chapter  13
19 Pages

Digital identity – beyond verification

To a transparent (decentralized) system for data and identity monitoring and control
WithClaire Ingram Bogusz

You have download access for this chapter.

PDF 0.38MB

Digital trace data have come to be collected, aggregated, and used by a large number of organizations, both private and state. However, recent events like the Cambridge Analytica scandal and public scandals around data being used to influence elections in the United States, India, and elsewhere have meant that individuals have become increasingly sensitive to how their data are collected and managed. As a result, new data management systems – and with them identity management systems – have emerged. This exploratory and conceptual chapter explores the different models that have emerged, assesses their strengths and weaknesses, and compares them to existing identity and data use systems. In particular, it highlights implementation risks and opportunities associated with more sophisticated data management systems, while outlining some possible concerns around centralization of data commoditization and control.