Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-fv566 Total loading time: 0 Render date: 2024-07-20T05:25:49.513Z Has data issue: false hasContentIssue false

Introduction

Published online by Cambridge University Press:  04 February 2022

Get access

Summary

The Domains of Identity outlines 16 key domains where individual's personally identifiable information ends up in databases. The book enumerates the 16 domains of identity, describing each in detail along with the types of data collected in the domain, the source and key actors among whom information moves.

I wrote this book for several reasons:

  • 1) to give journalists and the general public clear simple terms to understand the mechanics of and issues surrounding identity management across a range of societal contexts;

  • 2) to support professionals in the fields of identity management and privacy having a common language to understand where and how different types of identity interactions are happening, and from there being more able to solve the challenges that different domains present;

  • 3) to support those working in academia and the private sector having a common language to understand the landscape of issues so that academic research actually serves industry and industry work can be better understood by those researching the field; and

  • 4) to support government officials and those engaged with public policy issues being able to understand the challenges that exist in different domains and be able to craft better policies to address challenges within those domains.

Everyone in our society participates in identity management on a daily basis. It is so common that we do not really think about it. As a result, the discourse about identity often conflates radically different issues. The illicit market in which personal data are bought and sold is very different from the contemporary data broker industry, but it is not uncommon for people with fears about personal data use to lump these two contexts together—forgetting that one is a legal business market and the other is a result of criminal activity. Likewise, the data from a data breach via an HVAC vendor, such as the Target breach, that end up in an illicit market is different from data from a compromised enterprise identity management system protected by weak authentication (just a password) resulting in employee's authentication credentials being stolen in a spear phishing attack.

Type
Chapter
Information
The Domains of Identity
A Framework for Understanding Identity Systems in Contemporary Society
, pp. 1 - 8
Publisher: Anthem Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×