Self-Sovereignty for Refugees? The Contested Horizons of Digital Identity
In: Geopolitics, Band 27, Heft 1, S. 134-159
ISSN: 1557-3028
3594 Ergebnisse
Sortierung:
In: Geopolitics, Band 27, Heft 1, S. 134-159
ISSN: 1557-3028
In: Zwitter , A , Gstrein , O J & Yap , E 2020 , ' Digital Identity and the Blockchain: Universal Identity Management and the Concept of the "Self-Sovereign" Individual ' , Frontiers in Blockchain , vol. 3 , 26 . https://doi.org/10.3389/fbloc.2020.00026 ; ISSN:2624-7852
While "classical" human identity has kept philosophers busy since millennia, "Digital Identity" seems primarily machine related. Telephone numbers, E-Mail inboxes, or Internet Protocol (IP)-addresses are irrelevant to define us as human beings at first glance. However, with the omnipresence of digital space the digital aspects of identity gain importance. In this submission, we aim to put recent developments in context and provide a categorization to frame the landscape as developments proceed rapidly. First, we present selected philosophical perspectives on identity. Secondly, we explore how the legal landscape is approaching identity from a traditional dogmatic perspective both in national and international law. After blending the insights from those sections together in a third step, we will go on to describe and discuss current developments that are driven by the emergence of new tools such as "Distributed Ledger Technology" and "Zero Knowledge Proof." One of our main findings is that the management of digital identity is transforming from a purpose driven necessity toward a self-standing activity that becomes a resource for many digital applications. In other words, whereas traditionally identity is addressed in a predominantly sectoral fashion whenever necessary, new technologies transform digital identity management into a basic infrastructural service, sometimes even a commodity. This coincides with a trend to take the "control" over identity away from governmental institutions and corporate actors to "self-sovereign individuals," who have now the opportunity to manage their digital self autonomously. To make our conceptual statements more relevant, we present several already existing use cases in the public and private sector. Subsequently, we discuss potential risks that should be mitigated in order to create a desirable relationship between the individual, public institutions, and the private sector in a world where self-sovereign identity management has become the norm. We will illustrate these issues along the discussion around privacy, as well as the development of backup mechanisms for digital identities. Despite the undeniable potential for the management of identity, we suggest that particularly at this point in time there is a clear need to make detailed (non-technological) governance decisions impacting the general design and implementation of self-sovereign identity systems.
BASE
This paper examines online identifiers from an economic perspective. It uses conjoint analysis survey techniques to develop empirical data on how users value the attributes of online identifiers. It is concerned in particular with three issues: (1) the degree to which identified subjects value increasing the scope of an identifier, i.e., the ability to use a single identifier to access services offered by several organizations; (2) the degree to which users' choice may be constrained by switching costs; and (3) the value individuals place on privacy and data security relative to other attributes such as cost or scope. The survey population was located in South Korea. The results indicate that e-mail addresses dominate the world of online identifiers for ordinary consumers; that consumers highly value increased scope (e.g., single sign-on capabilities) and the security of their private data; and that switching costs are high. ; This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD)'' (KRF-2005-213-H00001).
BASE
In: BIS Papers No. 126
SSRN
In: Information economics and policy, Band 18, Heft 4, S. 405-422
ISSN: 0167-6245
In: The review of socionetwork strategies, Band 15, Heft 1, S. 251-276
ISSN: 1867-3236
The i2010 e-Government Action Plan from the European Union forces Public Administrations (national, regional and local) of all Member States that by 2010 to meet all administrative acts of the citizens through the Internet. This implies the need for mechanisms and systems to be able to unequivocally identify people on the Internet, together with a reliable system of interoperable electronic identification management (eIDM), in such a way that citizens, businesses and government departments (even in different Member States) can identify themselves and certify their transactions accurately, quickly and simply. However, despite the clear advantages that this entails for EU citizens, namely the fact that they possess a digital identity which allows them secure and identified access to the services offered by the various public administrations in Member States, the implementation of a solution of this kind involves a series of risks which, if they are not duly dealt with, may engender a reduction in the effectiveness of public institutions and citizens' trust in them. This article will analyse the problems associated with digital identity in the EU framework and the extent to which the solutions adopted to date meet the constitutional requirements, or fail to, highlighting aspects which may entail a risk or detriment to the freedoms of citizens and those relating to the handling of digital identity which have not yet been tackled but which, given their particular relevance, necessitate an immediate solution.
BASE
In: International journal of academic research in business and social sciences: IJ-ARBSS, Band 13, Heft 3
ISSN: 2222-6990
In: Palgrave studies in communication for social change
In: Comparative studies in society and history, Band 47, Heft 3, S. 532-551
ISSN: 1475-2999
Inventions have their greatest impact when they go beyond their possible practical applications and act upon the imagination. When Martin Behaim invented the first globe in 1490, a functionally useless object consisting mostly of terra incognita, he was widely ridiculed; but somehow the ideas that his globe represented stuck, and within a few decades the basic validity of his construction was confirmed by the voyages of Columbus, Cabot, Vasco de Gama, Magellan, and others. Today, with efforts to situate the rapid growth of information and communication technologies (ICTs), especially the Internet, in the context of globalization, there is a similar division between those who dismiss it as being of no importance and those who see in it a looming (for good or ill) global revolution. But, as with Behaim's globe, the imaginary possibilities of these innovations are important in determining how and to what extent human existence is to be transformed by them.
In: Comparative Studies in Society and History, Volume 47, Issue 3, July 2005 , pp. 532-551
SSRN
Working paper
Verlagsinfo: Identity is a "hot topic" in academia and popular culture. It might be considered as the ideological signifier of our age, but also carries an ever increasing weight as a political emblem, even as this mostly concerns identification, which we easily trade for consciousness. Identity is an essential attribute of being. At a personal level, identity is not only what we think we are or the labels we are given. It includes our unconscious and is more than our personality, the expression of our identity in relation to others. It goes deeper than our subjective selfhood, the notion of me or self which provides the sense of sameness and continuity, but this stability is an illusion. We are not the same all the time, the continuity of a single 'self' is a chimera. This is thus also true for our personality, One of the central themes of this book is that our personal identity is not an indivisible, immutable, totally consistent given, but rather a dynamic matrix, often a repertoire of identities. This is not a pathological condition, but something many of us have, with resulting inner conflicts, which eventually may cause depression or disease. To help understand these identity conflicts, in oneself and in others, we present a new way to look at the formation and development of identity and substitute identities and how these manifest and change. Dissociation and identification are processes of transformation, they shape us, a continuous process. Issues like the group mind, social identity, the Western identity crisis, identity politics, radicalization and identification mechanisms are covered in this book, as are PTSD and auto-immune diseases. We show how there is resonance between cell-, organ- and personal-identity at the epigenetic level. This book is full of new and daring insights and visualizations on how our psyche operates and how we as humans function.
In: Front. Blockchain, 28 May 2020 | https://doi.org/10.3389/fbloc.2020.00026
SSRN
Working paper
In: Journal of information policy: JIP, Band 5, S. 155-178
ISSN: 2158-3897
Abstract
How do policymakers and governments effectively safeguard digital privacy in the cloud? How do governments protect data stored in "the cloud" in a policy landscape that is simultaneously local, national, and global? In this article, we examine what we term "the privacy ecosystem"—the extensive global network of infrastructure, policies, legal rights, and cultural preferences that create privacy affordances for our digital information stored remotely. With these questions in mind, we look at some of the differing regulatory strategies of the European Union and United States, and the resulting contrast between policies governing privacy in the digital space.