Levallois-Barth Claire

Levallois-Barth Claire
Institut Mines-Télécom | telecom-sudparis.eu · Department of Economic and Social Sciences (SES)

About

38
Publications
4,185
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
57
Citations

Publications

Publications (38)
Preprint
Full-text available
National digital identity systems have become a key requirement for easy access to online public services, specially during Covid-19. While many countries have adopted a national digital identity system, many are still in the process of establishing one. Through a comparative analysis of the technological and legal dimensions of a few selected nati...
Book
Full-text available
The design and management of digital identity is a complex challenge. On the one hand, it requires a clear understanding of the parameters that are involved in identity management. On the other hand, it requires the cooperation of many stakeholders. In particular, this involves those public authorities and private organisations that need to be alig...
Technical Report
Full-text available
Automated driving vehicles are equipped with digital computational functions using sensors and on-board computers to replace the human driver. They are connected to a specific infrastructure. Their development is often motivated by the improvement of road safety through eliminating human failures, by a wider range of mobility options, lower emissio...
Technical Report
Full-text available
Le véhicule à conduite automatisée, dans lequel des fonctions numériques utilisant des capteurs et des calculateurs embarqués se substituent au conducteur, et qui est connecté à une infrastructure spécifique, est souvent motivé par l’amélioration de la sécurité routière, en éliminant les défaillances humaines, par l’élargissement de l’offre de moye...
Article
Full-text available
Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data, where involved entities may massively collect and process massive amounts of such data. Toward the...
Chapter
Tomorrow, the rise of the Internet of Things will allow us to collect and process a growing amount of real-time data related to our body. This phenomenon will unlock new opportunities both in health- and non-health-related sectors but also challenge the frontiers of what we used to consider private. Beyond these frontiers, not all data is created w...
Book
Les identités numériques tiennent un rôle prépondérant dans l'actualité, provoquant travaux et débats intenses, au sujet de l'évolution des usages sur Internet comme de l'émergence de nouveaux services numériques. Le manque de maîtrise des technologies utilisées, la recrudescence des délits d'usurpation d'identités, la volonté de l'Europe et de la...
Book
Les identités numériques tiennent un rôle prépondérant dans l'actualité, provoquant travaux et débats intenses, au sujet de l'évolution des usages sur Internet comme de l'émergence de nouveaux services numériques. Le manque de maîtrise des technologies utilisées, la recrudescence des délits d'usurpation d'identités, la volonté de l'Europe et de la...
Conference Paper
Full-text available
The use of privacy protection measures is of particular importance for existing and upcoming users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of pseudonyms in the context of eID systems, without specifying the way they should be implemented. The pap...
Book
Les identités numériques tiennent un rôle prépondérant dans l’actualité, provoquant travaux et débats intenses, au sujet de l’évolution des usages sur Internet comme de l’émergence de nouveaux services numériques. Le manque de maîtrise des technologies utilisées, la recrudescence des délits d’usurpation d’identités, la volonté de l’Europe et de la...
Book
p>This article analyses the social and legal construction of an interactive advertising project. The project consisted in the transmission of multimedia content, via Bluetooth, to the mobile phones of users at stations in the Paris underground. In this case the legal qualification of the Bluetooth identifier and the modalities for obtaining users'...
Article
Full-text available
This article analyses the social and legal construction of an interactive advertising project. The project consists in sending multimedia content, via Bluetooth, to the mobile phones of users at stations in the Paris underground within a few dozen meters of the Bluetooth emitter. The legal qualification of the Bluetooth identifier and the modalitie...
Article
L'offre de services de géolocalisation via un téléphone mobile implique de connaître la localisation et l'identifiant du téléphone, donc de collecter des données relatives à un utilisateur identifié ou identifiable. À ce titre, la loi Informatique et Libertés exige que l'utilisateur consente en toute transparence à bénéficier d'un service géolocali...

Network

Cited By