Roussos, G., Peterson, D. and Patel, U., 2003. Mobile Identity Management: An Enacted View. International Journal of Electronic Commerce, 8 (1), 81-100.
Full text available as:
|
PDF
Mobile Identity Management_ An Enacted View.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial. 200kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Official URL: http://doi.org/10.1080/10864415.2003.11044287
DOI: 10.1080/10864415.2003.11044287
Abstract
The growth of mobile business requires the ability to provide context-aware services when and where needed, the development of trust relationships between trading partners, and an ever-expanding capability to reconfigure value chains. These issues are becoming more prominent with the emergence of converged architectures for next generation public networks. The integration of the Internet, traditional telephony networks, and consumer electronics brings mobile business to the forefront. In this context, mobile identity management can play a central role in addressing usability and trust issues in mobile business. For this reason, it is being established as a core service for next-generation mobile telecommunications infrastructures. Mobile identity management is used to identify, acquire, access, and pay for services that follow the user from device to device, location to location, and context to context, and thus it is the network component that holds together novel services on novel networks using innovative business models. In contrast to previous-generation mobile business infrastructures, this represents a pivotal shift in focus from identification to identity. The present paper advocates that this shift calls for an enacted view of technology, since the level of involvement of human qualities is unprecedented when discussing identity. It introduces a view of identity in mobile business based on three principles and finds that this approach is useful in explaining some recent research findings in ubiquitous retailing. Widening the discipline boundaries for future research on identity in mobile business will be essential for the development of effective mobile service provision systems.
Item Type: | Article |
---|---|
ISSN: | 1086-4415 |
Uncontrolled Keywords: | Mobile identity management; next-generation mobile communication systems; pervasive computing; service provision; ubiquitous computing |
Group: | University Executive Team |
ID Code: | 36432 |
Deposited By: | Symplectic RT2 |
Deposited On: | 04 Jan 2022 12:29 |
Last Modified: | 14 Mar 2022 14:31 |
Downloads
Downloads per month over past year
Repository Staff Only - |