digital identities
Recently Published Documents


TOTAL DOCUMENTS

109
(FIVE YEARS 46)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Sarvesh Tanwar ◽  
Sumit Badotra ◽  
Ajay Rana

Abstract PKI gives undeniable degree of safety by transferring the key pair framework among the clients. By constructing, a PKI we combine digital identities with the digital signatures, which give an end-to-end trust model. Basically, PKI is an attempt, which can simulate the real-world human analyzation of identity and reliability in a computerized fashion. In any case, the existing applications are centered on a tight trust model which makes them inadequate as an overall device for trust examination. After years of research, development and deployment, PKI still facing strong technical and organizational challenges such as attacks against Certificate Authorities (CA). CAs are the primitive component of PKIs which plays powerful role in the PKI model. CA must be diligent, creditable and legitimate. In any case, a technocrat who picks up control on a CA can use CA's certificate to issue bogus certificate and impersonate any site, such as - DigiNotar, GobalSign, Comodo and DigiCert Malaysia. In this paper we proposed an approach to reduce the damage of compromised CA/CA’s key by imposing Multiple Signatures (MS) after verifying/authenticating user’s information. One single compromised CA is not able to issue a certificate to any domain as multiple signatures are required. Private key and other perceptive information are stored in the form of object/blob. Without knowing the structure of class no one can access the object and object output stream. Proposed MS achieve better performance over existing MS schemes and control fraudulent certificate issuance with more database security. The proposed scheme also avoids MITM attack against CA who is issuing certificate to whom which is using the following parameters such as identity of Sender, Receiver, Timestamp and Aadhar number.


Children ◽  
2021 ◽  
Vol 8 (12) ◽  
pp. 1179
Author(s):  
E. Begoña García-Navarro ◽  
Jose Luis Gil Bermejo ◽  
Miriam Araujo-Hernández

Through a mixed methodological approach, we want to know how adolescents aged between 14 and 16 years from the south of Spain express and identify themselves on social networks, with respect to their sex. As such differences can determine gender inequality, we will analyse differences between females and males regarding the expression of identity on social networks. Analysis of obtained results demonstrates that many relevant attributes still emerge such as the socio-cultural representation of gender as sex in social networks. Differences emerged between the identity expressions of females and males which can generate inequalities favouring females and males. This implies a series of repercussions and, ultimately, defines the so-called digital gender divide. Taking into account these results we could intervene in the population of children to carry out prevention activities focused on social networks.


Author(s):  
Johannes Sedlmeir ◽  
Reilly Smethurst ◽  
Alexander Rieger ◽  
Gilbert Fridgen
Keyword(s):  

Author(s):  
Paolo Spagnoletti ◽  
Federica Ceci ◽  
Bendik Bygstad

AbstractThis paper investigates the functioning of Online Black-Markets (OBMs), i.e. a digital infrastructure operating in the Dark Net that enables the exchange of illegal goods such as drugs, weapons and fake digital identities. OBMs exist notwithstanding adverse conditions such as police interventions, scams and market breakdowns. Relying on a longitudinal case study, we focus on the dynamics of interactions among actors and marketplace technologies and we identify three mechanisms explaining OBMs operations. In particular, we show that OBMs infrastructure is the result of commoditization, platformization and resilience processes. Our contribution relies on the identification of community-based mechanisms that generate the OBMs infrastructure, extending the current understanding of e-commerce and social commerce.


2021 ◽  
Vol 11 (4) ◽  
pp. 4885-4897
Author(s):  
Sanket Devlekar ◽  
Vidyavati Ramteke

Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.


Author(s):  
Anwar Ali Sathio ◽  
Mazhar Ali Dootio ◽  
Abdullah Lakhan ◽  
Mujeeb ur Rehman ◽  
Ali Orangzeb Pnhwar ◽  
...  
Keyword(s):  

Author(s):  
Kara S. Lopez ◽  
Susan P. Robbins

Despite the meteoric rise of social media, little is known about how clinical social workers and other mental health professionals respond to this new form of communication. This study used classic (Glaserian) grounded theory methodology to explore the experiences and concerns of mental health professionals on social networking websites such as Facebook, Twitter, and LinkedIn. The main concern that emerged out of research interviews with 26 mental health professionals was a loss of control over others’ perceptions and the loss of ability to compartmentalize the different parts of identities associated with personal and professional selves. Participants resolved these concerns through the author-identified basic social process of “managing digital identities.” This study highlights practice implications for professionals as they manage online identity.


Author(s):  
Centre for Intellectual Property and Information Technology (CIPIT)

The Centre for Intellectual Property and Information Technology Law (CIPIT) has been studying the impact of digital identities on society.  This has included policy research on the legal and technical aspects of the national digital ID system Huduma Namba under which the Government is integrating all its identification documents. This research shows that the national digital identity system also integrates with privately issued digital identities such as mobile phone numbers and social media accounts.   We anticipate that as national digital ID uses increase, so will the linkage with private systems. This is already evident from e-government services, where payments for Government services, such as passport applications, drivers’ licences, national health insurance and hospital bills in public hospitals are made using mobile money platforms. We also appreciate that private digital ID is more developed and has more uses than national digital ID. For example, a 2019 survey, undertaken by the Central Bank of Kenya (CBK), estimates that access to financial products had risen from 26.7% in 2006 to 89% of the population in 2019. This is attributed partly to the availability of digital products such as “mobile banking, agency banking, digital finance and mobile apps”.  These products make use of personal data, which broadly falls under digital identities. This study seeks to understand the privacy implications of digital ID by looking at digital lending apps.


2021 ◽  
Vol 13 (03) ◽  
pp. 43-59
Author(s):  
Maha Aldosary ◽  
Norah Alqahtani

An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.


Sign in / Sign up

Export Citation Format

Share Document