{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T12:14:25Z","timestamp":1742645665016,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100019180","name":"HORIZON EUROPE European Research Council","doi-asserted-by":"publisher","award":["759681"],"id":[{"id":"10.13039\/100019180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["DISO"],"published-print":{"date-parts":[[2023,8]]},"abstract":"Abstract<\/jats:title>The shift from electronic identification to digital identity is indicative of a broader evolution towards datafication of identity at large. As digital identity emerges from the fringes of technical challenges towards the legal and socio-technical, pre-existing ideologies on the reform of digital identity re-emerge with a newfound enthusiasm. Self-sovereign identity is one representative example of this trend. This paper sets out to uncover the principles, technological design ideas, and underlying guiding ideologies that are attached to self-sovereign identity infrastructures, carrying the promise of user-centricity, self-sovereignty, and individual empowerment. Considering the flourishing of digital identity markets, and the subsequent institutional interest on a European level in the techno-social promises that this identity architecture carries, this paper explores how the implementation of EU-wide self-sovereign identity shifts the already existing historical power balances in the construction of identity infrastructures. In this contribution, we argue that the European-wide adoption of self-sovereign ideals in identity construction does not address the shortcomings that identity and identification have historically faced and that instead of citizen empowerment, it puts individuals (a category broader than citizens) in a rather vulnerabilized position.<\/jats:p>","DOI":"10.1007\/s44206-023-00049-z","type":"journal-article","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T09:57:02Z","timestamp":1683799022000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Digital Identity Infrastructures: a Critical Approach of Self-Sovereign Identity"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7692-8062","authenticated-orcid":false,"given":"Alexandra","family":"Giannopoulou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,11]]},"reference":[{"key":"49_CR1","unstructured":"Allen C. (2016, April). The path to self-sovereign identity. 25 Avril 2016.\u00a0http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html#dfref-1111"},{"key":"49_CR2","volume-title":"2004\u00a0 Polity Press Identity. Conversations with Benedetto Vecchi, Polity Press, 2004.","author":"Z Bauman","year":"2004","unstructured":"Bauman, Z. (2004). 2004\u00a0 Polity Press.\u00a0Identity. Conversations with Benedetto Vecchi, Polity Press, 2004."},{"key":"49_CR3","doi-asserted-by":"publisher","first-page":"E15","DOI":"10.1017\/dap.2021.15","volume":"3","author":"A Beduschi","year":"2021","unstructured":"Beduschi, A. (2021). Rethinking digital identity for post-COVID-19 societies: Data privacy and human rights considerations. Data & Policy, 3, E15. https:\/\/doi.org\/10.1017\/dap.2021.15","journal-title":"Data & Policy"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Bernal, P. (2014). Internet privacy rights. Cambridge University Press.","DOI":"10.1017\/CBO9781107337428"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Beydoun, K. (2022). The new state of surveillance: Societies of subjugation. Washington & Lee Law Review, 79.","DOI":"10.2139\/ssrn.3977281"},{"issue":"9","key":"49_CR6","doi-asserted-by":"publisher","first-page":"2668","DOI":"10.1177\/1461444820939922","volume":"23","author":"B Bod\u00f3","year":"2021","unstructured":"Bod\u00f3, B. (2021). Mediated trust: A theoretical framework to address the trustworthiness of technological trust mediators. New Media & Society, 23(9), 2668\u20132690. https:\/\/doi.org\/10.1177\/1461444820939922","journal-title":"New Media & Society"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Bod\u00f3, B., & Giannopoulou A. (2019). The logics of technology decentralization - The case of distributed ledger technologies. In M. Ragnedda, & G. Destefanis (Eds.), Blockchain and Web 3.0: Social, Economic, and Technological Challenges, Routelge. 114\u2013129.","DOI":"10.4324\/9780429029530-8"},{"key":"49_CR8","volume-title":"The stack","author":"BB Bratton","year":"2015","unstructured":"Bratton, B. B. (2015). The stack.\u00a0On software and sovereignty,\u00a0The MIT Press."},{"issue":"3","key":"49_CR9","first-page":"774","volume":"125","author":"R Brescia","year":"2021","unstructured":"Brescia, R. (2021). Social change and the associational self: Protecting the integrity of identity and democracy in the digital age. Penn State Law Review, 125(3), 774\u2013835.","journal-title":"Penn State Law Review"},{"key":"49_CR10","unstructured":"Cameron, K. (2005, May). The laws of identity [Blog post]. Kim Cameron\u2019s identity weblog. https:\/\/www.identityblog.com\/?p=352"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030\u20131044.","DOI":"10.1145\/4372.4373"},{"key":"49_CR12","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479888702.001.0001","volume-title":"We are data. Algorithms and the making of our digital selves","author":"J Cheney- Lippold","year":"2017","unstructured":"Cheney- Lippold, J. (2017). We are data. Algorithms and the making of our digital selves. NYU Press."},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Dagiral, E., & Singh, K. M. (2020). Governance and accountable citizenship. Through identification infrastructures: Database politics of Copernicus (France) and National Register of Citizens (India). Science, Technology & Society 5(3), 368\u2013385.","DOI":"10.1177\/0971721820912895"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Denou\u00ebl, J. (2011). Identit\u00e9. Communications, 88(1), 75\u201382.","DOI":"10.3917\/commu.088.0075"},{"key":"49_CR15","volume-title":"Blockchain regulation and governance in Europe","author":"M Finck","year":"2019","unstructured":"Finck, M. (2019). Blockchain regulation and governance in Europe. Cambridge University Press."},{"key":"49_CR16","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11023-011-9259-6","volume":"21","author":"L Floridi","year":"2011","unstructured":"Floridi, L. (2011). The Informational Nature of Personal Identity. Minds & Machines, 21, 549\u2013566. https:\/\/doi.org\/10.1007\/s11023-011-9259-6","journal-title":"Minds & Machines"},{"key":"49_CR17","unstructured":"Foucault, M. (1994). In P.\u00a0Rabinow (Ed.),\u00a0The birth of biopolitics, Michel Foucault. Ethics: subjectivity and truth,\u00a0Volume 1. New York: Penguin Books,\u00a073\u201380."},{"key":"49_CR18","first-page":"41","volume-title":"Sociological Perspectives on Social Psychology","author":"V Gecas","year":"1995","unstructured":"Gecas, V., & Burke, P. J. (1995). Self and identity. In K. S. Cook, G. A. Fine, & J. S. House (Eds.), Sociological Perspectives on Social Psychology (pp. 41\u201367). Allyn & Bacon."},{"issue":"3","key":"49_CR19","first-page":"388","volume":"7","author":"A Giannopoulou","year":"2021","unstructured":"Giannopoulou, A. (2021). Putting data protection by design on the blockchain. EDPL, 7(3), 388\u2013399.","journal-title":"EDPL"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Giannopoulou, A. (2022). Allocating control in decentralised identity management. European Review of Digital Administration & Law \u2013 Erdal, 2(2):73\u201388.","DOI":"10.1007\/s44206-023-00049-z"},{"key":"49_CR21","doi-asserted-by":"publisher","unstructured":"Giannopoulou, A., & Wang, F. (2021). Self-sovereign identity. Internet policy review, 10(2). https:\/\/doi.org\/10.14763\/2021.2.1550","DOI":"10.14763\/2021.2.1550"},{"key":"49_CR22","doi-asserted-by":"publisher","unstructured":"Grassi, P., Garcia, M., Fenton, J. (2020). NIST Special Publication 800\u201363\u20133. Digital Identity Guidelines. 03 February 2020. https:\/\/doi.org\/10.6028\/NIST.SP.800-63-3","DOI":"10.6028\/NIST.SP.800-63-3"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Grech, A., Sood, I., & Ari\u00f1o, L. (2021). Blockchain, Self-sovereign identity and digital credentials: promise versus praxis in education. Frontiers in Blockchain, 4. https:\/\/www.frontiersin.org\/article\/10.3389\/fbloc.2021.616779","DOI":"10.3389\/fbloc.2021.616779"},{"key":"49_CR24","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00010","author":"OJ Gstrein","year":"2020","unstructured":"Gstrein, O. J., & Kochenov, D. (2020). Digital identity and distributed ledger technology: Paving the way to a neo-feudal brave new world? Frontiers in Blockchain. https:\/\/doi.org\/10.3389\/fbloc.2020.00010","journal-title":"Frontiers in Blockchain"},{"key":"49_CR25","doi-asserted-by":"publisher","unstructured":"G\u00fcrses, S., Kudnani, A., & van Hoboken, J. (2016). Crypto and empire: the contradictions of counter-surveillance advocacy. New Media & Society, 38(4), 576\u2013590. https:\/\/doi.org\/10.1177\/0163443716643006","DOI":"10.1177\/0163443716643006"},{"key":"49_CR26","doi-asserted-by":"publisher","unstructured":"Hansen, H.-T., Lundberg, K., & Syltevik, L. J. (2018). Digitalization, street-Level bureaucracy and welfare users\u2019 experiences. Social Policy & Administration, 52, 67\u201390. https:\/\/doi.org\/10.1111\/spol.12283","DOI":"10.1111\/spol.12283"},{"key":"49_CR27","unstructured":"Haraway, D. (1991). The cyborg manifesto. In Simians, cyborgs, and women: The reinvention of nature. Routledge. pp. 149\u2013182"},{"key":"49_CR28","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12587.001.0001","volume-title":"Privacy is hard and seven other myths: Achieving privacy through careful design","author":"J-H Hoepman","year":"2021","unstructured":"Hoepman, J.-H. (2021). Privacy is hard and seven other myths: Achieving privacy through careful design. The MIT Press."},{"issue":"4","key":"49_CR29","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1177\/1367549421994571","volume":"24","author":"J Holt","year":"2021","unstructured":"Holt, J., & Palm, M. (2021). More than a number: The telephone and the history of digital identification. European Journal of Cultural Studies, 24(4), 916\u2013934. https:\/\/doi.org\/10.1177\/1367549421994571","journal-title":"European Journal of Cultural Studies"},{"key":"49_CR30","doi-asserted-by":"publisher","unstructured":"Ishmaev, G. (2021). Sovereignty, privacy, and ethics in blockchain-based identity management systems. Ethics and Information Technology, 23, 239\u2013252. https:\/\/doi.org\/10.1007\/s10676-020-09563-x","DOI":"10.1007\/s10676-020-09563-x"},{"key":"49_CR31","doi-asserted-by":"publisher","unstructured":"Joinson, A. N., & Paine, C. B. (2009). Self-disclosure, privacy and the internet.\u00a0In A. N. Joinson, K. McKenna, T. Postmes, & U. D. Reips (Eds.),\u00a0Oxford Handbook of Internet Psychology.\u00a0https:\/\/doi.org\/10.1093\/oxfordhb\/9780199561803.013.0016","DOI":"10.1093\/oxfordhb\/9780199561803.013.0016"},{"issue":"1","key":"49_CR32","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1037\/h0043357","volume":"56","author":"SM Jourard","year":"1958","unstructured":"Jourard, S. M., & Lasakow, P. (1958). Some factors in self-disclosure. Journal of Abnormal and Social Psychology, 56(1), 91\u201398.","journal-title":"Journal of Abnormal and Social Psychology"},{"key":"49_CR33","doi-asserted-by":"publisher","DOI":"10.1002\/9781119629610","volume-title":"Digital identities in tension. Between autonomy and control.","author":"A Khatchatourov","year":"2019","unstructured":"Khatchatourov, A. (2019). Digital identities in tension. Between autonomy and control. Wiley."},{"key":"49_CR34","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1353\/con.2000.0005","volume":"8","author":"A M\u2019charek","year":"2000","unstructured":"M\u2019charek, A. (2000). Technologies of Population: Forensic DNA testing practices and the making of differences and similarities. Configurations, 8, 121\u2013159.","journal-title":"Configurations"},{"key":"49_CR35","doi-asserted-by":"publisher","unstructured":"Maliki, T., & Seigneur, M. (2013)\u00a0Online identity and user management services. Computer and Information Security Handbook. 985\u20131009. https:\/\/doi.org\/10.1016\/B978-0-12-803843-7.00071-5","DOI":"10.1016\/B978-0-12-803843-7.00071-5"},{"key":"49_CR36","doi-asserted-by":"publisher","unstructured":"Mejias, U. A., & Couldry, N. (2019). Datafication. Internet Policy Review, 8(4). https:\/\/doi.org\/10.14763\/2019.4.1428","DOI":"10.14763\/2019.4.1428"},{"key":"49_CR37","unstructured":"Nyst,\u00a0C.,\u00a0Makin,\u00a0P.,\u00a0Pannifer,\u00a0S., &\u00a0Whitley,\u00a0E.\u00a0(2016).\u00a0Digital identity: Issue analysis: executive summary.\u00a0Consult Hyperion, Guildford."},{"key":"49_CR38","unstructured":"Palfrey, J., & Gasser, U. (2007). Digital identity interoperability and innovation, Berkman Publication Series."},{"issue":"1","key":"49_CR39","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1177\/1461444816661553","volume":"20","author":"J-C Plantin","year":"2018","unstructured":"Plantin, J.-C., Lagoze, C., Edwards, P. N., & Sandvig, C. (2018). Infrastructure studies meet platform studies in the age of Google and Facebook. New Media & Society, 20(1), 293\u2013310. https:\/\/doi.org\/10.1177\/1461444816661553","journal-title":"New Media & Society."},{"key":"49_CR40","doi-asserted-by":"publisher","unstructured":"Pohle, J., & Thiel, T. (2020). Digital sovereignty. Internet Policy Review, 9(4). https:\/\/doi.org\/10.14763\/2020.4.1532","DOI":"10.14763\/2020.4.1532"},{"key":"49_CR41","unstructured":"Preukschat, A., & Reed, D. (2021). Self-sovereign Identity, MEAP."},{"key":"49_CR42","unstructured":"Renieris, E. (2021). What\u2019s really at stake with vaccine passports, Centre for International Governance Innovation. https:\/\/www.cigionline.org\/articles\/whats-really-stake-vaccine-passports\/"},{"key":"49_CR43","volume-title":"The Course of Recognition","author":"P Ricoeur","year":"2005","unstructured":"Ricoeur, P. (2005). The Course of Recognition. MA, Harvard University Press."},{"key":"49_CR44","doi-asserted-by":"crossref","unstructured":"Schoeman, F. (1984). Privacy and intimate information. In Schoeman, F. (Ed.). Philosophical Dimensions of Privacy. An anthology. pp. 403\u2013419.","DOI":"10.1017\/CBO9780511625138.018"},{"key":"49_CR45","unstructured":"Scott, J. C. (1999). Seeing like a state: How certain schemes to improve the human condition have failed. Yale University Press."},{"key":"49_CR46","doi-asserted-by":"publisher","unstructured":"Singh, R. (2019). Give me a database and I will raise the nation-state. South Asia: Journal of South Asian Studies. https:\/\/doi.org\/10.1080\/00856401.2019.1602810","DOI":"10.1080\/00856401.2019.1602810"},{"key":"49_CR47","doi-asserted-by":"crossref","unstructured":"Smith, C. H. (2020). Corporatised identities \u2260 digital identities: Algorithmic identities, social media, and their harmful impacts for autonomy and well-being. In L. Floridi, & C. Burr (Eds.), Ethics of digital well-being: A multidisciplinary approach (pp. 55\u201388). Springer.","DOI":"10.1007\/978-3-030-50585-1_3"},{"issue":"2","key":"49_CR48","first-page":"118","volume":"8","author":"O Tene","year":"2013","unstructured":"Tene, O. (2013). Me, myself and I: Aggregated and disaggregated identities on social networking services. Journal of International Commercial Law and Technology, 8(2), 118\u2013133.","journal-title":"Journal of International Commercial Law and Technology"},{"key":"49_CR49","doi-asserted-by":"publisher","DOI":"10.1017\/9781108664271","volume-title":"The invention of the passport","author":"JC Torpey","year":"2018","unstructured":"Torpey, J. C. (2018). The invention of the passport. Cambridge University Press. Second edition."},{"key":"49_CR50","volume-title":"United Nations E-Government Survey 2016: E-Government in Support of Sustainable Development","author":"United Nations","year":"2016","unstructured":"United Nations. (2016). United Nations E-Government Survey 2016: E-Government in Support of Sustainable Development. UN."},{"key":"49_CR51","doi-asserted-by":"publisher","unstructured":"Valiente, M.-C., & Tschorsch, F. (2021). Blockchain-based technologies. Internet Policy Review, 10(2). https:\/\/doi.org\/10.14763\/2021.2.1552","DOI":"10.14763\/2021.2.1552"},{"key":"49_CR52","unstructured":"Wagner, K., Nemethi, B., Renieris, E., Lang, P., Brunet, E., & Holst, E. (2018). Self-sovereign identity. A position paper on blockchain enabled identity and the road ahead (p. 56). Berlin: Blockchain Bundesverband."},{"key":"49_CR53","doi-asserted-by":"publisher","unstructured":"Wang F., & de Filippi P. (2020). Self-Sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion. Front Blockchain. https:\/\/doi.org\/10.3389\/fbloc.2019.00028","DOI":"10.3389\/fbloc.2019.00028"},{"key":"49_CR54","unstructured":"World Bank Group, GSMA and Secure Identity Alliance. (2016).\u00a0Digital identity: Towards shared principles for public and private sector cooperation. Washington, DC: World Bank Group."}],"container-title":["Digital Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44206-023-00049-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44206-023-00049-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44206-023-00049-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T09:03:54Z","timestamp":1693991034000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44206-023-00049-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["49"],"URL":"https:\/\/doi.org\/10.1007\/s44206-023-00049-z","relation":{},"ISSN":["2731-4650","2731-4669"],"issn-type":[{"type":"print","value":"2731-4650"},{"type":"electronic","value":"2731-4669"}],"subject":[],"published":{"date-parts":[[2023,5,11]]},"assertion":[{"value":"9 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"The author declares no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"18"}}