Skip to main content

Summary

What is a virtual person? What is it used for? What is its added value?

Virtual persons sometimes describe avatars and new forms of identities in online games. They also appear in other contexts; some authors use them in the legal domain. Within FIDIS, the concept of virtual person has been extended in order to better describe and understand new forms of identities in the Information Society in relation to rights, duties, obligations and responsibilities.

Virtual persons, as other virtual entities, exist in the virtual world, the collection of all (abstract) entities, which are or have been the product of the mind or imagination. The virtual world — not to be confused with the digital world — allows a unified description of many identity-related concepts that are usually defined separately without taking into consideration their similarities: avatars, pseudonyms, categories, profiles, legal persons, etc.

The legal system has a long experience of using abstract entities to define rules, categories, etc., in order to associate legal rights, obligations, and responsibilities to persons that can be considered instances of these abstract entities in specific situations. The model developed within FIDIS intentionally uses a similar construction.

In this chapter, after having explained the model, we apply it to pseudonyms. Then we explore the concept of virtual persons from a legal perspective. Eventually, we introduce trust in the light of virtual persons.

This chapter has been reviewed by Bert-Jaap Koops (TILT) and Vashek Matyas (MU). The authors thank the reviewers for their valuable comments and suggestions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Abdul-Rahman, A. (1997), ‘The PGP trust model’, EDI-Forum: the Journal of Electronic Commerce, 10(3):27–31.

    Google Scholar 

  • Abdul-Rahman, A. and Hailes, S. (1997), ‘A distributed trust model’, NSPW'97, Workshop on New Security Paradigms, pp 48–60, Langdale, Cumbria, U.K.

    Google Scholar 

  • Abdul-Rahman, A. and Hailes S (2000) ‘Supporting trust in virtual communities’, HICSS-33, 33rd Hawaii International Conference on System Sciences, pp 1769–1777, Maui, USA.

    Google Scholar 

  • Abrams, M. D. and Joyce, M. V. (1995), ‘Trusted system concepts’, Computers & Security, 14(1):45–56.

    Article  Google Scholar 

  • Almendra, V. S. and Schwabe, D. (2006), ‘Trust policies for semantic web repositories’, in: Bonatti, P. A., Ding, L., Finin, T., Olmedilla, D. (eds), SWPW'06, 2nd Semantic Web Policy Workshop, pp 17–31, Athens, USA.

    Google Scholar 

  • Anrig, B., Browne, W., Gasson, M. (2007), ‘The role of algorithms in profiling’, in: Hilde-brandt, M. and Gutwirth, S. (eds), Profiling the European Citizen, Springer, pp 65–80.

    Google Scholar 

  • Artz, D. and Gil, Z. (2007), ‘A survey of trust in computer science and the semantic web’, Web Semantics: Science, Services and Agents on the World Wide Web, 5(2):58–71.

    Article  Google Scholar 

  • Ashraf, N., Bohnet, I., Piankov, N. (2006), ‘Decomposing trust and trustworthiness’, Experimental Economics, 9(3):193–208.

    Article  Google Scholar 

  • Benoist, E. (2007), ‘Collecting data for the profiling of web-users’, in: Hildebrandt. M., Gutwirth, S. (eds), Profiling the European Citizen, pp 169–175, Springer.

    Google Scholar 

  • Berg, J., Dickhaut, J., McCabe, K. (1995), ‘Trust, reciprocity and social history’, Games and Economic Behavior, 10:122–142.

    Article  Google Scholar 

  • Berners-Lee, T. (1997), Metadata architecture, available online at http://www.w3.org/Design-Issues/Metadata.

  • Beth, T., Borcherding, M., Klein, B. (1994), ‘Valuation of trust in open networks’, ESORICS'94, 3rd European Symposium on Research in Computer Security, LNCS 875, pp 3–18.

    Google Scholar 

  • Blaze, M., Feigenbaum, J., Lacy, J. (1996), ‘Decentralized trust management’, SP'96, IEEE Symposium on Security and Privacy, pp 164–173, Oakland, USA.

    Google Scholar 

  • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A. D. (1999), ‘The role of trust management in distributed systems security’, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp 185–210, Springer.

    Google Scholar 

  • Bourcier, D. (2001), ‘De l'intelligence artificielle à la personne virtuelle: émergence d'une entité juridique?’, Droit and Société, 49, pp 847–871.

    Google Scholar 

  • Branchaud, M. and Flinn, S. (2004), ‘Trust: A scalable trust management infrastructure’, PST'04, 2nd Annual Conference on Privacy, Security and Trust, pp 207–218, Fredericton, Canada.

    Google Scholar 

  • Castelfranchi, C. and Falcone, R. (2001), ‘Social trust: a cognitive approach’, in: Cas-telfranchi, C. and Tan, Y. H. (eds), Trust and Deception in Virtual Societies, pp 55–90, Kluwer Academic Publishers.

    Google Scholar 

  • Challener, D., Yoder, K., Catherman, R., Safford, D., Van Doorn, L. (2007), A Practical Guide to Trusted Computing, IBM Press.

    Google Scholar 

  • Chaudhuri, A. and Gangadharan, L. (2007), ‘An experimental analysis of trust and trustworthiness’, Southern Economic Journal, 73(4):959–985.

    Google Scholar 

  • Cho, J. (2006), ‘The mechanism of trust and distrust formation and their relational outcomes’, Journal of Retailing, 82(1):25–35.

    Article  Google Scholar 

  • Christianson, B. and Harbison, W. S. (1997), ‘Why isn't trust transitive?’, in: Christianson, B., Crispo, B., Lomas, T. M. A., Roe, M. (eds.), IWSP'97, 5th International Workshop on Security Protocols, LNCS 1189, pp 171–176, Paris, France.

    Google Scholar 

  • Cofta, P. (2007), ‘Confidence, trust and identity’, BT Technology Journal, 25(2):173–178.

    Article  Google Scholar 

  • De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P. (2007), ‘Access control policies and languages in open environments’, in: Yu, T. and Jajodia, S. (eds.), Secure Data Management in Decentralized Systems, pp 21–58, Springer.

    Google Scholar 

  • Degerlund, F. (2007), ‘Trust mass, volume and density — a novel approach to reasoning about trust’, Electronic Notes in Theoretical Computer Science, 179:87–96.

    Article  Google Scholar 

  • Doney, P. M., Cannon, J. P. (1997), ‘An examination of the nature of trust in buyer-seller relationships’, Journal of Marketing, 61(2):35–51.

    Article  Google Scholar 

  • Flowerday, S. and von Solms, R. (2006), ‘Trust: An element of information security’, in:Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.), SEC'06, 21st International Information Security Conference, pp 87–98, Karlstad, Sweden.

    Google Scholar 

  • Fukuyama, F. (1995), Trust: The Social Virtues and the Creation of Prosperity, The Free Press.

    Google Scholar 

  • Gefen, D. (2002), ‘Reflections on the dimensions of trust and trustworthiness among online consumers’, ACM SIGMIS Database, 33(3):38–53.

    Article  Google Scholar 

  • Gerck, E. (2002), ‘Trust as qualified reliance on information’, The COOK Report on Internet, X(10):19–24.

    Google Scholar 

  • Giddens, A. (1990), The Consequences of Modernity, Polity Press.

    Google Scholar 

  • Grandison, T. and Sloman, M. (2000), ‘A survey of trust in internet applications’, IEEE Communications Surveys and Tutorials, 3(4).

    Google Scholar 

  • Griffiths, N. (2006), ‘A fuzzy approach to reasoning with trust, distrust and insufficient trust’, in: Klusch, M., Rovatsos, M., Payne, T. R. (eds.), CIA'06, 10th International Workshop on Cooperative Information Agents, volume 4149 of LNCS 4149, pp 360–374, Edinburgh, U.K.

    Google Scholar 

  • Guha, R., Kumar, R., Raghavan, P., Tomkins, A. (2004), ‘Propagation of trust and distrust’, in: Feldman, S. I., Uretsky, M., Najork, M., Wills, C. S. (eds.), WWW'04, 13th International Conference on World Wide Web, pp 403–412, New York, USA.

    Google Scholar 

  • Gutscher, A. (2007), ‘A trust model for an open, decentralized reputation system’, in: Etalle, S., Marsh, S. (eds), IFIPTM'07, 1st Joint iTrust and PST Conferences on Privacy Trust Management and Security, pp 285–300, Moncton, Canada.

    Google Scholar 

  • Haenni, R. (2005), ‘Using probabilistic argumentation for key validation in public-key cryptography’, International Journal of Approximate Reasoning, 38(3):355–376.

    Article  Google Scholar 

  • Haenni, R. (2009), ‘Non-additive degrees of belief’, in: Huber, F. and Schmidt-Petri, C. (eds.), Degrees of Belief, pp 121–160, Springer.

    Google Scholar 

  • Haenni, R. and Jonczy, J. (2007), ‘A new approach to PGP's web of trust’, EEMA'07, European e-Identity Conference, Paris, France.

    Google Scholar 

  • Haenni, R., Jonczy, J., Kohlas, R. (2007), ‘Two-layer models for managing authenticity and trust’, in: Song, R., Korba, L., Yee, G. (eds.), Trust in E-Services: Technologies, Practices and Challenges, chapter VI, pp 140–167, Idea Group Publishing.

    Google Scholar 

  • Hájek, P. and Valdés, J. J. (1991), ‘Generalized algebraic approach to uncertainty processing in rule-based expert systems (dempsteroids)’, Computers and Artificial Intelligence, 10:29–42.

    Google Scholar 

  • Hardin, R. (2004), Trust and Trustworthiness, vol. 4 of Series on Trust. Russell Sage Foundation Publications.

    Google Scholar 

  • Hardin, R. (2006), Trust (Key Concepts), Polity.

    Google Scholar 

  • Herlocker, J. L., Konstan, J. A., Terveen, L. G., Riedl, J. T. (2004), ‘Evaluating collaborative filtering recommender systems’, ACM Transactions on Information Systems, 22(1):5–53.

    Article  Google Scholar 

  • Hildebrandt, M. and Gutwirth, S. (eds.) (2007), Profiling the European Citizen. Springer.

    Google Scholar 

  • Jaquet-Chiffelle, D. O. (2007), ‘Direct and Indirect Profiling in the Light of Virtual Persons’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen, pp 34– 43, Springer.

    Google Scholar 

  • Jaquet-Chiffelle, D. O., Anrig, B., Benoist, E., Haenni, R., Hildebrandt, M., Kosta, E., Lefever, K. (eds.) (2008), FIDIS Deliverable D2.13: Virtual Persons and Identities, Download: http://www.fidis.net/deliverables.

  • Jaquet-Chiffelle, D. O., Anrig, B., Zwingelberg, H. (eds.) (2008), FIDIS Deliverable D17.1: Modelling New Forms of Identities: Applicability of the Model Based on Virtual Persons, Download: http://www.fidis.net.

  • Jones, K. (1999), ‘Second-hand moral knowledge’, The Journal of Philosophy, 96(2):55–78.

    Article  Google Scholar 

  • Jones, S., Wilikens, M., Morris, P., Masera, M. (2000), ‘Trust requirements in e-business’, Communications of the ACM, 43(12):81–87.

    Article  Google Scholar 

  • Jonczy, J. and Haenni, R. (2005), ‘Credential networks: a general model for distributed trust and authenticity management’, in: Ghorbani, A., Marsh, S. (eds), PST’05, 3rd Annual Conference on Privacy, Security and Trust, pp 101–112, St. Andrews, Canada.

    Google Scholar 

  • Josang, A. (1999), ‘An algebra for assessing trust in certification chains’, NDSS'99: 6th Annual Symposium on Network and Distributed System Security, San Diego, USA.

    Google Scholar 

  • Josang, A. (2001), ‘A logic for uncertain probabilities’, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279–311.

    Google Scholar 

  • Josang, A., Gray, E., Kinateder, M. (2006), ‘Simplification and analysis of transitive trust networks’, Web Intelligence and Agent Systems, 4(2):139–161.

    Google Scholar 

  • Josang, A., Ismail, R., Boyd, B. (2007), ‘A survey of trust and reputation systems for online service provision’, Decision Support Systems, 43(2):618–644.

    Article  Google Scholar 

  • Josang, A. and Lo Presti, S. (2004), ‘Anlysing the relationship between risk and trust’, in: Jensen, C. D., Poslad, S., Dimitrakos, T. (eds.), iTrust'04: 2nd International Conference on Trust Management, LNCS 2995, pp 135–145, Oxford, U.K.

    Google Scholar 

  • Kantorowicz, E. H. (1957), The King's Two Bodies — A Study in Mediaeval Political Theology, Princeton University Press.

    Google Scholar 

  • Kinateder, M. and Rothermel, K. (2003), ‘Architecture and algorithms for a distributed reputation system’, iTrust'03: 1st International Conference on Trust Management, LNCS 2692, pp 1–16, Heraklion, Greece.

    Google Scholar 

  • Kohlas, R. (2007), Decentralized Trust Evaluation and Public-Key Authentication, PhD thesis, University of Bern, Switzerland.

    Google Scholar 

  • Koops, B. J. and Jaquet-Chiffelle, D. O. (eds.) (2008), FIDIS Deliverable D17.2: New (Id)entities and the Law: Perspectives on Legal Personhood for Non-Humans, Download http://www.fidis.net.

  • Lee, J. and Moray, N. (1992), ‘Trust, control strategies and allocation of function in human-machine systems’, Ergonomics, 35:1243–1270.

    Article  Google Scholar 

  • Lewicki, R. J. (2006), ‘Trust and distrust’, in: Kupfer Schneider, A. and Honeyman, C. (eds.), The Negotiator's Fieldbook: The Desk Reference for the Experienced Negotiator, ch. 22, pp 191–202, American Bar Association.

    Google Scholar 

  • Levi, M. and Stoker, L. (2000), ‘Political trust and trustworthiness’, Annual Review of Political Science, 3:475–507.

    Article  Google Scholar 

  • Levien, R. and Aiken, A. (1998), ‘Attack-resistant trust metrics for public key certification’, Security'98, 7th USENIX Security Symposium, pp 229–242, San Antonio, USA.

    Google Scholar 

  • Li, H. and Singhal, M. (2000), ‘Trust management in distributed systems’, Computer, 40(2):45–53.

    Article  Google Scholar 

  • Luhmann, N. (2000), Vertrauen — ein Mechanismus der Reduktion sozialer Komplexität, UTP, Stuttgart, Germany, 4th ed.

    Google Scholar 

  • Mahoney, G., Myrvold, W., Shoja, G. C. (2005), ‘Generic reliability trust model’, in: Ghor-bani. A. and Marsh, S. (eds.), PST'05: 3rd Annual Conference on Privacy, Security and Trust, pp 113–120, St. Andrews, Canada.

    Google Scholar 

  • Manchala, D. W. (2000), ‘E-commerce trust metrics and models’, IEEE Internet Computing, 4(2):36–44.

    Article  Google Scholar 

  • Marsh, S. P. (1994), Formalising Trust as a Computational Concept, PhD thesis, University of Stirling, Scotland, U.K.

    Google Scholar 

  • Marsh, S. and Dibben, M. R. (2005), ‘Trust, untrust, distrust and mistrust — an exploration of the dark(er) side’ in: Herrmann, P., Issarny, V., Shiu, S. (eds.), iTrust'05: 3rd International Conference on Trust Management, LNCS 3477, pp 17–33, Rocquencourt, France.

    Google Scholar 

  • Maurer, U. (1996), ‘Modelling a public-key infrastructure’, in: Bertino, E., Kurth, H., Mar-tella, G., Montolivo, E. (eds.), ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pp 324–350.

    Google Scholar 

  • McKnight, H. D. and Chervany, N. L. (1996), The meanings of trust, Technical report, Carlson School of Management, University of Minnesota, Minneapolis, USA.

    Google Scholar 

  • McLeod, C., Zalta, E. N. (ed) (2006), ‘Trust’, The Stanford Encyclopedia of Philosophy, Center for the Study of Language and Information, Stanford University, USA.

    Google Scholar 

  • Muir, B. M. (1987), ‘Trust between humans and machines, and the design of decision aids’, International Journal of Man-Machine Studies, 27(5–6):527–539.

    Article  Google Scholar 

  • Newton, K. (2001), ‘Trust, social capital, civil society, and democracy’, International Political Science Review, 22(2):201–214.

    Article  Google Scholar 

  • Numan, J. H. (1998), Knowledge-Based Systems as Companions: Trust, Human Computer Interaction and Complex Systems, PhD thesis, University of Groningen, The Netherlands.

    Google Scholar 

  • Oliver, A. and Montgomery, K. (2001), ‘A system cybernetic approach to the dynamics of individual- and organizational-level trust’, Human relations, 54(8):1045–1063.

    Article  Google Scholar 

  • Patton, M. A. and Josang, A. (2004), ‘Technologies for trust in electronic commerce’, Electronic Commerce Research, 4(1–2):9–21.

    Article  Google Scholar 

  • Perlman, R. (1999), ‘An overview of PKI trust models’, IEEE Network, 13(6):38–43.

    Article  Google Scholar 

  • Pfitzmann, A. and Hansen, M. (2008), ‘Anonymity, Unlinkability, Undetectability, Unob-servability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology, v.031’, Technical Report, Faculty of Computer Science, Technical University, Dresden, Germany.

    Google Scholar 

  • Preece, J. and Maloney-Krichmar, D. (2003), ‘Online communities: Focusing on sociability and usability’, in: Jacko, J. and Sears, A. (eds.), The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, pp 596–620, Lawrence Erlbaum Associates.

    Google Scholar 

  • Richardson, M., Agrawal, R., Domingos, P. (2003), ‘Trust management for the semantic web’, in: Fensel, D., Sycara, K. P., Mylopoulos, J. (eds.), ISWC'03, 2nd International Semantic Web Conference, LNCS 2870, pp 351–368, Sanibel Island, USA.

    Google Scholar 

  • Rotter, J. B. (1980), ‘Interpersonal trust, trustworthiness, and gullibility’, American Psychologist, 35:1–7.

    Article  Google Scholar 

  • Ruohomaa, S. and Kutvonen, L. (2005), ‘Trust management survey’, in: Herrmann, P., Issarny, V., Shiu, S. (eds.), iTrust'05: 3rd International Conference on Trust Management, LNCS 3477, pp 77–92, Rocquencourt, France.

    Google Scholar 

  • Ruth, P., Xu, D., Bhargava, B., Regnier, F. (2004), ‘E-notebook middleware for accountability and reputation based trust in distributed data sharing communities’, in: Jensen, C. D., Poslad, S., Dimitrakos, T. (eds.), iTrust'04, 2rd International Conference on Trust Management, LNCS 2995, Oxford, U.K.

    Google Scholar 

  • Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K. E. (2005), ‘Adaptive trust negotiation and access control’, SACMAT'05, 10th ACM Symposium on Access Control Models and Technologies, pp 139–146, Stockholm, Sweden.

    Google Scholar 

  • Seligman, A. B. (2000), The Problem of Trust, Princeton University Press.

    Google Scholar 

  • Szerszynski, B. (1999), ‘Risk and trust: The performative dimension’, Environmental Values, 8(2):239–252.

    Article  Google Scholar 

  • Sztompka, P. (1999), Trust: a Sociological Theory, Cambridge University Press.

    Google Scholar 

  • Tan, Y. and Thoen, W. (1998), ‘Towards a generic model of trust for electronic commerce’, International Journal of Electronic Commerce, 3(1):65–81.

    Google Scholar 

  • Theodorakopoulos, G. (2004), Distributed trust evaluation in ad-hoc networks, Master's thesis, University of Maryland, College Park, USA.

    Google Scholar 

  • Uslaner, E. M. (2002), The Moral Foundations of Trust, Cambridge University Press.

    Google Scholar 

  • Wang, Y. and Vassileva, J. (2007), ‘Toward trust and reputation based web service selection: A survey’, International Transactions on Systems Science and Applications, 3(2):118–132.

    Google Scholar 

  • Warren, M. E. (1999), Democracy and Trust, Cambridge University Press.

    Google Scholar 

  • Williamson, O. E. (1993), ‘Calculativeness, trust, and economic organization’, Journal of Law & Economics, 36(1):453–486.

    Article  Google Scholar 

  • Xiong, L. and Liu, L. (2004), ‘PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities’, IEEE Transactions on Knowledge and Data Engineering, 16(7):843–857.

    Article  Google Scholar 

  • Yu, B. and Singh, M. P. (2002), ‘Distributed reputation management for electronic commerce’, Computational Intelligence, 18(4):535–549.

    Article  Google Scholar 

  • Zhang, Q., Yu, T., Irwin, K. (2004), ‘A classification scheme for trust functions in reputation-based trust management’, ISWC'04, 3rd International Semantic Web Conference, Workshop on ‘Trust, Security, and Reputation on the Semantic Web’, Hiroshima, Japan.

    Google Scholar 

  • Ziegler, C. N. and Lausen, G. (2005), ‘Propagation models for trust and distrust in social networks’, Information Systems Frontiers, 7(4–5):337–358.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jaquet-Chiffelle, DO., Benoist, E., Haenni, R., Wenger, F., Zwingelberg, H. (2009). Virtual Persons and Identities. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_3

Download citation

Publish with us

Policies and ethics