Microsoft Word fidis-wp2-de models doc



Yüklə 0,65 Mb.
Pdf görüntüsü
səhifə7/30
tarix24.04.2018
ölçüsü0,65 Mb.
#40095
1   2   3   4   5   6   7   8   9   10   ...   30

FIDIS 

Future of Identity in the Information Society (No. 507512)

 

D2.3 

  

[Final], Version: 2.0 



File: fidis-wp2-del2.3.models.doc 

Page 16 

 

Temporal states: Finally, other attributes are used to represent very temporary situations that 

are attached to a particular context. Examples in this case include for instance the 

geographical position of a person at a given time or the mood of the person. 

 

2.2.2 Functional categorisation 

The attributes can also be categorised according to some functional characteristics. 

Examples of such categories of attributes include: 

 

identification (such as a name, the social security number, password, …) 



 

location (geographical location, addresses, ...) 



 

biological characteristics (biometrics, age, …) 



 

personal - psychological (personality, psychological state, preferences, …) 



 

group - sociological (affiliations, social group, social networks…) 



 

… 



 

This categorisation will be detailed in the following chapter. 

 

2.2.3  Categorisation by domain / spheres 

The attributes can also be grouped according to their application domain / activities in which 

these attributes are used such as: 

 



work (employer, title, roles, expertise, acquaintances, work context / tasks, ...) 

 



education (university, degrees, …) 

 



leisure (pseudo used in chat spaces, friends, sexual preferences, …) 

 



government (registration information, tax services, …) 

 



justice and police (criminal files, …) 

 



health (social security number (ssn), medical information, …) 

 



… 

 

A subsequent chapter of this document will present more in detail how the categories of 



attributes are managed in different domains of application. 

 

2.3  Acquisition of the Person’s Information (Profiling) 

Profiling of a given user is the process of obtaining the values associated with the different 

attributes that constitute the user model (note: refer to the work conducted in WP7, especially 

D7.2, for a more elaborated study of profiling). 

The different means that can be employed to get the information associated with the different 

attributes include:  

 



The direct entering of the personal information by the end-user 


FIDIS 

Future of Identity in the Information Society (No. 507512)

 

D2.3 

  

[Final], Version: 2.0 



File: fidis-wp2-del2.3.models.doc 

Page 17 

 

 



The extraction of this information from querying existing data sources (such as 

databases) or/and captured during different processes (such as the recording of a 

transaction) 

 



The calculation from existing attributes (simple algorithms or expert systems) 

 



The extraction via the mining of information 

 

Of course, one should be aware that the quality of the information differs, and depends largely 



on the means that have been employed to get this information. For instance, one can easily 

imagine that certain information originating from a governmental database is much more 

reliable than the same information found in a personal web page which the user has entered 

by her- or himself. In a similar way, we can assume that information that has been calculated 

or inferred is more prone to error than information that has been entered directly (although the 

phenomenon of obsolescence of information can mitigate this assertion). 

Similarly, the control of this information is strongly correlated to the means that have been 

employed to collect the information. For instance, information that is present in web pages is 

totally controlled by the users themselves, whereas information that is present in a 

governmental database is principally controlled by a third party (the government). In the later 

case, legislation and the possibility of the end user bringing some correction can help to share 

part of this control. In the case where the information has been extracted by some data mining 

procedures, it is totally controlled by some third parties. There is almost no possibility of 

intervention by the end-users (who may simply be totally unaware that their personal 

information is being exploited).  

2.3.1  Direct entering of the personal data 

Direct entering of personal data consists of mechanisms in which the end users are able to 

enter explicitly their personal information. For instance, a typical example of such systems is 

an online system in which the users have to describe themselves by specifying their name, 

addresses, preferences and other characteristics. 

The Type 3 IMS (individual function), presented previously, represent a typical category of 

systems that employ this method. 

The personal data directly entered is mostly under the total control of the user who is able to 

modify this information whenever he likes. 

This mode of collection of the personal data appears to better preserve the privacy of the user 

than the centralised solutions, although it is not without a certain number of limitations. 

Firstly, this information may not be very reliable nor up-to-date, since it relies on the 

willingness of the users to enter this information and to be honest. Equally, the users may 

even involuntary introduce some errors that originate from an incorrect perception of reality 

(such as rationalisation). Secondly, the entering of this information and its update can be 

considered too time consuming for the user who may not be ready to spend the effort. 

The typical attributes that can be captured in this way include name, addresses, pseudonyms, 

short descriptions (such as picture) and preferences (basic). 




Yüklə 0,65 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   10   ...   30




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə