This article is devoted to the consideration of such a sphere of modern reality as the representation of a person in the digital environment through the statement. The study analyzes the process, ...mechanisms and ways of representation through storytelling. The historical aspect appears as an integral part of the exposure of the individual's attitude to the inner and surrounding reality, which is transmitted not only in the form of a reflexive monologue, but also in the form of an installation, an opinion, and a look. The author notes the multi-level use of storytelling in the context of social space and in building digital identity. The work defines the philosophical and methodological foundations of the study, describes in detail the provisions of fragmentation and plurality of digital identity. The content of the article indicates the forms of development of storytelling as a communication technology, substantiates the main forms of influence on the formation of identity and its broadcasting in the digital surroundings. The article shows how transmedia and cross-platform play the role of connective tissue for overcoming the fragmentation of transmitted meanings. Thus, the consistency in the formation of a single image is maintained. It also takes into account the problem of technological alienation and the ways to overcome it, one of which is storytelling. The involvement of this communication technology and self-presentation appears to be an essential element for the socio-cultural analysis of digital reality and the development of a new problem field associated with the significance of the digital history of the individual.
Toward Seamless Mobility-as-a-Service Hoess, Alexandra; Lautenschlager, Jonathan; Sedlmeir, Johannes ...
Business & information systems engineering,
02/2024
Journal Article
Recenzirano
Abstract With growing awareness of sustainability and convenience expectations, customers are increasingly demanding integrated and seamless mobility in the form of mobility-as-a-service (MaaS). ...However, as centralized MaaS platforms have thus far failed to integrate a critical share of mobility service providers (MSPs), travelers lack opportunities to efficiently combine the various mobility services required for seamless end-to-end itinerary coverage. Particularly, MSPs often refuse to collaborate by devolving control over customer interfaces or sensitive data owing to threats of market power concentration. While alternative blockchain-based approaches aim to provide equal market access, they cannot sufficiently align competing business goals and face substantial problems resulting from the replicated processing of sensitive data. Both researchers and practitioners have recently suggested decentralized digital identity management enabled by digital wallets as a promising mechanism to exchange verifiable identity attributes while mitigating problems related to data aggregation. Following a design science research approach, the article accordingly explores how digital wallets can address the shortcomings of existing approaches to MaaS. It contributes a novel IS architecture and principles for a design at the nexus of centralized and decentralized solutions to mitigate tensions between cooperation and competition. Further, the findings indicate that when building decentralized solutions, one should also consider components beyond blockchain and smart contracts.
With the increasing levels of digital transformation, focus on digital identities of individuals is increasingly getting prominence. It is the information captured as part of the identity surrounding ...the citizen which decides what services and products one is entitled to and can access. At present, there are still around 1.1 billion people in the world without any official identity and to address this concern, United Nations through its 16th Sustainable Development Goals (SDGs) recommended governments to provide their citizens with unique identities by 2030. India's Aadhaar is one consequential step in this direction as it has already reached over 1 billion enrolments in India. However establishing a national identity program successfully requires expertise, time, and huge financial commitments. This paper takes Aadhaar as a case study and uses Design Theory (DT) and Critical Success Factor theory (CSF) as a theoretical lens and attempts to evaluate design and execution choices made during the tenure of the project. The study also identifies and prioritizes primary goals of Aadhaar based on the secondary data, expert opinion through a Focus Group Discussion (FGD) and subsequently systematic prioritization using mixed research methodologies. The expert opinion from the FGD was analyzed using the Best-Worst method (BWM), followed by the Total Interpretive Structural Modeling (TISM) method and Matrix of Cross Impact Multiplications Applied to Classification (MICMAC) analysis. The study identified uniqueness, security and privacy as the top priority goals in an identity system and is 11 times more crucial than scalability which is identified to be of lesser priority. These findings from this study could be considered as a reference for other countries that aim to develop and implement digital identity for its citizens.
•Uses design theory for analyzing digital identity systems.•Identifies Critical Success Factors (CSFs) of India's digital identity system –Aadhaar.•Identifies linkages between the CSFs and design and execution choices of Aadhaar.•Proposes a hierarchical model of digital identity goals based on priorities.
Migration (irregular and forced) represents one of the major challenges the international community faces today. Inasmuch as the phenomenon of irregular and forced migration is the marker of the ...state of socio-economic systems around the world, the response to and the ways of navigating the resulting multi-scalar challenges mirror not only the efficiency of the global regulatory frameworks, but also our civility. Recognizing the potential inherent in sophisticated information and communication technology (ICT), specifically the blockchain technology and smart contracts, this paper focuses on the special case of “welcome centers” that irregular migrants enter in the hope of acquiring international legal protection and thus refugee status. Since the process may be time-consuming and the living conditions undignified, this paper proposes a tool, named here “responsible wallet”, aka rWallet, that bears the promise of navigating some of these challenges. rWallet derives from the recognition that in modern societies ICT should serve the purpose of improving the quality of life of all people.
•(Irregular) migration is the key challenge our societies face today.•Precarity and immobility are the key issues that challenge irregular migrants.•Also the receiving communities are challenged and their vulnerability rises.•Blockchain-based tools offer a way of navigating these challenges.•The rWallet is a blockchain-based tool that does it.
Conceptually, the blockchain is a distributed database containing records of transactions that are shared among participating members. Each transaction is confirmed by the consensus of a majority of ...the members, making fraudulent transactions unable to pass collective confirmation. Once a record is created and accepted by the blockchain, it can never be altered or disappear.
Nowadays the blockchain technology is considered as the most significant invention after the Internet. If the latter connects people to realize on-line business processes, the former could decide the trust problem by peer-to-peer networking and public-key cryptography. The purpose of this paper is to consider on distinct use cases at the all-pervasive impact of the blockchain technology and look at this as an inalienable part of our daily life.
Establishing IT governance arrangements is a deeply political process, where relationships of power play a crucial role. While the importance of power relationships is widely acknowledged in IS ...literature, specific mechanisms whereby the consequences of power relationships affect IT governance arrangements are still under‐researched. This study investigates the way power relationships are inscribed in the governance of digital identity systems in Denmark and the United Kingdom, where public and private actors are involved. Drawing on the theoretical lens of circuits of power, we contribute to research on the role of power in IT governance by identifying two distinct mechanisms of power inscription into IT governance: power cultivation and power limitation.
MitID is the new electronic identification (eID) solution in Denmark. It provides access to many online services, including online banking, insurance, taxes, and health information. In this paper, we ...analyze the security of the new solution from the user experience perspective concerning Denial of Service (DoS), Social Engineering (SocEng), and other possible attacks that can be mounted without special privileges or obtaining unauthorized access. Our analysis shows that, even though the solution is of paramount importance to the Danish online infrastructure, the analyzed version did not adequately defend against simple attacks targeting specific users. With simple automated scripts, we were able to prevent a targeted user from authenticating for a period of 9 days; and show how an attacker can collect information to mount convincing SocEng attacks aiming at identity theft. Our findings were disclosed to the affected parties in December 2021, and since then, the solution has been updated two times. The first update in January 2022 rendered the SocEng attacks ineffective. However, due to the inherent design trade-offs, targeted DoS attacks were still unmitigated. The second update was in June 2023 and appears to address all of our findings.
The literature on e-governance has highlighted the potential of ICTs to enable good governance and socioeconomic development by leveraging stakeholders and resources within and outside the government ...to address specific challenges. A significant challenge in many developing countries is the inability of large segments of the population—particularly, the vulnerable poor—to receive and benefit from services or public provisions because they lack a means of formal identification. Various digital identity projects worldwide have attempted to address the problem through an umbrella approach dubbed identification for development (ID4D). However, little is known about how digital identity advances e-governance by enabling socioeconomic development through inclusion. This study examines the inclusion and developmental significance of digital identity by drawing on thematic analysis of secondary data from 40 published studies based on the empirical context of India’s Aadhaar—the world’s largest digital identity scheme which enables service delivery to over 1.2 billion people. From our analysis, we identify themes of digital identity and socioeconomic inclusion and develop a theoretical account of their relationship. The resulting framework contributes towards advancing e-governance for development by showing how digital identity might enable inclusion.
•Digital identity has been claimed to offer socioeconomic inclusion in developing countries.•There is, however, limited research on the link between digital identity and socioeconomic inclusion.•This study reviews 40 studies based on India’s Aadhaar digital identity system to uncover key themes of digital identity and socioeconomic inclusion.•The article develops a theoretical framework that proposes four inclusion affordances of digital identification.