56 research outputs found

    Securing Refugee Identity: A Literature Review on Blockchain-based Smart Contract

    Full text link
    Identity documentation for refugees is a complex process and crucial for host nations. A secured identity management system ensures both security and the efficient provision of services for the host nation and the donor organizations. Realizing the benefits, a handful of studies enriched the blockchain-based security identification for refugees. The research studies presented the introductory, conceptual, and practical solution related to the blockchain-based smart contract. There is a common agreement in the studies that blockchain-based smart contract not only streamlines refugee identity verification but also safeguards against unauthorized entries. Since it is a technology as well, it has been essential to know the present status of the technology in the social context. In such a situation it becomes essential to review the existing research studies to provide insight for future studies. In this study, we reviewed current studies using a thematic approach. Our findings suggest researchers are more inclined to provide conceptual models as the models are important in advancing technology; however, the models need to be implemented for practical advances. However, the main contribution of this study is that this study gathers current efforts in smart contract-based refugee identity management. This study is important for the refugee host nations as well as for stakeholders. Knowledge gained from the study is expected to provide insight into how the technology can be developed using existing theory and implementation frameworks

    Blockchain-based Micro-credentials: Design, Implementation, Evaluation and Adoption

    Get PDF
    This study examines a blockchain-based micro- credential system implementation with a particular focus on understanding user perceptions. While blockchain technology has become increasingly popular, its applications extend far beyond finance and cryptocurrency. In particular, blockchain enables the generation and management of verifiable digital certificates which possess several system-level advantages when compared to current solutions. Still, does the utilisation of blockchain add value to the issuers and recipients of micro-credentials? Applying a design science approach, we design, implement and evaluate a blockchain-based micro- credential management system within a business school’s executive education unit. Qualitative evaluation reveals that such systems can decrease the overall cost and administrative workload. While issuers perceive the implementation as useful and low risk, the general knowledge regarding blockchain and its advantages, especially in the context of micro- credential management, is insufficient. We discuss this amongst other challenges that must be addressed before widespread adoption of blockchain-based micro-credentials can be achieved

    A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework

    Get PDF
    We present a user-centric and decentralized digital identity system that allows anyone to easily benefit from an enriched digital identity made of multi-purpose and multi-origin attributes. It increases usability by the elimination of user passwords. It also makes this digital identity highly trustworthy both for the user (in terms of privacy and sovereignty) and the service provider who requires highly certified information about the user being enrolled to and/or authenticated on its services. We built our system based on the Universal Authentication Framework specified by the FIDO Alliance and the data model proposed by the W3C Verifiable Credentials WG. The whole system has been implemented in a banking scenario

    Controlling Your Own Story Using a Digital Identity Solution: Creation Of Economic Identity for Financial Inclusion and Protection

    Get PDF
    An economic identity that we take for granted in many developed countries is often elusive for large segments of the population who are at risks or under political oppression. These segments are often physically located in geographical jurisdiction that are politically unstable and are not connected to conventional banking infrastructure and have little means to access or afford financial services that some of us take for granted. Therefore, in this research proposal, we posit that the starting point of activating one’s digital identity and the subsequent creation of an economy identity is the proper management of the elements of their life stories associated with their identity. We are thus interested in exploring the design principles underlying a digital identity solution (DIS) built on a decentralized blockchain that would bestow upon the individual the affordances to curate, manage, and formulate their life stories through the mechanisms of the narrative persuasion theory for an optimal economic identity

    Blockchain Technology for Emergency Response

    Get PDF
    As unforeseen situations, emergencies threaten the environment, property, and people’s lives. Large emergencies are characterized by the demand for coordination of a variety of actors, such as civil defense or disaster relief. Communication and information exchange are crucial for coordination. Therefore, a solid, stable communication infrastructure is among the crucial factors for emergency response. New technologies that seem to ensure trustworthy communication must be evaluated constantly. Blockchain technology is widely applied in a broad variety of contexts and is commonly known for its decentralized and distributed governance. This is the motivation for the design and evaluation of a framework for the adoption of blockchain technology in the case of emergency response following a design science approach. Evaluation of the artifact using a specific evaluation framework clearly indicates the suitability of the case for application of blockchain technology

    The Review of Non-Technical Assumptions in Digital Identity Architectures

    Get PDF
    The literature on digital identity management systems (IdM) is abundant and solutions vary by technology components and non-technical requirements. In the long run, however, there is a need for exchanging identities across domains or even borders, which requires interoperable solutions and flexible architectures. This article aims to give an overview of the current research on digital identity management. We conduct a systematic literature review of digital identity solution architectures and extract their inherent non-technical assumptions. The findings show that solution designs can be based on organizational, business and trust assumptions as well as human-user assumptions. Namely, establishing the trust relationships and collaborations among participating organizations; human-users capability for maintaining private cryptographic material or the assumptions that win-win business models could be easily identified. By reviewing the key findings of solutions proposed and looking at the differences and commonalities of their technical, organizational and social requirements, we discuss their potential real-life inhibitors and identify opportunities for future research in IdM
    corecore