Information used by computer systems to represent an external agent
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
This article may be too technical for most readers to understand. Please help improve it to make it understandable to non-experts, without removing the technical details.(December 2009) (Learn how and when to remove this message)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Digital identity" – news · newspapers · books · scholar · JSTOR(September 2013) (Learn how and when to remove this message)
This article may be confusing or unclear to readers. Please help clarify the article. There might be a discussion about this on the talk page.(November 2017) (Learn how and when to remove this message)
This article's tone or style may not reflect the encyclopedic tone used on Wikipedia. See Wikipedia's guide to writing better articles for suggestions.(November 2017) (Learn how and when to remove this message)
(Learn how and when to remove this message)
A digital identity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves the collection of personal data that is essential for facilitating automated access to digital services, confirming one's identity on the internet, and allowing digital systems to manage interactions between different parties. It is a component of a person's social identity in the digital realm, often referred to as their online identity.
Digital identities are composed from the full range of data produced by a person's activities on the internet, which may include usernames and passwords, search histories, dates of birth, social security numbers, and records of online purchases. When such personal information is accessible in the public domain, it can be used by others to piece together a person's offline identity. Furthermore, this information can be compiled to construct a "data double"—a comprehensive profile created from a person's scattered digital footprints across various platforms. These profiles are instrumental in enabling personalized experiences on the internet and within different digital services.[1][2]
Should the exchange of personal data for online content and services become a practice of the past, an alternative transactional model must emerge. As the internet becomes more attuned to privacy concerns, media publishers, application developers, and online retailers are re-evaluating their strategies, sometimes reinventing their business models completely. Increasingly, the trend is shifting towards monetizing online offerings directly, with users being asked to pay for access through subscriptions and other forms of payment, moving away from the reliance on collecting personal data.[3]
Navigating the legal and societal implications of digital identity is intricate and fraught with challenges. Misrepresenting one's legal identity in the digital realm can pose numerous threats to a society increasingly reliant on digital interactions, opening doors for various illicit activities. Criminals, fraudsters, and terrorists could exploit these vulnerabilities to perpetrate crimes that can affect the virtual domain, the physical world, or both.[4]
^Jones, Kyle M. L. (May 1, 2018). "What is a data double?". Data Doubles. Retrieved May 3, 2023.
^Haggerty, Kevin D.; Ericson, Richard V. (December 2000). "The surveillant assemblage" (PDF). British Journal of Sociology. 51 (4): 606–618. doi:10.1080/00071310020015280. PMID 11140886. S2CID 3913561.
^"The battle for digital privacy Is reshaping the internet". www.bizjournals.com. Retrieved May 10, 2023.
^Blue, Juanita; Condell, Joan; Lunney, Tom. "A Review of Identity, Identification and Authentication" (PDF). International Journal for Information Security Research. 8 (2): 794–804.
A digitalidentity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves the...
IdentityDigital Inc. is a company with affiliated entities that operate in the domain name industry, including a domain name registrar and registry services...
Digitalidentity is used in Australia by residents to validate who they are over digital media, such as over the Internet. While many organisations use...
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity...
protection (e.g., network protocols, digital certificates, passwords, etc.). Identity management (ID management) – or identity and access management (IAM) –...
System and Internet Identifier Specifications arXiv Bibcode DataCite Digitalidentity Metadata standard Object identifier ORCID PMID Publisher Item Identifier...
An identity document (also called ID or colloquially as papers) is any document that may be used to prove a person's identity. If issued in a small, standard...
up identity in Wiktionary, the free dictionary. Identity may refer to: Identity document Identity (philosophy) Identity (social science) Identity (mathematics)...
to electronic transactions: Digitalidentity: a European-wide framework (European DigitalIdentity Wallet, EDIW) for digital authentication of citizens...
implementing, or have proposed nationwide digitalidentity systems. Although many facets of digitalidentity are universal owing in part to the ubiquity...
Organizational digitalidentity is a collectively shared digitalidentity prototype in organizations, consisting of fondness towards digital technology and...
Architecture," which refers to an interoperable architecture for digitalidentity. Ping Identity Corporation is a software company established in 2002 by Andre...
and territory issued identity photo cards Australian driving licence Australia Post Keypass identity card Australia Post Digital iD For visitors to Australia:...
footprints are not a digitalidentity or passport, but the content and metadata collected impacts internet privacy, trust, security, digital reputation, and...
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying...
ID-card can also be used for establishing one's identity in electronic environment and for giving one's digital signature. Within Europe (except Belarus, Russia...
federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management...
terminology of the NIST DigitalIdentity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant...
An authenticator is a means used to confirm a user's identity, that is, to perform digital authentication. A person authenticates to a computer system...
and their devices with digital transformation and application modernization initiatives. Security is based on digitalidentity, real-time context, and...
A service account or application account is a digitalidentity used by an application software or service to interact with other applications or the operating...
Internet identity (IID), also online identity, online personality, online persona or internet persona, is a social identity that an Internet user establishes...
identity or corporate image is the manner in which a corporation, firm or business enterprise presents itself to the public. The corporate identity is...
place by NIDP digital identification number. It serves as a unique proof of identity for an individual based on the “one person, one identity” principle...
October 2018, the Australian Digital Transformation Agency criticised an ASPI report on the Australian Government's digitalidentity program. The Agency stated...