FIDIS
Future of Identity in the Information Society (No. 507512)
D2.3
[Final], Version: 2.0
File: fidis-wp2-del2.3.models.doc
Page 16
Temporal states: Finally, other attributes are used to represent very
temporary situations that
are attached to a particular context. Examples in this case include for instance the
geographical position of a person at a given time or the mood of the person.
2.2.2 Functional categorisation
The attributes can also be categorised according to some functional characteristics.
Examples of such categories of attributes include:
•
identification (such as a name, the social security number, password, …)
•
location (geographical location, addresses, ...)
•
biological characteristics (biometrics, age, …)
•
personal - psychological (personality, psychological state, preferences, …)
•
group - sociological (affiliations, social group, social networks…)
•
…
This categorisation will be detailed in the following chapter.
2.2.3 Categorisation by domain / spheres
The attributes can also be grouped according to their application domain / activities in which
these attributes are used such as:
•
work (employer, title, roles, expertise, acquaintances, work context / tasks, ...)
•
education (university, degrees, …)
•
leisure (pseudo used in chat spaces, friends,
sexual preferences, …)
•
government (registration information, tax services, …)
•
justice and police (criminal files, …)
•
health (social security number (ssn), medical information, …)
•
…
A subsequent chapter of this document will present more in detail how the categories of
attributes are managed in different domains of application.
2.3 Acquisition of the Person’s Information (Profiling)
Profiling of a given user is the process of obtaining the values associated with the different
attributes that constitute the user model (note: refer to the work conducted in WP7, especially
D7.2, for a more elaborated study of profiling).
The different means that can be employed to get the information associated with the different
attributes include:
•
The direct entering of the personal
information by the end-user
FIDIS
Future of Identity in the Information Society (No. 507512)
D2.3
[Final], Version: 2.0
File: fidis-wp2-del2.3.models.doc
Page 17
•
The extraction of this information from querying existing data sources (such as
databases) or/and captured during different processes (such as the recording of a
transaction)
•
The calculation from existing attributes (simple algorithms or expert systems)
•
The extraction via the mining of information
Of course, one should be aware that the quality of the information differs, and depends largely
on the means that have been employed to get this information. For instance, one can easily
imagine that certain information originating from a governmental database is much more
reliable than the same information found in a personal web page which the user has entered
by her- or himself. In a similar way, we can assume that information that has been calculated
or inferred is more prone to error than information that has been entered directly (although the
phenomenon of obsolescence of information can mitigate this assertion).
Similarly, the control of this information is strongly correlated to the means that have been
employed to collect the information. For instance, information that is present in web pages is
totally controlled by the users themselves, whereas information that is present in a
governmental database is principally controlled by a third party (the government). In the later
case, legislation and the possibility of the end user bringing some correction can help to share
part of this control. In the case where the information has been extracted by some data mining
procedures, it is totally controlled by some third parties. There is almost no possibility of
intervention by the end-users (who may simply be totally unaware that their personal
information is being exploited).
2.3.1 Direct entering of the personal data
Direct entering of personal data consists of mechanisms in which the end users are able to
enter explicitly their personal information. For instance, a typical example of such systems is
an online system in which the users have to describe themselves by specifying their name,
addresses, preferences and other characteristics.
The Type 3 IMS (individual function), presented previously, represent a typical category of
systems that employ this method.
The personal data directly entered is mostly under the total control of the user who is able to
modify this information whenever he likes.
This mode of collection of the personal data appears to better preserve the privacy of the user
than the centralised solutions, although it is not without a certain number of limitations.
Firstly, this information may not be very reliable nor up-to-date, since it relies on the
willingness of the users to enter this information and to be honest. Equally, the users may
even involuntary introduce some errors that originate from an incorrect perception of reality
(such as rationalisation). Secondly, the entering of this information and its update can be
considered too time consuming for the user who may not be ready to spend the effort.
The typical attributes that can be captured in this way include name, addresses, pseudonyms,
short descriptions (such as picture) and preferences (basic).