About the Project
The work on the doctoral study PhD will focus on the management of digital identifiers in cases where the less digitally confident share their details with others, for instance as used in decentralised identity systems. The study will address the gap between (a) users’ real-world information practices around sharing access to digital identifiers and (b) the assumptions of self-management that underpin the concept of many decentralised identity infrastructures.
The research aspects of this project are information and people focused, and it will make use of advanced digital identity frameworks such as self-sovereign identity and distributed identity. This project is for a student with a focus on information practice research, and an interest in and ability to understand and explain the underlying technologies.
A first degree (at least a 2.1) ideally in a subject that has included information science and/or (cyber) security with a good fundamental knowledge of information systems.
English language requirement
IELTS score must be at least 6.5 (with not less than 6.0 in each of the four components). Other, equivalent qualifications will be accepted.
• Experience of fundamental topics related to information science
• Competent in qualitative research
• Knowledge of information behaviour, data protection, information security
• Good written and oral communication skills
• Strong motivation, with evidence of independent research skills relevant to the project
• Good time management
An ability to work with a range of people (including researchers and practitioners) across different disciplines, in particular, an interest in understanding relevant technologies and how they can work in cases where citizens are not skilled or motivated computer users.
Coles-Kemp, L., & Hansen, R. R. (2017). Walking the Line: The Everyday Security Ties that Bind. In T. Tryfonas (Ed.), HAS 2017: International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 464–480). https://doi.org/10.1007/978-3-319-58460-7_32
Dourish, P., & Anderson, K. (2006). Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction, 21(3), 319–342. https://doi.org/10.1207/s15327051hci2103_2
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., & Pope, S. (2005). Trust requirements in identity management. Conferences in Research and Practice in Information Technology Series, 44, 99–108.
Kaczmarek, M., Shankar, S., & Nathan, L. P. (2019). Information practice, responsibility, and the ability to respond. Proceedings of the Association for Information Science and Technology, 55(1), 837–838. https://doi.org/10.1002/pra2.2018.14505501138
Moncur, W., Durrant, A., & Martindale, S. (2014). An introduction to charting the digital lifespan. Paper presented at CHI 2014 Workshop on Designing Technology for Major Life Events, Toronto, Canada.
Zagouras, P., Kalloniatis, C., & Gritzalis, S. (2017). Managing User Experience: Usability and Security in a New Era of Software Supremacy. In T. Tryfonas (Ed.), HAS 2017: International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 174–188). https://doi.org/10.1007/978-3-319-58460-7_12
Why not add a message here
Based on your current searches we recommend the following search filters.
Based on your current search criteria we thought you might be interested in these.
Supporting Behaviour Change - using research in cognitive and social psychology that has identfied strategies that improve the transition from an individual’s intentions and their actual behaviours
University of Reading