I have a Facebook account, therefore I am – authentication with social networks

  title={I have a Facebook account, therefore I am – authentication with social networks},
  author={Jessica Schroers},
  journal={International Review of Law, Computers \& Technology},
  pages={211 - 223}
  • J. Schroers
  • Published 4 May 2019
  • Computer Science
  • International Review of Law, Computers & Technology
ABSTRACT Social login is the use of a social network account to get access to other services. Since the internet in its architecture does not have the possibility to identify the internet user, for many services, social logins are the solution to authenticate users without the need to set up individual identity management systems. Social logins are not useful for all types of services, however, and the potential lock-in and lock-out of users needs to be considered. 


Identity management and trusted interaction in internet and mobile computing
  • A. Jøsang
  • Business, Computer Science
  • IET Inf. Secur.
  • 2014
The aim of this study is to present an overview of the central aspects of identity management in the Internet and mobile computing with respect to security and trust. Expand
The Laws of Identity
This paper is about how we can prevent the loss of trust and go forward to give Internet users a deep sense of safety, privacy, and certainty about whom they are relating to in cyberspace. NothingExpand
Friending the taxman
The provision of identities online continues to be a fiercely debated topic in policy circles, with proposals emerging for public sector organizations to leverage pre-existing social networkingExpand
Solving the legal challenges of trustworthy online identity
The key legal challenges that must be addressed to make identity systems work are identified, and some of the key issues of structuring an appropriate identity system legal framework are highlighted. Expand
Regulating Electronic Identity Intermediaries: The 'Soft eID' Conundrum
Online intermediation platforms, such as Facebook and Amazon, are traditionally defined by their roles in enabling the publication, sharing and distribution of information, as well as the purchase ofExpand
Towards a Decentralized Identity Management Ecosystem for Europe and Beyond
This paper summarizes the results from the 3 year EU-funded project and adopts an ecosystem-approach by creating a free market for identity intermediation services, which provides for the flexibility to scale according to need, adapt to market needs, support special needs of market sectors and adapt to established contractual relationships. Expand
Mandating portability and interoperability in online social networks
Due to the relatively concentrated nature of the market and the predominance of Facebook, online social networking may be the next digital service facing scrutiny by the European Commission. ThisExpand
Social Media & Competition Law
Virtually all of the important IT companies have been under scrutiny from the competition authorities, often on a worldwide basis. However, this is not yet true for the main actors in the field ofExpand
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management and proposes recommendations to resolve or to mitigate the problems. Expand
Privacy-enhancing identity management
A component-based architecture is defined that describes the basic building blocks a PE-IMS must include and is meant to be used as a fundamental concept for PE- IMS in practice. Expand