scispace - formally typeset
Search or ask a question
Topic

Digital identity

About: Digital identity is a research topic. Over the lifetime, 1244 publications have been published within this topic receiving 13715 citations.


Papers
More filters
01 Jan 2010
TL;DR: Anonymity, unlinkability, linkability, undetectability, unobservability, pseudonymity, identifiability, identity, partial identity, digital identity and identity management are defined.
Abstract: Based on the nomenclature of the early papers in the field privacy by data minimization, we develop a terminology which is both expressive and precise More particularly, we define anonymity, unlinkability, linkability, undetectability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), identifiability, identity, partial identity, digital identity and identity management In addition, we describe the relationships between these terms, give a rationale why we define them as we do, and sketch the main mechanisms to provide for the properties defined

732 citations

01 Jan 2005
TL;DR: The approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity, which define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
Abstract: This paper is about how we can prevent the loss of trust and go forward to give Internet users a deep sense of safety, privacy, and certainty about whom they are relating to in cyberspace. Nothing could be more essential if Web-based services and applications are to continue to move beyond "cyber publication" and encompass all kinds of interaction and services. Our approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.

325 citations

Journal ArticleDOI
TL;DR: To understand scholars' naturalistic practices in social networks in general and on Twitter in particular, tweets from 45 scholars were analysed qualitatively to arrive at dominant themes describing online social network practice.
Abstract: Scholars participate in online social networks for professional purposes. In such networks, learning takes the form of participation and identity formation through engagement in and contribution to networked practices. While current literature describes the possible benefits of online participation, empirical research on scholars' use of online social networks in the educational technology literature is negligible. The purpose of this paper is to understand scholars' naturalistic practices in social networks in general, and on Twitter in particular. Tweets from 45 scholars were analysed qualitatively to arrive at dominant themes describing online social network practice. Findings indicate that scholars participating on Twitter (1) shared information, resources, and media relating to their professional practice; (2) shared information about their classroom and their students; (3) requested assistance from and offered suggestions to others; (4) engaged in social commentary; (5) engaged in digital identity and impression management; (6) sought to network and make connections with others; and (7) highlighted their participation in online networks other than Twitter. These findings assist the field in understanding the emerging practice of scholarly participation in online networks. © 2012 Wiley Periodicals, Inc.

315 citations

Patent
16 Sep 2004
TL;DR: In this article, a basic architecture for managing digital identity information in a network such as the World Wide Web is provided, where a user can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile.
Abstract: A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.

302 citations

Book
01 Aug 2005
TL;DR: This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Abstract: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for [email protected] and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

251 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
81% related
Mobile device
58.6K papers, 942.8K citations
81% related
Mobile computing
51.3K papers, 1M citations
80% related
Web page
50.3K papers, 975.1K citations
78% related
Social network
42.9K papers, 1.5M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202348
202283
2021102
2020159
2019147
201889