{"version":"1.0","provider_name":"ITU","provider_url":"https:\/\/www.itu.int\/hub\/zh-hans\/","author_name":"Ralf Vanalst","author_url":"https:\/\/www.itu.int\/hub\/zh-hans\/author\/ralf-vanalstitu-int\/","title":"Digital identity in the ICT ecosystem: An overview - ITU","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VcjJTFdKgd\"><a href=\"https:\/\/www.itu.int\/hub\/zh-hans\/publication\/d-pref-bb-id01-2018\/\">Digital identity in the ICT ecosystem: An overview<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.itu.int\/hub\/zh-hans\/publication\/d-pref-bb-id01-2018\/embed\/#?secret=VcjJTFdKgd\" width=\"600\" height=\"338\" title=\"\u300aDigital identity in the ICT ecosystem: An overview\u300b\u2014ITU\" data-secret=\"VcjJTFdKgd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.itu.int\/hub\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.itu.int\/hub\/wp-content\/uploads\/sites\/4\/2018\/11\/d-pref-bb.id01-2018-img-jpg-m.jpg","thumbnail_width":1024,"thumbnail_height":577,"description":"Nearly half the world\u2019s population are online every day using the Internet in ways that can compromise their digital identities. Digital Identity in the ICT Ecosystem: An Overview highlights the need for digital identity protection, greater data security, interoperability, and trust and privacy. It presents an overview of the challenges and opportunities governments face in protecting digital identities in a world where the number of ways they can be compromised is growing by the day."}