Electronic identification; digital identity; self-sovereign identity; interpretive flexibility; social construction of technology
Abstract :
[en] Ever-growing concerns over ‘Big Brother’ continue driving individuals towards user-centric identity management systems. Nascent innovations are framed as offering Self-Sovereign Identity (SSI). Because of the association with value-laden ideals and technical components like blockchain, SSI is caught up with both hype and idiosyncrasy. Competing interpretations of SSI damage the public discourse and risk misrepresenting affordances these systems might offer. Based on a qualitative inductive interview study and document analysis, this article extrapolates a constructivist theoretical frame – the Extended Model of Interpretive Flexibility – which combines insights from the Social Construction of Technology and the Structurational Model of Technology. The Extended Model of Interpretive Flexibility highlights malleability in the technical implementations and social representations, which in turn is affected by and influences institutional properties around SSI. This research further offers implications for practice around the implementation of SSI, in particular regarding policy, management, and design. For theory on public sector information systems, the proposed model has generalizable potential for the analysis of socio-technical systems and offers future research directions.
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > FINATRAX - Digital Financial Services and Cross-organizational Digital Transformations
Disciplines :
Business & economic sciences: Multidisciplinary, general & others Sociology & social sciences
Author, co-author :
WEIGL, Linda ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust > FINATRAX > Team Gilbert FRIDGEN
BARBEREAU, Tom Josua ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > FINATRAX
FRIDGEN, Gilbert ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > FINATRAX
External co-authors :
yes
Language :
English
Title :
The construction of self-sovereign identity: Extending the interpretive flexibility of technology towards institutions
This research was funded by the Luxembourg National Research Fund (FNR) and PayPal PEARL (grant reference 13342933) . For the purpose of open access, the authors have applied a Creative Commons Attribution 4.0 International (CC BY 4.0) license to any author accepted manuscript version arising from this submission.
Addo, A., Senyo, P.K., Advancing e-governance for development: Digital identification and its link to socioeconomic inclusion. Government Information Quarterly, 38, 2021, 101568.
Aladwani, A.M., A cross-cultural comparison of Kuwaiti and British citizens’ views of e-government interface quality. Government Information Quarterly 30 (2013), 74–86.
Alastria Association Network Consortium, Whitepaper. 2020, Privacy Rational, Alastria ID.
Allen, C., The path to self-sovereign identity. Retrieved from http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html, 2016.
Backhouse, J., Halperin, R., Security and privacy perceptions of E-ID: A grounded research. 16th European conference on information systems (ECIS 2008), Galway, Ireland, 2008, 1382–1393.
Barbereau, T., Sedlmeir, J., Smethurst, R., Rieger, A., Fridgen, G., Tokenization and regulatory compliance for art and collectible markets: From regulators’ demands for transparency to investors’ demands for privacy. Lacity, M., Treblmeir, H., (eds.) Blockchains and the token economy: Studies in theory and practice, 2022, Palgrave Macmillan, London.
Bélanger, F., Carter, L., Trust and risk in e-government adoption. The Journal of Strategic Information Systems 17 (2008), 165–176, 10.1016/j.jsis.2007.12.002.
Bowen, G.A., Document analysis as a qualitative research method. Qualitative Research Journal 9:2 (2009), 27–40, 10.3316/QRJ0902027.
Brinkmann, S., Kvale, S., InterViews: Learning the craft of qualitative research interviewing. 3rd ed., 2015, SAGE Publications.
Bundeskanzleramt, Report. Digitale Identität: Wie ein Ökosystem digitaler Identitäten zu einem selbstbestimmten und zugleich nutzerfreundlichen Umgang mit dem digitalen Ich beitragen kann. 2021.
Bundesregierung, Germany and Spain and join forces on the development of a cross-border, decentralised digital identity ecosystem. Retrieved from https://www.bundesregierung.de/breg-de/suche/germany-and-spain-and-join-forces-on-the-development-of-a-cross-border-decentralised-digital-identity-ecosystem-194, 2021 Accessed April 5, 2022.
Canales, K., Hackers scraped data from 500 million LinkedIn users — about two-thirds of the platform's userbase — and have posted it for sale online. Retrieved from https://businessinsider.mx/hackers-scraped-data-from-500-million-linkedin-users-about-two-thirds-of-the-platforms-userbase-and-have-posted-it-for-sale-online/, 2021.
Cap, C.H., Maibaum, N., Digital identity and its implication for electronic government. Schmid, B., Stanoevska-Slabeva, K., Tschammer, V., (eds.) Towards the E-society, 2002, Kluwer Academic Publishers, Boston, 10.1007/0-306-47009-8_59.
Chadwick, D.W., Laborde, R., Oglaza, A., Venant, R., Wazan, S., Nijjar, M., Improved identity management with verifiable credentials and fido. IEEE Communications Standards Magazine 3 (2019), 14–20.
Chaum, D., Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28 (1985), 1030–1044, 10.1145/4372.4373.
Cheesman, M., Self-sovereignty for refugees? The contested horizons of digital identity. Geopolitics 27:1 (2020), 134–159, 10.1080/14650045.2020.1823836.
Corbin, J., Strauss, A., Basics of qualitative research: Techniques and procedures for developing grounded theory. 4th ed., 2015, SAGE Publications.
Dawes, S.S., Pardo, T.A., Building collaborative digital government systems: Systemic constraints and effective practices. Elmagarmid, A.K., McIver, W.J., Elmagarmid, A.K., (eds.) Advances in digital government, 2002, Springer US, Boston, MA, 10.1007/0-306-47374-7_16.
DiMaggio, P.J., Powell, W.W., The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review 48:2 (1983), 147–160.
Doherty, N.F., Coombs, C.R., Loan-Clarke, J., A re-conceptualization of the interpretive flexibility of information technologies: Redressing the balance between the social and the technical. European Journal of Information Systems 15 (2006), 569–582, 10.1057/palgrave.ejis.3000653.
Edler, J., James, A.D., Understanding the emergence of new science and technology policies: Policy entrepreneurship, agenda setting and the development of the European framework programme. Research Policy 44 (2015), 1252–1265.
Ferdous, M.S., Chowdhury, F., Alassafi, M.O., In search of self-sovereign identity leveraging blockchain technology. IEEE Access, 7, 2019, 10.1109/ACCESS.2019.2931173.
Finger, M., Groenewegen, J., Künneke, R., The quest for coherence between institutions and technologies in infrastructures. Journal of Network Industries, 2005, 227–259.
Finnish Government, Finland and Germany intensify cooperation to promote digital identification. Retrieved from https://valtioneuvosto.fi/en/-/10623/finland-and-germany-intensify-cooperation-to-promote-digital-identification, 2021 Accessed October 10, 2021.
Frederickson, H.G., Smith, K.B., Larimer, C.W., Licari, M.J., The public administration theory primer. 3rd ed., 2018, Routledge, New York.
Gascó, M., New technologies and institutional change in public administration. Social Science Computer Review 21 (2003), 6–14.
Geels, F.W., Technological transitions as evolutionary reconfiguration processes: A multi-level perspective and a case-study. Research Policy 31 (2002), 1257–1274, 10.1016/S0048-7333(02)00062-8.
Giannopoulou, A., Digital identity infrastructures: A critical approach of self-sovereign identity. Digital Society, 2, 2023, 18, 10.1007/s44206-023-00049-z.
Giannopoulou, A., Wang, F., Self-sovereign identity. Internet Policy Review, 10(2), 2021, 10.14763/2021.2.1550.
Giddens, A., Central problems in social theory: Action, structure, and contradiction in social analysis. 1979, Palgrave Macmillan, London.
Gray, J., Gerlitz, C., Bounegru, L., Data infrastructure literacy. Big Data & Society, 5(2), 2018 2053951718786316.
Haas, C., On the relationship between old and new technologies. Computers and Composition 16 (1999), 209–228, 10.1016/S8755-4615(99)00003-1.
Halpin, H., Vision: A critique of immunity passports and W3C decentralized identifiers. van der Merwe, T., Mitchell, C., Mehrnezhad, M., (eds.) Security standardisation research: 6th international conference, 2020, Springer International Publishing, Cham, 10.1007/978-3-030-64357-7.
Hargadon, A.B., Douglas, Y., When innovations meet institutions: Edison and the design of the electric light. Administrative Science Quarterly 46 (2001), 476–501.
Henningsson, S., Henriksen, H.Z., Inscription of behaviour and flexible interpretation in information infrastructures: The case of European e-customs. The Journal of Strategic Information Systems 20 (2011), 355–372, 10.1016/j.jsis.2011.05.003.
Herian, R., Blockchain, GDPR, and fantasies of data sovereignty. Law, Innovation and Technology 12 (2020), 156–174, 10.1080/17579961.2020.1727094.
Holmes, A., 533 million Facebook users' phone numbers and personal data have been leaked online. Retrieved from https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4, 2021.
Hughes, T.P., The evolution of large technological systems. Bijker, W.E., Hughes, T.P., Pinch, T., (eds.) The social construction of technological systems: New directions in the sociology and history of technology, 1987, MIT Press, Cambridge, MA.
Hummel, P., Braun, M., Augsberg, S., Dabrock, P., Sovereignty and data sharing. ITU Journal: ICT Discoveries, 2, 2018.
Husz, O., Bank identity: Banks, ID cards, and the emergence of a financial identification society in Sweden. Enterprise and Society 19 (2018), 391–429, 10.1017/eso.2017.43.
Ishmaev, G., Sovereignty, privacy, and ethics in blockchain-based identity management systems. Ethics and Information Technology, 1–14, 2020, 10.1007/s10676-020-09563-x.
Janowski, T., Digital government evolution: From transformation to contextualization. Government Information Quarterly 32 (2015), 221–236.
Janssen, M., Helbig, N., Innovating and changing the policy-cycle: Policy-makers be prepared!. Government Information Quarterly 35 (2018), 99–105.
Jin, D.Y., Digital platforms, imperialism and political culture. 1st ed., 2015, Routledge, New York, 10.4324/9781315717128.
Jones, B.D., Reconceiving decision-making in democratic politics: Attention, choice, and public policy. 1994, University of Chicago Press.
Kahn, P.W., Political theology: Four new chapters on the concept of sovereignty. 2011, Columbia University Press, New York.
Keohane, R.O., Ironies of sovereignty: The European Union and the United States. Journal of Common Market Studies 40 (2002), 743–765, 10.1111/1468-5965.00396.
Klein, H.K., Myers, M.D., A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly 23 (1999), 67–93, 10.2307/249410.
Koppenjan, J., Groenewegen, J., Institutional design for complex technological systems. International Journal of Technology, Policy and Management 5 (2005), 240–257.
Kubach, M., Schunck, C.H., Sellung, R., Roßnagel, H., Self-sovereign and decentralized identity as the future of identity management?. Open Identity Summit 2020 (2020), 1–13.
Kuperberg, M., Blockchain-based identity management: A survey from the enterprise and ecosystem perspective. IEEE Transactions on Engineering Management 67 (2020), 1008–1027, 10.1109/TEM.2019. 2926471.
Law, J., Callon, M., The life and death of an aircraft: A network analysis of technical change. Bijker, W.E., Law, J., (eds.) Shaping technology-building society: Studies in sociotechnical change, 1992, MIT Press, Cambridge, MA.
Layne, K., Lee, J., Developing fully functional E-government: A four stage model. Government Information Quarterly 18 (2001), 122–136, 10.1016/S0740-624X(01)00066-1.
Leech, B.L., Asking questions: Techniques for semistructured interviews. Political Science & Politics 35 (2002), 665–668.
Lips, A.M.B., Taylor, J.A., Organ, J., Managing citizen identity information in E-government service relationships in the UK: The emergence of a surveillance state or a service state?. Public Management Review 11 (2009), 833–856, 10.1080/14719030903318988.
Lips, M., Rethinking citizen – Government relationships in the age of digital identity: Insights from research. Information Polity 15:4 (2010), 273–289, 10.3233/IP-2010-0216.
Luna-Reyes, L.F., Gil-Garcia, J.R., Digital government transformation and internet portals: The co-evolution of technology, organizations, and institutions. Government Information Quarterly 31 (2014), 545–555.
MacKenzie, D., Wajcman, J., The social shaping of technology. 1985, Open University Press.
Maler, E., Reed, D., The Venn of identity: Options and issues in federated identity management. IEEE Security & Privacy Magazine 6 (2008), 16–23, 10.1109/MSP.2008.50.
March, J.G., Olsen, J.P., Rediscovering institutions. 2010, Simon and Schuster.
Mayer-Schönberger, V., Big data: A revolution that will transform how we live, work, and think. 2013, Houghton Mifflin Harcourt, Boston.
Mergel, I., Edelmann, N., Haug, N., Defining digital transformation: Results from expert interviews. Government Information Quarterly, 36, 2019, 101385.
Microsoft, Whitepaper. Decentralized Identity: Own and control your identity. 2018.
Mir, U.B., Kar, A.K., Dwivedi, Y.K., Gupta, M., Sharma, R., Realizing digital identity in government: Prioritizing design and implementation objectives for Aadhaar in India. Government Information Quarterly, 37, 2020, 101442, 10.1016/j.giq.2019.101442.
Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C., A survey on essential components of a self-sovereign identity. Computer Science Review 30 (2018), 80–86, 10.1016/j.cosrev.2018. 10.002.
Myers, M.D., Newman, M., The qualitative interview in IS research: Examining the craft. Information and Organization 17 (2007), 2–26, 10.1016/j.infoandorg.2006.11.001.
Newell, B.C., Technopolicing, surveillance, and citizen oversight: A neorepublican theory of liberty and information control. Government Information Quarterly 31 (2014), 421–431, 10.1016/j. giq.2014.04.001.
Nograšek, J., Vintar, M., E-government and organisational transformation of government: Black box revisited?. Government Information Quarterly 31 (2014), 108–118.
Nooteboom, B., Institutions and forms of co-ordination in innovation systems. Organization Studies 21 (2000), 915–939.
OECD, OECD digital economy papers. Digital identity management: Enabling innovation and trust in the internet economy. 2011, 10.1787/5kg1zqsm3pns-en.
Ølnes, S., Jansen, A., Blockchain technology as support infrastructure in e-government. Janssen, M., Axelsson, K., Glassey, O., Klievink, B., Krimmer, R., Lindgren, I.Trutnev, D., (eds.) Electronic government, 2017, Springer International Publishing, Cham, 10.1007/978-3-319-64677-0_18.
Ontology, Whitepaper. Ontology: A new high performance public multi-chain project & a distributed trust collaboration platform, 2017.
Orlikowski, W.J., The duality of technology: Rethinking the concept of technology in organizations. Organization Science 3 (1992), 398–427, 10.1287/orsc.3.3.398.
Orlikowski, W.J., Using technology and constituting structures: A practice lens for studying technology in organizations. Organization Science 11 (2000), 404–428, 10.1287/orsc.11.4. 404.14600.
Otjacques, B., Hitzelberger, P., Feltz, F., Interoperability of e-government information systems: Issues of identification and data sharing. Journal of Management Information Systems 23 (2007), 29–51, 10.2753/MIS0742-1222230403.
Pinch, T.J., Bijker, W.E., The social construction of facts and artefacts: Or how the sociology of science and the sociology of technology might benefit each other. Social Studies of Science 14 (1984), 399–441, 10.1177/030631284014003004.
Pollitt, C., Time, policy, management: Governing with the past. 2008, Oxford University Press, Oxford.
Preukschat, A., Reed, D., Self-sovereign identity: Decentralized digital identity and verifiable credentials. 2021, Manning Publications, Shelter Island, NY.
Procivis, A.G., Whitepaper. Procivis eID+ Produktpräsentation Juni 2017, 2017.
Reed, D., Sporny, M., Sabadello, M., Decentralized identifiers (DIDs) v1.0 Core architecture, data model and representations. Retrieved from https://www.w3.org/TR/did-core/, 2021.
Rubin, H., Rubin, I., Qualitative interviewing: The art of hearing data. 3rd ed., 2012, 10.4135/9781452226651 Thousand Oaks, California.
Russell, S., The social construction of artefacts: A response to pinch and bijker. Social Studies of Science 16 (1986), 331–346.
Sahay, S., Robey, D., Organizational context, social interpretation, and the implementation and consequences of geographic information systems. Accounting, Management and Information Technologies 6 (1996), 255–282, 10.1016/S0959-8022(96)90016-8.
Sartor, S., Sedlmeir, J., Rieger, A., Roth, T., Love at first sight? A user experience study of self-sovereign identity wallets. 30th European conference on information systems, Timișoara, Romania, 2022.
Savoldelli, A., Codagnone, C., Misuraca, G., Understanding the e-government paradox: Learning from literature and practice on barriers to adoption. Government Information Quarterly 31 (2014), 63–71.
Scharpf, F.W., Games real actors play: Actor-centered institutionalism in policy research. 2018, Routledge, New York.
Schultze, U., Avital, M., Designing interviews to generate rich data for information systems research. Information and Organization 21 (2011), 1–16.
Schuppan, T., E-government in developing countries: Experiences from sub-saharan africa. Government Information Quarterly 26 (2009), 118–127.
Scott, W.R., Institutions and organizations. Foundations for organizational science. 1995, SAGE Publications.
Sedlmeir, J., Huber, J., Barbereau, T.J., Weigl, L., Roth, T., Transition pathways towards design principles of self-sovereign identity. 43rd international conference on information systems (ICIS 2022), Copenhagen, Denmark, 2022.
Sedlmeir, J., Smethurst, R., Rieger, A., Fridgen, G., Digital identities and verifiable credentials. Business and Information Systems Engineering 63 (2021), 603–613, 10.1007/s12599-021-00722-y.
SelfKey Foundation, Whitepaper. 2017, The SelfKey Foundation, SelfKey.
Seltsikas, P., O'Keefe, R.M., Expectations and outcomes in electronic identity management: The role of trust and public value. European Journal of Information Systems 19 (2010), 93–103, 10.1057/ejis.2009.51.
Smethurst, R., Digital identity wallets and their semantic contradictions. 31st European conference on information systems (ECIS), Kristiansand, Norway, 2023.
Sovrin, Sovrin: A Protocol and Token for SelfSovereign Identity and Decentralized Trust, 2018, Sovrin Foundation.
Sporny, M., Longely, D., Chadwick, D., Verifiable credentials data model 1.0. Retrieved from https://w3c.github.io/vc-data-model/WD/2018-07-18/, 2019 Accessed May 5, 2021.
Star, S.L., Griesemer, J.R., Institutional ecology, translations and boundary objects: Amateurs and professionals in berkeley's museum of vertebrate zoology, 1907-39. Social Studies of Science 19 (1989), 387–420.
Stillman, R.J., American vs. European public administration: Does public administration make the modern state, or does the state make public administration?. Public Administration Review 57 (1997), 332–338, 10.2307/977316.
Thomas, J.C., Streib, G., The new face of government: Citizen-initiated contacts in the era of E-government. Journal of Public Administration Research and Theory 13:1 (2003), 83–102.
Tobin, A., Reed, D., Whitepaper. The inevitable rise of self-sovereign identity, 2017, Sovrin Foundation.
Van Dijck, J., Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance and Society 12 (2014), 197–208, 10.24908/ss.v12i2.4776.
Van Dijck, J., Jacobs, B., Electronic identity services as sociotechnical and political-economic constructs. New Media & Society 22 (2020), 896–914, 10.1177/1461444819872537.
VETRI, Whitepaper. VETRI: Value Your Data, 2020.
Walters, W., Border/control. European Journal of Social Theory 9 (2006), 187–203.
Weerakkody, V., Janssen, M., Dwivedi, Y.K., Transformational change and business process reengineering (bpr): Lessons from the british and dutch public sector. Government Information Quarterly 28 (2011), 320–328.
Weigl, L., Amard, A., Codagnone, C., Fridgen, G., The EU's digital identity policy: Tracing policy punctuations. In 15th international conference on theory and practice of electronic governance (ICEGOV 2022), Guimarães, Portugal, 2022, 10.1145/3560107.3560121.
Weinberger, M., It happened again: Yahoo says 1 billion user accounts stolen in what could be biggest hack ever. Retrieved from https://www.businessinsider.com/yahoo-data-breach-billion-accounts-2016-12, 2016.
West, D.M., Digital government: Technology and public sector performance. 2007, Princeton University Press, Princeton, NJ.
Wihlborg, E., Secure electronic identification (eID) in the intersection of politics and technology. International Journal of Electronic Governance 6 (2013), 143–151, 10.1504/IJEG.2013.058371.
Williams, R., Edge, D., The social shaping of technology. Research Policy 25 (1996), 865–899.
Winner, L., Do artifacts have politics?. Daedalus 109:1 (1980), 121–136.
Zuboff, S., Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology 30 (2015), 75–89.
Zuboff, S., The age of surveillance capitalism: The fight for a human future at the new frontier of power. 2019, Public affairs, Hachette Book Group.
Zwitter, A.J., Gstrein, O.J., Yap, E., Digital identity and the blockchain: Universal identity management and the concept of the “self-sovereign” individual. Frontiers in Blockchain 3 (2020), 1–28, 10.3389/fbloc.2020.00026.