This is the mobile-friendly web version of the original article.
Digital Identity: A Human-Centered Risk Awareness Study
University of South Florida
Scholar Commons
Graduate Theses and Dissertations, Graduate School
November 2020
Toufic N. Chebib
University of South Florida
A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Business Administration Muma College of Business University of South Florida
Co-Major Professor: Jung Chul Park, Ph.D.
Co-Major Professor: Loran Jarrett, D.B.A.
Joann Quinn, Ph.D.
Paul Solomon, Ph.D.
Date of Approval:
October 23, 2020
Copyright © 2020, Toufic N. Chebib
Video: Welcome to the University of South Florida
Scholar Commons Citation Chebib, Toufic N., “Digital Identity: A Human-Centered Risk Awareness Study” (2020). Graduate Theses and Dissertations. https://scholarcommons.usf.edu/etd/8523
This Dissertation is brought to you for free and open access by the Graduate School at Scholar Commons. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Scholar Commons. For more information, please contact [email protected].
ACKNOWLEDGMENTS
I would like to thank my family for always being there for me. I especially thank my parents for raising their two boys on great values of maintaining integrity in our relationships and work, self-respect, and respect for others, as well as instilling into us a sense of servant leadership. My father, Nicolas, and my mother, Margaret, have always been and still are an exemplary couple in teaching us family values and finding joy in helping others around us. My parents have always taught us not to be afraid to aim for the stars, work hard, and be humble. A big thank you to my brother Ziad for always being a rock I can lean on during tough times.
The journey to get this far through my studies has not been easy. When I first moved to the United States in December 2000, I had a couple of hundred dollars that my father managed to put aside for me; times were tough. He always taught me to be the best I can be in everything I do. My goal was to seek knowledge and get a terminal degree. Here I am, 20 years later, making my dream come true. I always dreamt of being an astronaut; little did I know that being an astronaut was all about breaking barriers and reaching new heights in life.
I want to also thank my DBA cohort members for being a great support channel throughout this program. Thank you to my dissertation chairs and committee: Dr. Jung Chul Park, Dr. Loran Jarrett, Dr. Joann Quinn, and Dr. Paul Solomon. I also thank my dissertation team and cohort members, Mark Mattia, Michael Summers, and Brad Puckey, for listening to my progress updates for almost a year. A special thank you to Dr. Vernetta Williams for being a fantastic dissertation process guide and writing coach, particularly for keeping me motivated and focused. Congratulations to the Doctor of Business Administration class of 2020; this year has not been easy, but we made it through. Best of luck in all your future endeavors.
TABLE OF CONTENTS
- List of Tables
- List of Figures
- Abstract
- Chapter One: Introduction
- Background
- Example of an Identity Theft Victim
- Statement of Purpose
- Purpose
- Relevance
- The Motivation for the Study
- Researcher Bias and Assumptions
- Research Question
- Background
- Chapter Two: About Identity
- Identity
- Privacy
- Data Privacy Risks
- Privacy Laws, Regulations, and Frameworks
- Digital Identity Management
- Chapter Three: Literature Review
- Overview
- Themes from the Literature
- Theme 1: Increased Use of the Internet
- Theme 2: Definition of Digital Identity
- Theme 3: Perspectives on Digital Identity and Privacy
- Theme 4: Privacy Risks
- Theme 5: Laws and Regulations Relating to Privacy and Digital Identity
- Theme 6: Individuals Behavior and Habits
- Theme 7: Tools and Training Enabling Digital Identity Management
- Summary of Findings
- Chapter Four: Methodology
- Overview
- Research Design
- Interview Until Data Novelty Saturation
- Process Followed
- Thematic Analysis
- Why the ATA for this Study
- Data Collection
- Participant Selection
- Interview Participants Characteristics
- Study Invitation
- IRB Approval
- Data Analysis
- Coding Method
- Top-down open coding
- Bottom-up axial coding
- Illustrate findings by themes or key concepts
- Coding Results
- Open coding
- Coding Method
- Chapter Five: Findings
- Overview
- Findings from the Interviews
- Qualifier to the Study: High Internet Adoption and Use of Digital Identity
- Most people 55 to 75 are active online…………………………………………….48
- Online Accounts
- Most of the people didn’t remember all the online accounts they used in the last 5 to 10 years
- Social media
- Online banking
- Online purchases
- Digital identity includes online personal data as well as online interactions
- Theme 1: People Accept the Risk When It Affects Their Convenience
- Accept the risk as it is part of life right now, especially when the convenience outweighs the risks
- Most study participants have been or know someone who has been affected by an online data breach
- Study participants’ online behavior was not affected by experiencing or knowing about cybersecurity breaches
- Study participants’ concern about their online reputation
- People seem to trust their financial institutions to protect them and their money
- Cybersecurity risks are not a deterrence
- Theme 2: People Are Concerned That Companies Are Not Being Transparent with Regards to Being Good Custodians of Their Digital Identity
- Companies are not providing details about data breaches
- There is a high level of familiarity with the existence of online privacy rules, laws, and regulations
- Companies are not transparent with people’s personal data withheld or shared online
- People want companies to be more transparent
- Theme 3: People Are Aware of the Availability of Tools and Trainings to Help Manage the Risks
- Awareness to keep digital identity secure
- People’s awareness of tools and training
- People’s exposure to cybersecurity training
- Cybersecurity training is helpful
- Low adoption of password management tools
- Theme 4: People Want More Transparency and Control Over Their Digital Identity to Help Them Ease Their Concerns of the Risks
- People want more transparency and control over their online digital data
- Solutions desired geared towards transparency and more control
- Qualifier to the Study: High Internet Adoption and Use of Digital Identity
- Chapter Six: Discussion
- Overview
- Analysis
- Qualifier to the Study: Increased Level of Internet Adoption Among People Caused the Wide Use of Digital Identity
- Interpretation
- Qualifier to the Study: People Are Aware of the Composition of Their Digital Identity
- Interpretation
- Theme 1: Relationship Between Digital Identity Risks and People’s Online Behavior
- Interpretation
- Theme 2: Online Platforms Are a Risk to People’s Digital Identity
- Interpretation
- Theme 3: Tools to Manage Digital Identity Risks
- Interpretation
- Theme 4: People Want More Transparency and Awareness to Keep Their Digital Identity Secure
- Interpretation
- Qualifier to the Study: Increased Level of Internet Adoption Among People Caused the Wide Use of Digital Identity
- Conclusions
- Contribution to Academics and Practitioners
- Limitations and Future Research
References
Appendix A: Interview Solicitation Flyer
Appendix B: IRB Verbal Consent Form
Appendix C: Interview Questionnaire
Appendix D: IRB Approval Exempt Form
- Appendix E: ITRC 2019 Data Breach Report Statistics
LIST OF TABLES
Table 1: Literature Review Summary of Findings
Table 2: Open Coding and Groupings.
Table 3: Open Coding to Axial Coding
Table 4: Axial Coding to Themes
Table 5: Internet Adoption Comparison
Table 6: Digital Identity Composition Awareness Comparison
Table 7: Relationship Between Digital Identity Risks and People’s Online Behavior Comparison
Table 8: Online Platforms are a Risk to People’s Digital Identity Comparison
Table 9: Tools to Manage People’s Digital Identity Comparison
Table 10: People Want More Transparency and Awareness to Keep Their Digital Identity Secure Comparison
Table 1A: Breaches and Records Exposed (In Millions) by Year (2010 to 2019)
LIST OF FIGURES
Figure 1: The Two Major Categories of Identity
Figure 2: Digital Identity Composition
Figure 3: Literature Review Process
Figure 4: The Seven Themes from the Literature Review
Figure 5: The End-to-End Trust Model in the Interactions Between the Digital and Physical Worlds
Figure 6: Methodology Process Followed Thematic Analysis
Figure 7: Adapted Thematic Analysis Framework
Figure 8: Transcripts to Open Coding Relationship
Figure 9: Open Coding to Axial Coding Relationship
Figure 10: Axial Coding to Themes
Figure 11: The Four Major Themes from the Interviews
ABSTRACT
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.
To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 with no IT background, pertaining to their digital identity?” The literature review helped identify seven themes that served as a base to generate a series of qualitative interview questions. Twenty interviews were conducted, transcribed, and coded following the Adapted Thematic Analysis framework, which resulted in four themes that answered the research question.
The themes relevant to the research question were: People accept the risk when it affects their convenience, people are concerned that companies are not being transparent with regards to being good custodians of their digital identity, people are aware of the availability of tools and training to help manage the risks, people want more transparency and control over their digital identity to help ease their concerns of the risks.
The findings from the literature review and the interviews led to a series of interpretations that validated the gaps found in the literature review. Notably, the quarantine caused by the unexpected event (i.e.: COVID-19 pandemic) forced people to an all-time high adoption of the internet. People were aware of the risks pertaining to their digital identity, but their level of awareness varied. This gap developed the need for a personal risk assessment framework and the need for a benchmark of user-friendly best practices to help mitigate the risks. The increased adoption of new technologies similar to machine learning, artificial intelligence, and distributed ledger technologies like blockchain will help in creating more of a transparent ecosystem to interact online as well as reduce human intervention in reacting to and mitigating cybersecurity risks affecting digital identity.
Table of contents
- CHAPTER ONE - INTRODUCTION
- CHAPTER TWO - ABOUT IDENTITY
- CHAPTER THREE - LITERATURE REVIEW
- CHAPTER FOUR - METHODOLOGY
- CHAPTER FIVE - FINDINGS
- CHAPTER SIX - DISCUSSION
- REFERENCES
- APPENDIX A - INTERVIEW SOLICITATION FLYER
- APPENDIX B - IRB VERBAL CONSENT FORM
- APPENDIX C - INTERVIEW QUESTIONNAIRE
- APPENDIX D - IRB APPROVAL EXEMPT FORM
- APPENDIX E - ITRC 2019 DATA BREACH REPORT STATISTICS