[
Ahmed, A.I.A., Ab Hamid, S.H., Gani, A., Khan, S., Khan, M.K. (2019). Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges, Journal of Network and Computer Applications, 145.10.1016/j.jnca.2019.102409
]Search in Google Scholar
[
Chen, L.L., Mirpuri, S., Rao, N., Law, N. (2021). Conceptualization and measurement of digital citizenship across disciplines, Educational Research Review, vol. 33.
]Search in Google Scholar
[
Ennis, D. (August 2020). Citi cites human error in accidental $900M transfer. Banking Dive: https://www.bankingdive.com/news/citi-cites-human-error-in-accidental-900m-transfer/584156/.
]Search in Google Scholar
[
Grassi, P.A., Garcia, M.E., & Fenton, J.L. (2021). Digital Identity Guidelines, National Institute of Standards and Technology, NIST Special Publication, 800-63-3.
]Search in Google Scholar
[
International Telecommunication Union, ITU (2018). Digital Identity Roadmap Guide. Creative Commons Attribution 3.0 IGO (CC BY 3.0 IGO), ITU Geneva, Switzerland.
]Search in Google Scholar
[
Joint Information Systems Committee (JISC, 2019). Digital capabilities framework: the six elements defined, http://repository.jisc.ac.uk/7278/1/BDCP-DC-Framework-Individual-6E-110319.pdf.
]Search in Google Scholar
[
Karnana, M., Akila, M., Krishnaraj, N. (2011). Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing, 11, 1565-1573.10.1016/j.asoc.2010.08.003
]Search in Google Scholar
[
Kaaniche, N., Laurent, M., & Belguith, S. (2020). Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey, Journal of Network and Computer Applications, vol. 171.
]Search in Google Scholar
[
Liu, Y., He, D., Obaidat, M.S., Kumar, N., Khan, M.K., Choo, K.K.R. (2020). Blockchain-based identity management systems: A review, Journal of Network and Computer Applications, vol. 166.
]Search in Google Scholar
[
Okada, A., Whitelock, D., Holmes, W., & Edwards, C. (2019). e-Authentication for online assessment: A mixed-method study, British Journal of Educational Technology, 50(2), 861-875.10.1111/bjet.12608
]Search in Google Scholar
[
Ristoski, P., & Paulheim, H. (2016). Semantic Web in data mining and knowledge discovery: A comprehensive survey, Journal of Web Semantics, Vol. 36, 1-22.
]Search in Google Scholar
[
Rivera, R., Robledo, J.G., Larios, V.M., Avalos, J.M. (2017). How digital identity on blockchain can contribute in a smart city environment. In: 2017 International Smart Cities Conference (ISC2), 1-4.10.1109/ISC2.2017.8090839
]Search in Google Scholar
[
Shelfer, K.M., Corum, C., Procaccino, J.D., & Didier, J. (2004). Smart Cards, Advances in Computers, 147-192.10.1016/S0065-2458(03)60005-7
]Search in Google Scholar
[
Tavana, M., Hajipour, V., & Oveisi, S. (2020). IoT-based enterprise resource planning: Challenges, open issues, applications, architecture, and future research directions, Internet of Things.10.1016/j.iot.2020.100262
]Search in Google Scholar
[
Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy, Computers in Biology and Medicine, vol. 129.
]Search in Google Scholar
[
Tobin, A., & Reed, D. (March 2017). The Inevitable Rise of Self-Sovereign Identity. A white paper from the Sovrin Foundation.
]Search in Google Scholar
[
WEF (2018). World Economic Forum, Davos Identity in a Digital World. A new chapter in the social contract. Cologny/Geneva, Switzerland.
]Search in Google Scholar
[
World Bank Group – GSMA – Secure Identity Alliance Discussion Paper (2016). Digital Identity: Towards Shared Principles for Public and Private Sector Cooperation, July 2016, Washington DC.
]Search in Google Scholar
[
World Government Summit (2017). Building the hyperconnected future on blockchains, http://internetofagreements.com/files/WorldGovernmentSummit-Dubai2017.pdf.
]Search in Google Scholar