TI  Vol.4 No.1 , February 2013
Identity and Mobility in a Digital World
Abstract: Mobile identity management has attracted the attention of both the public and private sectors in the last few years. In the context of service delivery, modern mobile communication networks offer more convenient approaches to developing citizen-centric applications. However, taking into consideration the need for compelling user authentication and identification, secure communication in mobile environments remains a challenging matter. This article explores the potential role of government-issued smart identity cards in leveraging and enabling a more trusted mobile communication base. It delves into the identity management infrastructure program in the United Arab Emirates (UAE) and how the smart identity card and overall system architecture have been designed to enable trusted and secure transactions for both physical and virtual mobile communications.
Cite this paper: A. Al-Khouri, "Identity and Mobility in a Digital World," Technology and Investment, Vol. 4 No. 1, 2013, pp. 7-12. doi: 10.4236/ti.2013.41002.

[1]   D. Royer, “Economic Aspects of Mobility and Identity,” Future of Identity in the Information Society, 2012. doi:10.5121/ijmvsc.2011.2102

[2]   A. Deuker and D. Royer, “Next Generation Networks,” Future of Identity in the Information Society, 2009.

[3]   S. Srirama, M. Jarkeand W. Prinz, “Mobile Host: A Feasibility Analysis of Mobile Web Service Provisioning,” Proceedings of 4th International Workshop (CAiSE’ 06) on Ubiquitous Mobile Information and Collaboration Systems (UMICS 2006), Luxembourg, 5-6 June 2006, pp. 942-953.

[4]   A. M. Al-Khouri, “An Innovative Approach for e-Government Transformation,” International Journal of Managing Value and Supply Chains, Vol. 2, No. 1, 2012, pp. 22-43.

[5]   A. M. Al-Khouri, “eGovernment Strategies the Case of the United Arab Emirates (UAE),” European Journal of ePractice, No. 17, 2012, pp. 126-150.

[6]   A. M. Al-Khouri, “Emerging Markets and Digital Economy: Building Trust in the Virtual World,” International Journal of Innovation in the Digital Economy, Vol. 3, No. 2, 2012, pp. 57-69. doi:10.4018/jide.2012040105

[7]   A. M. Al-Khouri, “Electronic Government in the GCC Countries,” International Journal of Social Sciences, Vol. 1, No. 2, 2007, pp. 83-98.

[8]   A. M. Al-Khouri, “PKI in Government Digital Identity Management Systems,” European Journal of ePractice, No. 14, 2012, pp. 4-21.

[9]   L. Haddon, “Domestication and Mobile Telephony,” In: J. E. Katz, Ed., Machines that Become Us: The Social Context of Personal Communication Technology, Transaction Publishers, New Brunswick, 2003, pp. 43-55.

[10]   J. Keeney, D. Lewis, D. O’Sullivan, A. Roelens, V. Wade, A. Boranand and R. Richardson, “Runtime Semantic Interoperability for Gathering Ontology-Based Network Context,” Network Operations and Management Symposium, Vancouver, April 2006, pp. 56-65.

[11]   W. Kim, “On Digital Convergence and Challenges,” Journal of Object Technology, Vol. 4, No. 4, 2005, pp. 67-71. doi:10.5381/jot.2005.4.4.c5

[12]   R. Mantena and A. Sundararajan, “Competing in Markets with Digital Convergence,” 2004.

[13]   M. Mueller, “Digital Convergence and Its Consequences,” The Public, Vol. 6, No. 3, 1999, pp. 11-28.

[14]   S. Narendra, “Connecting Identity and Mobility: A Secure, Scalable and Sustainable Mobile Wallet Approach,” IQT Quarterly, Vol. 4, No. 1, 2012, pp. 18-21.

[15]   J. Strassner, M. O. Foghlu, W. Donnelly and N. Agoulmine, “Beyond the Knowledge Plane: An Inference Plane to Support the Next Generation Internet,” Global Information Infrastructure Symposium, Marrakech, 2-5 July 2007, pp. 112-119.