{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:57:02Z","timestamp":1776956222738,"version":"3.51.4"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:00:00Z","timestamp":1606694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:00:00Z","timestamp":1606694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001831","name":"Delft University of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001831","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that \u2018self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also argued that while it might be appealing to operationalise the concept of \u2018self-sovereignty\u2019 in a narrow technical sense, depreciation of moral semantics obscures key challenges and long-term repercussions. Closer attention to the normative substance of the \u2018sovereignty\u2019 concept helps to highlight a range of ethical issues pertaining to the changing nature of human identity in the context of ubiquitous private data collection.<\/jats:p>","DOI":"10.1007\/s10676-020-09563-x","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T07:03:04Z","timestamp":1606719784000},"page":"239-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Sovereignty, privacy, and ethics in blockchain-based identity management systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Georgy","family":"Ishmaev","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,30]]},"reference":[{"key":"9563_CR1","unstructured":"Acxiom Research. (2017). Blockchain in ad tech. Retrieved from https:\/\/www.acxiom.com\/wp-content\/uploads\/2017\/12\/AC-1752-17-3-Point-of-View-Blockchain-in-Ad-Tech.pdf."},{"key":"9563_CR2","unstructured":"Adams, T. (2018). Facebook\u2019s\u00a0week of shame: The Cambridge Analytica fallout. The Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2018\/mar\/24\/facebook-week-of-shame-data-breach-observer-revelations-zuckerberg-silence."},{"key":"9563_CR3","unstructured":"Allen, C. (2017). The path to self-sovereign identity. Retrieved from https:\/\/github.com\/WebOfTrustInfo\/self-sovereign-identity\/blob\/master\/ThePathToSelf-SovereignIdentity.md."},{"key":"9563_CR4","unstructured":"Allen, C., Brock, A., Buterin, V., Callas, J., & Dorje, D. (2015). Decentralized public key infrastructure. A white paper from rebooting the web of trust. Retrieved from https:\/\/github.com\/WebOfTrustInfo\/rebooting-the-web-of-trust\/blob\/master\/final-documents\/dpki.pdf."},{"issue":"11","key":"9563_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/3353770","volume":"62","author":"S Banerjee","year":"2019","unstructured":"Banerjee, S., & Sharma, S. (2019). Privacy concerns with Aadhaar. Communications of the ACM, 62(11), 80. https:\/\/doi.org\/10.1145\/3353770.","journal-title":"Communications of the ACM"},{"key":"9563_CR7","unstructured":"Canon, G. (2018). \u201cCity of surveillance\u201d: Privacy expert quits Toronto\u2019s smart-city project. The Guardian. Retrieved from https:\/\/www.theguardian.com\/world\/2018\/oct\/23\/toronto-smart-city-surveillance-ann-cavoukian-resigns-privacy."},{"issue":"10","key":"9563_CR8","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030\u20131044.","journal-title":"Communications of the ACM"},{"key":"9563_CR9","unstructured":"Christin, A., Rosenblat, A., & Boyd, D. (2015). Courts and predictive algorithms. Data & CivilRight. Retrieved from http:\/\/www.law.nyu.edu\/sites\/default\/files\/upload_documents\/Angele%20Christin.pdf."},{"key":"9563_CR10","volume-title":"Networks of control: A report on corporate surveillance, digital tracking, big data & privacy","author":"W Christl","year":"2016","unstructured":"Christl, W., & Spiekermann, S. (2016). Networks of control: A report on corporate surveillance, digital tracking, big data & privacy. Wien: Facultas."},{"key":"9563_CR11","unstructured":"Conway, S., Hughes, A., Ma, M., Poole, J., Riedel, M., Smith, S. M., & Stocker, C. (2019). A DID for everything attribution, verifcation and provenance for entities and data items a white paper from rebooting the web of trust VII. Retrieved from https:\/\/github.com\/WebOfTrustInfo\/rwot7-toronto\/blob\/master\/final-documents\/A_DID_for_everything.pdf."},{"issue":"4","key":"9563_CR12","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s12553-017-0202-6","volume":"7","author":"P Dixon","year":"2017","unstructured":"Dixon, P. (2017). A failure to \u201cDo No Harm\u201d\u2014India\u2019s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. Health and Technology, 7(4), 539\u2013567. https:\/\/doi.org\/10.1007\/s12553-017-0202-6.","journal-title":"Health and Technology"},{"key":"9563_CR13","doi-asserted-by":"publisher","unstructured":"Engelmann, S., Chen, M., Fischer, F., Kao, C., & Grossklags, J. (2019). Clear sanctions, vague rewards: How China\u2019s social credit system currently defines \u201cGood\u201d and \u201cBad\u201d behavior. In Proceedings of the conference on fairness, accountability, and transparency\u2014FAT*\u201919 (pp. 69\u201378). Atlanta, GA: ACM Press. https:\/\/doi.org\/10.1145\/3287560.3287585.","DOI":"10.1145\/3287560.3287585"},{"key":"9563_CR14","unstructured":"Filippi, P. D., & Hassan, S. (2018). Blockchain technology as a regulatory technology: From code is law to law is code. CoRR, abs\/1801.02507. Retrieved from http:\/\/arxiv.org\/abs\/1801.02507."},{"issue":"3","key":"9563_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10676-006-9121-3","volume":"8","author":"L Floridi","year":"2006","unstructured":"Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8(3), 109\u2013119. https:\/\/doi.org\/10.1007\/s10676-006-9121-3.","journal-title":"Ethics and Information Technology"},{"key":"9563_CR16","unstructured":"Harwell, D. (2018). Wanted: The \u2018perfect babysitter.\u2019 Must pass AI scan for respect and attitude. Washington Post. Retrieved from https:\/\/www.washingtonpost.com\/technology\/2018\/11\/16\/wanted-perfect-babysitter-must-pass-ai-scan-respect-attitude\/."},{"key":"9563_CR17","unstructured":"Holmes, A. (2020). Facebook knows what you\u2019re doing on other sites and in real life. This tool lets you see what it knows about you. Business Insider. https:\/\/www.businessinsider.nl\/facebook-clear-history-offline-activity-tracker-tool-how-to-use-2020-1?international=true&r=US."},{"issue":"3","key":"9563_CR18","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1093\/ijlit\/eaw006","volume":"24","author":"WK Hon","year":"2016","unstructured":"Hon, W. K., Millard, C., Singh, J., Walden, I., & Crowcroft, J. (2016). Policy, legal and regulatory implications of a Europe-only cloud. International Journal of Law and Information Technology, 24(3), 251\u2013278.","journal-title":"International Journal of Law and Information Technology"},{"key":"9563_CR19","unstructured":"Hughes, E. (1993). A cypherpunk\u2019s manifesto. Retrieved August 10, 2019, from http:\/\/www.activism.net\/cypherpunk\/manifesto.html."},{"key":"9563_CR20","first-page":"203","volume-title":"Data protection and privacy: The age of intelligent machines","author":"G Ishmaev","year":"2018","unstructured":"Ishmaev, G. (2018). Rethinking trust in the Internet of things. In R. Leenes, R. van Brakel, S. Gutwirth, & P. de Hert (Eds.), Data protection and privacy: The age of intelligent machines (pp. 203\u2013230). Oxford: Hart Publishing."},{"issue":"3","key":"9563_CR21","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s13347-019-00361-y","volume":"33","author":"G Ishmaev","year":"2019","unstructured":"Ishmaev, G. (2019). The ethical limits of blockchain-enabled markets for private IoT data. Philosophy & Technology, 33(3), 411\u2013432. https:\/\/doi.org\/10.1007\/s13347-019-00361-y.","journal-title":"Philosophy & Technology"},{"key":"9563_CR22","doi-asserted-by":"publisher","first-page":"15","DOI":"10.3389\/fbloc.2020.00015","volume":"3","author":"G Ishmaev","year":"2020","unstructured":"Ishmaev, G., & Stokkink, Q. (2020). Identity management systems: Singular identities and multiple moral issues. Frontiers in Blockchain, 3, 15. https:\/\/doi.org\/10.3389\/fbloc.2020.00015.","journal-title":"Frontiers in Blockchain"},{"key":"9563_CR23","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1017\/CBO9780511675928.007","volume-title":"Sovereignty in fragments. The past, present and future of a contested concept","author":"H Kalmo","year":"2010","unstructured":"Kalmo, H. (2010). A matter of fact? The many faces of sovereignty. In H. Kalmo & Q. Skinner (Eds.), Sovereignty in fragments. The past, present and future of a contested concept (pp. 114\u2013131). Cambridge: Cambridge University Press."},{"key":"9563_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/CBO9780511675928","volume-title":"Sovereignty in fragments. The past, present and future of a contested concept","author":"H Kalmo","year":"2010","unstructured":"Kalmo, H., & Skinner, Q. (2010). Introduction: A concept in fragments. In H. Kalmo & Q. Skinner (Eds.), Sovereignty in fragments. The past, present and future of a contested concept (pp. 1\u201325). Cambridge: Cambridge University Press."},{"key":"9563_CR25","volume-title":"The Facebook effect: The inside story of the company that is connecting the world","author":"D Kirkpatrick","year":"2011","unstructured":"Kirkpatrick, D. (2011). The Facebook effect: The inside story of the company that is connecting the world (1st Simon & Schuster trade pbk ed.). New York: Simon & Schuster Paperbacks.","edition":"1 Simon & Schus"},{"key":"9563_CR26","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1017\/CBO9780511675928.013","volume-title":"Sovereignty in fragments. The past, present and future of a contested concept","author":"M Koskenniemi","year":"2010","unstructured":"Koskenniemi, M. (2010). Conclusion: Vocabularies of sovereignty\u2014Powers of a paradox. In H. Kalmo & Q. Skinner (Eds.), Sovereignty in fragments. The past, present and future of a contested concept (pp. 222\u2013242). Cambridge: Cambridge University Press."},{"key":"9563_CR27","unstructured":"Kussmaul, W., & Greening, D. (2018). SSI: A roadmap for adoption. Retrieved from https:\/\/github.com\/WebOfTrustInfo\/rwot6-santabarbara\/blob\/master\/final-documents\/a-roadmap-for-ssi.pdf."},{"key":"9563_CR28","unstructured":"Lecher, C. (2019). Automated background checks are deciding who\u2019s fit for a home. The Verge. Retrieved from https:\/\/www.theverge.com\/2019\/2\/1\/18205174\/automation-background-check-criminal-records-corelogic."},{"key":"9563_CR29","volume-title":"The passport: The history of man\u2019s most travelled document","author":"M Lloyd","year":"2008","unstructured":"Lloyd, M. (2008). The passport: The history of man\u2019s most travelled document. Canterbury: Queen Anne\u2019s Fan."},{"key":"9563_CR30","volume-title":"Two treatises of government: And a letter concerning toleration","author":"J Locke","year":"2003","unstructured":"Locke, J., Shapiro, I., & Locke, J. (2003). Two treatises of government: And a letter concerning toleration. New Haven, CT: Yale University Press."},{"key":"9563_CR31","unstructured":"Loffreto, D. (2012). What is \u2018sovereign source authority\u2019? The Moxy Tongue. https:\/\/www.moxytongue.com\/2012\/02\/what-is-sovereign-source-authority.html."},{"key":"9563_CR70","unstructured":"Ma, M., Rumore, C., Gisolfi, D., Kussmaul, W., & Greening, D. (2018). SSI: A roadmap for adoption. Retrieved from https:\/\/github.com\/WebOfTrustInfo\/rwot6-santabarbara\/blob\/master\/final-documents\/a-roadmap-for-ssi.pdf."},{"issue":"1","key":"9563_CR32","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10676-010-9216-8","volume":"12","author":"N Manders-Huits","year":"2010","unstructured":"Manders-Huits, N. (2010). Practical versus moral identities in identity management. Ethics and Information Technology, 12(1), 43\u201355. https:\/\/doi.org\/10.1007\/s10676-010-9216-8.","journal-title":"Ethics and Information Technology"},{"key":"9563_CR33","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-0-387-79026-8_6","volume-title":"The future of identity in the information society","author":"N Manders-Huits","year":"2008","unstructured":"Manders-Huits, N., & van den Hoven, J. (2008). Moral identification in identity management systems. In S. Fischer-H\u00fcbner, P. Duquenoy, A. Zuccato, & L. Martucci (Eds.), The future of identity in the information society (pp. 77\u201391). New York: Springer."},{"key":"9563_CR34","unstructured":"Marlinspike, M. (2014). Root data sovereignty. The Moxy Tongue. Retrieved from https:\/\/www.moxytongue.com\/2014\/07\/root-data-sovereignty.html."},{"key":"9563_CR35","volume-title":"Bitcoin and cryptocurrency technologies: A comprehensive introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., & Felten, E. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press."},{"key":"9563_CR36","unstructured":"Ohlberg, M., Ahmed, S., & Lang, B. (2017). Central planning, local experiments. The complex implementation of China\u2019s Social Credit System. MERICS. Mercator Instituite for China Studies. Retrieved from https:\/\/www.merics.org\/sites\/default\/files\/2017-12\/171212_China_Monitor_43_Social_Credit_System_Implementation.pdf."},{"issue":"2","key":"9563_CR37","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1177\/0032329219838932","volume":"47","author":"KS Rahman","year":"2019","unstructured":"Rahman, K. S., & Thelen, K. (2019). The rise of the platform business model and the transformation of twenty-first-century capitalism. Politics & Society, 47(2), 177\u2013204. https:\/\/doi.org\/10.1177\/0032329219838932.","journal-title":"Politics & Society"},{"key":"9563_CR38","unstructured":"Ramirez, E., Brill, J., Ohlhausen, M. K., Wright, J. D., & McSweeny, T. (2014). Data brokers. A call for transparency and accountability. US Federal Trade Commission. Retrieved from https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014\/140527databrokerreport.pdf."},{"key":"9563_CR39","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.62","author":"W Reijers","year":"2016","unstructured":"Reijers, W., O\u2019Brolch\u00e1in, F., & Haynes, P. (2016). Governance in blockchain technologies & social contract theories. Ledger. https:\/\/doi.org\/10.5195\/ledger.2016.62.","journal-title":"Ledger"},{"key":"9563_CR40","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1017\/S0167676800004906","volume":"6","author":"W Riphagen","year":"1975","unstructured":"Riphagen, W. (1975). Some reflections on \u201cFunctional Sovereignty\u201d. Netherlands Yearbook of International Law, 6, 121. https:\/\/doi.org\/10.1017\/S0167676800004906.","journal-title":"Netherlands Yearbook of International Law"},{"key":"9563_CR41","unstructured":"Schmidt, D. C. (2018). Google data collection (p. 53). Digital content next. Retrieved from https:\/\/digitalcontentnext.org\/wp-content\/uploads\/2018\/08\/DCN-Google-Data-Collection-Paper.pdf."},{"key":"9563_CR42","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvndv992","volume-title":"Identity and violence: The illusion of destiny","author":"A Sen","year":"2007","unstructured":"Sen, A. (2007). Identity and violence: The illusion of destiny (1. paperback ed.). New York: Norton.","edition":"1. paperback"},{"issue":"1","key":"9563_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10676-009-9186-x","volume":"12","author":"DW Shoemaker","year":"2010","unstructured":"Shoemaker, D. W. (2010). Self-exposure and exposure of the self: Informational privacy and the presentation of identity. Ethics and Information Technology, 12(1), 3\u201315. https:\/\/doi.org\/10.1007\/s10676-009-9186-x.","journal-title":"Ethics and Information Technology"},{"key":"9563_CR44","unstructured":"Singer, N., & Mahshwari, S. (2018). Google is teaching children how to act online. Is it the best role model? The New York Times. Retrieved from https:\/\/www.nytimes.com\/2018\/10\/23\/business\/google-kids-online-safety.html."},{"key":"9563_CR46","unstructured":"Smith, S. M., & Khovratovich, D. (2016). Identity system essentials. Retrieved from https:\/\/www.evernym.com\/wp-content\/uploads\/2017\/02\/Identity-System-Essentials.pdf."},{"key":"9563_CR47","unstructured":"Sovrin. (2018). SovrinTM: A protocol and token for self-sovereign identity and decentralized trust. Sovrin foundation. Retrieved from https:\/\/sovrin.org\/wp-content\/uploads\/Sovrin-Protocol-and-Token-White-Paper.pdf."},{"key":"9563_CR49","doi-asserted-by":"publisher","unstructured":"Stokkink, Q. and Pouwelse, J. (2018). Deployment of a blockchain-based self-sovereign identity. In 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 1336\u20131342), Halifax, NS, Canada. https:\/\/doi.org\/10.1109\/cybermatics_2018.2018.00230.","DOI":"10.1109\/cybermatics_2018.2018.00230"},{"key":"9563_CR50","volume-title":"The inevitable rise of self-sovereign identity","author":"A Tobin","year":"2016","unstructured":"Tobin, A., & Reed, D. (2016). The inevitable rise of self-sovereign identity. Provo: The Sovrin Foundation."},{"key":"9563_CR51","first-page":"56","volume-title":"Self-sovereing identity. A position paper on blockchain enabled identity and the road ahead","author":"K Wagner","year":"2018","unstructured":"Wagner, K., Nemethi, B., Renieris, E., Lang, P., Brunet, E., & Holst, E. (2018). Self-sovereing identity. A position paper on blockchain enabled identity and the road ahead (p. 56). Berlin: Blockchain Bundesverband."},{"issue":"3","key":"9563_CR52","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1177\/1354066101007003001","volume":"7","author":"WG Werner","year":"2001","unstructured":"Werner, W. G., & De Wilde, J. H. (2001). The endurance of sovereignty. European Journal of International Relations, 7(3), 283\u2013313. https:\/\/doi.org\/10.1177\/1354066101007003001.","journal-title":"European Journal of International Relations"},{"issue":"4","key":"9563_CR53","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1073\/pnas.1418680112","volume":"112","author":"W Youyou","year":"2015","unstructured":"Youyou, W., Kosinski, M., & Stillwell, D. (2015). Computer-based personality judgments are more accurate than those made by humans. Proceedings of the National Academy of Sciences, 112(4), 1036\u20131040.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"9563_CR54","unstructured":"Zetter, K. (2016). Apple\u2019s FBI battle is complicated: Here\u2019s what\u2019s really going on. Wired. Retrieved from https:\/\/www.wired.com\/2016\/02\/apples-fbi-battle-is-complicated-heres-whats-really-going-on\/."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09563-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-020-09563-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09563-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T19:16:44Z","timestamp":1638299804000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-020-09563-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,30]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["9563"],"URL":"https:\/\/doi.org\/10.1007\/s10676-020-09563-x","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,30]]},"assertion":[{"value":"30 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}