A Review of Identity, Identification & Authentication

Juanita Blue, Joan Condell, Tom Lunney

Research output: Contribution to journalArticlepeer-review

379 Downloads (Pure)


With the continued increase in identity theft and related crime, the topics of Identity, Identification and authentication have become a salient focus for governments, institutions and federal crime units across the globe. A plethora of personal identifying details contribute to the formation of an ‘identity’. The construct of an individual’s identity is formed from a combination of attributes that may be genetic, assigned, acquired or socially based. Although the concept of ‘identity’ is somewhat intangible, the concept has morphed in something that is undeniably tangible through the use of identification documentation. Traditionally individuals and organisations depended on traditional paper documentation as a proof of identity, however, with technological advancements, this trend is fast becoming obsolete. Individuals are now required to prove their identity not only in the physical world but also in a cyber context. This review paper explores the areas of identity, identification and authentication, identifying the means by which individuals may be identified, including the modern technologies that are invoked to conduct the process. It also examines emerging technologies that may become standard methods utilized to authenticate purported identities.
Original languageEnglish
Article number561
Pages (from-to)794-804
Number of pages11
JournalInternational Journal for Information Security Research
Issue number2
Publication statusAccepted/In press - 28 Sept 2018


  • Identity
  • identificacion
  • authentication
  • digital identity
  • digital footprint
  • identity access management
  • Access control
  • Information Security
  • e-identification
  • IDaaS
  • identity on the blockchain


Dive into the research topics of 'A Review of Identity, Identification & Authentication'. Together they form a unique fingerprint.

Cite this