Sovereignty, privacy, and ethics in blockchain-based identity management systems

Ethics and Information Technology 23 (3):239-252 (2020)
  Copy   BIBTEX

Abstract

Self-sovereign identity solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also argued that while it might be appealing to operationalise the concept of ‘self-sovereignty’ in a narrow technical sense, depreciation of moral semantics obscures key challenges and long-term repercussions. Closer attention to the normative substance of the ‘sovereignty’ concept helps to highlight a range of ethical issues pertaining to the changing nature of human identity in the context of ubiquitous private data collection.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Practical versus moral identities in identity management.Noëmi Manders-Huits - 2010 - Ethics and Information Technology 12 (1):43-55.
Towards a better citizen identification system.Piotr Cofta - 2008 - Identity in the Information Society 1 (1):39-53.
Editorial.Noëmi Manders-Huits - 2010 - Ethics and Information Technology 12 (1):1-2.
Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
Towards inclusive identity management.Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim - 2010 - Identity in the Information Society 3 (3):515-538.
National Identity, Constitutional Identity, and Sovereignty in the EU.Eike Cloots - 2016 - Netherlands Journal of Legal Philosophy 45 (2):82-98.
A persistent data tracking mechanism for user-centric identity governance.Hidehito Gomi - 2010 - Identity in the Information Society 3 (3):639-656.

Analytics

Added to PP
2020-12-01

Downloads
52 (#300,476)

6 months
22 (#119,049)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Georgy Ishmaev
Delft University of Technology

References found in this work

Two Treatises of Government and a Letter Concerning Toleration.John Locke & Ian Shapiro - 2003 - Yale University Press. Edited by Ian Shapiro.
Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
Rethinking Trust in the Internet of Things.Georgy Ishmaev - 2018 - In R. Leenes, R. Van Brakel, S. Gutwirth & P. De Hert (eds.), Data Protection and Privacy: The Internet of Bodies. Oxford ; Portland, Oregon: pp. 203-230.
Practical versus moral identities in identity management.Noëmi Manders-Huits - 2010 - Ethics and Information Technology 12 (1):43-55.

View all 7 references / Add more references