English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109952/140887 (78%)
Visitors : 46304048      Online Users : 291
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/130571


    Title: 探索當前和未來的識別管理趨勢
    Exploring Current and Future Identity Management Trends
    Authors: 馬濤
    Taleshi, Mark Mahyar
    Contributors: 尚孝純
    Shang, Shari
    馬濤
    Mark Mahyar Taleshi
    Keywords: 保證
    區塊鍊
    詐騙
    識別
    隱私
    Assurance
    Blockchain
    Fraud
    Identity
    Privacy
    Date: 2018
    Issue Date: 2020-07-01 13:46:26 (UTC+8)
    Abstract: 
    Abstract
    Exploring Current and Future Identity Management Trends
    by Mark Mahyar Taleshi
    The growing digital economy has had a lot to offer to businesses and consumers alike, in terms of efficiency and convenience. Proper identity management is at the heart of this trend. Despite all the successes so far, online systems are still prone to fraud, security breaches and privacy invasions. Additionally, significant costs due to related manual and duplicated work is still shouldered by the industry. This paper explores various identity assurance models as well as working cases in order to seek possible solutions to above ongoing issues.
    Upon observing industry research and future estimates, it becomes clear a decentralized identity-provider based model has an immense potential to overcome current obstacles. In simple economic terms, such a system will be well positioned to efficiently and accurately align supply to demand by matching specific services to the users’ corresponding needs in the right circumstances, resulting in estimated long-term cost savings of 90% over current costs.
    SecureKey Technologies, a leading identity and authentication provider based in Canada, has partnered with IBM, telecom companies, banks and the government to make such a system happen, due later in 2018. The decentralized and distributed nature of this model, based on blockchain technology, is the key in allowing the clients to share their identity credentials or attributes at will in a secure and private manner online, while receiving services online from organizations such as the government.
    Approaches to take, in order to achieve a wide-spread ecosystem adoption, include significant collaboration (as opposed to competition) among different parties, adopt open standards and simplify external transactions as well as accommodate global privacy policies and regulations.

    Keywords: assurance, blockchain, fraud, identity, privacy
    Reference: Reference
    • American Banker. (2017, Mar). Banks pick IBM blockchain to expand digital ID project in Canada. Retrieved from https://www.americanbanker.com/news/canadian-banks-pick-ibm-blockchain-to-expand-digital-identity-project
    • Blockgeeks. (2016, Mar). What is Blockchain Technology? A Step-by-Step Guide For Beginners. Retrieved from https://blockgeeks.com/guides/what-is-blockchain-technology/
    • CMC-Canada. (n.d.). Blockchain Technology: A Primer for Consultants. Retrieved from http://www.cmc-canada.ca/consult/articles/all-topics/blockchain-technology-a-primer-for-consultants
    • ComputerWeekly.com. (2017, May). Gov.uk Verify and identity assurance - it`s time for a rethink. Retrieved from https://www.computerweekly.com/opinion/Govuk-Verify-and-identity-assurance-its-time-for-a-rethink
    • CSO. (2017, Mar). IBM: 4 billion online records were leaked in 2016. Retrieved from https://www.cso.com.au/article/616877/ibm-4-billion-online-records-were-leaked-2016/
    • DIGITALGOV. (2017, Aug). Government Launches Login.Gov to Simplify Access to Public Services. Retrieved from https://www.digitalgov.gov/2017/08/28/government-launches-login-gov-to-simplify-access-to-public-services
    • Financial Post. (2017, Apr). IBM features blockchain technology and Canadian connections at its annual Interconnect conference. Retrieved from http://business.financialpost.com/technology/cio/ibm-features-lots-of-blockchain-technology-at-its-annual-interconnect-conference
    • K(NO)W Identity Conference 2017. (2017). Business of Identity. Retrieved from https://securekey.com/resources/know-identity-conference-2017-trusted-digital-identity-networks-2/
    • Money & Career CheatSheet. (2018, Apr). Here’s How Much Google and Facebook Really Think You’re Worth. Retrieved from https://www.cheatsheet.com/money-career/heres-much-google-facebook-really-think-youre-worth.html/?a=viewall
    • News BTC. (2017, May). Bank of Canada Decides It’s Too Early to Adopt Blockchain Technology. Retrieved from https://www.newsbtc.com/2017/05/29/bank-of-canada-blockchain-implementation/
    • OIX & Ctrl-Shift. (2014, Jun). Economics Of Identity. Retrieved from http://www.openidentityexchange.org/economics-of-identity/
    • OIX. (2014). The ARPU of Identity. Retrieved from https://securekey.com/resources/arpu-identity/
    • SecureIDNews. (2016, Jul). Feds scrap Connect.Gov. Retrieved from https://www.secureidnews.com/news-item/feds-scrap-connect-gov
    • SecureKey. (2015, Sep). Trust Framework – SecureKey Concierge In Canada. Retrieved from https://securekey.com/wp.../SK-UN117-Trust-Framework-SecureKey-Concierge-Canada.pdf
    • SecureKey. (2017a). An Ecosystem Approach to Frictionless Digital Identity. Retrieved from https://securekey.com/resources/
    • SecureKey. (2017b, Feb). Consumer Digital Identity. Retrieved from https://securekey.com/resources/consumer-digital-identity/
    • SecureKey. (2017c). Fighting Fraud in 2017: Are you protected? Retrieved from https://securekey.com/resources/fighting-fraud-2017-protected/
    • SecureKey. (2017d, Jan). Rethinking Identity In The 21st Century. Retrieved from https://securekey.com/resources/
    • SecureKey. (2018). SecureKey Concierge. Retrieved from https://www.canada.ca/en/revenue-agency/services/e-services/e-services-individuals/account-individuals.html ("Sign-In Partner Login" button)
    • SecureKey. (n.d.). Government of Canada Case Study. Retrieved from https://securekey.com/resources/government-canada-case-study/
    • Statista. (2016, Oct). Retail e-commerce revenue in Canada from 2015 to 2021. Retrieved from https://www.statista.com/statistics/289741/canada-retail-e-commerce-sales/
    • Statista. (2018, Mar). Retail e-commerce sales worldwide from 2014 to 2021. Retrieved from https://www.statista.com/statistics/379046/worldwide-retail-e-commerce-sales/
    • Technology Innovation Management Review. (2017, 10). A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors. Retrieved from http://www.timreview.ca/article/1112
    • Wikipedia. (2017, Dec). Timeline of e-commerce. Retrieved from https://en.wikipedia.org/wiki/Timeline_of_e-commerce
    Description: 碩士
    國立政治大學
    國際經營管理英語碩士學位學程(IMBA)
    105933038
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0105933038
    Data Type: thesis
    DOI: 10.6814/NCCU202000471
    Appears in Collections:[國際經營管理英語碩士學程IMBA] 學位論文

    Files in This Item:

    There are no files associated with this item.



    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback