Abstract
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity research should focus on practically and usability by using the design science paradigm. By considering the organizational challenges in implementing a decentralized identity management system, decentralized identity technologies will improve and become more widely adopted, making the internet more secure for individuals and organizations.
Faculty Advisor/Mentor
Michael Lapke
Document Type
Paper
Disciplines
Computer and Systems Architecture | Computer Sciences | Databases and Information Systems | Data Storage Systems | Digital Communications and Networking | Information Security | OS and Networks | Science and Technology Studies | Software Engineering | Systems Architecture
DOI
10.25777/pzec-6e97
Publication Date
4-19-2024
Upload File
wf_yes
Included in
Computer and Systems Architecture Commons, Databases and Information Systems Commons, Data Storage Systems Commons, Digital Communications and Networking Commons, Information Security Commons, OS and Networks Commons, Science and Technology Studies Commons, Software Engineering Commons, Systems Architecture Commons
A Design Science Approach to Investigating Decentralized Identity Technology
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity research should focus on practically and usability by using the design science paradigm. By considering the organizational challenges in implementing a decentralized identity management system, decentralized identity technologies will improve and become more widely adopted, making the internet more secure for individuals and organizations.