{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T08:10:07Z","timestamp":1739347807015,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884804"},{"type":"electronic","value":"9783642018206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01820-6_5","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T16:02:59Z","timestamp":1253289779000},"page":"195-242","source":"Crossref","is-referenced-by-count":2,"title":["Mobility and Identity"],"prefix":"10.1007","author":[{"given":"Denis","family":"Royer","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Deuker","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1_5","volume-title":"Understanding Attitudes and Predicting Social Behaviour","author":"I. Ajzen","year":"1980","unstructured":"Ajzen, I. (1980), Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood Cliffs, NJ."},{"issue":"4","key":"5_CR2_5","first-page":"458","volume":"1","author":"A. Arvidsonn","year":"2004","unstructured":"Arvidsonn, A. (2004), \u2018On the prehistory of the panoptic sort: mobility in market research\u2019, Surveillance and Society 1 (4): 458.","journal-title":"Surveillance and Society"},{"issue":"11","key":"5_CR3_5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/948383.948384","volume":"46","author":"S.J. Barnes","year":"2003","unstructured":"Barnes, S.J. and Huff, S.L. (2003), \u2018Rising Sun: iMode and the Wireless Internet\u2019, Communications of the ACM 46 (11): 79\u201384.","journal-title":"Communications of the ACM"},{"issue":"3\/4","key":"5_CR4_5","first-page":"545","volume":"23","author":"H. Beyers","year":"2002","unstructured":"Beyers, H. (2002), \u2018Het internet en de informatiesamenleving \u2014 criteria voor de adoptie van nieuwe technologie\u2019, tijdschrift voor sociologie 23 (3\/4: 545\u2013 570.","journal-title":"tijdschrift voor sociologie"},{"key":"5_CR5_5","volume-title":"Mobile Multimedia-Dienste: Deutschlands Chance im globalen Wettbewerb","author":",F. B\u00fcllingen","year":"2004","unstructured":"B\u00fcllingen,F. and Stamm, P. (2004), Mobile Multimedia-Dienste: Deutschlands Chance im globalen Wettbewerb, Bundesministerium f\u00fcr Wirtschaft und Arbeit."},{"key":"5_CR6_5","volume-title":"The rise of the Network Society","author":"M. Castells","year":"1996","unstructured":"Castells, M. (1996), The rise of the Network Society, Blackwell, New York."},{"issue":"2","key":"5_CR7_5","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1108\/09593840110695767","volume":"14","author":"R. Clarke","year":"2001","unstructured":"Clarke, R. (2001), \u2018Person-location and Person-tracking: technologies, risks and policy implications\u2019, Information, Technology and People 14 (2): 206\u2013231.","journal-title":"Information, Technology and People"},{"key":"5_CR8_5","volume-title":"The Social Control of Technology","author":"D. Collingridge","year":"1980","unstructured":"Collingridge, D. (1980), The Social Control of Technology. Pinter, London."},{"key":"5_CR9_5","unstructured":"Cuijpers, C., Roosendaal, A., Koops, B. J. (eds.) (2007), FIDIS Deliverable D11.5: The legal framework for location-based services in Europe, Download: http:\/\/www.fidis.net\/ fileadmin\/fidis\/deliverables\/fidis-WP11-del11.5-legal_framework_for_LBS.pdf ."},{"issue":"3","key":"5_CR10_5","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F. D. Davis","year":"1989","unstructured":"Davis, F. D. (1989), \u2018Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology\u2019, MIS Quarterly 13 (3): 319\u2013339.","journal-title":"MIS Quarterly"},{"key":"5_CR11_5","unstructured":"Deuker, A. (ed.) (2008), FIDIS Deliverable D11.2: Mobility and LBS, Download: http:\/\/www. fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp11-del11.2_Mobility_and_LBS.pdf ."},{"key":"5_CR12_5","unstructured":"Dutton, W. H. (2001), Society on the Line. Information Politics in the Digital Age. A synthesis of research based on Britain's economic and social research council programme on information and communication technologies, Oxford University Press."},{"key":"5_CR13_5","unstructured":"Fishbein, M., Ajzen, I. (1975), Belief, attitude, intention, and behavior : An introduction to theory and research, Addison-Wesley, Reading (Mass.)."},{"key":"5_CR14_5","unstructured":"Fung, R., Lee, M. (1999), EC-Trust (Trust in electronic commerce): Exploring the antecedent factors. In Proceedings of America Conference of Information System."},{"key":"5_CR15_5","unstructured":"GIS Development (2006), Location Based Services, http:\/\/www.gisdevelopment.net\/magazine\/middleeast\/2006\/july-aug\/22_2.htm , accessed February 2009."},{"key":"5_CR16_5","unstructured":"GSM (2009), http:\/\/www.gsmworld.com\/newsroom\/market-data\/ market_data_summary.htm , accessed February 2009."},{"issue":"1","key":"5_CR17_5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S1363-4127(04)00014-7","volume":"9","author":"M. Hansen","year":"2004","unstructured":"Hansen, M., Berlich, P., Camenisch, J., Clau\u03b2, S., Pfitzmann, A., Waidner, M. (2004), \u2018Privacy-Enhancing Identity Management\u2019, Information Security Technical Report (ISTR) 9 (1): 35\u201344.","journal-title":"Information Security Technical Report (ISTR)"},{"key":"5_CR18_5","unstructured":"Hildebrandt, M. and Gutwirth, S. (eds) (2005), FIDIS deliverable D7.4: Implications of profiling practices on democracy and rule of law, Download: http:\/\/www.fidis.net\/filead-min\/fidis\/deliverables\/fidis-wp7-del7.4.implication_profiling_practices.pdf ."},{"key":"5_CR19_5","unstructured":"Ludden et al (2002), Report on implementation issues related to access to location information by emergency services (E112) in the European Union, Coordination Group on Access to Location information for Emergency Services (C.G.A.L.I.E.S), Download: http:\/\/www.telematica.de\/cgalies\/ ."},{"key":"5_CR20_5","unstructured":"M\u00fcller, G. and Wohlgemuth, S. (eds.) (2005), FIDIS deliverable D3.3: Study on Mobile Identity Management, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.3.study_on_mobile_identity_management.pdf ."},{"issue":"3","key":"5_CR21_5","first-page":"273","volume":"3","author":"G. Ng-Kruelle","year":"2002","unstructured":"Ng-Kruelle, G., P. Swatman, D. Rebne and F. Hampe (2002), \u2018The Price of Convenience: Privacy and Mobile Commerce\u2019, Quarterly Journal of Electronic Commerce 3 (3): 273\u2013385.","journal-title":"Quarterly Journal of Electronic Commerce"},{"key":"5_CR22_5","unstructured":"Nohria, N., Leestma, M. (2001), \u2018A moving Target: The Mobile-Commerce Customer\u2019, MIT Sloan Management Reviews, Spring Issue."},{"key":"5_CR23_5","unstructured":"Nokia (2001), Mobile Location Services (White Paper), Download: http:\/\/nds2.ir.nokia.com\/NOKIA_COM_1\/About_Nokia\/Press\/White_Papers\/pdf_files\/mlbs.pdf ."},{"key":"5_CR24_5","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-322-90695-3_4","volume-title":"Mobile Kommunikation","author":"Picot and Neuburger","year":"2002","unstructured":"Picot and Neuburger (2002), \u2018Mobile Business \u2014 Erfolgsfaktoren und Voraussetzungen\u2019, in: Reichwaldt (Hrsg.), Mobile Kommunikation Gabler, Wiesbaden, 55\u201369."},{"key":"5_CR25_5","first-page":"113","volume-title":"Security and Control of Information Technology in Society \u2014 Proceedings of the IFIP TC9\/WG 9.6 Working Conference August 12\u201317, 1993","author":"K. Rannenberg","year":"1994","unstructured":"Rannenberg, K. (1994), \u2018Recent Development in Information Technology Security Evaluation \u2014 The Need for Evaluation Criteria for multilateral Security\u2019, in: Sizer, R. et al., Security and Control of Information Technology in Society \u2014 Proceedings of the IFIP TC9\/WG 9.6 Working Conference August 12\u201317, 1993, St. Petersburg, Russia, North-Holland, Amsterdam, 113\u2013128."},{"key":"5_CR26_5","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/366173.366208","volume-title":"Proceedings of the 9th ACM New Security Paradigms Workshop","author":"K. Rannenberg","year":"2000","unstructured":"Rannenberg, K. (2000), \u2018Multilateral Security \u2014 A concept and examples for balanced security\u2019, Proceedings of the 9th ACM New Security Paradigms Workshop, Cork, Ireland: ACM Press, 151\u2013162."},{"issue":"1","key":"5_CR27_5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S1363-4127(04)00017-2","volume":"9","author":"K. Rannenberg","year":"2004","unstructured":"Rannenberg, K. (2004), \u2018Identity management in mobile cellular networks and related applications\u2019, Information Security Technical Report 9 (1): 77\u201385.","journal-title":"Information Security Technical Report"},{"key":"5_CR28_5","volume-title":"2002 CollECTeR (Europe) Conference on Electronic Commerce","author":"D. Rebne","year":"2002","unstructured":"Rebne, D., G. Ng-Kruelle, P. Swatman and F. Hampe (2002), \u2018Weberian Socioeconomic Behavioral Analysis and Price-of-convenience Sensitivity: Implications for MCom-merce and Location-based Applications\u2019, 2002 CollECTeR (Europe) Conference on Electronic Commerce, Centre de Congres, Toulouse, France."},{"key":"5_CR29_5","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/978-3-322-90695-3","volume-title":"Mobile Kommunikation","author":"R. Reichwald","year":"2002","unstructured":"Reichwald, R., Meier, R., Fremuth, N. (2002), \u2018Die Mobile \u00d6konomie \u2014 Definition und Spezifika\u2019, in: Reichenwald, R., Mobile Kommunikation. Gabler, Wiesbaden, 4\u201315."},{"key":"5_CR30_5","doi-asserted-by":"crossref","unstructured":"Ristola, A., Koivumaki, T., Kesti, M. (2005): \u2018The Effect on Familiar Mobile Device and Usage Time on Creating Perceptions Towards Mobile Services\u2019, International Conference on Mobile Business (ICMB'05), 384\u2013391.","DOI":"10.1109\/ICMB.2005.101"},{"key":"5_CR31_5","volume-title":"The Diffusion of Innovations","author":"E. M. Rogers","year":"2003","unstructured":"Rogers, E. M. (2003), The Diffusion of Innovations, 5th Edition, Free Press, New York.","edition":"5"},{"key":"5_CR32_5","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/10864415.2003.11044287","volume":"8","author":"G. Roussos","year":"2003","unstructured":"Roussos, G., Peterson, D., Patel, U. (2003) \u2018Mobile Identity Management: An Enacted View\u2019, International Journal of E-Commerce, Vol. 8: 81\u2013100.","journal-title":"International Journal of E-Commerce"},{"key":"5_CR33_5","unstructured":"Royer, D. (ed.) (2006), FIDIS Deliverable D11.1: Collection of Topics and Clusters of Mobility and Identity \u2014 Towards a Taxonomy of Mobility and Identity, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp11-del11.1.mobility_and_identity.pdf"},{"key":"5_CR34_5","unstructured":"Royer, D. (ed.) (2008), FIDIS Deliverable D11.3: Economic aspects of mobility and identity, Download: http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp11-del11.3.economic_aspects.pdf"},{"key":"5_CR35_5","doi-asserted-by":"crossref","unstructured":"Royer, D. and Meints, M. (2009; forthcoming): \u2018Enterprise Identity Management \u2014 Towards a Decision Support Framework based on the Balanced Scorecard Approach\u2019 Wirtschaftsinformatik 51 (3).","DOI":"10.1007\/s12599-009-0052-5"},{"issue":"9","key":"5_CR36_5","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s11623-006-0146-x","volume":"30","author":"D. Royer","year":"2006","unstructured":"Royer, D. and Rannenberg, K. (2006) \u2018Mobilit\u00e4t, mobile Technologie und Identit\u00e4t\u2019 Datenschutz und Datensicherheit 30 (9): 571\u2013575.","journal-title":"Datenschutz und Datensicherheit"},{"key":"5_CR37_5","unstructured":"Saarenp\u00e4\u00e4, A. (2002), \u2018The constitutional state and digital identity\u2019, Paper available on the website of the 2002 World Congress for Informatics and Law II Spain September 23rd to 27th 2002, http:\/\/www.ieid.org\/congreso\/ponencia_i.htm ."},{"key":"5_CR38_5","volume-title":"Mobile Communications","author":"J. H. Schiller","year":"2003","unstructured":"Schiller, J. H. (2003), Mobile Communications. 2nd ed., Addison-Wesley, London.","edition":"2"},{"key":"5_CR39_5","unstructured":"Schneberger, S. and Wade, M. (eds.) (2008), Theories Used in IS Research Wiki, http:\/\/www.fsc.yorku.ca\/york\/istheory\/wiki\/index.php\/Main_Page , York (Canada), (Accessed on 30 June 2008)."},{"key":"5_CR40_5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1086\/209170","volume":"15","author":"B. H. Sheppard","year":"1988","unstructured":"Sheppard, B. H., Hartwick, J., Warshaw, P.R. (1988), \u2018The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research\u2019, Journal of Consumer Research 15: 325\u2013343.","journal-title":"Journal of Consumer Research"},{"issue":"4","key":"5_CR41_5","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/641205.641211","volume":"46","author":"K. Siau","year":"2003","unstructured":"Siau, K. and Shen, Z. (2003), \u2018Building Customer Trust in Mobile Commerce\u2019, Communications of the ACM 46 (4): 91\u201394.","journal-title":"Communications of the ACM"},{"key":"5_CR42_5","doi-asserted-by":"crossref","unstructured":"Sui, D.Z. (2004), \u2018The media and the message of location-based services (LBS): Death of distance or the revenge of geography?\u2019, Geoinformatics Proc. 12 th Int. Conf. on Geoinformatics \u2014 geospatial information research.","DOI":"10.1080\/10824000409480668"},{"key":"5_CR43_5","unstructured":"UN (2009), United Nations Member States, www.un.org\/members\/list.shtml , visited February 2009"},{"key":"5_CR44_5","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-0-387-72367-9_28","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the 22nd IFIP TC-11 International Information Security Conference","author":"J. Zibuschka","year":"2007","unstructured":"Zibuschka, J., Fritsch, L., Radmacher, M., Scherner, T., Rannenberg, K. (2007) \u2018Enabling Privacy of Real-Life LBS: A Platform for Flexible Mobile Service Provisioning\u2019, in: New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the 22nd IFIP TC-11 International Information Security Conference, Sandton, South Africa, 325\u2013336."}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01820-6_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T07:40:41Z","timestamp":1739346041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01820-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540884804","9783642018206"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01820-6_5","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}