Pepe and Quentin

Technical Definitions

(links/citations included when appropriate)

ITGS Definition
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is a user login to a network. A more advanced example would be the use of encrypted digital signatures in a business transaction or the use of watermarking on digital photographs.

Our Definitions in "Plain English"

Authenticity means being able to verify the user when attempted to access a network, through verifications such as log-in or digital signatures.

Images/Videos and Explanations
This video explains how the ey scanner technolog yfunctions and what technology it requires.
This video explains in a simple way the authenticity using technology in a business.

Examples of Authenticity

  • Log-in Systems
external image 20090129-174342.png
external image 20090129-174342.png

  • Digital signatures
external image DSC+Hand.jpg
external image DSC+Hand.jpg

  • “Captcha” questions
external image recaptcha_2007_versus_2010.jpg
external image recaptcha_2007_versus_2010.jpg

  • User-created questions

external image Facebook_Security_Question.png
external image Facebook_Security_Question.png

  • Voice authentication
  • external image VoiceSense.gif
    Finger Print authentication
external image fingerprint_scanners.jpg
Eye scanner
external image CryptoResearchEyeScanner.png


  • Protects user information
  • Protects classified info
  • Provides some safety
  • Can monitor location and who access the system

Non-examples/Negatives of Authenticity

  • Anyone with user information can gain access
  • Hackable

Relevant News Articles
Summary: Hublot a luxury watch brand has introduced Wisekey technology in order to protect their watches. This technological device allows the users to log in into a special website made by the brand. Therefore, this Wisekey technology is allowing the website to recognize real users from any possible fake ones.

Summary: This article talks about a man who uses twitter daily and he compares his activity in twitter to the one of teenagers because he finds the way that teenagers use it less secure. In other words he cares more about his privacy because the teenagers are not aware of the consequences there could be.