Digital identity – beyond verification
Digital trace data have come to be collected, aggregated, and used by a large number of organizations, both private and state. However, recent events like the Cambridge Analytica scandal and public scandals around data being used to influence elections in the United States, India, and elsewhere have meant that individuals have become increasingly sensitive to how their data are collected and managed. As a result, new data management systems – and with them identity management systems – have emerged. This exploratory and conceptual chapter explores the different models that have emerged, assesses their strengths and weaknesses, and compares them to existing identity and data use systems. In particular, it highlights implementation risks and opportunities associated with more sophisticated data management systems, while outlining some possible concerns around centralization of data commoditization and control.