The field of digital identity innovation has grown significantly over the last 30 years, with over 6000 technology patents registered worldwide. However, many questions remain about who controls and ...owns our digital identity and intellectual property and, ultimately, where the future of digital identity is heading.
To investigate this further, this research mines digital identity patents and explores core themes such as identity, systems, privacy, security, and emerging fields like blockchain, financial transactions, and biometric technologies, utilizing natural language processing (NLP) methods including part-of-speech (POS) tagging, clustering, topic classification, noise reduction, and lemmatisation techniques. Finally, the research employs graph modelling and statistical analysis to discern inherent trends and forecast future developments.
The findings significantly contribute to the digital identity landscape, identifying key players, emerging trends, and technological progress. This research serves as a valuable resource for academia and industry stakeholders, aiding in strategic decision-making and investment in emerging technologies and facilitating navigation through the dynamic realm of digital identity technologies.
Studies have revealed that individuals' identities can be shaped not only offline but also online. However, the formation of online identity of students in higher education environments is complex. ...Empirical evidence has suggested that academics are interested in using social media to enhance their professional identity and reputation. The current study examined the effects of online social capital and social networking on the formation of graduate students' professional identity. Structural equation modeling was used to test the research hypotheses. The sample consisted of 298 graduate students from one leading public university and three private higher education centers in Iran. The results showed that online social networks in higher education environments could affect the construction of students' professional identity through online social capital as a mediator.
Cultural nuance, human behaviour and social identity require greater attention within the emerging smart city phenomenon. This special issue critically considers identity and urban culture as central ...to the smart city challenge. Current discourse on smart cities is obsessed with technological capability and development. Global rankings reduce cities to a one-dimensional business model and series of metrics. If the term ‘smart city’ is to have any enduring value, technology must be used to develop a city's unique cultural identity and quality of life for the future. The editorial reviews emerging research on the cultural dimensions of urban innovation and smart cities and places the six special issue papers within a theoretical context. Each paper critiques smart city theories in relation to the practical challenge of enhancing urban identity, quality and value at a range of scales and geographic contexts. Three main themes are used to frame the debate on smart cities and urban innovation: 1) local development histories, 2) face-to-face relationships and 3) local community scales. Each of these themes is lacking in current smart city approaches and requires innovative approaches to integrate into the smart city of tomorrow.
•Governance, urban data platforms and dashboards in diverse smart cities.•Smart city policy and governance in emerging economies, with a focus on India.•Smart cities, specifically the identity of their data and informational ecosystem.•Creative and human-centric approaches to smart cities and their environments.•participatory urbanism and smart cities.
As human beings we are inevitably social, dependent on others for our physical and emotional well-being. The problem today is the difficulty of finding moments of disengagement from the group. We ...cannot avoid the addictive factor of social networks, as the human need to be accepted and validated leads to an excessive dependence on external approval. It is therefore important to reflect on the veracity of the images shared and what is actually happening. We will expose referents and photographers dealing with these issues, such as Gregory Crewdson and Jeff Wall.
Como seres humanos somos inevitablemente sociales, pues dependemos de los demás para el bienestar físico y emocional. El problema actual es la dificultad de encontrar momentos de desvinculación grupal. No podemos eludir el factor adictivo de las redes sociales, ya que la necesidad humana de ser aceptados y validados concluye en una excesiva dependencia hacia la aprobación externa. Por ello es importante reflexionar sobre la veracidad de las imágenes compartidas y lo que está ocurriendo en realidad. Expondremos referentes y fotógrafos tratan estas cuestiones, como Gregory Crewdson y Jeff Wall.
Purpose Mothers sharing images and information on social media about their children is a contemporary cultural norm. While the practice has been heavily discussed in popular media, there is a lack of ...empirical research examining the phenomenon from the perspectives of parents and adolescent children in China. The current study aims to find out whether or not mothers and their children engage in discussions about sharenting and how adolescents negotiate their privacy concerns with their mothers. Design/methodology/approach The current study examined how parents and their children make sense of sharenting via semi-structured interviews with 16 Chinese mothers. In addition, the study enlisted 21 adolescents to examine their perspectives on sharenting. Data were analyzed using thematic analysis. Findings Results showed that although documentation is articulated as the primary sharenting motivation, identity management is a major drive behind sharenting. The dynamics between mothers and their children, as well as between adolescents and their parents, are also explored regarding the issues of consent, privacy and identity. Research limitations/implications This study has theoretical implications for the communication privacy management (CPM) theory, as it underscores the dynamic nature of privacy management, shaped by cultural norms, family dynamics and evolving communication technologies. It also adds value for campaign practitioners to provide education programs on the serious consequences of sharenting. Originality/value This research serves as a starting point to further explore a child’s entrance to adulthood as our culture’s first true digital natives who will bear extensive online and offline identities.
Reflecting on the thousands of diverse research studies of social media representation and digital privacy, this article presents a comprehensive summary of online personal strategies. First, the ...evolution of academic concepts about digital identity and the online self is summarised. Then, the article investigates the key dynamics of personal strategies and control issues in detail with ideas, experiences, stories and metaphors taken from 60 qualitative interviews from Central and Eastern Europe and Southeast Asia. According to the key findings of this article, the universal patterns of online personal strategies follow mostly conscious decisions, resulting in users maintaining 70% control of their digital footprints. However, the remaining 30% of online activities are unconscious floating with digital dynamics and resulting in a wide range of non-expected consequences from identity theft to kidnapping. In summary, an intercultural and intergenerational model highlights the complexity and diversity of the studied field, providing a reference framework for future studies. The closing section presents a discussion of those findings of this study that are inconsistent with commonplace assumptions and conclusions present in the academic literature, promoting for study those subjects that still need to be extended or explored.
Ever-growing concerns over ‘Big Brother’ continue driving individuals towards user-centric identity management systems. Nascent innovations are framed as offering Self-Sovereign Identity (SSI). ...Because of the association with value-laden ideals and technical components like blockchain, SSI is caught up with both hype and idiosyncrasy. Competing interpretations of SSI damage the public discourse and risk misrepresenting affordances these systems might offer. Based on a qualitative inductive interview study and document analysis, this article extrapolates a constructivist theoretical frame – the Extended Model of Interpretive Flexibility – which combines insights from the Social Construction of Technology and the Structurational Model of Technology. The Extended Model of Interpretive Flexibility highlights malleability in the technical implementations and social representations, which in turn is affected by and influences institutional properties around SSI. This research further offers implications for practice around the implementation of SSI, in particular regarding policy, management, and design. For theory on public sector information systems, the proposed model has generalizable potential for the analysis of socio-technical systems and offers future research directions.
•Self-sovereign identity (SSI) is subject to ambiguity and varying technical implementations.•The role of institutional properties in IT artifacts' ambiguity is unclear.•We conducted an inductive study with expert interviews and SSI project documentation.•Our Extended Model of Interpretive Flexibility accounts for the role of institutions.•We offer a holistic view on SSI with policy, management, and design implications.