American International Journal of Computer Science and Information Technology (AIJCSIT)

THEORETICAL FOUNDATIONS OF ONLINE IDENTITY SECURITY

Authors

  • Stella Tonye Whyte Rivers State University, Port Harcourt
  • Bayo Olushola Omoyiola University of the People, USA
  • Steven Vile Case Walden University

Abstract

Online identity security is an important and evolving field that combines cybersecurity concepts, authentication systems, privacy concepts, and decentralized identity management. This chapter explores the theoretical underpinnings of online identity security, namely, Identity and Access Management (IAM), the zero-trust security paradigm, and self-sovereign identity (SSI). It also covers privacy theories, such as Nissenbaum’s contextual integrity and the privacy paradox, which emphasize the difficulties of protecting personal data in digital contexts. Emerging threats such as identity theft, zero-day vulnerabilities, and AI-driven fraud, are examined in the context of cybersecurity resilience. This study examines the role of blockchain-based identity verification and AI-powered authentication systems in improving security while addressing ethical concerns about algorithmic bias and surveillance capitalism. This research adopts an interdisciplinary approach to balancing security, usability and legal compliance in current identity management frameworks. The findings highlight the necessity for continued developments in identity security to counter evolving digital threats while protecting privacy and user autonomy

Keywords:

Security, Identity, Privacy, Data, Cybersecurity, Threat, Digital

Published

2025-08-07

DOI:

https://doi.org/10.5281/zenodo.16759627

How to Cite

Whyte, S. T., Omoyiola , B. O., & Case, S. V. (2025). THEORETICAL FOUNDATIONS OF ONLINE IDENTITY SECURITY. American International Journal of Computer Science and Information Technology (AIJCSIT), 10(4), 1–12. https://doi.org/10.5281/zenodo.16759627

References

Abdelkader, S., Amissah, J., Kinga, S., Mugerwa, G., Emmanuel, E., Mansour, D. E. A. ... & Prokop, L. (2024). Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyberattacks. http://doi. 10.1016/j.rineng.2024.102647.

Acquisti, A., Brandimarte, L., & Loewenstein, G. (2020). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.

Ajit Bhingarkar (2024).Implementing Zero Trust Architecture on Azure hybrid cloud. https://dzone.com/articles/implementing-zero-trust-architecture-on-azure-hybr

Allen, C. (2016). Path to self-sovereign identity. Blockchain and Identity Review, 1(1), 1-10.

Akinsanya, M. O., Ekechi, C. C., & Okeke, C. D. (2024). [23] Evolution of cyber resilience frameworks in network security: A conceptual analysis. Computer Science & IT Research Journal, 5(4), 926-949.

AL-Hawamleh, A. (2024). Cyber resilience framework: Strengthening defenses and enhancing continuity in business security. International Journal of Computing and Digital Systems, 15(1), 1315-1331.

Atadoga, A., Sodiya, E. O., Umoga, U. J., and Amoo, O. O. (2024). A comprehensive review of machine learning’s role in enhancing network security and threat detection. World Journal of Advanced Research and Reviews, 21(2), 877-886.

Altman, I. (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole.

Bouchama, F., & Kamal, M. (2021). Enhance cyber threat detection by machine learning-based behavioral modeling of network traffic patterns. International Journal of Business Intelligence and Big Data Analytics, 4(9), 1-9.

Belli, L. (2022). AI and digital identity: Opportunities and risks. AI & Society Journal, 37(2), 189-203.

Boyd, D. (2014). It is complicated: The social lives of networked teens. Yale University Press.

Cavoukian, A. (2010). Privacy by Design: The 7 Foundational Principles. Information and Privacy Commissioner of Ontario.

Clarke, R. (2023). The Theory of Identity Management Extended to the Authentication of Identity Assertions. Published in the Proceedings of the 36th Bled conference, June 2023. https://www.rogerclarke.com/ID/IEA-Bled.html

Dwork, C. (2006). Differential Privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages, and Programming.

Flaherty, D. (1989). Protecting Privacy in Surveillance Societies. UNC Press; 2007.

Whyte, S. T., Omoyiola, B. O., and Benneth, E. O. (2022). Use of Blockchain Technology in Data Integrity Assurance. http://dx.doi.org/10.2139/ssrn.4043164. ELSEVIER.

Ferrara, E., et al. (2020). The rise of deepfake identity fraud: Implications for cybersecurity. IEEE Security & Privacy, 18(4), 72-80.

Goffman, E. (1959). The presentation of the self in everyday life. Anchor Books.

Kant, I. (1785). Groundwork of the Metaphysics of Morals.

Keith B. Anderson, Erik Durbin, and Michael A. Salinger (2008). Identity Theft. Journal of Economic Perspectives. 22(2), 171–192. https://pubs.aeaweb.org/doi/pdf/10.1257%2Fjep.22.2.171

Kindervag, J. (2010). No more chewy centers: The zero-trust model of information security. Forrester Research Report, 1-15.

Kuchipudi, N., Anusha, Y., & Mekala, T. (2024). Enhancing Cybersecurity Resilience: A Study of Threat Detection and Mitigation Techniques in Modern Networks. Library Progress International, 44(3), pp. 12371-12380.

Kshetri, N. (2021). Biometric authentication and digital identity security. Journal of Cybersecurity Studies, 5(1), 112-127.

Koops, B-J. (2014.) The Trouble with the European Data Protection Law. International Data Privacy Law, 4(4), 250-261.

Jobin, A., Ienca, M., & Vayena, E. (2019). The global landscape of AI ethics guidelines. Nature Machine Intelligence, 1(9), 389-399

Mill, J. S. (1863). Utilitarianism.

National Institute of Standards and Technology (NIST). (2021). Digital Identity Guidelines (NIST SP 800-63-3).

Mittal, S., Raj, H., & Aickelin, U. (2018). A review of machine learning approaches for cyber security analytics. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (pp. 819-824).9.

Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.

Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. NYU Press.

Omoyiola, B. O. (2018). The legality of ethical hacking. IOSR Journal of Computer Engineering (IOSR-JCE). 20(1), 61-63.doi:10.9790/0661-2001016163.

Samon, J., Carney, D., & Liu, Y. (2021). AI-Enabled Cyber Defense Systems: Next Generation Implementation and Deployment. Springer.

Satria, M .Z. Rimbawa, H. A. D., & Wiryana, M. (2024). Zero Trust Architecture: A Comprehensive Approach to Incident Response Management. International Journal of Progressive Sciences and Technologies (IJPSAT), 42(2), 487-496.

Santosh, K. B., Priyanka, A., & Ankit, K. J. (2025). Detection and prevention of spear phishing attacks: A comprehensive survey https://doi.org/10.1016/j.cose.2025.104317. ELSEVIER

Sivalenka, V., Aluvala, S., Mannanuddin, K., Sunil, G., Vedika, J., & Pranathi, V. (2024, June). A review of the impact of cybercrimes. In AIP Conference Proceedings (Vol. 2971, No. 1). AIP Publishing

Solove, D. (2008). Understanding Privacy. Harvard University Press.

Solove, D. J., & Schwartz, P. M. (2021). Information privacy law. Wolters Kluwer.

Tajfel, H., Turner, J. C. (1979). Integrative theory of intergroup conflict. The Social Psychology of Intergroup Relations, 33(47), pp. 74-89.

Vinod, V. V. (2023).Enhancing Cyber Resilience by Integrating AI-Driven Threat Detection and Mitigation Strategies.

Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220.

Whyte, S. T. (2023). Privacy and Cybersecurity in Data Governance. Journal of Information Technology Security and Applications. http://dx.doi.org/10.2139/ssrn.4043164.

Yuanhang He, Daochao Huang, Lei Chen, Yi Ni, Xiangjie Ma (2022). A Survey on Zero Trust Architecture: Challenges and Future Trends. https://doi.org/10.1155/2022/6476274

Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.

Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. IEEE Security & Privacy Workshops, 180-184.

Similar Articles

<< < 1 2 3 > >> 

You may also start an advanced similarity search for this article.