;439
10.2.1;24.1…Introduction;440
10.2.2;24.2…Voting Requirements;440
10.2.3;24.3…e-Voting in the Netherlands;441
10.2.4;24.4…Implicit Requirements;442
10.2.5;24.5…The Theory of Technological Mediation;444
10.2.6;24.6…Technology Mediates Voting;445
10.2.7;24.7…Challenges;446
10.2.7.1;24.7.1 Voting System;446
10.2.7.2;24.7.2 Autonomy;447
10.2.7.3;24.7.3 Secret Ballot/Privacy;448
10.2.7.4;24.7.4 Verifiability;449
10.2.7.5;24.7.5 Example: Estonia;450
10.2.8;24.8…Conclusions;451
10.2.9;Acknowledgments;451
10.2.10;References;451
11;Part VIIISynthesis;453
11.1;25 A Brave New Government?;454
11.1.1;25.1…Introduction;455
11.1.2;25.2…The Concept e-Government;455
11.1.3;25.3…Making e-Government Work;457
11.1.3.1;25.3.1 Getting Connected;457
11.1.3.2;25.3.2 Identity Construction;460
11.1.3.3;25.3.3 Efficient Big Brother;462
11.1.3.4;25.3.4 IT as a Tool for European Integration;463
11.1.4;25.4…Redefining Government;463
11.1.4.1;25.4.1 Changing the Face of Government: Seeing it in a Different Light;463
11.1.4.2;25.4.2 Accountability;464
11.1.5;25.5…Conclusion;465
11.1.6;Reference;465




