Identifying and Supporting Financially Vulnerable Consumers in a
Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and
Verifiable Credentials
- URL: http://arxiv.org/abs/2106.06053v1
- Date: Thu, 10 Jun 2021 21:05:34 GMT
- Title: Identifying and Supporting Financially Vulnerable Consumers in a
Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and
Verifiable Credentials
- Authors: Tasos Spiliotopoulos, Dave Horsfall, Magdalene Ng, Kovila Coopamootoo,
Aad van Moorsel, Karen Elliott
- Abstract summary: Vulnerable individuals have a limited ability to make reasonable financial decisions and choices.
This paper examines the potential of the combination of two emerging technologies, Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) for the identification of vulnerable consumers in finance.
- Score: 0.19573380763700707
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Vulnerable individuals have a limited ability to make reasonable financial
decisions and choices and, thus, the level of care that is appropriate to be
provided to them by financial institutions may be different from that required
for other consumers. Therefore, identifying vulnerability is of central
importance for the design and effective provision of financial services and
products. However, validating the information that customers share and
respecting their privacy are both particularly important in finance and this
poses a challenge for identifying and caring for vulnerable populations. This
position paper examines the potential of the combination of two emerging
technologies, Decentralized Identifiers (DIDs) and Verifiable Credentials
(VCs), for the identification of vulnerable consumers in finance in an
efficient and privacy-preserving manner.
Related papers
- 2FA: Navigating the Challenges and Solutions for Inclusive Access [55.2480439325792]
Two-Factor Authentication (2FA) has emerged as a critical solution to protect online activities.
This paper examines the intricacies of deploying 2FA in a way that is secure and accessible to all users.
An analysis was conducted to examine the implementation and availability of various 2FA methods across popular online platforms.
arXiv Detail & Related papers (2025-02-17T12:23:53Z) - Distributed Identity for Zero Trust and Segmented Access Control: A Novel Approach to Securing Network Infrastructure [4.169915659794567]
This study assesses security improvements achieved when distributed identity is employed with ZTA principle.
The study suggests adopting distributed identities can enhance overall security postures by an order of magnitude.
The research recommends refining technical standards, expanding the use of distributed identity in practice, and its applications for the contemporary digital security landscape.
arXiv Detail & Related papers (2025-01-14T00:02:02Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.
Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - DPFedBank: Crafting a Privacy-Preserving Federated Learning Framework for Financial Institutions with Policy Pillars [0.09363323206192666]
This paper presents DPFedBank, an innovative framework enabling financial institutions to collaboratively develop machine learning models.
DPFedBank is designed to address the unique privacy and security challenges associated with financial data, allowing institutions to share insights without exposing sensitive information.
arXiv Detail & Related papers (2024-10-17T16:51:56Z) - Language Models Can Reduce Asymmetry in Information Markets [100.38786498942702]
We introduce an open-source simulated digital marketplace where intelligent agents, powered by language models, buy and sell information on behalf of external participants.
The central mechanism enabling this marketplace is the agents' dual capabilities: they have the capacity to assess the quality of privileged information but also come equipped with the ability to forget.
To perform well, agents must make rational decisions, strategically explore the marketplace through generated sub-queries, and synthesize answers from purchased information.
arXiv Detail & Related papers (2024-03-21T14:48:37Z) - Towards Financially Inclusive Credit Products Through Financial Time
Series Clustering [10.06218778776515]
Financial inclusion increases consumer spending and consequently business development.
Customer segmentation based on consumer transaction data is a well-known strategy used to promote financial inclusion.
We present a novel time series clustering algorithm that allows institutions to understand the financial behaviour of their customers.
arXiv Detail & Related papers (2024-02-16T20:40:30Z) - Blockchain-Based Decentralized Knowledge Marketplace Using Active
Inference [0.0]
Authors present a decentralized framework for the knowledge marketplace incorporating technologies such as blockchain, active inference, zero-knowledge proof, etc.
The proposed decentralized framework provides not only an efficient mapping mechanism to map entities in the marketplace but also a more secure and controlled way to share knowledge and services among various stakeholders.
arXiv Detail & Related papers (2022-10-04T15:37:31Z) - Trustworthy AI [75.99046162669997]
Brittleness to minor adversarial changes in the input data, ability to explain the decisions, address the bias in their training data, are some of the most prominent limitations.
We propose the tutorial on Trustworthy AI to address six critical issues in enhancing user and public trust in AI systems.
arXiv Detail & Related papers (2020-11-02T20:04:18Z) - PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework
Based on Adversarial Learning [111.19576084222345]
This paper proposes a framework of Privacy-preserving Credit risk modeling based on Adversarial Learning (PCAL)
PCAL aims to mask the private information inside the original dataset, while maintaining the important utility information for the target prediction task performance.
Results indicate that PCAL can learn an effective, privacy-free representation from user data, providing a solid foundation towards privacy-preserving machine learning for credit risk analysis.
arXiv Detail & Related papers (2020-10-06T07:04:59Z) - Differentially Private and Fair Deep Learning: A Lagrangian Dual
Approach [54.32266555843765]
This paper studies a model that protects the privacy of the individuals sensitive information while also allowing it to learn non-discriminatory predictors.
The method relies on the notion of differential privacy and the use of Lagrangian duality to design neural networks that can accommodate fairness constraints.
arXiv Detail & Related papers (2020-09-26T10:50:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.