Realizing digital identity in government: Prioritizing design and implementation objectives for Aadhaar in India
With the increasing levels of digital transformation, focus on digital identities of individuals is
increasingly getting prominence. It is the information captured as part of the identity …
increasingly getting prominence. It is the information captured as part of the identity …
Chinese youth performing identities and navigating belonging online
J Fu - Journal of Youth Studies, 2018 - Taylor & Francis
This paper examines the experiences of belonging of young Chinese internet users through
an analysis of their online identity practices. Drawing on a qualitative research project about …
an analysis of their online identity practices. Drawing on a qualitative research project about …
Googling the requester: Identity‐questing and discrimination in public service provision
Innovating upon previous field experiments and theories of identity‐based discrimination,
we test whether public officials are using searches (“identity‐questing”) to profile citizens …
we test whether public officials are using searches (“identity‐questing”) to profile citizens …
Designing an effective long-term identity management strategy for a mature e-state
Countries that have a well-functioning e-governance ecosystem (infrastructure, processes,
interoperability network, user-friendly e-services etc.) reach a particularly high e-governance …
interoperability network, user-friendly e-services etc.) reach a particularly high e-governance …
Privacy in digital identity systems: models, assessment, and user adoption
A Khatchatourov, M Laurent… - … Government: 14th IFIP WG …, 2015 - Springer
The use of privacy protection measures is of particular importance for existing and upcoming
users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification …
users' digital identities. Thus, the recently adopted EU Regulation on Electronic identification …
[Retracted] Self‐Sovereign Identity for Consented and Content‐Based Access to Medical Records Using Blockchain
M Tcholakian, K Gorna, M Laurent… - Security and …, 2023 - Wiley Online Library
Electronic health records (EHRs) and medical data are classified as personal data in every
privacy law, meaning that any related service that includes processing such data must come …
privacy law, meaning that any related service that includes processing such data must come …
Security challenges in e-assessment and technical solutions
E-Assessment is an innovative form for the evaluation of learners' knowledge and skills in
online education, as well as in blended-learning environments, where part of the …
online education, as well as in blended-learning environments, where part of the …
Identity-as-a-service: An adaptive security infrastructure and privacy-preserving user identity for the cloud environment
TH Vo, W Fuhrmann, KP Fischer-Hellmann, S Furnell - Future Internet, 2019 - mdpi.com
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud
provider and may have established a business-to-business relationship with each other …
provider and may have established a business-to-business relationship with each other …
What if we could travel without passport? First sight to blockchain-based identity management in tourism
Blockchain technology, as a distributed digital ledger, enables users to control their
credentials without being breached by third parties. From a tourism perspective, it allows …
credentials without being breached by third parties. From a tourism perspective, it allows …
Learning in Pyjamas: What Their Use of Webcams Reveals about Students' Self-Presentation in Online Learning Activities
The paper aims to describe how higher education students manage their webcams in a
synchronous digital learning setting. A survey investigated students' self-presentation and …
synchronous digital learning setting. A survey investigated students' self-presentation and …