Consumers Say They're OK with Master IDs

Adams, John
June 2006
Bank Technology News;Jun2006, Vol. 19 Issue 6, p18
Trade Publication
The article discusses the confirmation from consumers on the universal accesses of identity cards to transportation, Internet and the public places. Based on a research, despite the security implemented in the identity cards through the giving of permanent personal privacy, some concerns related to electronic hacking were still raised. However, consumers promised to share personal data as soon as they will be convince on the protection of their information by the end user.


Related Articles

  • No privacy on the web. Quittner, Joshua; McCullagh, Declan // Time International (South Pacific Edition);06/02/97, Issue 22, p60 

    Reports on the easiness of getting private information such as social security numbers, tax reports, and liens off the Internet. Brokers who sell information; Personal Information Privacy Act of 1997; Concern of civil libertarians. INSET: My week as an internet gumshoe, by Noah Robischon..

  • HACKING THE NET. Fleischaker, Ted // Word (Word Publications - Ted Fleischaker);Sep2006, p52 

    The article addresses the issue of basic computer security. The Web site of "The Word" features an archive of the past issues of the journal, gadgets, and a Web site form that will enable the Web administrator to determine one's location. The Internet is capable of providing information about...

  • USER'S PERSPECTIVES ON PRIVACY IN WEB-BASED APPLICATIONS. Zviran, Moshe // Journal of Computer Information Systems;Summer2008, Vol. 48 Issue 4, p97 

    Privacy is a major concern in web-based applications. While privacy was a sensitive issue long before the advent of computers. the phenomenal growth in Internet commerce in recent years has brought privacy concerns to the fore. The problem of privacy has been further exacerbated by the fact that...

  • PKI Development in Estonia: Issues of Concern. Melnikova, Ksenia; Kreslins, Karlis // EBS Review;2001, Issue 13, p72 

    The article explores the challenges and concerns about the Public Key Infrastructure (PKI) mechanism in Estonia. It is stated that PKI is one of the tools for achieving secure authentication of identity, privacy and authorized access to information. The organizations or non-ethical issues...

  • Sign Here. Goodman, Josh // Governing;Sep2003, Vol. 16 Issue 12, p40 

    Reports on the development of public-key infrastructure by several U.S. states to be used for issuing and verifying digital certificates and thereby enable the use of digital signatures. Comparison of the approaches of Kansas and Illinois to making public-key infrastructure interoperable.

  • Security, Privacy and Politics in India: A Historical Review. Subramanian, Ramesh // Journal of Information System Security;2010, Vol. 6 Issue 2, p68 

    Much is discussed about privacy laws in developed economies such as The US, EU, Japan, Canada, and Australia. However, not many studies have focused on privacy laws that are evolving in emerging economies such as India. As the economy becomes global and companies resort to global outsourcing,...

  • How to protect your online privacy. Bairstow, Jeff // Laser Focus World;Jan2003, Vol. 39 Issue 1, p178 

    Offers advice on how to protect privacy on the Internet. Disclosure of personal information; Use of cookie notices on Web browsers; Sending of e-mails; Avoidance of certain Web sites.

  • Privacy on parade. Dancer, Helen // Australian Personal Computer;Jul99, Vol. 20 Issue 7, p56 

    Discusses the issue of privacy in the Internet world. Need for a public education campaign to remind people of their right to ask the uses for information that they give; Opportunity for businesses to compile data on users; CyberGold as patented process of measuring the value of a Netizen's...

  • Identity-Based Ring Signature Schemes for Multiple Domains. JuHee Ki; Jung Yeon Hwang; Dong Hoon Lee // KSII Transactions on Internet & Information Systems;Oct2012, Vol. 6 Issue 10, p2692 

    A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics