Explores authentication technologies and their implications for the privacy of the individuals being authenticated. This book examines numerous concepts, including authorization, identification, privacy, and security. It provides a framework to guide on these issues when deciding whether and how to use authentication in a particular context.