ArticlePDF Available

Self-sovereign identity

Authors:

Abstract

The concept of self-sovereign identity (SSI) describes an identity management system created to operate independently of third-party public or private actors, based on decentralised technological architectures, and designed to prioritise user security, privacy, individual autonomy and self-empowerment.
+9@:GCJ9F9=;B=89BH=HM
Volume O
Self-sovereign identity
Alexandra Giannopoulou (84@0<=4>C917=>0</,75;=5BBCDCI@CIIJ5B@
Fennie Wang 498C=?= ,-=:9BB=98=CBMGIG@56G7CA
DOI: <HHDG8C=CF;
Published: DF=@
Received: DF=@Accepted: DF=@
Competing Interests: ,<95IH<CF<5G897@5F98H<5HBC7CAD9H=B;=BH9F9GHG9L=GHH<5H
<5J9=B[I9B798H<9H9LH
Licence: ,<=G=G5BCD9B5779GG5FH=7@98=GHF=6IH98IB89FH<9H9FAGC:H<9F95H=J9
CAACBGHHF=6IH=CB%=79BG9 9FA5BMK<=7<D9FA=HGIBF9GHF=7H98IG9
8=GHF=6IH=CB5B8F9DFC8I7H=CB=B5BMA98=IADFCJ=898H<9CF=;=B5@KCF?=GDFCD9F@M
7=H98<HHDG7F95H=J97CAACBGCF;@=79BG9G6M8989989B
CDMF=;<HF9A5=BGK=H<H<95IH<CFG
Citation: =5BBCDCI@CI/5B;+9@:GCJ9F9=;B=89BH=HM8>0<80>$964.C
%0@40A<HHDG8C=CF;
Keywords: "89BH=HM
Abstract: ,<97CB79DHC:G9@:GCJ9F9=;B=89BH=HM++"89G7F=69G5B=89BH=HMA5B5;9A9BHGMGH9A
7F95H98HCCD9F5H9=B89D9B89BH@MC:H<=F8D5FHMDI6@=7CFDF=J5H957HCFG65G98CB8979BHF5@=G98
H97<BC@C;=75@5F7<=H97HIF9G5B889G=;B98HCDF=CF=H=G9IG9FG97IF=HMDF=J57M=B8=J=8I5@5IHCBCAM
5B8G9@:9ADCK9FA9BH
Issue 
,<=G5FH=7@969@CB;GHCH<9Glossary of decentralised technosocial systems5GD97=5@
G97H=CBC:8>0<80>$964.C%0@40A
De*nition of the term
,<97CB79DHC:G9@:GCJ9F9=;B=89BH=HM++"89G7F=69G5B=89BH=HMA5B5;9A9BH
GMGH9A7F95H98HCCD9F5H9=B89D9B89BH@MC:H<=F8D5FHMDI6@=7CFDF=J5H957HCFG
65G98CB8979BHF5@=G98H97<BC@C;=75@5F7<=H97HIF9G5B889G=;B98HCDF=CF=H=G9IG9F
G97IF=HMDF=J57M=B8=J=8I5@5IHCBCAM5B8G9@:9ADCK9FA9BH
Origin
F=B;=B;/9GHD<5@=5BGH5H979BHF98GCJ9F9=;BHMHCH<9=B8=J=8I5@@9J9@++"
9A9F;98:FCAH<95GD=F5H=CBC:G9@:89H9FA=B5H=CB5B8C:8=F97H=06129@0<8,8.0
(F;58D:CF957<=B8=J=8I5@CIHG=89GH5H9=BH9FJ9BH=CB"89BH=HM=G
7CBG=89F98:CIB85H=CB5@:CFDFCACH=B;GC7=5@9EI5@=HM:F998CA89AC7F57M5B8Z
B5B7=5@=B89D9B89B79.9F<I@GH1CIB;(F=;=B5@@M=061=9@0<0428,?>39<4
>CUH<9=89C@C;=75@DFC;9B=HCFHC++"UF9:9FF98HCV>30,.>?,6/01,?6>/0=428:,<,70
>0<91?7,84/08>4>C:<49<>9>30<024=><,>498:<9.0==?=0/>948,?2?<,>0:,<>4.4:,
>49848&9.40>C'30,.>91J<024=><,>498K47:640=>3,>,8,/7484=><,>498:<9.0==.98
><9660/-C&9.40>C4=<0;?4<0/19<J4/08>4>CK>90B4=>'34=,::<9,.3.98><4@0=&9.40>C,=
>309A80<91J4/08>4>CK,8/>308/4@4/?,6,=>309?>.97091=9.490.98974.,/7484=
><,>498W,<9&CLM,CB;I9IHCBCAM=GJ=9K985G589H9FA=B=B;9@9A9BHC:
G9@:GCJ9F9=;BHM=89C@C;=75@@M5@=;B=B;K=H<HF5BG79B89BH5@=GA77CF8=B;HC,FCH
H9FDV0,.391?=4=9A80/-C>30=>,>0A34.32<,8>=600A,CL>929@0<8
,8//4=:9=091.0<>,48,=:0.>=919?<-9/40=,8/64@0=W
"BH<9F579HCK5F8G8=;=H5@GCJ9F9=;BHM=9V>30,-464>C9148/4@4/?,6=>9>,50,.>498=
,8//0.4=498=48,.98=.49?=/064-0<,>0,8/48/0:08/08>7,880<I)C<@9,<=9@
5=A=B;HC9GH56@=G<7CBHFC@V9@0<>304</,>,/0@4.0=91>A,<03,</A,<0,8/
9>30<>0.38969240=WCIHIF9,CID=BD=89BH=HMA5B5;9A9BH=G?9M
"89BH=H=9G5B8H<9=FF9GD97H=J9H97<BC@C;=75@=B:F5GHFI7HIF9J=79G69;=BHCA9F;9
K<=@9697CA=B;5F9GCIF79:CFH<9;@C65@97CBCAM6=CA9HF=7G5F9HIFB=B;=BHC
;CJ9FBA9BH5@=B:F5GHFI7HIF9G5B85F95GGC7=5H98K=H<GH5H9=GGI98=89BH=Z9FG5B8
7=H=N9B"G9GH56@=G<=B;7=H=N9BG<=D%MCB9<5J=CIF5@=89BH=HM=G89F=J98
:FCA7CBGIA9FD9FGCB5@85H57C@@97H985B8ACB9H=G986MDF=J5H957HCFG,97<B=75@
=89BH=H=9G5F9:CFA986M@C75@5779GG7CBHFC@"G!95@H<=89BH=H=9GGH5FHHC5DD95F
/9K=@@IG9H<9H9FAGCJ9F9=;B=89BH=HM5B8++"=BH9F7<5B;956@M
 "BH9FB9H)C@=7M*9J=9KO
5G=AAIB=HMD5GGDCFHG=B5B7=5@=89BH=HM9G75D9GZB5B7=5@=BGH=HIH=CBG5B8;9B9F
5H9GJ5@I9=BM8>0.3/9GH9FA9=9F+=HI5H98K=H<=B6FC589F8=;=H5@=89BH=HM
89J9@CDA9BH8=G7IGG=CBG-B=H98'5H=CBG7CBHFC@CJ9F=89BH=HM697CA9G
=BGHFIA9BH5@5G=B8=J=8I5@GGH5H95B8DF=J5H957HCFG7CAD9H9:CFDCK9FCJ9F=HG
D<MG=75@5B88=;=H5@9LDF9GG=CBG
,<97CB79DHC:++"<5G699B9@56CF5H985G5B9LDF9GG=CBC:D9FGCB5@8=;=H5@GCJ9F
9=;BHM6M<F=GHCD<9F@@9B!9IG98=HHC89G7F=695DF=B7=D@965G98:F5A9
KCF?H<5HKCI@87F95H958979BHF5@=G98GMGH9AC:IG9F79BHF=7G9@:58A=B=GH9F98
=BH9FCD9F56@98=;=H5@=89BH=H=9G,<=GGMGH9A=G8F=J9B6MH9B:CIB85H=CB5@DF=B7=
D@9G:C@@CK=B;$=A5A9FCBWG%5KGC:"89BH=HML=GH9B79CBHFC@
779GG,F5BGD5F9B7M)9FG=GH9B79)CFH56=@=HM"BH9FCD9F56=@=HMCBG9BH
&=B=A5@=G5H=CB)FCH97H=CBH<5HKCI@85=AHC7CBGH=HIH9H<9A=GG=B;X=89B
H=HM@5M9FYCBH<9=BH9FB9H)F9I?G7<5H*998"H9A6C8=9G5GD97=Z7J=G=CB
C:8979BHF5@=G988=;=H5@=89BH=HMG9D5F5H98:FCADF99L=GH=B;79BHF5@=G985B8:989F
5H98AC89@GK<=7<5=AGHC897CID@9=89BH=HM=GGI5B796MH<9GH5H9=BCF89FHC
6F=B;=HHCH<9:I@@7CBHFC@C:H<97=H=N9B,<9&CLM,CB;I9HH<9A=B=AIA
++"V7,50=>30.4>4D0808>4<06C<0=:98=4-6019<>307,8,20708>0B:694>,>498,8/:<9
>0.>49891980I=/,>,W!9F=5BD/<=@9=AD@9A9BH5H=CBGC:=HGDF=B7=D@9G
J5FMGI6GH5BH=5@@M=H75B69G5=8H<5H++"5=AGHCV08,-60,79/06914/08>4>C7,8
,20708>>3,>:?>=48/4@4/?,6=,>>30.08>0<91>304<4/08>4>C<06,>0/><,8=,.>498=,669A
482>307>97,8,20,39=>914/08>4M0<=,8/:0<=98,64819<7,>498A4>39?><06C482?:
98,8C><,/4>498,6548/91.08><,64D0/,?>39<4>CW*9B=9F=G,<=G8C9GBCH=AD@M
H<5HH<957HCFGF9GDCBG=6@9:CF=GGI=B;9@9A9BHGC:CB9WG=89BH=HMK=@@69GHF=DD98
:FCAH<9=FDF=J=@9;96IHF5H<9FH<5H5B=B8=J=8I5@=BDCGG9GG=CBC:ACF9=89BH=
Z9FG75BDF9G9BH5@@7@5=AG7CFF9@5H98HCH<CG9=89BH=Z9FGVA4>39?>3,@482>929
>3<9?23,848>0<70/4,<CW/5;B9F9H5@D
Evolution
,<9IG9C:++"<5G699BH=98HCH<9IG9C:56@C7?7<5=B!CK9J9F++"=G
6@C7?7<5=B58>579BH6IHBCH6@C7?7<5=B89D9B89BHG<99GA5BDC=BHGCIH
V*=+970-079,8>30.98N,>49891J><?0&&KA4>3466/0M80/.98.0:>==?.3,=J?=0<.08
><4.K/424>,64/08>4>CA34.37,C89><0;?4<0-69.5.3,48>0.389692C9<?=04>>94>=1?66
47,2480//0.08><,64=0/:9>08>4,6WD
,<9H97<B=75@8=A9BG=CBC:++"<5GGC:5F699B5B7<CF98=B/0.08><,64=0/4/08>4M0<=
77CF8=B;HC;C5@C:H<9-B=H98'5H=CBG;9B85:CF+IGH5=B56@99J9@CDA9BHH<9C6>97
H=J9=GHCVDFCJ=89@9;5@=89BH=HM:CF5@@=B7@I8=B;6=FH<F9;=GHF5H=CBW6M
"BH<5HF9;5F8=H8=GH5B79G=HG9@::FCAH<97CB79DHC:GCJ9F9=;BHM&5BG?=&5BG?=
=5BBCDCI@CI/5B;
"@0<4M,-60.6,47=.5B8CH<9FF9@5H98GH5B85F8G:FCAH<9/CF@8/=89/96
CBGCFH=IA/H<9G5A9=BH9FB9HGH5B85F8GCF;5B=G5H=CB69<=B8H<97CAACB
=BH9FB9HDFCHC7C@GK95F9:5A=@=5FK=H<HC85MGI7<5G!,&%5B8!,,)+,<9G989
79BHF5@=G98=89BH=HMGH5B85F8G5F95G9HC:H97<B=75@GH5B85F8G:CF@=B?=B;5B85GGC
7=5H=B;85H556CIH5B=89BH=HMGI6>97HHC;9H<9F=B5D9FG=GH9BH5B8IB=J9FG5@A5B
B9FGI7<H<5HH<9=89BH=HMGI6>97HBCHCB@M<5G7CBHFC@CJ9F<CK=B:CFA5H=CB=G
@=B?985B8IG986IH=GH<9CKB9FC:H<9DFCZ@9F5H<9FH<5B5H<=F8D5FHMG9FJ=79
DFCJ=89F,<IGH<9G9HC:@=B?9885H575@@985HH9GH5H=CBGCF7@5=AGA5M69;@C65@@M
DCFH56@9HH9GH5H=CBGA5M=B7@I897F989BH=5@GH<5H;F5BHH<9=89BH=HMGI6>97H57
79GGF=;<HGCFDF=J=@9;9GCFA5M=B7@I89J9F=Z75H=CBC:=B:CFA5H=CBGI7<5G5@=B?HC
=89BH=HM8C7IA9BHGDFC:9GG=CB5@79FH=Z75H=CBG7F98=H<=GHCFMCF5BMCH<9F85H5CF
=B:CFA5H=CBJ9FM5HH9GH5H=CBH<5H=G@=B?98HC5B=89BH=HMGI6>97HAIGH69G=;B98
8=;=H5@@M6M5BCH<9F=89BH=HMGI6>97H
++"GMGH9AGA5M697CAD5H=6@9K=H<56@C7?7<5=B:CF8C7IA9BH=B;5B85HH57<=B;
H<9HF5BG57H=CBGHC957<=89BH=HMGI6>97HWGDFCZ@9,<96@C7?7<5=BKCI@8F97CF8
HF5BG57H=CBGH<5H=B7@I89H<9588=B;CFG=;B=B;C:5HH9GH5H=CBGH<9;F5BH=B;CFF9
JC75H=CBC:5779GGDF=J=@9;9G5B8GCCB,<96@C7?7<5=B8C7IA9BH5H=CB7F95H9G5
F97CF8C:H<985H5=BH9;F=HMC:5G9HC:=B:CFA5H=CB@=B?98HC5B=89BH=HMGI6>97H
++"<=B;9GCBH<9H97<B=75@9:Z7=9B7MC:=HG7CF97CB79DHGCF=BGH5B79BCHKC
D9CD@9G<CI@8<5J9H<9G5A9=89BH=Z9F?84.4>CK<9F96MH<9=89BH=Z9F75BBCHF9:
9F9B79ACF9H<5BCB9=89BH=HMGI6>97H,<=G7CB8=H=CB75B69G5H=GZ98H<FCI;<H<9
IG9C:7FMDHC;F5D<M=9A5H<9A5H=75@@M9BGIF=B;H<5HCB@MIB=EI9=89BH=Z9FG5F9
=GGI985B8DF9J9BH=B;H<9A:FCA69=B;F9=GGI98"BCH<9F75G9GGI7<5GJCH=B;CF
7F98=H7<97?G:CF7FCGG@9J9F5;9BCCB9D9FGCBG<CI@8<5J9ACF9H<5BCB9=89BH=
Z9F=482?6,<4>CK<9F96MH<9F9@5H=CBG<=D69HK99BH<9=89BH=HMGI6>97H5B8=89BH=
Z9F=GCB9HCCB9CB@M,<=G7CB8=H=CBA5M69H<9ACGH7<5@@9B;=B;=B5DG9I8CBM
ACIG5B88979BHF5@=G98=89BH=HMGMGH9A"B5KCF@8K<=7<F9EI=F9GG=B;I@5F=HMC:
=89BH=Z75H=CBH97<B=75@HCC@G5B8CF@9;5@F9EI=F9A9BHGH<5H5F99LC;9BCIGHC5B
++"GMGH9A5DD95FHC695GC@IH=CB,<9G=B;I@5F=HMEI5@=HMC:5B=89BH=Z9F5B8
=89BH=Z75H=CBGMGH9A<5GHF58=H=CB5@@M699BGC@J98H<FCI;<79BHF5@=G9885H565G9G
K<9F9=B5@@GCIF79GC:=B:CFA5H=CB75B695;;F9;5H98HCCB95IH<CF=HMH<5H75B
7FCGG7<97?K<9H<9FCB9=89BH=HMGI6>97H<5GAI@H=D@9=89BH=H=9G5B8=89BH=Z9FG
/5B;9=@=DD=
Coexisting uses/meanings
G89G7F=69856CJ9++"=GC:H9BH=A9GIG98=BH9F7<5B;956@MK=H<H9FAGGI7<5G89
79BHF5@=G98=89BH=HM5B88=;=H5@=89BH=HM/<=@9H<9ZFGHHKCH9FAGF9:9FHC5F5H<9F
 "BH9FB9H)C@=7M*9J=9KO
G=A=@5F=89BH=HMA5B5;9A9BHGMGH9ACB9H<5H5DD@=9GH97<BC@C;=75@5F7<=H97HIF9G
GI7<5GH<9CB9GA9BH=CB9856CJ9;I=8986MDC@=H=75@5B8=89C@C;=75@5;9B85G
8=;=H5@=89BH=HMF9DF9G9BHG56FC589FH97<BC@9;5@GC7=9H5@G<=:HHCK5F8G=B7CFDCF5H
=B;D<MG=75@=89BH=HMJ5@I9G=B58=;=H5@:CFA"H=GGIDDCFH986M5B9HKCF?C:@9;5@
F9:CFAG5B8:57=@=H5H986MH97<BC@C;=75@89J9@CDA9BHG+I@@=J5B9F;9F
,<9A5B5;9A9BHC:D<MG=75@5B88=;=H5@=89BH=HM=GGI6>97HHCB5H=CB5@F9;I@5H=CB
5G5B9LDF9GG=CBC:8=;=H5@GH5H9GCJ9F9=;BHM&58=9;5(B5IFCD95B@9J9@
G9J9F5@=B=H=5H=J9G<5J9699B@5IB7<98K=H<5:C7IGCB8=;=H5@=89BH=HMG9FJ=79G"B
=HGF979BH7CAAIB=75H=CBH<9IFCD95BCAA=GG=CBA9BH=CBGH<5HV,?84@0<=,66C
,..0:>0/:?-64.060.><984.4/08>4>C04=80.0==,<C19<.98=?70<=>93,@0,..0==>9
>304</,>,,8/=0.?<06C?=0>30:<9/?.>=,8/=0<@4.0=>30CA,8>A4>39?>3,@482>9?=0
?8<06,>0/:6,>19<7=>9/9=9,8/?880.0==,<46C=3,<482:0<=98,6/,>,A4>3>307?<9
:0,8=.,8,6=9-080M>1<97?=091/,>,>947:<9@0:?-64.,=A066,=:<4@,>0/0.4=498
7,5482W5D,<9V=;=H5@=B5B79+HF5H9;M:CFH<9-WGD97=Z9GH<5HV-C
>30(=39?6/47:60708>,=9?8/602,61<,70A9<508,-6482>30?=09148>0<9:0<
,-60/424>,64/08>4>C=96?>498=W6DK<=7<KCI@86F=B;H97<BC@C;=75@GH5B
85F8=G5H=CB=BH9FCD9F56=@=HM5B86FC589FG97IF=HM=B7IGHCA9FIG9F=89BH=Z75H=CB
5B85IH<9BH=75H=CB6MZB5B7=5@=BGH=HIH=CBG
77CF8=B;HCH<9CAA=GG=CBH<9DFCACH=CB5B8F9;I@5H=CBC:8=;=H5@=89BH=HM=G
9GG9BH=5@=BA5=BH5=B=B;5BH9:08/079.<,>4.,8/=?=>,48,-60=9.40>CIK<=7<=GCB9
C:H<9A5=BC6>97H=J9GC:H<=G85H5GHF5H9;MCFH<=GHFIGH985B8G97IF9=BH9F57
H=CBG5F99GG9BH=5@,<9C6>97H=J9KCI@869HC9BGIF95DDFCDF=5H95B8=BH9FCD9F5
6@9=89BH=Z75H=CB5B85IH<9BH=75H=CB:F5A9KCF?GIFF9BH8=;=H5@=89BH=HMF9:CFAG
5F9C:H9B5@=;B98HC++":CFH<9=FC6>97H=J9HC7F95H9IG9F79BHF=785H5GCJ9F9=;BHM
!CK9J9F5B85GDC=BH98CIH6M+<9@8F5?9V,6>39?23&&3,=-008=.9:0/,<.34>0.>
0/,8/-?46>,=>0.389692C4>4=89>70<06C>0.389692CC/0M84>4984>4==9.49>0.3896
92CIBD
Issues currently associated with the term
/<=@9H<9F9<5J9699B7CBG=89F56@9F9:CFAGH<5H<5J9:57=@=H5H98H<9DFC@=:9F5H=CB
C:DF=J5H9DI6@=7=89BH=HMGC@IH=CBGH<9F9F9A5=BBIA9FCIG @9;5@7CAD@=5B79
G<CFH7CA=B;G=BH<9=AD@9A9BH5H=CB5B8;9B9F5@=G9858CDH=CBC:8979BHF5@=G98
G9@:GCJ9F9=;B=89BH=HM
+D97=Z75@@MH<99"+*9;I@5H=CB89ZB9G8=::9F9BH@9J9@GC:HFIGHG9FJ=79G5B8DFC
J=89GH<9F9;I@5HCFM9BJ=FCBA9BHH<5H9B56@9GH<97F95H=CBC:BIA9FCIG=BH9FCD9F
56@98=;=H5@=89BH=HMGC@IH=CBG@5A=@@C+7<FC9FG77CF8=B;HCFH=7@9
=5BBCDCI@CI/5B;
9@97HFCB=7=89BH=Z75H=CB=GV,7,>0<4,6,8/9<477,>0<4,6?84>.98>,48482:0<=98
4/08>4M.,>498/,>,,8/A34.34=?=0/19<,?>308>4.,>49819<,8986480=0<@4.0WBM:CFA
C:7FCGG6CF89F8=;=H5@=89BH=HMG9@:GCJ9F9=;BCFBCHKCI@8<5J9HC:IB7H=CBK=H<
=B5AIHI5@@MF97C;B=G98=89BH=HM:F5A9KCF?69HK99B-A9A69FGH5H9G:CF5I
H<9BH=75H=CB5B85779GGHC9@97HFCB=7G9FJ=79G
"B588=H=CB=89BH=HMDFCJ=89FG<5J9HC7CB:CFAHC85H5DFCH97H=CBF9;I@5H=CBGI7<
5GH<9 )**9B=9F=G =5BBCDCI@CICAD@=5B795DD95FGHC69
F5H<9F7<5@@9B;=B;8I9HC7CBGHF5=BHGF9@5H98HCH<9;CJ9FB5B795F7<=H97HIF95B8
H<9H97<BC@C;=75@89G=;BC:H<9=89BH=HMDFC>97HCF=BGH5B7957HCF@=56=@=HMC:89
79BHF5@=G985F7<=H97HIF9GF9A5=BGIB79FH5=B=B7?+=A=@5F@MH<99L9F7=G9C:
85H5GI6>97HGWF=;<HGK=H<=B5G9@:GCJ9F9=;B=89BH=HM5F7<=H97HIF9<5GM9HHC69H9GH
989GD97=5@@MK=H<H<99A9F;9B79C:B9KHMD9GC:HFIGH57HCFG
&5BM5DD@=756@9@9;5@BCFAG5F9G97HCFGD97=Z7"BZB5B7=5@F9;I@5H=CBH<9)5M
A9BH+9FJ=79G=F97H=J95=AGHC:57=@=H5H9ZB5B7=5@85H5G<5F=B;=BCF89FHC9L
D5B8H<9H97<BC@C;=75@56=@=H=9GC:H<99L=GH=B;ZB5B7=5@=B:F5GHFI7HIF9G/9GH9F
A9=9F5B8HCV:<979>04889@,>4@079-460,8/48>0<80>:,C708>=0<@4.0=W"89BH=
HM5B8H<9IG9C:GHFCB;5IH<9BH=75H=CBH97<BC@C;=75@GH5B85F8G5F96CH<?9M=B5D
D@M=B;5B8=AD@9A9BH=B;H<95GD=F5H=CBGC:H<9IFCD95B@9;=G@5HCFK=H<=BH<9Z
B5B7=5@G97HCF,<=G=G5@GC5DD5F9BHK<9BF9J=9K=B;,8>47980C6,?8/0<482&%
5B8589AC9?<.?=>970<$1C6@=;5H=CBGF9J=G986MH<9&%=F97H=J9K<=7<F9
EI=F958=;=H5@=89BH=HMH<5H:57=@=H5H9GHF5BGD5F9B7M5B8577CIBH56=@=HMC:ZB5B7=5@
=BH9FA98=5F=9G,<95DD@=75H=CBC:H<9G9C6@=;5H=CBG=BH<96FC589F7FMDHC7IFF9B7M
B9HKCF?C:57HCFGF9A5=BGIB7@95F
)I6@=78=G7CIFG9<=;<@=;<HG++"WG:CIB85H=CB5@;C5@C:D@57=B;H<9=89BH=HMGI6>97H
=B7CBHFC@C:H<9=F=89BH=HM85H5IG9F79BHF=7=89BH=HM5B8J=9KG++"GC@IH=CBG5G
5AI7<B99898;@C65@=B:F5GHFI7HIF9H<5HKCI@8DFCJ=898C7IA9BH5H=CBHC@5F;9
DCDI@5H=CBGH<5H<5J9BCB969HH9F=BH9;F5H=B;H<9A=BAC89FB8=;=H5@GC7=9HM
/CF@85B? FCID/CF@87CBCA=7CFIA!CK9J9FH<9F95F97CB
G=89F56@9F=G?GF9@5H98HCH<99LD5BG=CBC:;@C65@++"GMGH9AG:CFDIFDCG9GGI7<5G
F9:I;99=89BH=Z75H=CBGDC=BH98CIH6M<99GA5BDV>3007,8.4:,>9<C
:9>08>4,691/0.08><,64=0/?=0<9A80/79/0=914/08>4M.,>498.,7048>9>08=498A4>3
>30209:964>4.,6<0,64>C91>308,>498=>,>0=C=>0748A34.3=>,>0=I:<0<92,>4@04=>9.98
><96>306024>47,>070,8=9179@0708>F9<48/00/4/08>4M.,>498I,<9D9FG=GH9BH=B
H9;F5H=CBC:5B=89BH=HM@5M9F75BBCH577CIBH:CF5BCBMA=HMBCF:CFH<97CBH9LHI5@
,<=GC6>97H=J9=GD9F:97H@M5@=;B98K=H<H<9=895@GC:8979BHF5@=G5H=CBH<5H8FCJ9H<989J9@CDA9BHC:
6@C7?7<5=BH97<BC@C;M=B;9B9F5@C8Q =5BBCDCI@CI
 "BH9FB9H)C@=7M*9J=9KO
=BH9FD9FGCB5@B5HIF9C:ACGH9LDF9GG=CBGC:CIF=89BH=HM!CDA5B&W<5F9?
C@@CK=B;5HF58=H=CBC:=89BH=Z75H=CBH97<BC@C;=9GV48>08=4M0/<02470=91
=?<@0466,8.0=0.?<4>4=,>498,8/.98><96I%MCB<99GA5BKCI@8H9B8HC
9A9F;9:IFH<9FGC@=8=:M=B;9L=GH=B;=B9EI5@=H=9G GHF9=B$C7<9BCJ
,<9F9=G5F5D=8@M[CIF=G<=B;8=;=H5@=89BH=HMA5F?9HK=H<DF9J=CIG@M=GC@5H98H97<
BC@C;=75@=B:F5GHFI7HIF9G7CBJ9F;=B;5B89B56@=B;H<97=F7I@5H=CB5B87CAAC8=Z
75H=CBC:=89BH=HM85H5/<=@9C:H9B@5I898H<97CAAC8=Z75H=CBC:=89BH=HM6MJ5F
=CIGDF=J5H9=89BH=HMDFCJ=89FG=F7<7CI@8F9GI@H=BGH5H9G7CAD9H=B;=B5B
CD9BA5F?9H:CFGCJ9F9=;B7=H=N9BG=B5@@M5GF9DIH5H=CB&57+SH<=;<+=9AG
=G697CA=B;9GG9BH=5@=BDFC8I7=B;HFIGHK=H<=BAC89FBD@5H:CFAA98=5H98
8=;=H5@G9FJ=79GC8Q8979BHF5@=G98=89BH=HM=GF9;5F8985G5B9EI5@=G=B;
:CF7969HK99BDCK9F5GMAA9HF=9G!CK9J9F@5H9@MB9K=BH9FA98=5F=9G<5J9GH5FH
98HC9A9F;9=BH<9Z9@8C:/0.08><,64=0/<0:?>,>498=C=>07=5B8K=H<H<9A7CA9G
H<9DCH9BH=5@:CF5B9KGC7=9H5@CF89FC:GIFJ9=@@5B79CI75I@H89ZB986M
H<97CBG9EI9B79GC:5GG=;B=B;D9FG=GH9BH=89BH=H=9GHC7CBHFC@ZB5B7=5@7F=A=B5@
5B8<IA5B[CKG
Conclusion
+9@:GCJ9F9=;B=89BH=HM++"=GFCCH98=BH<969@=9:H<5H=B8=J=8I5@G<5J9H<9F=;<H
HC5B=89BH=HM=B89D9B89BHC:F9@=5B79CB5H<=F8D5FHM=89BH=HMDFCJ=89FGI7<5G
H<9GH5H9CF5BMCH<9F79BHF5@5IH<CF=HM"HG=AD@9A9BH5H=CBF9EI=F9GH<989J9@CD
A9BHC:H97<B=75@GH5B85F8G5GK9@@5GGC7=CDC@=H=75@585DH5H=CBGFCCH98=B@9;5@
5A9B8A9BHG=BCF89FHC69GI779GG:I@(J9F5@@++"=G=AD@9A9BH985G6@C7?7<5=B
58>579BH6IHBCH6@C7?7<5=B89D9B89BH=89BH=HMA5B5;9A9BHGMGH9AGK<=7<5F9
;I=8986MH<9:IB85A9BH5@DF=B7=D@9C:IG9F79BHF=789G=;BIG=B;H97<B=75@GH5B
85F8GH<5H9B56@9IG9F;9B9F5H985B8IG9F7CBHFC@@988979BHF5@=G98=89BH=Z9FG5G
GC7=5H987F989BH=5@G5B85HH9GH5H=CBG,<=G=GGIDD@9A9BH986M@9;5@5B8DC@=7MF9
EI=F9A9BHGHC9BGIF9H<5HH<9C6>97H=J9G:CFD5FH=7I@5FIG975G9G5F957<=9J98=B
7@I8=B;65@5B7=B;7CAD9H=B;GC7=9H5@;C5@G69HK99BIG9FDF=J57MG97IF=HM@5K9B
:CF79A9BHZB5B7=5@=B7@IG=CB5B8F=G?A5B5;9A9BH
References
@5A=@@CCA=B;C"&&0& 02,6%0:9<>9A0&.,8602,66C=?::9<>/424>,64/08>4>C,8/
><?=>A9<>3C '-,=0/><,8=,.>498=48>30424>,6&48260!,<50>2*9DCFH3IFCD95BCAA=GG=CB<HHD
G>C=BID979IFCD59I7C@@97H=CBGG=9=85G6F=8;98C7IA9BHGG=9=85G@9;5@F9DCFH
@@9BDF=@,<9D5H<HCG9@:GCJ9F9=;B=89BH=HM2@C;DCGH3 410)4>36,.<4>C<HHDGK
=5BBCDCI@CI/5B;
KK@=:9K=H<5@57F=HM7CAH<9D5H<HCG9@:GCJ9F9F9=;B=89BH=HM<HA@8:F9:
=F7</08>4>C4=>3080A7980C698/98:?-64=3482:,<>80<=34:
C8Q&98=5H98HFIGHH<9CF9H=75@:F5A9KCF?HC588F9GGH<9HFIGHKCFH<=B9GGC:
H97<BC@C;=75@HFIGHA98=5HCFG"0A!0/4,&9.40>C<HHDG8C=CF;
C8Q =5BBCDCI@CI,<9@C;=7GC:H97<BC@C;M8979BHF5@=N5H=CB,<975G9C:
8=GHF=6IH98@98;9FH97<BC@C;=9G"B&*5;B9885 9GH9:5B=G8G69.5.3,48,8/A0-
&9.4,60.98974.,8/>0.3896924.,6.3,660820=<9?>60/20<HHDG8C=CF;
5A9FCB$&5M,<9@5KGC:=89BH=HM2@C;DCGH347,70<98I=/08>4>C)0-692<HHDGKK
K=89BH=HM6@C;7CAD
<99GA5B&+9@:GCJ9F9=;BHM:CFF9:I;99G,<97CBH9GH98<CF=NCBGC:8=;=H5@=89BH=HM
09:964>4.=<HHDG8C=CF;
IFCD95BCAA=GG=CB5977?84.,>4981<97>30.9774==498>9>300?<9:0,8:,<64,708>>30
.9?8.46>300?<9:0,80.98974.,8/=9.4,6.9774>>00,8/>30.9774>>0091>30<02498=98=3,:482
?<9:0I=/424>,61?>?<0#!M8,6<HHDG9IF@9L9IFCD59I@9;5@7CBH9BH',0,IF=%
0
IFCD95BCAA=GG=CB6977?84.,>4981<97>30.9774==498>9>300?<9:0,8:,<64,708>>30
.9?8.46>300?<9:0,80.98974.,8/=9.4,6.9774>>00,8/>30.9774>>0091>30<02498=98,/424>,6
M8,8.0=><,>02C19<>30(#!M8,6<HHDG9IF@9L9IFCD59I@9;5@7CBH9BH',0,IF
=%0
=B7?&69.5.3,48<02?6,>498,8/29@0<8,8.0480?<9:05A6F=8;9-B=J9FG=HM)F9GG<HHD
G8C=CF;
CI75I@H&&E.?<4>E'0<<4>94<0$9:?6,>498 5@@=A5F8
=5BBCDCI@CI5H5)FCH97H=CBCAD@=5B79<5@@9B;9G:CF+9@:GCJ9F9=;B"89BH=HM"B#
)F=9HC)=BHC$5G+9FF9HH=8G69.5.3,48,8/::64.,>498=DDT+DF=B;9F
"BH9FB5H=CB5@)I6@=G<=B;<HHDG8C=CF;4
GHF9=B($C7<9BCJ=;=H5@=89BH=HM5B88=GHF=6IH98@98;9FH97<BC@C;M)5J=B;H<9
K5MHC5B9C:9I85@6F5J9B9KKCF@8<98>40<=4869.5.3,48<HHDG8C=CF;:6@C7

!9F=5B**9;I@5H=B;@C7?7<5=BF=H=75@D9FGD97H=J9G=B@5K5B8H97<BC@C;M%9?>60/20<HH
DG8C=CF;
!9F=5B*C69FH@C7?7<5=B )*5B8:5BH5G=9GC:85H5GCJ9F9=;BHM ,A889@,>498,8/
'0.389692CT<HHDG8C=CF;
!CDA5B*&W<5F9?57=B;H<9IB?BCKBGIGD97HCF9BG=7'D<9BCHMD=B;5B8
H<9CG7=@@5H=CB69HK99BH<9=B8=J=8I5@5B8H<97C@@97H=J949&9.40>40=T<HHDG8C=CF;
G
%MCB=CA9HF=7G=89BH=Z75H=CB5B8GIFJ9=@@5B79490>34.=T<HHDG8C=CF
;>L
&57+SH<=;<+=9AG&,<97<=B9G9GC7=5@7F98=HGMGH9AAC89@:CFCH<9F7CIBHF=9G
!9/0<8 ,A%0@40AT<HHDG8C=CF;
&58=9;5,424>,6=9@0<0428>C19<?<9:0F=9ZB;))*+"895G)5D9FGIFCD95B
 "BH9FB9H)C@=7M*9J=9KO
)5F@=5A9BH5FM*9G95F7<+9FJ=79
&5BG?=+&5BG?='C C8G'C&5GH9FG'CC89FG,<9IHIF9C:+CJ9F9=;BHM=B5
@C7?7<5=B/CF@8 ,A,8/<4>4;?0T<HHDG8C=CF;GN
(F;58%@CI87CAAIB=H=9G,<985KBC:;@C65@7=H=N9BG<=D"B*5I6R7?80-,>482
><,8=19<7,>498=918,>498,6.4>4D08=34:DDT+DF=B;9F<HHDG8C=CF;
4
)C<@9#,<=9@,=;=H5@GCJ9F9=;BHM8>0<80>$964.C%0@40A<HHDG8C=CF;

)F9I?G7<5H*998&061=9@0<04284/08>4>C0.08><,64D0//424>,64/08>4>C,8/@0<4M,-60
.<0/08>4,6=!$
*9B=9F=G++"/<5HK9F95@@MB998=G:I@@85H5DCFH56=@=HM2@C;DCGH3)970848/08>4>C<
HHDGKCA9B=B=89BH=HMCF;85H5DCFH56=@=HM
+7<FC9FG#,<9ZB5@D=979C:H<99"+*9;I@5H=CB2@C;DCGH3( 0?@0808><019<'$
,A<HHDGKKK@5K?I@9IJ9B697=H=D6@C;H<9ZB5@D=979C:H<99=85GF9;I@5H=CB
+<9@8F5?9)(7HC69F'30/C=>9:4,91=061=9@0<04284/08>4>C 9B9F5H=J9"89BH=HM<HHDG;
9B9F5H=J9=89BH=HMCF;H<98MGHCD=5C:G9@:GCJ9F9=;B=89BH=HMGG=
,<9&CLM,CB;I996FI5FM/<5H=GVGCJ9F9=;BGCIF795IH<CF=HMW2@C;DCGH3'30!9BC
'982?0<HHDGKKKACLMHCB;I97CAK<5H=GGCJ9F9=;BGCIF795IH<CF=HM<HA@
,<9&CLM,CB;I996FI5FM+9@:GCJ9F9=;B=89BH=HM2@C;DCGH3'30!9BC'982?0<HHD
GKKKACLMHCB;I97CAG9@:GCJ9F9=;B=89BH=HM<HA@
,FCHH9F IHCBCAM5GG9@:GCJ9F9=;BHM9<?7T<HHDG8C=CF;G

-B=H98'5H=CBG'<,8=19<74829?<A9<6/'30,208/,19<=?=>,48,-60/0@069:708><HHD
GG8;GIBCF;5;9B85
.9F<I@GH+ 1CIB;406/<0:9<>98>30070<208>?=091/4=><4-?>0/60/20<>0.38969240=
19<4/08>4>C7,8,20708>2*9DCFH3,<9 CJ%56<HHDG6@C7?7<5B;96@C7?7<5B;9Z9@8F9DCFHD8:
/5;B9F$'PA9H<=*9B=9F=G%5B;) FIB9H!C@GH&061=9@0<04284/08>4>C
:9=4>498:,:0<98-69.5.3,4808,-60/4/08>4>C,8/>30<9,/,30,/2)CG=H=CBD5D9F3"89BH=HM/CF?=B;
FCIDC:H<9 9FA5B@C7?7<5=BGGC7=5H=CB<HHDGKKK6IB89G6@C7?89KD7CBH9BHID@C58G
GG=D5D9FD8:
/5B;9=@=DD=)+9@:GCJ9F9=;B=89BH=HM=B5;@C65@=N98KCF@8F989BH=5@G65G98
=89BH=HMGMGH9AG5G58F=J9F:CF97CBCA=7=B7@IG=CB:FCBH=9FG=B6@C7?7<5=B<98>40<=4869.5.3,48<
HHDG8C=CF;:6@C7
/9GH9FA9=9F&CB9M=G85H5TH<9D@5H:CFA=N5H=CBC:ZB5B7=5@HF5BG57H=CBG819<7,>498
977?84.,>498&9.40>CT<HHDG8C=CF;0
/CF@85B? FCID/08>4M.,>49819<0@069:708>88?,6%0:9<>2*9DCFH3<HHDG=88KCF@86
5B?CF;G=H9G=88KCF@865B?CF;Z@9G4"4BBI5@4*9DCFHD8:
/CF@87CBCA=7CFIA/08>4>C48,/424>,6A9<6/G80A.3,:>0<48>30=9.4,6.98><,.>
2*9DCFH3/CF@87CBCA=7CFIA<HHDKKKK9:CFIACF;8C7G/4"'+" !,4*)(*,4=;=H5@
"89BH=HMD8:
=5BBCDCI@CI/5B;
)I6@=G<986M=B7CCD9F5H=CBK=H<
 "BH9FB9H)C@=7M*9J=9KO
... Powstaje również pytanie o granice dopuszczalności tworzenia sztucznych tożsamości cyfrowych np. w metaverse, które mogą sprzyjać działaniom nieetycznym lub przestępczym [Giannopoulou, Wang, 2021]. W tym kontekście kluczowe znaczenie może mieć koncepcja cyfrowej tożsamości suwerennej (Self Sovereign Identity -SSI) [Sas, 2020;Duijzer, 2021]. ...
Article
Full-text available
Celem artykułu (cz.1) jest analiza metaverse z perspektywy kluczowych wyzwań dla regulacji, jak również kwestie szans i zagrożeń dla biznesu. Istnieją różnice poglądów na temat potencjalnych implikacji metaverse na ludzi i biznes. Część badaczy sądzi, że jest to tylko inkrementalny rozwój rozszerzonej (mieszanej) rzeczywistości, trend rozwoju serwisów społecznościowych, gamingu i rozrywki, bez cech przełomowej innowacji. Inni wskazują na jakościowe zmiany środowiska Internetu, już obecnie wpływające na penetrację metaverse przez korporacje i nowe modele biznesowe. Metody badawcze to przegląd literatury, prawa i orzecznictwa, z uwzględnieniem ekonomicznej analizy prawa.
... Although at the moment most interactions in social networks are done through centralized models, with users having a residual or no role in decision making, DOSNs offer a different kind of sociability and help to think "social" in networks in terms of topology, abstraction and scale (Zulli et al., 2020). While this new option gains strength and adds followers, in the current scenario marked by automation and artificial intelligence, in order to recover trust between users and centralized platforms, there is an emergence of the idea of the search for an effective algorithmic sovereignty, data sovereignty, technological sovereignty, or (self-)sovereign digital identity that mitigates some of the negative effects of the dominant model in social networks (Couture & Toupin, 2019;Giannopoulou & Wang, 2021;Hummel et al., 2021;Reviglio & Agosti, 2020). Such effective algorithmic sovereignty is, at least for the moment, a desideratum in corporate networks, but it does seem to materialize in the Fediverse: ...
Article
Full-text available
Introduction: This study analyses the presence of newspapers on Mastodon, the most popular social platform in the Fediverse and an alternative to X (Twitter) in this ecosystem of decentralized and interoperable networks. Methodology: A subsample of newspapers (n=20) and accounts (n=28) on Mastodon was obtained from a sample (n=38) of digital native and legacy media in Spain. Official and unofficial, bots and non-automated, active and inactive accounts, instances where they are hosted, and links to Mastodon on media websites were identified. The date the accounts were created were also identified to check if they appeared before or after Elon Musk’s purchase of Twitter, which boosted Mastodon’s popularity. Results: A total of 13 official accounts (10 native and 3 legacy) were spotted. None of them worked on owned instances. Also, a total of 15 unofficial accounts (9 legacy and 6 native) were identified and they connected via RSS by Mastodon instances administrators. Legacy media show a higher proportion of active accounts than digital natives. The proportion of automated accounts is high for both categories. A ‘Musk effect’ is observed in the account’s creation. Only elDiario.es and El Salto (digital natives) offer links on their websites. El País (legacy) has the oldest account, and El Salto is the one that shows the greatest commitment to Mastodon. Discussion: The analyzed media do not take advantage of the full potential of the technological sovereignty provided by Mastodon. Conclusions: The template used, and the results open up new lines for academic research on a social platform (Mastodon) and an ecosystem (Fediverse) barely explored in the journalistic field.
... Блокчейн в цифровых профилях применяется исключительно как децентрализованное хранилище ключей и идентификаторов, а их подтверждение реализовано через подход самостоятельной (независимой или суверенной) идентичности (SSI). SSI, как подход цифровой идентификации, позволяет пользователю контролировать использование размещаемой им в Интернете информации и управлять ею -делиться с частными лицами или публичными институтами, отслеживать использование или отменять доступ [15]. Децентрализованная архитектура на основе SSI приоритизирует такие характеристики взаимодействия пользователей информационных систем, как безопасность, конфиденциальность, индивидуальная автономия. ...
Article
Full-text available
Purpose of research. The trend of personalization of learning forms a demand for the development and implementation of software tools for processing the digital footprint of the learner, to manage his/her educational trajectory. In combination with decentralized identification technologies, such software tools assume a more active role of the learner in the creation of his/her personal learning trajectory. Additional challenges for the developed software tools are the functional requirement to ensure the independence of learner profile data from individual educational services, while at the same time complying with the standards of information security of working with data. The purpose of this research is to expand the understanding of the possibility of modifying online learning by including distributed solutions in the field of information technology application in education. Materials and methods. The paper describes in detail the solutions developed by the authors for software implementation of a digital profile of learner's competencies - a decentralized application designed to store data of learning activity and confirmed qualifications aggregated from various external educational platforms and services. When forming these solutions, the authors proceeded from the advantages of using a decentralized approach to software development. The methodological basis of the research is represented by a set of approaches and technologies that support the logic of the software development process - distributed registry technology, digital identification approach, credentials storage standard. Results. The authors substantiate the choice of solution for software implementation of digital competence profile: SSI approach will provide decentralized identification of digital footprint data beyond the boundaries of individual educational platforms and services; application of the standard of verifiable VC credentials will create conditions for decentralized storage of learning activity data. The results of the study may be of practical interest for the administration of domestic educational organizations, administration of educational platforms and educational services implementing online learning programs for effective and secure management of each individual student's digital footprint data, creating an individual educational trajectory in his/her interests and confirming competencies. Conclusion. Implementation and scaling of the digital competence profile are aimed at ensuring the identification, safe storage, and effective management of the learner's digital footprint data, which can be used to create an individual learning trajectory. The digital competence profile will allow to realize the function of confirming any forms of activity, the nature of interaction of the learner with the functions of the educational service, as well as allow the learner to control and manage the use of the information placed in the digital profile. As part of the whole, the digital profile is considered in the overall architecture of the information system, which implies the interaction of the software application with other subsystems, including in the structure of the educational platform. The scheme of interaction demonstrated for the digital educational platform “Digital Tutor” developed at the Plekhanov Russian University of Economics. Additional research requires tools for controlling the activity and motivation of the learner to formalize his/her active role in the issues of personal learning trajectory management.
... The heterogeneity of SSI's technical operationalization (Kuperberg, 2020) and its social ambiguity (Giannopoulou & Wang, 2021;Ishmaev, 2020), make SSI implementations malleable to the flexible interests of key actors involved in the design process. This can be both a blessing and a curse. ...
Article
Full-text available
Ever-growing concerns over ‘Big Brother’ continue driving individuals towards user-centric identity management systems. Nascent innovations are framed as offering Self-Sovereign Identity (SSI). Because of the association with value-laden ideals and technical components like blockchain, SSI is caught up with both hype and idiosyncrasy. Competing interpretations of SSI damage the public discourse and risk misrepresenting affordances these systems might offer. Based on a qualitative inductive interview study and document analysis, this article extrapolates a constructivist theoretical frame – the Extended Model of Interpretive Flexibility – which combines insights from the Social Construction of Technology and the Structurational Model of Technology. The Extended Model of Interpretive Flexibility highlights malleability in the technical implementations and social representations, which in turn is affected by and influences institutional properties around SSI. This research further offers implications for practice around the implementation of SSI, in particular regarding policy, management, and design. For theory on public sector information systems, the proposed model has generalizable potential for the analysis of socio-technical systems and offers future research directions.
... Self-Sovereign Identity (SSI) is a cornerstone of Web 3.0 [10], as it represents an innovative approach to digital identity management that aims to remove dependency on centralized third parties and focuses on autonomy and ownership by individuals. These identities are verified and recognized by different organizations and online services, allowing users to interact securely and privately without having to reveal sensitive information. ...
Article
Full-text available
Management of competencies is a crucial concern for both learners and workers as well as for training institutions and companies. For the former, it allows users to track and certify the acquired skills to apply for positions; for the latter, it enables better organisation of business processes. However, currently, most software systems for competency management adopted by the industry are either organisation-centric or centralised: that is, they either lock-in students and employees wishing to export their competencies elsewhere, or they require users’ trust and for users to give up privacy (to store their personal data) while being prone to faults. In this paper, we propose a user-centric, fully decentralised competency management system enabling verifiable, secure, and robust management of competencies digitalised as Open Badges via notarization on a public blockchain. This way, whoever acquires the competence or achievement retains full control over it and can disclose his/her own digital certifications only when needed and to the extent required, migrate them across storage platforms, and let anyone verify the integrity and validity of such certifications independently of any centralised organisation. The proposed solution is based on C-Box®, an existing application for the management of digital competencies that has been improved to fully support models, standards, and technologies of the so-called Web 3.0 vision—a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership.
Chapter
Full-text available
"Web 3.0: İnternetin Yeni Dönemi ve Dijital Gelecek" kitabının bu bölümünde, öncelikle kimlik kavramı tanımlanarak dijital kimliklerin tarihsel gelişim sürecine odaklanılmaktadır. Farklı dijital kimlik yönetim sistemlerinin özellikleri ve işleyişi incelendikten sonra, geleneksel kimlik yönetim sistemlerinin yetersiz kalma nedenleri üzerinde durulmuştur. Bu bağlamda, kendine egemen kimlik kavramı, geleneksel yöntemlere alternatif bir çözüm olarak sunulmuş ve bu sistemin kullanıldığı bazı projelerden örnekler verilmiştir. Ardından, kendine egemen kimlik sistemlerinin avantajları, tartışmalı yönleri ve olası kullanım alanları kapsamlı bir şekilde analiz edilmiştir.
Article
Full-text available
Стаття надає всебічний огляд існуючих технологій, включаючи блокчейн та IPFS, детально аналізуючи їхні переваги, недоліки та потенційні сценарії використання для зберігання та обробки публічних даних у децентралізований спосіб. Розглянуто наявні дослідження в цій сфері, які демонструють ефективність децентралізованих рішень у порівнянні з традиційними централізованими системами зберігання даних. У статті детально обговорюються потенційні виклики та обмеження, пов'язані з децентралізованими системами зберігання даних. Зокрема, розглянуто питання сумісності з існуючими інформаційними системами, проблеми виконання операцій у розподіленому середовищі, а також аспекти прийняття цих технологій на ринку. Окремо виділено питання безпеки та конфіденційності, критично важливі при роботі з публічними даними. Стаття містить аналіз перспектив розвитку та можливих напрямків подальших досліджень у цій галузі, що можуть сприяти вдосконаленню та впровадженню децентралізованих технологій для зберігання даних.
Chapter
The Fourth Industrial Revolution, also known as Industry 4.0, represents a transformative period driven by the convergence of digital, physical, and biological technologies. This revolution is profoundly reshaping numerous industries and activities. Specifically, in media and journalism, it introduces advanced techniques and intelligent systems that redefine how information is gathered, processed, and disseminated. This first chapter analyzes and reflects on these changes from a global perspective. In this Industry 4.0 scenario, virtual and physical production systems cooperate to generate competitive products that satisfy the needs of increasingly demanding audiences. But how does this situation affect the media industry? Is journalism able to adapt to continue satisfying audiences in the Fourth Industrial Revolution? We introduce these and other questions to pave the way for the subsequent 18 chapters, in which 40 esteemed authors from 26 different universities around the world delve into the exploration of the opportunities and challenges that Industry 4.0 presents for journalism.
Article
Full-text available
This paper critically examines the implications of ‘self-sovereign identity’ (SSI) for border politics and migration management. SSI refers to user-controlled, decentralised forms of digital identification. Closely linked with the distributed ledger technology blockchain, SSI is presented by advocates as a tool to empower marginalised groups, including refugees. Among other benefits, some claim that SSI removes the need for powerful, centralised institutional structures by giving individuals control and ownership of their identity information. However, through ethnographic research in an international aid organisation, I find that SSI is an embryonic technology with indeterminate properties and benefits. I identify a series of competing logics in the debates around SSI’s emancipatory potential, which relate to four issues: (i) the neutrality of the technology, (ii) the capacities of refugees, (iii) global governance and the nation state, and (iv) new economic models for digital identity. SSI is simultaneously the potential enabler of new modes of empowerment, autonomy and data security for refugees and a means of maintaining and extending bureaucratic and commercial power. I situate SSI in a genealogy of systems of identity control and argue that, in practice, it is likely to feed into the powers of corporations and states over refugee populations.
Article
Full-text available
This article considers the impact of digital technologies on the interpersonal and institutional logics of trust production. It introduces the new theoretical concept of technology-mediated trust to analyze the role of complex techno-social assemblages in trust production and distrust management. The first part of the article argues that globalization and digitalization have unleashed a crisis of trust, as traditional institutional and interpersonal logics are not attuned to deal with the risks introduced by the prevalence of digital technologies. In the second part, the article describes how digital intermediation has transformed the traditional logics of interpersonal and institutional trust formation and created new trust-mediating services. Finally, the article asks as follows: why should we trust these technological trust mediators? The conclusion is that at best, it is impossible to establish the trustworthiness of trust mediators, and that at worst, we have no reason to trust them.
Article
Full-text available
Financial transactions are part of everyday life, yet banking has largely withstood the digital transformation within most European countries. Recently, there have been initiatives that merge the digital and the financial sphere by integrating the transactions that run through established financial infrastructures into digital platforms. Large data-driven companies hereby seek access to financial transactions and try to embed payments within their platforms. This contribution discusses differing models of how tech-driven companies gain access to financial infrastructures, and how recently introduced policies engender these processes. Within Europe and the United Kingdom, banks that operate through financial infrastructures and hold most transactional data are now required by regulators to provide access to their customers’ accounts. The platformization of financial transactions is thus not purely a technical question, but it also is a remarkable example of how politically enforced changes in the materiality of data lead to reconfigurations with broader economic and social consequences. It results in the transformation of money into a form of (transactional) data and shows how the value of money and data depends on the technological underpinnings that determine the capability of their circulation. In order to understand their valuation, we need to take the material assemblages that enable their distribution into account.
Article
Full-text available
Forensic DNA phenotyping (FDP) encompasses a set of technologies geared towards inferring externally visible characteristics from DNA traces found at crime scenes. As such, they are used to generate facial renderings of unknown suspects. First, through the configuration of molecularly inscribed parts, pigmentary traits are assembled into a probabilistic rendition of the face; second, facial features are landscaped from DNA to produce a metrically rendered face; third, by geographically ordering DNA, an unknown suspect is attributed a particular genetic ancestry as to give him a face. We ethnographically examine these FDP practices within and beyond the laboratory to demonstrate how the promise of individuality—namely the face of the suspect—comes with the production of collectives. And it is precisely these collectives that are a matter of concern in the context of crime, as they rapidly become racialized. We show that each of these FDP practices folds in disparate histories—variously implicating the individual and the collective—while giving rise to different versions of race. The “race sorting logic” (Fullwiley in Br J Sociol 66(1):36–45, 2015) displays the tenacity of race in genetics research and its practical applications.
Article
Full-text available
While the digital layer of social interaction continues to evolve, the recently proclaimed hopes in the development of digital identity could be both naïve and dangerous. Rather than just asking ourselves how we could digitize existing features of identity management, and corresponding financial transactions on a community or state level, we submit that truly useful and innovative digital identities need to be accompanied by some significant rethinking of the essential basics behind the organization of the world. Once digital technologies leave the realm of purely online or deeply local projects, the confrontation with the world of citizenship's biases and the random distribution of rights and duties precisely on the presumption of the lack of any choice and absolute pre-emption of any disagreement comes into a direct conflict with all the benefits Distributed Ledger Technology purports to enable. Some proponents of Distributed Ledger Technology-based identity systems envisage “cloud communities” with truly “self-sovereign” individuals picking and choosing which communities they belong to. We rather see a clear risk that when implemented at the global scale, such decentralized systems could be deeply harmful, reinforcing and amplifying the most repugnant aspects of contemporary citizenship. In this contribution, we present a categorization of existing digital identity systems from a governance perspective and discuss it on the basis of three corresponding case studies that allow us to infer opportunities and limitations of Distributed Ledger Technology-based identity. Subsequently, we put our findings in the context of existing preconditions of citizenship law and conclude with a suggestion of a combination of several tests that we propose to avoid the plunge into a neo-feudal “brave new world.” We would like to draw attention to the perspective that applying digital identity without rethinking the totalitarian assumptions behind the citizenship status will result in perfecting the current inequitable system, which is a move away from striving toward justice and a more dignified future of humanity. We see the danger that those might be provided with plenty of opportunities who already do not lack such under current governance structures, while less privileged individuals will witness their already weak position becoming increasingly worse.
Article
Full-text available
After introducing key concepts and definitions in the field of digital identity, this paper will investigate the benefits and drawbacks of existing identity systems on the road toward achieving self-sovereign identity. It will explore, in particular, the use of blockchain technology and biometrics as a means to ensure the “unicity” and “singularity” of identities, and the associated challenges pertaining to the security and confidentiality of personal information. The paper will then describe an alternative approach to self-sovereign identity based on a system of blockchain-based attestations, claims, credentials, and permissions, which are globally portable across the life of an individual. While not dependent on any particular government or organization for administration or legitimacy, credentials and attestations might nonetheless include government-issued identification and biometrics as one of many indicia of identity. Such a solution—based on a recorded and signed digital history of attributes and activities—best approximates the fluidity and granularity of identity, enabling individuals to express only specific facets of their identity, depending on the parties with whom they wish to interact. To illustrate the difficulties inherent in the implementation of a self-sovereign identity system in the real world, the paper will focus on two blockchain-based identity solutions as case studies: (1) Kiva's identity protocol for building credit history in Sierra Leone, and (2) World Food Programme's Building Blocks program for delivering cash aid to refugees in Jordan. Finally, the paper will explore how the combination of blockchain-based cryptocurrencies and self-sovereign identity may contribute to promoting greater economic inclusion. With digital transactions functioning as identity claims within an ecosystem based on self-sovereign identity, new business models might emerge, such as identity insurance schemes, along with the emergence of value-stable cryptocurrencies (“stablecoins”) functioning as local currencies.
Chapter
Various identity management solutions are emerging in different jurisdictions, with the goal of creating a unified and privacy-preserving identity management system bridging the offline with the online. Within this trend, the concept of self-sovereign identity has re-emerged. It is a concept attached to expressions of both individual autonomy and individual control (sovereignty)—an aspiration in direct relation to what blockchain is promised to bring in contemporary discourse. The paper will provide an overview of the current self-sovereign identity paradigm solutions within the technological environment that involves decentralized networks and it will trace some of the challenges it faces within the European Union especially with regards to the General Data Protection Regulation (EU) 2016/679 (GDPR).
Article
Like the European Union’s General Data Protection Regulation (GDPR), the broader, mainstream emergence of blockchain technology in the present moment of, what I call, data dysphoria is no accident. It is in part reaction to data dysphoria, and in part exploitation of it, a duality underpinned by the tantalising promise of the prosumer ‘taking control’ of their data and establishing sovereignty over it. Blockchain and GDPR alike aim to resolve ‘problem’/’solution’ matrices with deep roots in a wide variety of global economic, political, social, legal and cultural contexts. This article explores the problem of achieving resolution based on innovation and technology by offering an account of the rise of blockchain and implementation of GDPR within a psycho-political framework, one in which fantasies of taking control are predominant yet highly contestable actualities in the lives of technology users.
Article
Many countries know financial consumer credit ratings, and recent years have also seen a proliferation of rating systems in relation to online platforms and in the ‘sharing economy’, such as eBay, Uber and Airbnb. In the view of many Western observers, however, the emerging Chinese Social Credit System indicates a paradigm shift compared to these former rating systems as it aims for a comprehensive and uniform social rating based on penalty and award mechanisms. By contrast, this article suggests that the evolving forms of the Chinese system should be seen as a specific instance of a wider phenomenon. Thus, it develops a framework that compares different rating systems by reference to their drafters, users, aims, scoring systems, application, use of algorithms, enforcement and accountability; it identifies shortcomings of both low and high interventionist rating systems; and it discusses a range of regulatory approaches and emerging issues that law makers should consider.