Explores authentication technologies and their implications for the privacy of the individuals being authenticated.
This book examines numerous concepts, including authorization, identification, privacy, and security.
It provides a framework to guide on these issues when deciding whether and how to use authentication in a particular context.