Skip to Main content Skip to Navigation
Journal articles

Identity control, activity control : from trust to suspicion

Meryem Marzouki 1 
1 NPA - Networks and Performance Analysis
LIP6 - Laboratoire d'Informatique de Paris 6
Abstract : Processes introducing biometric identity control and communicating activity controls through data retention sign, in France and Europe, a reversal of perspective. Taking into account the legislative and regulatory transformations as well as the strategies of government and industry actors, and considering the various means of consent from the general public, we will analyze several levels of this change of paradigm: security objectives centered on intelligence rather than legal investigation; legislative and judicial proceedings oriented towards soft and contract law; intervention of private actors with prerogatives of public power; preventive rather than repressive civil or penal actions, specially through the use of technical means; sometimes inversion of the burden of the proof, requiring proving innocence rather than guilt. This results in the change from a conception of society based on mutual trust into a situation of generalized suspicion.
Document type :
Journal articles
Complete list of metadata
Contributor : Lip6 Publications Connect in order to contact the contributor
Submitted on : Wednesday, May 13, 2015 - 4:02:24 PM
Last modification on : Sunday, June 26, 2022 - 9:53:24 AM

Links full text



Meryem Marzouki. Identity control, activity control : from trust to suspicion. Annals of Telecommunications - annales des télécommunications, Springer, 2007, La sécurité du monde numérique : confiance, vie privée, gouvernance, 62 (11-12), pp.1207-1222. ⟨10.1007/BF03253314⟩. ⟨hal-01151804⟩



Record views