全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Chain Perspective on Large-scale Number Systems

Keywords: authentication , large-scale personal number system , Chain-computerisation , information strategy , identity management , interoperability , privacy , security

Full-Text   Cite this paper   Add to My Lib

Abstract:

As large-scale number systems gain significance in social and economic life (electronic communication, remote electronic authentication), the correct functioning and the integrity of public number systems take on crucial importance. They are needed to uniquely indicate people, objects or phenomena in the ever-increasing digitisation of our information society. Number systems fulfil many functions, often several at the same time. Due to poor system design and management people can in many ways manipulate number systems or number verifications to claim rights or other advantages and to render oneself invisible and untraceable by hiding behind somebody else's personal number. In practice, a personal number is often used as claim of identity, both online and offline, both honestly and dishonestly. At present, our large-scale number systems are vulnerable to the misuse of personal numbers (identity fraud/theft). Moreover, the usual multi-chain usage of large-scale personal number systems turns out to be very problematic. Thus, the design and management of number systems are becoming more and more vital to our information society. Unfortunately, the study of large-scale number systems has long been neglected in Public Administration Science as well as in Information Science. To fill this gap this article presents a number system theory based on the theory of Chain-computerisation. It explaines some important insights that have to be taken into account when designing, implementing and managing large-scale number systems. This article is only available in English. As large-scale number systems gain significance in social and economic life (electronic communication, remote electronic authentication), the correct functioning and the integrity of public number systems take on crucial importance. They are needed to uniquely indicate people, objects or phenomena in the ever-increasing digitisation of our information society. Number systems fulfil many functions, often several at the same time. Due to poor system design and management people can in many ways manipulate number systems or number verifications to claim rights or other advantages and to render oneself invisible and untraceable by hiding behind somebody else's personal number. In practice, a personal number is often used as claim of identity, both online and offline, both honestly and dishonestly. At present, our large-scale number systems are vulnerable to the misuse of personal numbers (identity fraud/theft). Moreover, the usual multi-chain usage of large-scale personal number systems turns out to be ve

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133