At present, our online activity is almost constant, either producing information or consuming it, both for the social and academic fields. The spaces in which people move and travel every day, ...innocently divided between the face-to-face and the virtual, affect the way we communicate and perceive ourselves. In this document, a characterization of the academic digital identity of Chilean university students is proposed and an invitation to teachers to redefine learning spaces is made, allowing integrating all those technological tools that the student actually uses. This study was developed within the logic of pragmatism based on mixed methodology, non-experimental design, and a descriptive–quantitative cross-sectional approach. A non-probabilistic sample was made up of 509 students, who participated voluntarily with an online questionnaire. The Stata Version-14 program was used, applying the Mann–Whitney–Wilcoxon and Kruskal–Wallis U tests. To develop characterizations, a conglomerate analysis was performed with a hierarchical dissociative method. In general, Chilean university students are highly truthful on the Internet without making significant differences between face-to-face and digital interactions, with low awareness of their ID, being easily recognizable on the Web. Regarding their educational process, they manage it with analogical/face-to-face mixing formal and informal technological tools to optimize their learning process. These students manifest a hybrid academic digital identity, without gender difference in the deployment of their PLEs, but maintaining stereotypical gender behaviors in the construction of their digital identity on the Web, which shows a human-technological development similar to that of young Asians and Europeans.
The interest in digital identities has increased considerably in academia and practice in recent years. This can be seen by the many electronic identity projects worldwide and the numerous published ...studies that provide insightful narratives and descriptive case findings about success factors and barriers to the adoption of national authentication infrastructures. In this paper, we take a closer look to the role of trust on the design and implementation of a nation-wide e-credential market. We argue that trust in political and economic institutions can be an important factor to explain differences in the chosen cooperative arrangement which can range from monopolistic, purely state-controlled e-credential markets, to polypolistic, decentralized e-credential markets where also private vendors offer state recognized e-ID on their own or in partnership with the government. Following an inductive reasoning process, we develop three testable propositions which may inspire further empirical research and offer practitioners a new angle to rethink e-credential markets in the light of citizen trust in political and economic institutions.
Digital platforms are restructuring how many companies and industries function, including humanitarian organisations that operate in complex environments and serve vulnerable populations. To date, ...however, there has been limited study of their use in humanitarian and particularly refugee contexts. This paper seeks to address this gap by drawing on the concept of platformisation to study the opportunities and challenges arising from UNHCR's transition from a closed transactional system to an open innovation platform focusing on core processes of identification, value creation and platform governance that are relevant for refugee management and protection. Our empirical study captures the perspectives of the UNHCR, organisational stakeholders and refugees in the world's largest refugee camp in Northern Uganda with regards to UNHCR's strategy towards platform openness. We find that UNHCR's data transformation strategy introduces the potential for increasing institutional value in the form of more effective service delivery to refugees. However, these technological opportunities do not necessarily translate to greater value if they do not mesh with current work practices, incentives and activities of service provider organisations and refugees. Our study helps identify opportunities to address these constraints, primarily through improving understanding of the emergent governance‐related tensions that exist for digital platforms for development and surfacing existing issues of exclusion and vulnerability. We conclude with insights for the broader theorisation of identification platforms and with recommendations for policies and practices that together might help realise the potential value creation introduced through the platformisation of identification systems.
Security policies of authentication systems are a crucial factor in mitigating the risk of impersonation, which is often the first stage of advanced persistent threats. Online authentication systems ...may often interact with each other, due to various mechanisms, such as account recovery or federated authentication. This leads to an implicit extension of the security policies of an authentication system with policies over which the system has no control. As a result, an authentication system that adopts very strong security policies can be unexpectedly weak. This paper deals with the above problem, which affects most real-world online authentication systems. The paper proposes a theoretical framework that formalizes authentication policies and interactions among authentication systems, together with a protocol that prevents, whenever an interaction is established or updated, the security issues described above. An SSI-based implementation of the proposed protocol is presented as well.
•Online authentication systems may interact with each other (e.g., for account recovery, federated authentication, etc.).•Interaction between authentication systems may be adopted to bypass strong security policies of authentication systems.•Our work proposes a framework that formalizes authentication policies and interactions among authentication systems.•We provide an SSI-based protocol for the establishment and the update of the interactions between authentication systems.
Research Summary
Modern audio‐visual digital technology enables the immediate exchange of explicit, but also of tacit knowledge worldwide. Still, when not embedded in strong ties, the international ...exchange of tacit and proprietary knowledge becomes risky. Our flexible pattern matching qualitative research approach develops new theory and finds that in the nascent 3D printing industry firms exchange explicit and tacit knowledge globally, even in weak ties. The exchanges seem to be grounded in identification processes with digital technology forming a shared digital identity. We conceptualize the shared digital identity as the collective self‐concept(s) of an in‐group towards the creation, emergence, application, and development of digital technology built on a sense of community, enthusiasm, being part of something special as well as common values and norms.
Managerial Summary
Firms in the nascent digital industry of 3D printing share knowledge worldwide. Potentials of transferring tacit and proprietary knowledge by modern audio‐visual digital technologies increase constantly. However, so do the dangers of knowledge leakage and competitive risks. A resolution of this tension comes from a new phenomenon, the shared digital identity. A shared digital identity within and among firms enables and informally guards the sharing of tacit and proprietary knowledge via digital technologies. We conceptualize the shared digital identity by a sense of community, enthusiasm, being part of something special as well as common values and norms. The knowledge exchanges assisted by digital technology occur under the aegis of the shared digital identity and accelerate the emergence of digital technologies and so facilitate global business.
This article analyzes the novel partnership between Ancestry DNA and Spotify to create DNA-based playlists and tracks publics’ responses to them. Analysis reveals how the companies construct a sense ...of self that is biologically determined, technologically mediated, and culturally expressed. Layers of abstraction and curation construct their corporate, techno-utopic view of bio-digital identity performances. Yet, publics perceived these media through a dystopic lens, critiquing invasions of privacy and genetic determinism. Conceptualized as hyper-objects, DNA-based playlists demonstrate collective desires to leverage media and technoscience for conceptualizing and managing identities.
Electronic healthcare (eHealth) identity management (IdM) is a pivotal feature in the eHealth system. Distributed ledger technology (DLT) is an emerging technology that can achieve agreements of ...transactional data states in a decentralized way. Building identity management systems using Blockchain can enable patients to fully control their own identity and provide increased confidence in data immutability and availability. This paper presents the state of the art of decentralized identity management using Blockchain and highlights the possible opportunities for adopting the decentralized identity management approaches for future health identity systems. First, we summarize eHealth identity management scenarios. Furthermore, we investigate the existing decentralized identity management solutions and present decentralized identity models. In addition, we discuss the current decentralized identity projects and identify new challenges based on the existing solutions and the limitations when applying it to healthcare as a particular use case.