{"title":"Mick or Keith: blended identity of online rock fans","authors":"Andrea Baker","doi":"10.1007/S12394-009-0015-5","DOIUrl":"https://doi.org/10.1007/S12394-009-0015-5","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115798448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A roadmap for research on identity in the information society","authors":"Ruth Halperin, J. Backhouse","doi":"10.1007/S12394-008-0004-0","DOIUrl":"https://doi.org/10.1007/S12394-008-0004-0","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profiling and the rule of law","authors":"M. Hildebrandt","doi":"10.1007/S12394-008-0003-1","DOIUrl":"https://doi.org/10.1007/S12394-008-0003-1","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121257589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy in the clouds","authors":"A. Cavoukian","doi":"10.1007/S12394-008-0005-Z","DOIUrl":"https://doi.org/10.1007/S12394-008-0005-Z","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"As I see it: enclosing identity","authors":"I. Angell","doi":"10.1007/S12394-008-0001-3","DOIUrl":"https://doi.org/10.1007/S12394-008-0001-3","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129082628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nine principles for assessing whether privacy is protected in a surveillance society","authors":"Chris Pounder, Dr. C. N. M. Pounder","doi":"10.1007/S12394-008-0002-2","DOIUrl":"https://doi.org/10.1007/S12394-008-0002-2","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127738336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overlooking children: an experiment with consequences","authors":"T. Dowty","doi":"10.1007/S12394-009-0010-X","DOIUrl":"https://doi.org/10.1007/S12394-009-0010-X","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification practices in government: citizen surveillance and the quest for public service improvement","authors":"John A. Taylor, M. Lips, J. Organ","doi":"10.1007/S12394-009-0007-5","DOIUrl":"https://doi.org/10.1007/S12394-009-0007-5","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claudia Díaz, E. Kosta, H. Dekeyser, Markulf Kohlweiss, G. Nigusse
{"title":"Privacy preserving electronic petitions","authors":"Claudia Díaz, E. Kosta, H. Dekeyser, Markulf Kohlweiss, G. Nigusse","doi":"10.1007/S12394-009-0012-8","DOIUrl":"https://doi.org/10.1007/S12394-009-0012-8","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a better citizen identification system","authors":"P. Cofta","doi":"10.1007/S12394-009-0006-6","DOIUrl":"https://doi.org/10.1007/S12394-009-0006-6","url":null,"abstract":"","PeriodicalId":175696,"journal":{"name":"Identity in the Information Society","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}