{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:48:03Z","timestamp":1760597283331},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s11623-006-0137-y","type":"journal-article","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T04:08:30Z","timestamp":1158552510000},"page":"533-537","source":"Crossref","is-referenced-by-count":4,"title":["Identity as an emerging field of study"],"prefix":"10.1007","volume":"30","author":[{"given":"Ruth","family":"Halperin","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"137_CR1","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1111\/1540-4560.00066","volume":"59","author":"S. A. Alpert","year":"2003","unstructured":"Alpert, S. A. (2003). \u201eProtecting medical privacy: Challenges in the age of genetic information.\u201c Journal of Social Issues 59(2): 301\u201322.","journal-title":"Journal of Social Issues"},{"key":"137_CR2","first-page":"33","volume":"3","author":"J. Backhouse","year":"1996","unstructured":"Backhouse, J. (1996). Information @ Risk. Information Strategy, The Economist. 3: 33\u20135.","journal-title":"Information Strategy, The Economist"},{"key":"137_CR3","unstructured":"Backhouse, J., Ed. (2005). Structured account of approaches on interoperability, FIDIS WP4, Del 4.2."},{"issue":"1","key":"137_CR4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/019722401750067397","volume":"17","author":"M. Barrett","year":"2001","unstructured":"Barrett, M., S. Sahay, et al. (2001). \u201eInformation technology and social transformation: GIS for forestry management in India.\u201c Information Society 17(1): 5\u201320.","journal-title":"Information Society"},{"issue":"1","key":"137_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.10.1.1","volume":"10","author":"M. Barrett","year":"1999","unstructured":"Barrett, M. and G. Walsham (1999). \u201eElectronic trading and work transformation in the London Insurance Market.\u201c Information Systems Research 10(1): 1\u201322.","journal-title":"Information Systems Research"},{"key":"137_CR6","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-44586-2_15","volume":"1992","author":"E. Bresson","year":"2001","unstructured":"Bresson, E. and J. Stern (2001). Efficient revocation in group signatures. Public Key Cryptography, Proceedings. 1992: 190\u2013206.","journal-title":"Public Key Cryptography, Proceedings"},{"issue":"1","key":"137_CR7","first-page":"407","volume":"79","author":"M. Caughey","year":"2004","unstructured":"Caughey, M. (2004). \u201eKeeping attorneys from trashing identities: Malpractice as backstop protection for clients under the united states judicial conference\u2019s policy on electronic court records.\u201c Washington Law Review 79(1): 407\u201335.","journal-title":"Washington Law Review"},{"issue":"6","key":"137_CR8","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1287\/orsc.13.6.618.493","volume":"13","author":"P. Foreman","year":"2002","unstructured":"Foreman, P. and D. A. Whetten (2002). \u201eMembers\u2019 identification with multiple-identity organizations.\u201c Organization Science 13(6): 618\u201335.","journal-title":"Organization Science"},{"issue":"4","key":"137_CR9","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1177\/003802610205000406","volume":"50","author":"M. Hardey","year":"2002","unstructured":"Hardey, M. (2002). \u201eLife beyond the screen: embodiment and identity through the internet.\u201c Sociological Review 50(4): 570\u201385.","journal-title":"Sociological Review"},{"key":"137_CR10","first-page":"235","volume":"2119","author":"S. Hirose","year":"2001","unstructured":"Hirose, S. and S. Yoshida (2001). A user authentication scheme with identity and location privacy. Information Security and Privacy, Proceedings. 2119: 235\u201346.","journal-title":"Information Security and Privacy, Proceedings"},{"issue":"2","key":"137_CR11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/019722499128583","volume":"15","author":"D. L. Hoffman","year":"1999","unstructured":"Hoffman, D. L., T. P. Novak, et al. (1999). \u201eInformation privacy in the marketspace: Implications for the commercial uses of anonymity on the Web.\u201c Information Society 15(2): 129\u201339.","journal-title":"Information Society"},{"key":"137_CR12","doi-asserted-by":"crossref","first-page":"121","DOI":"10.5465\/amr.2000.2791606","volume":"25","author":"M. A. Hogg","year":"2000","unstructured":"Hogg, M. A. and D. J. Terry (2000). \u201eSocial identity and self categorization processes in organizational contexts.\u201c Academy of Management Review 25: 121\u201340.","journal-title":"Academy of Management Review"},{"issue":"2","key":"137_CR13","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1177\/0967010604044974","volume":"35","author":"G. Hoogensen","year":"2004","unstructured":"Hoogensen, G. and S. V. Rottem (2004). \u201eGender identity and the subject of security.\u201c Security Dialogue 35(2): 155\u201371.","journal-title":"Security Dialogue"},{"issue":"1","key":"137_CR14","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1177\/1350508404039662","volume":"11","author":"D. Karreman","year":"2004","unstructured":"Karreman, D. and M. Alvesson (2004). \u201eCages in tandem: Management control, social identity, and identification in a knowledge-intensive firm.\u201c Organization 11(1): 149\u201375.","journal-title":"Organization"},{"issue":"1","key":"137_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01972240590895883","volume":"21","author":"R. Lamb","year":"2005","unstructured":"Lamb, R. and E. Davidson (2005). \u201eInformation and communication technology challenges to scientific professional identity.\u201c Information Society 21(1): 1\u201324.","journal-title":"Information Society"},{"issue":"3","key":"137_CR16","first-page":"239","volume":"20","author":"P. B. Lehning","year":"2001","unstructured":"Lehning, P. B. (2001). \u201eEuropean Citizenship: Towards a European Identity?\u201c Law and Philosophy 20(3): 239\u201382.","journal-title":"Law and Philosophy"},{"key":"137_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-11948-6","volume-title":"Understanding Information: An Introduction","author":"J. Liebenau","year":"1990","unstructured":"Liebenau, J. and J. Backhouse (1990). Understanding Information: An Introduction. Basingstoke and London, Macmillan Press."},{"key":"137_CR18","unstructured":"Nabeth, T. and M. Hildebrandt, Eds. (2005). D 2.1 Inventory of topics and clusters, FIDIS WP2, to be published at www.fidis.net in 2005."},{"key":"137_CR19","unstructured":"Nabeth, T., Ed. (2005). FIDIS Wiki of the Identity Domain, FIDIS WP2, working document available at http:\/\/www.calt.insead.edu\/fidis\/ ."},{"issue":"4","key":"137_CR20","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1177\/026839629801300406","volume":"13","author":"D. J. Phillips","year":"1998","unstructured":"Phillips, D. J. (1998). \u201eThe social construction of a secure, anonymous electronic payment system: frame alignment and mobilization around Ecash.\u201c Journal of Information Technology 13(4): 273\u201383.","journal-title":"Journal of Information Technology"},{"issue":"3","key":"137_CR21","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1207\/s15327019eb0703_2","volume":"7","author":"W. L. Robison","year":"1997","unstructured":"Robison, W. L. (1997). \u201ePrivacy and personal identity.\u201c Ethics & Behavior 7(3): 195\u2013205.","journal-title":"Ethics & Behavior"},{"issue":"1","key":"137_CR22","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1080\/014492900118768","volume":"19","author":"R. Stamper","year":"2000","unstructured":"Stamper, R., K. Liu, et al. (2000). \u201eUnderstanding the roles of signs and norms in organizations\u2014a semiotic approach to information systems design.\u201c Behaviour and Information Technology 19(1): 15\u201328.","journal-title":"Behaviour and Information Technology"},{"key":"137_CR23","first-page":"172","volume":"23","author":"S. K. Tambyah","year":"1996","unstructured":"Tambyah, S. K. (1996). Life on the net: The reconstruction of self and community. Advances in Consumer Research. 23: 172\u20137.","journal-title":"Advances in Consumer Research"},{"issue":"5","key":"137_CR24","first-page":"12","volume":"43","author":"W. D. Terry","year":"2000","unstructured":"Terry, W. D. (2000). \u201eElectronic identity theft.\u201c Communications of the ACM 43(5): 12\u20133.","journal-title":"Communications of the ACM"},{"issue":"2","key":"137_CR25","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1177\/1354066198004002003","volume":"4","author":"M. C. Williams","year":"1998","unstructured":"Williams, M. C. (1998). \u201eIdentity and the politics of security.\u201c European Journal of International Relations 4(2): 204\u201325.","journal-title":"European Journal of International Relations"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0137-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0137-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0137-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:18Z","timestamp":1559398098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0137-y"}},"subtitle":["Areas of research and the cross-disciplinary challenge"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["137"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0137-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]}}}