Summary
What is a virtual person? What is it used for? What is its added value?
Virtual persons sometimes describe avatars and new forms of identities in online games. They also appear in other contexts; some authors use them in the legal domain. Within FIDIS, the concept of virtual person has been extended in order to better describe and understand new forms of identities in the Information Society in relation to rights, duties, obligations and responsibilities.
Virtual persons, as other virtual entities, exist in the virtual world, the collection of all (abstract) entities, which are or have been the product of the mind or imagination. The virtual world — not to be confused with the digital world — allows a unified description of many identity-related concepts that are usually defined separately without taking into consideration their similarities: avatars, pseudonyms, categories, profiles, legal persons, etc.
The legal system has a long experience of using abstract entities to define rules, categories, etc., in order to associate legal rights, obligations, and responsibilities to persons that can be considered instances of these abstract entities in specific situations. The model developed within FIDIS intentionally uses a similar construction.
In this chapter, after having explained the model, we apply it to pseudonyms. Then we explore the concept of virtual persons from a legal perspective. Eventually, we introduce trust in the light of virtual persons.
This chapter has been reviewed by Bert-Jaap Koops (TILT) and Vashek Matyas (MU). The authors thank the reviewers for their valuable comments and suggestions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A. (1997), ‘The PGP trust model’, EDI-Forum: the Journal of Electronic Commerce, 10(3):27–31.
Abdul-Rahman, A. and Hailes, S. (1997), ‘A distributed trust model’, NSPW'97, Workshop on New Security Paradigms, pp 48–60, Langdale, Cumbria, U.K.
Abdul-Rahman, A. and Hailes S (2000) ‘Supporting trust in virtual communities’, HICSS-33, 33rd Hawaii International Conference on System Sciences, pp 1769–1777, Maui, USA.
Abrams, M. D. and Joyce, M. V. (1995), ‘Trusted system concepts’, Computers & Security, 14(1):45–56.
Almendra, V. S. and Schwabe, D. (2006), ‘Trust policies for semantic web repositories’, in: Bonatti, P. A., Ding, L., Finin, T., Olmedilla, D. (eds), SWPW'06, 2nd Semantic Web Policy Workshop, pp 17–31, Athens, USA.
Anrig, B., Browne, W., Gasson, M. (2007), ‘The role of algorithms in profiling’, in: Hilde-brandt, M. and Gutwirth, S. (eds), Profiling the European Citizen, Springer, pp 65–80.
Artz, D. and Gil, Z. (2007), ‘A survey of trust in computer science and the semantic web’, Web Semantics: Science, Services and Agents on the World Wide Web, 5(2):58–71.
Ashraf, N., Bohnet, I., Piankov, N. (2006), ‘Decomposing trust and trustworthiness’, Experimental Economics, 9(3):193–208.
Benoist, E. (2007), ‘Collecting data for the profiling of web-users’, in: Hildebrandt. M., Gutwirth, S. (eds), Profiling the European Citizen, pp 169–175, Springer.
Berg, J., Dickhaut, J., McCabe, K. (1995), ‘Trust, reciprocity and social history’, Games and Economic Behavior, 10:122–142.
Berners-Lee, T. (1997), Metadata architecture, available online at http://www.w3.org/Design-Issues/Metadata.
Beth, T., Borcherding, M., Klein, B. (1994), ‘Valuation of trust in open networks’, ESORICS'94, 3rd European Symposium on Research in Computer Security, LNCS 875, pp 3–18.
Blaze, M., Feigenbaum, J., Lacy, J. (1996), ‘Decentralized trust management’, SP'96, IEEE Symposium on Security and Privacy, pp 164–173, Oakland, USA.
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A. D. (1999), ‘The role of trust management in distributed systems security’, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp 185–210, Springer.
Bourcier, D. (2001), ‘De l'intelligence artificielle à la personne virtuelle: émergence d'une entité juridique?’, Droit and Société, 49, pp 847–871.
Branchaud, M. and Flinn, S. (2004), ‘Trust: A scalable trust management infrastructure’, PST'04, 2nd Annual Conference on Privacy, Security and Trust, pp 207–218, Fredericton, Canada.
Castelfranchi, C. and Falcone, R. (2001), ‘Social trust: a cognitive approach’, in: Cas-telfranchi, C. and Tan, Y. H. (eds), Trust and Deception in Virtual Societies, pp 55–90, Kluwer Academic Publishers.
Challener, D., Yoder, K., Catherman, R., Safford, D., Van Doorn, L. (2007), A Practical Guide to Trusted Computing, IBM Press.
Chaudhuri, A. and Gangadharan, L. (2007), ‘An experimental analysis of trust and trustworthiness’, Southern Economic Journal, 73(4):959–985.
Cho, J. (2006), ‘The mechanism of trust and distrust formation and their relational outcomes’, Journal of Retailing, 82(1):25–35.
Christianson, B. and Harbison, W. S. (1997), ‘Why isn't trust transitive?’, in: Christianson, B., Crispo, B., Lomas, T. M. A., Roe, M. (eds.), IWSP'97, 5th International Workshop on Security Protocols, LNCS 1189, pp 171–176, Paris, France.
Cofta, P. (2007), ‘Confidence, trust and identity’, BT Technology Journal, 25(2):173–178.
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P. (2007), ‘Access control policies and languages in open environments’, in: Yu, T. and Jajodia, S. (eds.), Secure Data Management in Decentralized Systems, pp 21–58, Springer.
Degerlund, F. (2007), ‘Trust mass, volume and density — a novel approach to reasoning about trust’, Electronic Notes in Theoretical Computer Science, 179:87–96.
Doney, P. M., Cannon, J. P. (1997), ‘An examination of the nature of trust in buyer-seller relationships’, Journal of Marketing, 61(2):35–51.
Flowerday, S. and von Solms, R. (2006), ‘Trust: An element of information security’, in:Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.), SEC'06, 21st International Information Security Conference, pp 87–98, Karlstad, Sweden.
Fukuyama, F. (1995), Trust: The Social Virtues and the Creation of Prosperity, The Free Press.
Gefen, D. (2002), ‘Reflections on the dimensions of trust and trustworthiness among online consumers’, ACM SIGMIS Database, 33(3):38–53.
Gerck, E. (2002), ‘Trust as qualified reliance on information’, The COOK Report on Internet, X(10):19–24.
Giddens, A. (1990), The Consequences of Modernity, Polity Press.
Grandison, T. and Sloman, M. (2000), ‘A survey of trust in internet applications’, IEEE Communications Surveys and Tutorials, 3(4).
Griffiths, N. (2006), ‘A fuzzy approach to reasoning with trust, distrust and insufficient trust’, in: Klusch, M., Rovatsos, M., Payne, T. R. (eds.), CIA'06, 10th International Workshop on Cooperative Information Agents, volume 4149 of LNCS 4149, pp 360–374, Edinburgh, U.K.
Guha, R., Kumar, R., Raghavan, P., Tomkins, A. (2004), ‘Propagation of trust and distrust’, in: Feldman, S. I., Uretsky, M., Najork, M., Wills, C. S. (eds.), WWW'04, 13th International Conference on World Wide Web, pp 403–412, New York, USA.
Gutscher, A. (2007), ‘A trust model for an open, decentralized reputation system’, in: Etalle, S., Marsh, S. (eds), IFIPTM'07, 1st Joint iTrust and PST Conferences on Privacy Trust Management and Security, pp 285–300, Moncton, Canada.
Haenni, R. (2005), ‘Using probabilistic argumentation for key validation in public-key cryptography’, International Journal of Approximate Reasoning, 38(3):355–376.
Haenni, R. (2009), ‘Non-additive degrees of belief’, in: Huber, F. and Schmidt-Petri, C. (eds.), Degrees of Belief, pp 121–160, Springer.
Haenni, R. and Jonczy, J. (2007), ‘A new approach to PGP's web of trust’, EEMA'07, European e-Identity Conference, Paris, France.
Haenni, R., Jonczy, J., Kohlas, R. (2007), ‘Two-layer models for managing authenticity and trust’, in: Song, R., Korba, L., Yee, G. (eds.), Trust in E-Services: Technologies, Practices and Challenges, chapter VI, pp 140–167, Idea Group Publishing.
Hájek, P. and Valdés, J. J. (1991), ‘Generalized algebraic approach to uncertainty processing in rule-based expert systems (dempsteroids)’, Computers and Artificial Intelligence, 10:29–42.
Hardin, R. (2004), Trust and Trustworthiness, vol. 4 of Series on Trust. Russell Sage Foundation Publications.
Hardin, R. (2006), Trust (Key Concepts), Polity.
Herlocker, J. L., Konstan, J. A., Terveen, L. G., Riedl, J. T. (2004), ‘Evaluating collaborative filtering recommender systems’, ACM Transactions on Information Systems, 22(1):5–53.
Hildebrandt, M. and Gutwirth, S. (eds.) (2007), Profiling the European Citizen. Springer.
Jaquet-Chiffelle, D. O. (2007), ‘Direct and Indirect Profiling in the Light of Virtual Persons’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen, pp 34– 43, Springer.
Jaquet-Chiffelle, D. O., Anrig, B., Benoist, E., Haenni, R., Hildebrandt, M., Kosta, E., Lefever, K. (eds.) (2008), FIDIS Deliverable D2.13: Virtual Persons and Identities, Download: http://www.fidis.net/deliverables.
Jaquet-Chiffelle, D. O., Anrig, B., Zwingelberg, H. (eds.) (2008), FIDIS Deliverable D17.1: Modelling New Forms of Identities: Applicability of the Model Based on Virtual Persons, Download: http://www.fidis.net.
Jones, K. (1999), ‘Second-hand moral knowledge’, The Journal of Philosophy, 96(2):55–78.
Jones, S., Wilikens, M., Morris, P., Masera, M. (2000), ‘Trust requirements in e-business’, Communications of the ACM, 43(12):81–87.
Jonczy, J. and Haenni, R. (2005), ‘Credential networks: a general model for distributed trust and authenticity management’, in: Ghorbani, A., Marsh, S. (eds), PST’05, 3rd Annual Conference on Privacy, Security and Trust, pp 101–112, St. Andrews, Canada.
Josang, A. (1999), ‘An algebra for assessing trust in certification chains’, NDSS'99: 6th Annual Symposium on Network and Distributed System Security, San Diego, USA.
Josang, A. (2001), ‘A logic for uncertain probabilities’, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279–311.
Josang, A., Gray, E., Kinateder, M. (2006), ‘Simplification and analysis of transitive trust networks’, Web Intelligence and Agent Systems, 4(2):139–161.
Josang, A., Ismail, R., Boyd, B. (2007), ‘A survey of trust and reputation systems for online service provision’, Decision Support Systems, 43(2):618–644.
Josang, A. and Lo Presti, S. (2004), ‘Anlysing the relationship between risk and trust’, in: Jensen, C. D., Poslad, S., Dimitrakos, T. (eds.), iTrust'04: 2nd International Conference on Trust Management, LNCS 2995, pp 135–145, Oxford, U.K.
Kantorowicz, E. H. (1957), The King's Two Bodies — A Study in Mediaeval Political Theology, Princeton University Press.
Kinateder, M. and Rothermel, K. (2003), ‘Architecture and algorithms for a distributed reputation system’, iTrust'03: 1st International Conference on Trust Management, LNCS 2692, pp 1–16, Heraklion, Greece.
Kohlas, R. (2007), Decentralized Trust Evaluation and Public-Key Authentication, PhD thesis, University of Bern, Switzerland.
Koops, B. J. and Jaquet-Chiffelle, D. O. (eds.) (2008), FIDIS Deliverable D17.2: New (Id)entities and the Law: Perspectives on Legal Personhood for Non-Humans, Download http://www.fidis.net.
Lee, J. and Moray, N. (1992), ‘Trust, control strategies and allocation of function in human-machine systems’, Ergonomics, 35:1243–1270.
Lewicki, R. J. (2006), ‘Trust and distrust’, in: Kupfer Schneider, A. and Honeyman, C. (eds.), The Negotiator's Fieldbook: The Desk Reference for the Experienced Negotiator, ch. 22, pp 191–202, American Bar Association.
Levi, M. and Stoker, L. (2000), ‘Political trust and trustworthiness’, Annual Review of Political Science, 3:475–507.
Levien, R. and Aiken, A. (1998), ‘Attack-resistant trust metrics for public key certification’, Security'98, 7th USENIX Security Symposium, pp 229–242, San Antonio, USA.
Li, H. and Singhal, M. (2000), ‘Trust management in distributed systems’, Computer, 40(2):45–53.
Luhmann, N. (2000), Vertrauen — ein Mechanismus der Reduktion sozialer Komplexität, UTP, Stuttgart, Germany, 4th ed.
Mahoney, G., Myrvold, W., Shoja, G. C. (2005), ‘Generic reliability trust model’, in: Ghor-bani. A. and Marsh, S. (eds.), PST'05: 3rd Annual Conference on Privacy, Security and Trust, pp 113–120, St. Andrews, Canada.
Manchala, D. W. (2000), ‘E-commerce trust metrics and models’, IEEE Internet Computing, 4(2):36–44.
Marsh, S. P. (1994), Formalising Trust as a Computational Concept, PhD thesis, University of Stirling, Scotland, U.K.
Marsh, S. and Dibben, M. R. (2005), ‘Trust, untrust, distrust and mistrust — an exploration of the dark(er) side’ in: Herrmann, P., Issarny, V., Shiu, S. (eds.), iTrust'05: 3rd International Conference on Trust Management, LNCS 3477, pp 17–33, Rocquencourt, France.
Maurer, U. (1996), ‘Modelling a public-key infrastructure’, in: Bertino, E., Kurth, H., Mar-tella, G., Montolivo, E. (eds.), ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pp 324–350.
McKnight, H. D. and Chervany, N. L. (1996), The meanings of trust, Technical report, Carlson School of Management, University of Minnesota, Minneapolis, USA.
McLeod, C., Zalta, E. N. (ed) (2006), ‘Trust’, The Stanford Encyclopedia of Philosophy, Center for the Study of Language and Information, Stanford University, USA.
Muir, B. M. (1987), ‘Trust between humans and machines, and the design of decision aids’, International Journal of Man-Machine Studies, 27(5–6):527–539.
Newton, K. (2001), ‘Trust, social capital, civil society, and democracy’, International Political Science Review, 22(2):201–214.
Numan, J. H. (1998), Knowledge-Based Systems as Companions: Trust, Human Computer Interaction and Complex Systems, PhD thesis, University of Groningen, The Netherlands.
Oliver, A. and Montgomery, K. (2001), ‘A system cybernetic approach to the dynamics of individual- and organizational-level trust’, Human relations, 54(8):1045–1063.
Patton, M. A. and Josang, A. (2004), ‘Technologies for trust in electronic commerce’, Electronic Commerce Research, 4(1–2):9–21.
Perlman, R. (1999), ‘An overview of PKI trust models’, IEEE Network, 13(6):38–43.
Pfitzmann, A. and Hansen, M. (2008), ‘Anonymity, Unlinkability, Undetectability, Unob-servability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology, v.031’, Technical Report, Faculty of Computer Science, Technical University, Dresden, Germany.
Preece, J. and Maloney-Krichmar, D. (2003), ‘Online communities: Focusing on sociability and usability’, in: Jacko, J. and Sears, A. (eds.), The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, pp 596–620, Lawrence Erlbaum Associates.
Richardson, M., Agrawal, R., Domingos, P. (2003), ‘Trust management for the semantic web’, in: Fensel, D., Sycara, K. P., Mylopoulos, J. (eds.), ISWC'03, 2nd International Semantic Web Conference, LNCS 2870, pp 351–368, Sanibel Island, USA.
Rotter, J. B. (1980), ‘Interpersonal trust, trustworthiness, and gullibility’, American Psychologist, 35:1–7.
Ruohomaa, S. and Kutvonen, L. (2005), ‘Trust management survey’, in: Herrmann, P., Issarny, V., Shiu, S. (eds.), iTrust'05: 3rd International Conference on Trust Management, LNCS 3477, pp 77–92, Rocquencourt, France.
Ruth, P., Xu, D., Bhargava, B., Regnier, F. (2004), ‘E-notebook middleware for accountability and reputation based trust in distributed data sharing communities’, in: Jensen, C. D., Poslad, S., Dimitrakos, T. (eds.), iTrust'04, 2rd International Conference on Trust Management, LNCS 2995, Oxford, U.K.
Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K. E. (2005), ‘Adaptive trust negotiation and access control’, SACMAT'05, 10th ACM Symposium on Access Control Models and Technologies, pp 139–146, Stockholm, Sweden.
Seligman, A. B. (2000), The Problem of Trust, Princeton University Press.
Szerszynski, B. (1999), ‘Risk and trust: The performative dimension’, Environmental Values, 8(2):239–252.
Sztompka, P. (1999), Trust: a Sociological Theory, Cambridge University Press.
Tan, Y. and Thoen, W. (1998), ‘Towards a generic model of trust for electronic commerce’, International Journal of Electronic Commerce, 3(1):65–81.
Theodorakopoulos, G. (2004), Distributed trust evaluation in ad-hoc networks, Master's thesis, University of Maryland, College Park, USA.
Uslaner, E. M. (2002), The Moral Foundations of Trust, Cambridge University Press.
Wang, Y. and Vassileva, J. (2007), ‘Toward trust and reputation based web service selection: A survey’, International Transactions on Systems Science and Applications, 3(2):118–132.
Warren, M. E. (1999), Democracy and Trust, Cambridge University Press.
Williamson, O. E. (1993), ‘Calculativeness, trust, and economic organization’, Journal of Law & Economics, 36(1):453–486.
Xiong, L. and Liu, L. (2004), ‘PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities’, IEEE Transactions on Knowledge and Data Engineering, 16(7):843–857.
Yu, B. and Singh, M. P. (2002), ‘Distributed reputation management for electronic commerce’, Computational Intelligence, 18(4):535–549.
Zhang, Q., Yu, T., Irwin, K. (2004), ‘A classification scheme for trust functions in reputation-based trust management’, ISWC'04, 3rd International Semantic Web Conference, Workshop on ‘Trust, Security, and Reputation on the Semantic Web’, Hiroshima, Japan.
Ziegler, C. N. and Lausen, G. (2005), ‘Propagation models for trust and distrust in social networks’, Information Systems Frontiers, 7(4–5):337–358.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Jaquet-Chiffelle, DO., Benoist, E., Haenni, R., Wenger, F., Zwingelberg, H. (2009). Virtual Persons and Identities. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-01820-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88480-4
Online ISBN: 978-3-642-01820-6
eBook Packages: Business and EconomicsBusiness and Management (R0)