You are here: Home
14 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Governing ID: Kenya’s Huduma Namba Programme
by Amber Sinha published Mar 02, 2020 — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: Use of Digital ID in the Healthcare Sector
by Shruti Trikanad published Mar 02, 2020 last modified Mar 02, 2020 01:21 PM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: India’s Unique Identity Programme
by Vrinda Bhandari published Mar 02, 2020 — filed under: , , ,
Located in Internet Governance
Blog Entry Governing ID: 
Use of Digital ID for Verification
by Shruti Trikanad published Mar 02, 2020 last modified Mar 02, 2020 11:16 AM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: A Framework for Evaluation of Digital Identity
by Vrinda Bhandari, Shruti Trikanad, and Amber Sinha published Mar 02, 2020 last modified Mar 02, 2020 01:22 PM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Governing ID: Introducing our Evaluation Framework
by Shruti Trikanad published Mar 02, 2020 last modified Mar 02, 2020 08:03 AM — filed under: , , ,
Located in Internet Governance / Blog
Blog Entry Core Concepts and Processes
by Shruti Trikanand and Amber Sinha published Sep 13, 2019 last modified Oct 17, 2019 04:06 PM — filed under: , ,
When we embarked on this research project, we began with the primary questions of what constitutes a digital identity system. In the last few years, with the rise in national digital identity projects, there has been significant academic and media attention to the idea, benefits and risks of a digital identity system.
Located in Internet Governance / Digital IDs
Blog Entry Design and Uses of Digital Identities - Research Plan
by Amber Sinha and Pooja Saxena published Aug 08, 2019 last modified Aug 17, 2019 07:58 AM — filed under: , , , ,
In our research project about uses and design of digital identity systems, we ask two core questions: a) What are appropriate uses of ID?, and b) How should we think about the technological design of ID? Towards the first research question, we have worked on first principles and will further develop definitions, legal tests and applications of these principles. Towards the second research question, we have first identified a set of existing and planned digital identity systems that represent a paradigm of how such a system can be envisioned and implemented, and will look to identify key design choices which are causing divergence in paradigm.
Located in Internet Governance / Blog
Blog Entry Holding ID Issuers Accountable, What Works?
by Shruti Trikanad and Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:23 AM — filed under: , , , ,
Located in Internet Governance / Blog
Blog Entry The Appropriate Use of Digital Identity
by Amber Sinha published Aug 08, 2019 last modified Aug 08, 2019 10:24 AM — filed under: , , , ,
Located in Internet Governance / Blog