%0 Conference Proceedings %T Privacy in digital identity systems: models, assessment and user adoption %+ Département Langues et Sciences Humaines (IMT-BS - LSH) %+ Laboratoire Sens et Compréhension du Monde Contemporain (LASCO) %+ Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR) %+ Département Réseaux et Services de Télécommunications (TSP - RST) %+ Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR) %+ Centre National de la Recherche Scientifique (CNRS) %+ Laboratoire Traitement et Communication de l'Information (LTCI) %A Khatchatourov, Armen %A Laurent, Maryline %A Levallois-Barth, Claire %Z Part 4: Application Areas and Evaluation %< avec comité de lecture %Z 15417 %( Lecture Notes in Computer Science %B 14th International Conference on Electronic Government (EGOV) %C Thessaloniki, Greece %Y Efthimios Tambouris %Y Marijn Janssen %Y Hans Jochen Scholl %Y Maria A. Wimmer %Y Konstantinos Tarabanis %Y Mila Gascó %Y Bram Klievink %Y Ida Lindgren %Y Peter Parycek %I Springer international publishing %3 Electric government %V LNCS-9248 %P 273-290 %8 2015-08-30 %D 2015 %R 10.1007/978-3-319-22479-4_21 %K EIDAS %K Privacy impact as-sessment %K E-Government %K EID %K EID deployer %K Pseudonymous authentication %K Privacy %K Multiple / partial identities %K Technology adoption %K Selective disclosure %K Privacy adoption paradox %K Digital identity %K Privacy by design %K Personal data %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI] %Z Humanities and Social Sciences/SociologyConference papers %X The use of privacy protection measures is of particular importance for existing and upcoming users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying the way they should be implemented. The paper contributes to the discussion on pseudonyms and multiple identities, by (1) providing an original analysis grid that can be applied for privacy evaluation in any eID architecture, and (2) intro-ducing the concept of eID deployer allowing to model virtually any case of the relation between the user, the eID implementation and user's digital identities. Based on these inputs, a comparative analysis of four exemplary eID architec-tures deployed in European countries is conducted. The paper also discusses how sensitive citizens of these countries are to the privacy argument while adopting these systems, and presents the "privacy adoption paradox". %G English %Z TC 8 %Z WG 8.5 %2 https://hal.science/hal-01283997/document %2 https://hal.science/hal-01283997/file/2015-EGOV-Khatchatourov_Privacy_in_Digital_Identity.pdf %L hal-01283997 %U https://hal.science/hal-01283997 %~ SHS %~ UNIV-PARIS5 %~ INSTITUT-TELECOM %~ CNRS %~ ENST %~ AO-SOCIOLOGIE %~ TELECOM-PARISTECH %~ TELECOM-SUDPARIS %~ TELECOM-MANAGEMENT %~ SOCIOLOGIE %~ PARISTECH %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-EGOV %~ IFIP-WG8-5 %~ IFIP-LNCS-9248 %~ LTCI %~ I3-TPT %~ SES %~ IMT-BS %~ INSTITUTS-TELECOM %~ UNIV-PARIS %~ NOS %~ UMR_I3