Editorial: Identity and Privacy Governance

A. Zwitter, O. Gstrein
{"title":"Editorial: Identity and Privacy Governance","authors":"A. Zwitter, O. Gstrein","doi":"10.3389/fbloc.2021.738862","DOIUrl":null,"url":null,"abstract":"The design and management of digital identity is a complex challenge. On the one hand, it requires a clear understanding of the parameters that are involved in identity management. On the other hand, it requires the cooperation of many stakeholders. In particular, this involves those public authorities and private organisations that need to be aligned to define technical standards, develop identification infrastructures and maintain them. A shared understanding of fundamental concepts that define identity in the digital age is then a prerequisite. Such a complimentary reflection and evaluation of what the emergence of distributed-ledger technologies means from the perspectives of human rights, human dignity, as well as individual and collective autonomy are essential to ensure their use for good purposes. While technical capabilities are important, they are increasingly insufficient without guiding theoretical frameworks. Sound governance mechanisms which respect, protect and promote human rights such as privacy are equally essential. The COVID-19 pandemic has only further increased the desire to use data to understand and manage our societies (Zwitter and Gstrein, 2020), which also increases the degree to which we are defined through data and our access to digital services. Certainly, we currently witness profound changes in the capabilities to define and manage identity. Established architectures to validate, certify, and manage credentials are usually based on centralized or federated top-down approaches. They rely on territorial sovereignty, trusted authorities and third-party operators which gain considerable power by being able to manage the systems. In recent years, distributed-ledger technologies such as Blockchain have been described as “trust mechanisms”, which can operate independently of such trust-mediators and territorial restrictions. One might prefer to rather trust a technical system, as well as the parties that host the software and ensure proper functioning, than traditional institutions such as banks and states. This emerging opportunity to change the practice of identity management raises the questions of 1) how blockchain applications influence trust, and 2) how trust based requirements affect the design of applications based on distributed-ledger technology? Some identity management architectures presented in this research topic go even further and design full-fledged identity management systems. Their users are not only independent from the gatekeepers mentioned above. They also do not need to maintain a single aggregated identity. This enhances privacy and autonomy, so the authors argue, since aggregated identities can potentially be constrained or reconstructed against the interests of individuals. Such a pattern change could also potentially mitigate information security issues. These security issues are becoming more and more pressing as conventional digital identity management based on passwords and e-mail addresses face enhanced cybersecurity threats, typically associated with identity theft. Nevertheless, private forms of digital identity governance can also create worrying consequences from a security perspective, as the case of “Silk Road”—a historically influential platform for trading on the “dark web”—demonstrates. Edited and reviewed by: Richard Adams, Cranfield University, United Kingdom","PeriodicalId":426570,"journal":{"name":"Frontiers in Blockchain","volume":"739 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in Blockchain","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/fbloc.2021.738862","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The design and management of digital identity is a complex challenge. On the one hand, it requires a clear understanding of the parameters that are involved in identity management. On the other hand, it requires the cooperation of many stakeholders. In particular, this involves those public authorities and private organisations that need to be aligned to define technical standards, develop identification infrastructures and maintain them. A shared understanding of fundamental concepts that define identity in the digital age is then a prerequisite. Such a complimentary reflection and evaluation of what the emergence of distributed-ledger technologies means from the perspectives of human rights, human dignity, as well as individual and collective autonomy are essential to ensure their use for good purposes. While technical capabilities are important, they are increasingly insufficient without guiding theoretical frameworks. Sound governance mechanisms which respect, protect and promote human rights such as privacy are equally essential. The COVID-19 pandemic has only further increased the desire to use data to understand and manage our societies (Zwitter and Gstrein, 2020), which also increases the degree to which we are defined through data and our access to digital services. Certainly, we currently witness profound changes in the capabilities to define and manage identity. Established architectures to validate, certify, and manage credentials are usually based on centralized or federated top-down approaches. They rely on territorial sovereignty, trusted authorities and third-party operators which gain considerable power by being able to manage the systems. In recent years, distributed-ledger technologies such as Blockchain have been described as “trust mechanisms”, which can operate independently of such trust-mediators and territorial restrictions. One might prefer to rather trust a technical system, as well as the parties that host the software and ensure proper functioning, than traditional institutions such as banks and states. This emerging opportunity to change the practice of identity management raises the questions of 1) how blockchain applications influence trust, and 2) how trust based requirements affect the design of applications based on distributed-ledger technology? Some identity management architectures presented in this research topic go even further and design full-fledged identity management systems. Their users are not only independent from the gatekeepers mentioned above. They also do not need to maintain a single aggregated identity. This enhances privacy and autonomy, so the authors argue, since aggregated identities can potentially be constrained or reconstructed against the interests of individuals. Such a pattern change could also potentially mitigate information security issues. These security issues are becoming more and more pressing as conventional digital identity management based on passwords and e-mail addresses face enhanced cybersecurity threats, typically associated with identity theft. Nevertheless, private forms of digital identity governance can also create worrying consequences from a security perspective, as the case of “Silk Road”—a historically influential platform for trading on the “dark web”—demonstrates. Edited and reviewed by: Richard Adams, Cranfield University, United Kingdom
社论:身份和隐私治理
数字身份的设计和管理是一项复杂的挑战。一方面,它需要清楚地了解身份管理中涉及的参数。另一方面,它需要许多利益相关者的合作。特别是,这涉及到那些需要在定义技术标准、开发识别基础设施和维护它们方面保持一致的公共当局和私人组织。在数字时代,对定义身份的基本概念的共同理解是一个先决条件。从人权、人的尊严以及个人和集体自治的角度对分布式账本技术的出现意味着什么进行这种补充性的反思和评估,对于确保它们被用于良好的目的至关重要。虽然技术能力很重要,但如果没有指导性的理论框架,它们就会越来越不够。尊重、保护和促进隐私权等人权的健全治理机制同样至关重要。2019冠状病毒病大流行只会进一步增加使用数据来理解和管理我们的社会的愿望(Zwitter和Gstrein, 2020),这也增加了我们通过数据和获取数字服务来定义的程度。当然,我们目前见证了身份定义和管理能力的深刻变化。已建立的验证、认证和管理凭证的体系结构通常基于集中式或联合式自顶向下方法。它们依赖于领土主权、可信的当局和第三方运营商,这些运营商通过能够管理这些系统而获得相当大的权力。近年来,区块链等分布式账本技术被描述为“信任机制”,它可以独立于信任中介和地域限制而运行。比起银行和国家等传统机构,人们可能更愿意信任一个技术系统,以及托管软件并确保其正常运行的各方。这种改变身份管理实践的新机会提出了以下问题:1)区块链应用程序如何影响信任,以及2)基于信任的需求如何影响基于分布式账本技术的应用程序的设计?本研究主题中提出的一些身份管理体系结构甚至更进一步,设计了成熟的身份管理系统。它们的用户不仅独立于上面提到的守门人。它们也不需要维护单个聚合标识。作者认为,这增强了隐私性和自主性,因为聚合的身份可能会受到约束或重构,违背个人利益。这种模式更改还可能潜在地减轻信息安全问题。这些安全问题正变得越来越紧迫,因为基于密码和电子邮件地址的传统数字身份管理面临着日益增强的网络安全威胁,通常与身份盗窃有关。然而,从安全的角度来看,私人形式的数字身份管理也可能产生令人担忧的后果,正如“丝绸之路”——一个在“暗网”上具有历史影响力的交易平台——所证明的那样。编辑和评审:理查德·亚当斯,克兰菲尔德大学,英国
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
7.00
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信