Identity control, activity control : from trust to suspicion

Meryem Marzouki 1
1 NPA - Networks and Performance Analysis
LIP6 - Laboratoire d'Informatique de Paris 6
Abstract : Processes introducing biometric identity control and communicating activity controls through data retention sign, in France and Europe, a reversal of perspective. Taking into account the legislative and regulatory transformations as well as the strategies of government and industry actors, and considering the various means of consent from the general public, we will analyze several levels of this change of paradigm: security objectives centered on intelligence rather than legal investigation; legislative and judicial proceedings oriented towards soft and contract law; intervention of private actors with prerogatives of public power; preventive rather than repressive civil or penal actions, specially through the use of technical means; sometimes inversion of the burden of the proof, requiring proving innocence rather than guilt. This results in the change from a conception of society based on mutual trust into a situation of generalized suspicion.
Document type :
Journal articles
Complete list of metadatas

https://hal.archives-ouvertes.fr/hal-01151804
Contributor : Lip6 Publications <>
Submitted on : Wednesday, May 13, 2015 - 4:02:24 PM
Last modification on : Thursday, March 21, 2019 - 1:10:02 PM

Links full text

Identifiers

Citation

Meryem Marzouki. Identity control, activity control : from trust to suspicion. Annals of Telecommunications - annales des télécommunications, Springer, 2007, La sécurité du monde numérique : confiance, vie privée, gouvernance, 62 (11-12), pp.1207-1222. ⟨10.1007/BF03253314⟩. ⟨hal-01151804⟩

Share

Metrics

Record views

147