{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:15:29Z","timestamp":1726762529431},"reference-count":105,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"vor","delay-in-days":3,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s12599-021-00722-y","type":"journal-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T02:50:56Z","timestamp":1633402256000},"page":"603-613","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":71,"title":["Digital Identities and Verifiable Credentials"],"prefix":"10.1007","volume":"63","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2631-8749","authenticated-orcid":false,"given":"Johannes","family":"Sedlmeir","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6191-475X","authenticated-orcid":false,"given":"Reilly","family":"Smethurst","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7996-4678","authenticated-orcid":false,"given":"Alexander","family":"Rieger","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7037-4807","authenticated-orcid":false,"given":"Gilbert","family":"Fridgen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,4]]},"reference":[{"key":"722_CR2","unstructured":"Aiello C (2018) What data scandal? Facebook\u2019s stock notches an all time high, shrugging off user privacy woes. https:\/\/www.cnbc.com\/2018\/07\/06\/facebook-hits-all-time-high-marking-full-recovery-from-data-scandal.html, Accessed 25 May 2021"},{"key":"722_CR3","unstructured":"Alamillo-Domingo I (2020) SSI eIDAS legal report: how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the digital single market. https:\/\/joinup.ec.europa.eu\/collection\/ssi-eidas-bridge\/document\/ssi-eidas-legal-report, Accessed 25 May 2021"},{"key":"722_CR4","unstructured":"Allen C (2016) The path to self-sovereign identity. http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html, Accessed 25 May 2021"},{"key":"722_CR5","unstructured":"Andrade-Walz A (2019) Evernym founded. https:\/\/www.evernym.com\/blog\/timeline\/timeline\/, Accessed 25 May 2021"},{"key":"722_CR6","doi-asserted-by":"crossref","unstructured":"Backes M, Camenisch J, Sommer D (2005) Anonymous yet accountable access control. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society, Association for Computing Machinery, New York, pp. 40\u201346","DOI":"10.1145\/1102199.1102208"},{"issue":"4","key":"722_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10550-006-0004-2","volume":"23","author":"K Bosworth","year":"2005","unstructured":"Bosworth K, Lee MG, Jaweed S, Wright T (2005) Entities, identities, identifiers and credentials \u2013 what does it all mean? BT Technol J 23(4):25\u201336","journal-title":"BT Technol J"},{"key":"722_CR8","unstructured":"Bouma T, Doerk A (2020) Self-sovereign identity. https:\/\/medium.com\/@trbouma\/self-sovereign-identity-interview-with-tim-bouma-ca193f66f2bb, Accessed 25 May 2021"},{"key":"722_CR9","volume-title":"Self-sovereign identity: decentralized digital identity and verifiable credentials","author":"T Bouma","year":"2021","unstructured":"Bouma T, Robert D (2021) Canada: Enabling self-sovereign identity. In: Preukschat A, Reed D (eds) Self-sovereign identity: decentralized digital identity and verifiable credentials. Manning, New York"},{"key":"722_CR10","unstructured":"Bryant A (2006) Thinking informatically: a new understanding of information, communication, and technology. Edwin Mellen, Lewiston"},{"key":"722_CR11","unstructured":"Business Insider (2021) Apple is finding more ways to keep you glued to the iPhone with iOS 15. https:\/\/www.businessinsider.com\/apple-ios-15-apple-wallet-features-harder-to-leave-iphone-2021-6, Accessed 25 May 2021"},{"key":"722_CR12","unstructured":"Cameron K (2005) The laws of identity. https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf, Accessed 25 May 2021"},{"key":"722_CR13","unstructured":"Cameron K (2018) Let\u2019s find a more accurate term than self-sovereign identity. https:\/\/www.identityblog.com\/?p=1693, Accessed 25 May 2021"},{"key":"722_CR14","unstructured":"Chadwick DW (2020) Why I do NOT need DIDs or a DLT for VCs and SSI. https:\/\/verifiablecredentials.info\/contact-us, Accessed 25 May 2021"},{"key":"722_CR15","unstructured":"Champion M (2016) Re: Support for verifiable claims. https:\/\/lists.w3.org\/Archives\/Public\/public-webpayments-comments\/2016Nov\/0022.html, Accessed 25 May 2021"},{"issue":"10","key":"722_CR16","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28(10):1030\u20131044","journal-title":"Commun ACM"},{"key":"722_CR17","doi-asserted-by":"crossref","unstructured":"Checkland P, Poulter J (2020) Soft systems methodology. In: Systems approaches to making change: A practical guide, Springer, pp. 201\u2013253","DOI":"10.1007\/978-1-4471-7472-1_5"},{"key":"722_CR18","doi-asserted-by":"crossref","unstructured":"Cheesman M (2020) Self-sovereignty for refugees? The contested horizons of digital identity. Geopolitics pp. 1\u201326","DOI":"10.1080\/14650045.2020.1823836"},{"key":"722_CR19","unstructured":"Christopher N (2018) Security experts say need to secure Aadhaar ecosystem, warn about third party leaks. https:\/\/economictimes.indiatimes.com\/news\/politics-and-nation\/there-is-a-need-to-secure-full-aadhaar-ecosystem-experts\/articleshow\/63459367.cms, Accessed 25 May 2021"},{"key":"722_CR20","unstructured":"Clark J, Vyjayanti V, Cooper A, Marskell J, Mittal A, Neumann J, Satola D, van\u00a0der Veen M (2019) ID4D practitioner\u2019s guide: Version 1.0. http:\/\/documents1.worldbank.org\/curated\/en\/248371559325561562\/pdf\/ID4D-Practitioner-s-Guide.pdf, Accessed 25 May 2021"},{"issue":"2","key":"722_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"S Clau\u00df","year":"2001","unstructured":"Clau\u00df S, K\u00f6hntopp M (2001) Identity management and its support of multilateral security. Comput Netw 37(2):205\u2013219","journal-title":"Comput Netw"},{"key":"722_CR22","unstructured":"Cowley S (2019) Equifax to pay at least \\$650 million in largest-ever data breach settlement. https:\/\/www.nytimes.com\/2019\/07\/22\/business\/equifax-settlement.html, Accessed 25 May 2021"},{"key":"722_CR23","volume-title":"The sovereign individual: how to survive and thrive during the collapse of the welfare state","author":"JD Davidson","year":"1997","unstructured":"Davidson JD, Rees-Mogg W (1997) The sovereign individual: how to survive and thrive during the collapse of the welfare state. Simon & Schuster, New York"},{"issue":"2","key":"722_CR24","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1080\/15252019.2015.1082450","volume":"15","author":"F De Keyzer","year":"2015","unstructured":"De Keyzer F, Dens N, De Pelsmacker P (2015) Is this for me? How consumers respond to personalized advertising on social network sites. J Interact Advert 15(2):124\u2013134","journal-title":"J Interact Advert"},{"issue":"2","key":"722_CR25","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1057\/s41265-016-0033-3","volume":"33","author":"M De Reuver","year":"2018","unstructured":"De Reuver M, S\u00f8rensen C, Basole RC (2018) The digital platform: a research agenda. J Inf Technol 33(2):124\u2013135","journal-title":"J Inf Technol"},{"issue":"2","key":"722_CR26","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s12599-019-00624-0","volume":"62","author":"M Dietz","year":"2020","unstructured":"Dietz M, Pernul G (2020) Digital twin: empowering enterprises towards a system-of-systems approach. Bus Inf Syst Eng 62(2):179\u2013184","journal-title":"Bus Inf Syst Eng"},{"key":"722_CR27","unstructured":"Dizme et al (2020) Position statement toward EBSI. https:\/\/lissi.id\/about, Accessed 25 May 2021"},{"key":"722_CR28","doi-asserted-by":"crossref","unstructured":"Ehrlich T, Richter D, Meisel M, Anke J (2021) Self-sovereign Identity als Grundlage f\u00fcr universell einsetzbare digitale Identit\u00e4ten. HMD Praxis der Wirtschaftsinformatik pp. 1\u201324","DOI":"10.1365\/s40702-021-00711-5"},{"key":"722_CR29","unstructured":"European Commission (2020) European blockchain service infrastructure, explained. https:\/\/ec.europa.eu\/cefdigital\/wiki\/download\/attachments\/326108260\/Final.%2820201204%29%28EBSI_European_Blockchain_Convention_Master_Class%29%28v1.01%29.pdf?version=1&modificationDate=1608291889774&api=v2, Accessed 25 May 2021"},{"key":"722_CR30","unstructured":"European Commission (2021a) Commission proposes a trusted and secure digital identity for all Europeans. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/IP_21_2663, Accessed 25 May 2021"},{"key":"722_CR31","unstructured":"European Commission (2021b) COVID-19: Digital green certificates. https:\/\/ec.europa.eu\/info\/live-work-travel-eu\/coronavirus-response\/safe-covid-19-vaccines-europeans\/covid-19-digital-green-certificates_en, Accessed 25 May 2021"},{"key":"722_CR32","unstructured":"Federal German Government (2021) New pilot project launched. https:\/\/www.bundesregierung.de\/breg-en\/news\/digital-identities-1916352, Accessed 25 May 2021"},{"key":"722_CR33","unstructured":"Federal Office for Migration and Refugees (2021) Digitization of certification processes in the asylum procedure by means of digital identities. https:\/\/www.bamf.de\/SharedDocs\/Anlagen\/EN\/Digitalisierung\/blockchain-whitepaper-2021.html?nn=282388, Accessed 25 May 2021"},{"key":"722_CR34","doi-asserted-by":"crossref","unstructured":"Fedrecheski G, Rabaey JM, Costa LCP, Calcina\u00a0Ccori PC, Pereira WT, Zuffo MK (2020) Self-sovereign identity for IoT environments: a perspective. In: Global internet of things summit, IEEE","DOI":"10.1109\/GIOTS49054.2020.9119664"},{"key":"722_CR35","first-page":"133","volume-title":"Part five: right of death and power over life, the history of sexuality","author":"M Foucault","year":"1978","unstructured":"Foucault M (1978) Part five: right of death and power over life, the history of sexuality, vol 1. Pantheon, New York, pp 133\u2013159"},{"key":"722_CR36","unstructured":"Fridgen G, Guggenmos F, Lockl J, Rieger A (2018) Challenges and opportunities of blockchain-based platformization of digital identities in the public sector. In: 26th European conference on information systems"},{"key":"722_CR37","unstructured":"Fry E, Renieris E (2020) SSI? what we really need is full data portability. https:\/\/womeninidentity.org\/2020\/03\/31\/data-portability\/, Accessed 25 May 2021"},{"key":"722_CR38","unstructured":"Ganesh M (2018) Data and discrimination: Fintech, biometrics and identity in India. https:\/\/thesocietypages.org\/cyborgology\/2018\/01\/25\/fintech-aadhaar-and-identity-in-india, Accessed 25 May 2021"},{"key":"722_CR39","unstructured":"Gasteiger D (2021) Building a digital society that inspires! Procivis AG (unpublished PDF file)"},{"key":"722_CR40","unstructured":"Ghent University (2020) EBSI social assessment report. https:\/\/ec.europa.eu\/cefdigital\/wiki\/download\/attachments\/262505908\/EBSI_Social_assessment_report.pdf?api=v2, Accessed 25 May 2021"},{"key":"722_CR41","doi-asserted-by":"crossref","unstructured":"Giannopoulou A, Wang F (2021) Self-sovereign identity. Internet Polic Rev 10(2)","DOI":"10.14763\/2021.2.1550"},{"key":"722_CR42","unstructured":"Graglia M, Mellon C, Robustelli T (2018) The nail finds a hammer: self-sovereign identity, design principles, and property rights in the developing world. https:\/\/www.newamerica.org\/future-property-rights\/reports\/nail-finds-hammer, Accessed 25 May 2021"},{"key":"722_CR43","unstructured":"Haas R (2016) Ryan bundy declares himself an \u2018idiot\u2018 not subject to US courts. https:\/\/www.opb.org\/news\/series\/burns-oregon-standoff-bundy-militia-news-updates\/ryan-bundy-incompetent-subject-federal-law\/, Accessed 25 May 2021"},{"key":"722_CR44","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-030-64357-7_7","volume-title":"Security standardisation research: 6th international conference","author":"H Halpin","year":"2020","unstructured":"Halpin H (2020) Vision: a critique of immunity passports and W3C decentralized identifiers. In: van der Merwe T, Mitchell C, Mehrnezhad M (eds) Security standardisation research: 6th international conference. Lecture Notes in Computer Science, Springer, Heidelberg, pp 148\u2013168"},{"key":"722_CR45","unstructured":"Hardman D (2019) Categorizing verifiable credentials. https:\/\/www.evernym.com\/blog\/categorizing-verifiable-credentials\/, Accessed 25 May 2021"},{"key":"722_CR46","doi-asserted-by":"crossref","unstructured":"Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the 2009 workshop on new security paradigms, pp. 133\u2013144","DOI":"10.1145\/1719030.1719050"},{"key":"722_CR47","doi-asserted-by":"crossref","unstructured":"Ishmaev G (2020) Sovereignty, privacy, and ethics in blockchain-based identity management systems. Ethics and Information Technology","DOI":"10.1007\/s10676-020-09563-x"},{"key":"722_CR48","unstructured":"Jain S (2015) Man arrested for getting Aadhaar card for dog. https:\/\/www.hindustantimes.com\/india\/man-arrested-for-getting-aadhaar-card-for-dog\/story-MVtobqWtsrLXm01OkCBSvK.html, Accessed 25 May 2021"},{"key":"722_CR49","unstructured":"Jordan J (2018) Digital trust: How the OrgBook enables the digital economy. https:\/\/bc-von.s3.amazonaws.com\/2018-06-VON-Webinar-for-Sovrin-Indy-Community.mp4, Accessed 25 May 2021"},{"key":"722_CR50","volume-title":"Dissent on Aadhaar: Big data meets big brother","year":"2018","unstructured":"Khera R (ed) (2018) Dissent on Aadhaar: Big data meets big brother. Orient BlackSwan, Hyderabad"},{"key":"722_CR51","unstructured":"Klarl H, Wolff C, Emig C (2009) Identity management in business process modelling: a model-driven approach. https:\/\/epub.uni-regensburg.de\/8847\/1\/klarl2009_Identity_Management_in_Business_Process_Modelling.pdf, Accessed 25 May 2021"},{"key":"722_CR52","unstructured":"Kubach M, Schunck CH, Sellung R, Ro\u00dfnagel H (2020) Self-sovereign and decentralized identity as the future of identity management? In: Open identity summit 2020, Gesellschaft f\u00fcr Informatik eV"},{"issue":"4","key":"722_CR53","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TEM.2019.2926471","volume":"67","author":"M Kuperberg","year":"2020","unstructured":"Kuperberg M (2020) Blockchain-based identity management: a survey from the enterprise and ecosystem perspective. IEEE Transact Eng Manag 67(4):1008\u20131027","journal-title":"IEEE Transact Eng Manag"},{"key":"722_CR54","doi-asserted-by":"publisher","first-page":"357","DOI":"10.2307\/25148735","volume":"30","author":"D Leidner","year":"2006","unstructured":"Leidner D, Kayworth T (2006) A review of culture in information systems research: toward a theory of information technology culture conflict. MIS Q 30:357\u2013399","journal-title":"MIS Q"},{"key":"722_CR55","unstructured":"Linux Foundation (2020) Cross-industry coalition advances digital trust standards. https:\/\/www.linuxfoundation.org\/press-release\/2020\/05\/cross-industry-coalition-advances-digital-trust-standards, Accessed 25 May 2021"},{"issue":"1","key":"722_CR56","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s10207-005-0077-9","volume":"5","author":"A Lioy","year":"2006","unstructured":"Lioy A, Marian M, Moltchanova N, Pala M (2006) PKI past, present and future. Int J Inf Secur 5(1):18\u201329","journal-title":"Int J Inf Secur"},{"key":"722_CR57","unstructured":"Lundy L (2019) No such thing as decentralised governance. https:\/\/outlierventures.io\/research\/the-crypto-trias-politica\/, Accessed 25 May 2021"},{"key":"722_CR58","unstructured":"Lyons T, Courcelas L, Timsit K (2019) Blockchain and digital identity. https:\/\/www.eublockchainforum.eu\/sites\/default\/files\/report_identity_v0.9.4.pdf, Accessed 25 May 2021"},{"key":"722_CR59","unstructured":"MacNab JJ (2012) What is a sovereign citizen? https:\/\/www.forbes.com\/sites\/jjmacnab\/2012\/02\/13\/what-is-a-sovereign-citizen\/#dca32716012e, Accessed 25 May 2021"},{"issue":"2","key":"722_CR60","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E Maler","year":"2008","unstructured":"Maler E, Reed D (2008) The venn of identity: options and issues in federated identity management. IEEE Secur Priv 6(2):16\u201323","journal-title":"IEEE Secur Priv"},{"key":"722_CR61","unstructured":"McKinnon JD (2018) FTC probing facebook over data use by Cambridge Analytica. https:\/\/www.wsj.com\/articles\/ftc-probing-facebook-over-data-use-by-cambridge-analytica-1521561803, Accessed 25 May 2021"},{"issue":"3","key":"722_CR62","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1080\/0960085X.2020.1755207","volume":"29","author":"J Mendling","year":"2020","unstructured":"Mendling J, Pentland BT, Recker J (2020) Building a complementary agenda for business process management and digital innovation. Europ J Inf Syst 29(3):208\u2013219","journal-title":"Europ J Inf Syst"},{"key":"722_CR63","unstructured":"Meyer R (2018) The Cambridge Analytica scandal, in three paragraphs. https:\/\/www.theatlantic.com\/technology\/archive\/2018\/03\/the-cambridge-analytica-scandal-in-three-paragraphs\/556046"},{"key":"722_CR64","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle A, Gr\u00fcner A, Gayvoronskaya T, Meinel C (2018) A survey on essential components of a self-sovereign identity. Comput Sci Rev 30:80\u201386","journal-title":"Comput Sci Rev"},{"issue":"32","key":"722_CR65","first-page":"17","volume":"47","author":"PK Nayar","year":"2012","unstructured":"Nayar PK (2012) i sing the body biometric: surveillance and biological citizenship. Econ Politic Wkly 47(32):17\u201322","journal-title":"Econ Politic Wkly"},{"issue":"3","key":"722_CR66","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer M, Gomber P, Hinz O, Schiereck D (2017) Blockchain. Bus Inf Syst Eng 59(3):183\u2013187","journal-title":"Bus Inf Syst Eng"},{"issue":"5","key":"722_CR67","first-page":"21","volume":"26","author":"M Novakouski","year":"2013","unstructured":"Novakouski M (2013) User-centric identity management: a future vision for IdM. CrossTalk J Def Softw Eng 26(5):21\u201326","journal-title":"CrossTalk J Def Softw Eng"},{"key":"722_CR68","unstructured":"Oath (2017) Yahoo provides notice to additional users affected by previously disclosed 2013 data theft. https:\/\/www.verizonmedia.com\/press\/yahoo-provides-notice-to-additional-users-affected-by-previously, Accessed 25 May 2021"},{"key":"722_CR69","unstructured":"O\u2019Connell M (2018) Why Silicon Valley billionaires are prepping for the apocalypse in New Zealand. https:\/\/www.theguardian.com\/news\/2018\/feb\/15\/why-silicon-valley-billionaires-are-prepping-for-the-apocalypse-in-new-zealand, Accessed 25 May 2021"},{"key":"722_CR70","doi-asserted-by":"crossref","unstructured":"O\u2018Hara K (2018) Privacy: essentially contested, a family resemblance concept, or a family of conceptions? https:\/\/www.ssrn.com\/abstract=3262405, Accessed 25 May 2021","DOI":"10.2139\/ssrn.3262405"},{"key":"722_CR71","unstructured":"Pahwa N, V A (2017) You can\u2019t make citizens safer by making them more vulnerable: aadhaar does exactly that. https:\/\/economictimes.indiatimes.com\/blogs\/et-commentary\/you-cant-make-citizens-safer-by-making-them-more-vulnerable-aadhaar-does-exactly-that, Accessed 25 May 2021"},{"key":"722_CR72","unstructured":"Pandya J (2019) Nuances of Aadhaar: India\u2019s digital identity, identification system and ID. https:\/\/www.forbes.com\/sites\/cognitiveworld\/2019\/07\/16\/nuances-of-aadhaar-indias-digital-identity-identification-system-and-id\/#37dd18b6209d, Accessed 25 May 2021"},{"issue":"2","key":"722_CR73","doi-asserted-by":"publisher","first-page":"99","DOI":"10.17705\/2msqe.00010","volume":"18","author":"AB Pedersen","year":"2019","unstructured":"Pedersen AB, Risius M, Beck R (2019) A ten-step decision path to determine when to use blockchain technologies. MIS Q Exec 18(2):99\u2013115","journal-title":"MIS Q Exec"},{"issue":"3","key":"722_CR74","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1177\/030631284014003004","volume":"14","author":"TJ Pinch","year":"1984","unstructured":"Pinch TJ, Bijker WE (1984) The social construction of facts and artefacts: or how the sociology of science and the sociology of technology might benefit each other. Soc Stud Sci 14(3):399\u2013441","journal-title":"Soc Stud Sci"},{"key":"722_CR75","volume-title":"Self-sovereign identity: decentralized digital identity and verifiable credentials","author":"A Preukschat","year":"2021","unstructured":"Preukschat A, Reed D (2021) Why the internet is missing an identity layer \u2013 and why SSI can finally provide one. In: Preukschat A, Reed D (eds) Self-sovereign identity: decentralized digital identity and verifiable credentials. Manning, New York"},{"key":"722_CR76","unstructured":"Reed D (2018) The story of open SSI standards. https:\/\/ssimeetup.org\/story-open-ssi-standards-drummond-reed-evernym-webinar-1\/, Accessed 25 May 2021"},{"key":"722_CR77","unstructured":"Reed D (2020) Self-sovereign identity: Who will own the wallet of the future? https:\/\/www.youtube.com\/watch?v=bwsHW_QOM7k&list=PLXW4bzMu4rtEkubOi7467e2LqDKz_5sLx&index=6&t=7s, Accessed 25 May 2021"},{"key":"722_CR78","unstructured":"Reed D, Sabadello M (2019) The DID report 1: The first official W3C DID working group meeting (Japan). https:\/\/ssimeetup.org\/did-report-1-first-official-w3c-did-working-group-meeting-japan-drummond-reed-webinar-36\/, Accessed 25 May 2021"},{"key":"722_CR79","unstructured":"Reed D, Sporny M, Longley D, Allen C, Grant R, Sabadello M, Holt J (2021) Decentralized identifiers (dids) v1.0: Core architecture, data model, and representations. https:\/\/www.w3.org\/TR\/did-core\/, Accessed 25 May 2021"},{"key":"722_CR80","doi-asserted-by":"crossref","unstructured":"Reijers W, Wuisman I, Mannan M, De\u00a0Filippi P, Wray C, Rae-Looi V, Cubillos\u00a0V\u00e9lez A, Orgad L (2018) Now the code runs itself: On-chain and off-chain governance of blockchain technologies. Topoi","DOI":"10.1007\/s11245-018-9626-5"},{"key":"722_CR81","doi-asserted-by":"crossref","unstructured":"Rieger A, Roth T, Sedlmeir J, Fridgen G (2021) The privacy challenge in the race for digital vaccination certificates. Med","DOI":"10.1016\/j.medj.2021.04.018"},{"key":"722_CR82","unstructured":"Riley C (2020) By embracing blockchain, a California bill takes the wrong step forward. https:\/\/blog.mozilla.org\/netpolicy\/2020\/08\/06\/by-embracing-blockchain-a-california-bill-takes-the-wrong-step-forward, Accessed 25 May 2021"},{"key":"722_CR83","unstructured":"Ruff T (2018) Seven myths of self-sovereign identity. https:\/\/medium.com\/evernym\/7-myths-of-self-sovereign-identity-67aea7416b1, Accessed 25 May 2021"},{"key":"722_CR84","volume-title":"Self-sovereign identity: decentralized digital identity and verifiable credentials","author":"M Sabadello","year":"2021","unstructured":"Sabadello M (2021) Decentralized identity for a peaceful society. In: Preukschat A, Reed D (eds) Self-sovereign identity: decentralized digital identity and verifiable credentials. Manning, New York"},{"issue":"4","key":"722_CR85","first-page":"255","volume":"6","author":"S Sahay","year":"1996","unstructured":"Sahay S, Robey D (1996) Organizational context, social interpretation, and the implementation and consequences of geographic information systems. Account Manag Inf Technol 6(4):255\u2013282","journal-title":"Account Manag Inf Technol"},{"issue":"4","key":"722_CR86","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1080\/17530350.2019.1589553","volume":"12","author":"N Schneider","year":"2019","unstructured":"Schneider N (2019) Decentralization: an incomplete ambition. J Cult Econ 12(4):265\u2013285","journal-title":"J Cult Econ"},{"key":"722_CR87","unstructured":"Sovrin Foundation (2020) The principles of SSI. https:\/\/sovrin.org\/the-principles-of-ssi\/, Accessed 25 May 2021"},{"key":"722_CR88","unstructured":"Speelman T (2020) Self-sovereign identity: proving power over legal entities. http:\/\/resolver.tudelft.nl\/uuid:aab1f3ff-da54-47f7-8998-847cb78322c8, Accessed 25 May 2021"},{"issue":"1","key":"722_CR89","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1057\/jit.2016.4","volume":"32","author":"S Spiekermann","year":"2017","unstructured":"Spiekermann S, Korunovska J (2017) Towards a value theory for personal data. J Inf Technol 32(1):62\u201384","journal-title":"J Inf Technol"},{"key":"722_CR90","unstructured":"Sporny M, Longley D, Chadwick D (2019) Verifiable credentials data model 1.0: Expressing verifiable information on the web. https:\/\/www.w3.org\/TR\/vc-data-model, Accessed 25 May 2021"},{"key":"722_CR91","unstructured":"Swan M (2015) Blockchain: Blueprint for a new Economy. O\u2019Reilly Media, Inc"},{"issue":"3","key":"722_CR92","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/10919392.2019.1598608","volume":"29","author":"P Tarafdar","year":"2019","unstructured":"Tarafdar P, Bose I (2019) Systems theoretic process analysis of information security: the case of Aadhaar. J Organ Comput Electron Commer 29(3):209\u2013222","journal-title":"J Organ Comput Electron Commer"},{"key":"#cr-split#-722_CR93.1","unstructured":"The Council of the European Union (2014) Regulation"},{"key":"#cr-split#-722_CR93.2","unstructured":"(EU) no 910\/2014 of the European Parliament and of the Council of 23 july 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. Official Journal of the European Union L:73-114"},{"key":"722_CR94","unstructured":"Tobin A (2018) Sovrin: What goes on the ledger? https:\/\/www.evernym.com\/wp-content\/uploads\/2017\/07\/What-Goes-On-The-Ledger.pdf, Accessed 25 May 2021"},{"key":"722_CR95","unstructured":"Tobin A, Reed D (2017) The inevitable rise of self-sovereign identity: a white paper from the Sovrin foundation. https:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf, Accessed 25 May 2021"},{"issue":"6","key":"722_CR1","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s12599-019-00618-y","volume":"61","author":"W van der Aalst","year":"2019","unstructured":"van der Aalst W, Hinz O, Weinhardt C (2019) Big digital platforms: growth, impact, and challenges. Bus Inf Syst Eng 61(6):645\u2013648","journal-title":"Bus Inf Syst Eng"},{"key":"722_CR96","unstructured":"Wagner K, Vila\u00a0Pueyo X, Vandy N, Bachenheimer D, Beron D (2020) Decentralised identity: What\u2019s at stake? https:\/\/inatba.org\/wp-content\/uploads\/2020\/11\/2020-11-INATBA-Decentralised-Identity-001.pdf, Accessed 25 May 2021"},{"key":"722_CR97","unstructured":"Welling W (2018) Digital identity: a misunderstood building block of our society. https:\/\/policylab.waag.org\/article\/digital-identity-a-misunderstood-building-block-of-our-society\/, Accessed 25 May 2021"},{"key":"722_CR98","doi-asserted-by":"crossref","unstructured":"Williams B, Hummelbrunner R (2010) Soft systems methodology. In: Systems concepts in action, Stanford University Press, pp. 241\u2013261","DOI":"10.1515\/9780804776554"},{"key":"722_CR99","unstructured":"Windley P (2020) Cogito, ergo sum. https:\/\/www.windley.com\/archives\/2020\/08\/cogito_ergo_sum.shtml, Accessed 25 May 2021"},{"key":"722_CR100","unstructured":"World Bank (2015) Identification for development: cross-practice initiative. https:\/\/www.worldbank.org\/content\/dam\/Worldbank\/Governance\/GGP%20ID4D%20flyer.pdf, Accessed 25 May 2021"},{"key":"722_CR101","unstructured":"World Bank (2018) Private sector economic impacts from identification systems. http:\/\/documents1.worldbank.org\/curated\/en\/219201522848336907\/Private-Sector-Economic-Impacts-from-Identification-Systems.pdf, Accessed 25 May 2021"},{"key":"722_CR102","unstructured":"World Bank (2018) Public sector savings and revenue from identification systems: Opportunities and constraints. http:\/\/documents1.worldbank.org\/curated\/en\/745871522848339938\/Public-Sector-Savings-and-Revenue-from-Identification-Systems-Opportunities-and-Constraints.pdf, Accessed 25 May 2021"},{"key":"722_CR103","volume-title":"The age of surveillance capitalism: the fight for a human future at the new frontier of power","author":"S Zuboff","year":"2019","unstructured":"Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power. PublicAffairs, New York"},{"key":"722_CR104","doi-asserted-by":"crossref","unstructured":"Zwitter AJ, Gstrein OJ, Yap E (2020) Digital identity and the blockchain: Universal identity management and the concept of the self-sovereign individual. Front Blockchain 3(26)","DOI":"10.3389\/fbloc.2020.00026"}],"container-title":["Business & Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-021-00722-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-021-00722-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-021-00722-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T12:29:26Z","timestamp":1635251366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-021-00722-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":105,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["722"],"URL":"https:\/\/doi.org\/10.1007\/s12599-021-00722-y","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"12 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}