Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.
3. NO IDENTITY
=
NO ACCESS
No rights
or redress
TO JUSTICE
OR SERVICES
R
I
S
K
IDENTITY INFORMATION
4. BIRTH AND CITIZENSHIP
RECORDS
SUBSTANTIALLY DECREASE
CITIZENS’ RISKS
R
I
S
K
Access to rights
and legal system
IDENTITY INFORMATION
5. BUT MORE IDENTITY
INFORMATION
IS NOT
NECESSARILY BETTER
R
I
S
K
?
IDENTITY INFORMATION
6. IDENTIFICATION TRANSFERS RISK
FROM THE IDENTIFYING PARTY
TO THE IDENTIFIED PARTY
R Identified party bears risk of being
I Each party’s initial risk denied service if identity information
S is adverse
K
Identifying party avoids risk by
denying service if identity
information is adverse
IDENTITY INFORMATION
7. SOCIETY USES IDENTIFICATION
TO TAKE RISK FROM
INSTITUTIONS
AND GIVE IT TO INDIVIDUALS
R
I
S
K
Individual citizen needs resources;
must submit to identification
Business or agency has resources;
may require identification
IDENTITY INFORMATION
9. BUILDING DOSSIERS INCREASES RISKS
TO IDENTIFIED PARTIES
BY APPLYING INFORMATION
TO MANY TRANSACTIONS
Risk in future
transactions
R Individual citizen
I
S
K
Risk in current
transaction
Business or agency
IDENTITY INFORMATION
10. ADDING FAVORABLE INFORMATION
TO AN IDENTITY DOSSIER
CAN DECREASE RISK
TO IDENTIFIED PARTIES A LITTLE…
R
I
S
K Benefits granted
based on history
IDENTITY INFORMATION
11. INDIVIDUAL
Roles/ Personal
Persone
Cloud
DATA
Shared &
Personal
Personal
Devices Context Data
Analytics
What if we collected our own data in our own dossiers?
12. BUT ADDING ADVERSE INFORMATION
TO AN IDENTITY DOSSIER
CAN INCREASE RISK
TO IDENTIFIED PARTIES A LOT
R
I
S
K Benefits denied
based on history
IDENTITY INFORMATION
13. Services IDENTITY DOSSIERS
DO NOT ALLOCATE RISKS
EQUALLY TO RICH AND POOR
Good history =
Many service providers =
Easy access to resources = No history or bad history =
Many opportunities Few service providers =
to build good history Little access to resources =
Few opportunities
to build good history
14. THE POOR ARE MORE LIKELY
TO HAVE ADVERSE
INFORMATION
ADDED TO DOSSIERS
Low access to
R resources
I and legal
S services
K
IDENTITY INFORMATION
15. THE RICH ARE
MORE LIKELY TO HAVE
ADVERSE INFORMATION
REMOVED FROMDOSSIERS
R
I High access to
S resources
K and legal
services
IDENTITY INFORMATION
16. Infomediary Markets Retailer
Market Vendor
INDIVIDUAL Individual
Business Place Agent
Agent
Service
Roles/ Provider
Personae
Personal Data Aggregation Markets
DATA
Cloud
Shared & Data
Personal
Devices Aggregation
Context Services Market
Vendor
Place Agent
Utilities Local
Retailor Retailer Service
Social Profit Product Provider
Organization Service Producer
Provider
Vendor Relationship Management
NO PII
17.
18. DOSSIERS TEND TO
ALLOCATE RISKS TO
THOSE LEAST ABLE TO
ABSORB THEM
High Risk
Poor
R
I
S Rich
K Low Risk
IDENTITY INFORMATION
19. CITIZENS OPT OUT OF OR
SUBVERT IDENTITY SYSTEMS
WHICH CREATEEXCESSIVE RISKS
C
O
O
R
P
I
E
S
R
K
A
T
I
O
N
IDENTITY INFORMATION
20. R
I
S
K
Optimal identity Maximum identity
information information
IDENTITY INFORMATION
No identity
information
WELL-DESIGNED IDENTITY SYSTEMS COLLECT, MAINTAIN,
AND USE THE SOCIALLY OPTIMAL AMOUNT
AND TYPEOF IDENTITY INFORMATION
21. R
I
S
K
Felons IDENTITY INFORMATION PREFERENCE
Police
Liberals Conservatives
Tax & Banks
Privacy Persecuted
welfare advocates minorities General Public
cheats
FINDING THE OPTIMAL RISK/BENEFIT TRADEOFF
REQUIRES CAREFUL STUDY AND CITIZEN INVOLVEMENT
23. Verified
? ü
Anonymous Verified
ü ü
ü ü
ü
ü
Documentation In Person Biometric
Verification Capture
24. ?
One Site Multi-Site
ü
Anonymous Verified
Pseudonymous
25. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
26. Planning Considerations
for Identity Systems
• Involve the citizens meaningfully
in the system’s design
27. What are the different contexts that you navigate in your life?
28. What are the different contexts that you navigate in your life?
Daughter Friend: Confidante, Encourager,
Daughter Fun, Listener, Confider
Daughter
Partner Mother
Daughter Great Friend
Spouse Mother
Friend Mother
Wife Sister Friend Mother
Wife Sister Friend Mother
Wife Sister Friend Mother-in-
Wife Sister Friend Law
Wife Sister-in-Law
Wife Mom
Wife Pet Sitting Parent
Aunt Dog Lover Parent
Cousin Dog Owner Parent
Europe Family Dog Owner/Companion
29. What are the different contexts that you navigate in your life?
school volunteer
Volunteer at the Space and Science Center
Volunteer at the Animal Shelter Student
Volunteer at Community Outreach Student
Member SVForum Tech Women Student
Book Club: hostess, humorous, well read, insightful Student
Student
Meetup Organizer Student
Girl Scouts
Organizer Girl Scouts
President (club) Soccer
Secretary of School Club School Soccer Team
A School Club Member Member NCAA Fencing Team
School Newspaper
Energy club Leader
30. What are the different contexts that you navigate in your life?
Work: Mentor, collaborator, driver of work, Innovator
Project Management Professional at ____
Airline Industry Expert MBA
Technologist LinkedIn - Professional Online
Anthropologist LinkedIn: professional Executive
International Artist At work- OnlineID
Director in my Company
Finance Executive Mentor for Startup
Sales Director Cultural Mentor
Sales Enablement Manager Mentor
International Project Manager Mentor Employee
Program Manger Mentor Co-Worker
Organizational Planning Meeting Colleague
Design Thinker Employee
Connector Intern
31. What are the different contexts that you navigate in your life?
Facebook: Funny, Wry posting links about tech, politics, humor, family
Face to face: Celebration Party Arabic Language Learner
Walker
Dancing: Free in the Flow Cyclist
Moose
Chef Formulal Fun
Creative Traveler Sports Car Enthusiast
Piano Photographer
Artist Blogger Contrarian
Artistic Social Media Personal pain in the side
Movie Addict
Online: get educated review before purchase
Online: Research, Learn Inspiration
Online: Buy/place orders Energetic
32. How do you manage persona’s
and your identities with different
contexts and social roles?
I handed out paper and invited the women
to draw their own map of how they do this
and then to share it with their neighbor.
33.
34.
35.
36.
37.
38. Planning Considerations
for Identity Systems
• Make social justice
an explicit design goal
o Carefully balance stakeholder interests
• Consider a system of loosely-linked
special-purpose systems
o Instead of a single centralized system
o Design systems that inherently don’t link personas
together - Example: LLP
39. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
Over 18 years ? Ms.Sue Donna
Woman DOB = 1/21/1982
Voter ü 1823 6th Ave.
Alameda, CA
CA District 9
Verified
Anonymous
Attributes
40. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
41. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
42. ?
One Site Multi-Site
ü
Anonymous Self-Asserted Socially Verified
Pseudonymous Validated
ü
ü
Limited
Liability
Persona
43. Planning Considerations
for Identity Systems
• Design the system to forget
history information after a while
o Or not to compile dossiers at all
44. Planning Considerations
for Identity Systems
• Legally enumerate permitted and
forbidden uses of identity data
o Forbid secondary uses and establish sanctions
• Regulate use, not collection
(per danah boyd)
o Explicitly enumerate permitted uses in the data itself
o Using context metadata
45. What would it look like have citizens meaningfully involved?
http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg
http:
//far
m4.sta
ticfli
ckr.co
m/35
32/4
0152
5698
5_b1
3d64
46. Kaliya’s NSTIC – Governance NOI Response
http://www.identitywoman.net/
insight-for-governance
taoofdemocracy.com
Tom Atlee
co-intelligence.org
47. The Core Principles for Public Engagement
1. Careful Planning and Preparation
2. Inclusion and Demographic Diversity
3. Collaboration and Shared Purpose
4. Openness and Learning
5. Transparency and Trust
6. Impact and Action
7. Sustained Engagement
and Participatory Culture
48. High performance collaboration
amongst industry stakeholders
is needed for NSTIC to succeed.
Shared Understanding
Shared Language
http://www.identitywoman.net/
ecosystems-collaborate-using-shared-language-nstic
alignment-of-nstic-stakeholders
50. A Pattern Language for Bringing Life
to Meetings and other Gatherings
groupworksdeck.org
51. nist.gov/nstic/notices.html
idecosystem.org/
Inviting community engagement
on NSTIC Charter & Bylaws
Mailing List: NSTIC.US
http://lists.idcommons.net
/lists/subscribe/nstic-idm
52. Find a resource list and reference links on our blogs
Bob Blakley
http://notabob.blogspot.com/
Kaliya “Identity Woman” Hamlin
http://www.identitywoman.net
Cloud Identity Summit July 19 2012