Abstract

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity research should focus on practically and usability by using the design science paradigm. By considering the organizational challenges in implementing a decentralized identity management system, decentralized identity technologies will improve and become more widely adopted, making the internet more secure for individuals and organizations.

Faculty Advisor/Mentor

Michael Lapke

Document Type

Paper

Disciplines

Computer and Systems Architecture | Computer Sciences | Databases and Information Systems | Data Storage Systems | Digital Communications and Networking | Information Security | OS and Networks | Science and Technology Studies | Software Engineering | Systems Architecture

DOI

10.25777/pzec-6e97

Publication Date

4-19-2024

Upload File

wf_yes

Share

COinS
 

A Design Science Approach to Investigating Decentralized Identity Technology

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity research should focus on practically and usability by using the design science paradigm. By considering the organizational challenges in implementing a decentralized identity management system, decentralized identity technologies will improve and become more widely adopted, making the internet more secure for individuals and organizations.