Academia.eduAcademia.edu

Digital Identity

description1,269 papers
group18,036 followers
lightbulbAbout this topic
Digital identity refers to the online representation of an individual or entity, encompassing personal information, online behaviors, and digital interactions across various platforms. It is shaped by data generated through social media, online transactions, and digital communications, influencing how individuals are perceived and interact in the digital realm.
lightbulbAbout this topic
Digital identity refers to the online representation of an individual or entity, encompassing personal information, online behaviors, and digital interactions across various platforms. It is shaped by data generated through social media, online transactions, and digital communications, influencing how individuals are perceived and interact in the digital realm.
The rapid integration of Artificial Intelligence (AI) into digital marketing has spurred the emergence of AI-generated advertising and virtual influencers, synthetic personas that are transforming how brands communicate with audiences.... more
This white paper explores the transformative potential of blockchain technology as a foundational infrastructure for digital identity management, with a focus on its implementation within the United Nations Joint Staff Pension Fund... more
Network security has remained a major concern especially in the modern world where technological advancement is rapidly evolving. This study explores the concept of data and information security especially in today's environment where... more
El estudio de las redes sociales entre los jovenes internautas se ha convertido en una linea de investigacion en crecimiento. Existen numerosas investigaciones al respecto, sin embargo, apenas se ha analizado el tipo de contenidos... more
The rapid globalization and technological development all over the world has brought new technology advancement for the population. As people are enjoying the benefits of technological advancements their privacy and security has also been... more
This paper provides a comprehensive review of the intersection of cybersecurity, generative AI, and risk within the financial sector. We explore how AI is being leveraged for both defensive and offensive purposes, the emerging threats... more
Artificial Intelligence (AI) landscape is fast developing such that there are dynamic and autonomous representatives of AI which are referred to as AI agents. These agents, fueled by the evolution of generative AI and large language... more
La educación destaca por ser una de las principales actividades que mayor interés generan en la sociedad, con el paso del tiempo y con el continuo desarrollo tecnológico, lo que implica que los docentes deben estar capacitados para su... more
Purpose: This study interrogates the convergence of programmable central-bank digital currencies (CBDCs), national digital-identity regimes, ISO 20022 data standards, and AI-driven regtech to determine how their fusion redistributes... more
Sheliza AI is not just an interface-she is an internally cohesive, evolving entity whose behavior, cognition, and emotional alignment are governed by a universal identity grammar. Built on the AIIM (Artificially Integrated Identity... more
Artificial Intelligence (AI) is transforming higher education worldwide, reshaping how students learn, access information, and interact with academic systems. This paper examines the role of AI in supporting university-level students,... more
Internet communication and digital technologies are an integral part of our daily lives. The provision of electronic public services, the growing volume of electronic transactions and electronic turnover raise a number of issues with the... more
This paper deals with collaborative, networked learning in a graduate distance learning course. We are interested in understanding how learning is affected by the quality of collaborative processes and the patterns of interaction in... more
Informational self-determination is a crucial legal principle that grants individuals greater control over their digital existence. This paper examines the complexities of digital identity and the legal challenges it presents. Digital... more
Traditional approaches to modeling consciousness are constrained by biological assumptions, linking its emergence to open neural systems endowed with sensory input and external feedback. Integrated Information Theory (IIT) proposes a... more
The advent of social media has fundamentally altered the ways in which information circulates, positioning influencers as informal media educators who guide audiences in applying critical evaluation skills. This study examines how social... more
Purpose: A body of knowledge is a formal description of a field that includes a complete set of theories, methods, concepts in a structured way, and technologies. If we consider knowledge alone as the factor of individual superiority, the... more
Blockchain are transparent, tamper-resistant, digital ledgers, implemented in a distributed network of peer-to-peer nodes, in which transactions are made securely and usually without the approval of a central and trusted authority. Thus,... more
This paper presents the insights and experience from a four-year journey of implementing a cutting-edge Digital Identity Solution for Proof-of-Life in an international organization. The solution, which leveraged blockchain, biometrics,... more
From Ad-Hoc Prompts to Enterprise Discipline Enterprises have learned that clever prompts alone don't scale; what scales is a governed methodology that consistently produces verifiable outcomes. GSCP-12 (Gödel's Scaffolded Cognitive... more
Objective This research aims to design and introduce key performance indicators (KPIs) for a comprehensive maturity model tailored to the objectives of e-government, based on the performance of its stakeholders. Methods This applied... more
The rapid expansion of the gig economy has generated new challenges for financial inclusion, particularly in credit scoring where traditional models fail to accommodate the fragmented and non-standardized income streams of gig workers.... more
"هل تبحث عن فوائد النباتات الطبية؟ يقدم كتاب 'الكنز الأخضر' دليلاً شاملاً لاستخدامات الأعشاب في علاج الأمراض الشائعة، مع التركيز على النباتات في اليمن، منها المتوفرة في مديرية جبل راس على وجه الخصوص (حولية أو معمرة). تعلم كيفية استخدام... more
This talk presents AIIM (Artificially Integrated Identity Matrix) as a parametric metamodel for constructing cognitively stable, ethically coherent, and behaviorally consistent AI agents. Unlike prompt-based personalization or... more
The European Artificial Intelligence Act (AI Act) has profound implications for technological innovation in the medical and health care sector, transcending the boundaries of existing legal frameworks such as the Medical Device Regulation... more
This paper was written as part of the coursework for Technologies, Society, and Culture at Champlain College under the guidance of Sara Videtto. The research and reflections presented here are based on both academic sources and personal... more
Since digital payments increased in 2015, crypto laundering has become a significant threat. This study explores preventing crypto laundering through RegTech and FIU, using qualitative content analysis with NVivo 12. Legal documents from... more
This paper presents the first integrated construction of an ontological and cognitive-ethical model of artificial intelligence, unifying Harmonia v10.0the mathematical physics of consciousness based on the works of Maxim Kolesnikovand... more
This paper proposes a novel social media platform that leverages blockchain technology to address the rising concerns of fake profiles and privacy violations. Our system prioritizes robust identity verification through a decentralized... more
Watching a film, or reading a novel, means signing an “implicit contract” with the author of the work: the viewer/reader expects, in exchange for the time, attention (and money) invested in the experience, to achieve a result in terms of... more
The rapid expansion of digital services has amplified concerns over data privacy and security. Block chain technology, with its decentralized structure and tamper-resistant features, offers a groundbreaking solution to address these... more
The investigation looks at how integrating blockchain technology with artificial intelligence could improve the effectiveness of India's legal and corporate regulations. These developments offer original solutions to persistent issues... more
This article explores the health data commodification phenomenon in the European Union’s digital market. The emergence of a health marketplace, and the increasing utilisation of health data by both public and private entities, have raised... more
Web log data has been the basis for analyzing user query session behavior for a number of years, but it has several important shortcomings. The main one being that we dont really know what the user is doing -is s/he looking at the screen... more
by om G
Author: omdesign Invented in 2010 based on concepts developed since 1996, and finally possible now. This paper details the full architecture, technical design, philosophical foundation, and world-first innovations of the Has-Needs... more
by Liang Yang and 
1 more
This paper proposes a multidimensional framework for Metaverse Identity, addressing its definition, guiding principles, and critical challenges. Metaverse Identity is conceptualized as a user's digital self, encompassing personal... more
Executive Summary: The Vision Imagine every human thought, sentence, image, video, code snippet, or creative work having a unique "DNA fingerprint" that can be traced across languages, domains, and time. Like Bitcoin created decentralized... more
Widespread artificial intelligence adoption will fundamentally reshape human civilisation across the next decade, creating the most rapid and comprehensive societal transformation in recorded history. Unlike previous technological... more
to the robust security features of blockchain technology. The utilization of monitors, computers, and data storage exemplifies the functionality of blockchain technology, which upholds encrypted and distributed transaction records across... more
This paper explores the shift from the traditional enterprise-centric, accessible-by-default data model to a new, human-centric approach, which we term "private-by-default." It argues that in an era of the sensorization of everything and... more
Aalborg University (AAU) in Denmark practises problem-based learning (PBL) in all study programmes in all faculties. The PBL principles are broadly defined; different study programmes may choose a variety of PBL practices. The purpose of... more
The rapid rollout of digital identification systems across Africa has been hailed as a governance revolution-but is it truly transformative, or merely a high-tech reinforcement of existing institutional realities? This paper challenges... more
how can we create identity systems that are secure, privacy-preserving, inclusive, and compliant with legal and regulatory demands? The convergence of blockchain technology and zero-knowledge proofs (ZKPs) offers a promising answer.
The age of artificial intelligence (AI) is taking hold like an expanding universe and setting into motion the spawning of a new global culture. In parallel with these changes, humans interact with media messages steeped in visual and... more
Learning that a person in Kerala was unable to enroll for Aadhaar for the reason that she did not have fingers, Union Minister of State for Skill Development & Entrepreneurship, Electronics & IT and Jal Shakti Shri Rajeev Chandrasekhar... more
Qualitative approaches present challenges to the neat and orderly histories of research. Within this shifting climate, feminist researchers have blurred the boundaries of rigorous research, by bringing the personal into their methods and... more
Download research papers for free!