SlideShare uma empresa Scribd logo
1 de 52
Baixar para ler offline
Identification and
  Social Justice
            Bob Blakley

Kaliya “Identity Woman” Hamlin

 Cloud Identity Summit   July 19 2012
Identity is
socially constructed
and contextual.
NO IDENTITY
                                             =
                                         NO ACCESS
    No rights
    or redress
                                         TO JUSTICE
                                        OR SERVICES
R
I
S
K




                 IDENTITY INFORMATION
BIRTH AND CITIZENSHIP
                                RECORDS
                        SUBSTANTIALLY DECREASE
                            CITIZENS’ RISKS


R
I
S
K
    Access to rights
    and legal system




         IDENTITY INFORMATION
BUT MORE IDENTITY
                             INFORMATION
                                 IS NOT
                           NECESSARILY BETTER


R
I
S
K

       ?
    IDENTITY INFORMATION
IDENTIFICATION TRANSFERS RISK
                             FROM THE IDENTIFYING PARTY
                               TO THE IDENTIFIED PARTY



R                                 Identified party bears risk of being
I   Each party’s initial risk     denied service if identity information
S                                 is adverse
K


                                   Identifying party avoids risk by
                                   denying service if identity
                                   information is adverse

                    IDENTITY INFORMATION
SOCIETY USES IDENTIFICATION
                 TO TAKE RISK FROM
                    INSTITUTIONS
             AND GIVE IT TO INDIVIDUALS

R
I
S
K
                 Individual citizen needs resources;
                 must submit to identification

                  Business or agency has resources;
                  may require identification


    IDENTITY INFORMATION
Information Asymmetry
 and Power Asymmetry
BUILDING DOSSIERS INCREASES RISKS
             TO IDENTIFIED PARTIES
          BY APPLYING INFORMATION
            TO MANY TRANSACTIONS


                                     Risk in future
                                     transactions
R               Individual citizen
I
S
K
                                     Risk in current
                                     transaction
                Business or agency



    IDENTITY INFORMATION
ADDING FAVORABLE INFORMATION
             TO AN IDENTITY DOSSIER
               CAN DECREASE RISK
        TO IDENTIFIED PARTIES A LITTLE…



R
I
S
K                             Benefits granted
                              based on history




    IDENTITY INFORMATION
INDIVIDUAL


 Roles/                             Personal
Persone
                                     Cloud
                DATA


Shared &
Personal
                                     Personal
Devices    Context                    Data
                                     Analytics


What if we collected our own data in our own dossiers?
BUT ADDING ADVERSE INFORMATION
           TO AN IDENTITY DOSSIER
              CAN INCREASE RISK
         TO IDENTIFIED PARTIES A LOT



R
I
S
K                          Benefits denied
                           based on history




    IDENTITY INFORMATION
Services                        IDENTITY DOSSIERS
                              DO NOT ALLOCATE RISKS
                             EQUALLY TO RICH AND POOR




Good history =
Many service providers =
Easy access to resources =   No history or bad history =
Many opportunities           Few service providers =
    to build good history    Little access to resources =
                             Few opportunities
                                     to build good history
THE POOR ARE MORE LIKELY
                    TO HAVE ADVERSE
                      INFORMATION
                   ADDED TO DOSSIERS


                                Low access to
R                               resources
I                               and legal
S                               services
K




    IDENTITY INFORMATION
THE RICH ARE
                   MORE LIKELY TO HAVE
                  ADVERSE INFORMATION
                 REMOVED FROMDOSSIERS



R
I                               High access to
S                               resources
K                               and legal
                                services




    IDENTITY INFORMATION
Infomediary Markets             Retailer



                                                                                     Market         Vendor
     INDIVIDUAL                                                      Individual
                                                                     Business        Place          Agent
                                                                       Agent
                                                                                                       Service
   Roles/                                                                                              Provider
  Personae

                                   Personal                                Data Aggregation Markets
             DATA
                                    Cloud
Shared &                                                               Data
Personal
Devices                                                             Aggregation
           Context                                                   Services            Market
                                                                                                         Vendor
                                                                                         Place           Agent



                                   Utilities          Local
                                                     Retailor                            Retailer      Service
                    Social Profit                                Product                                Provider
                    Organization               Service          Producer
                                               Provider


                    Vendor Relationship Management
                                                                                              NO PII
DOSSIERS TEND TO
                        ALLOCATE RISKS TO
                       THOSE LEAST ABLE TO
                          ABSORB THEM


        High Risk
                                  Poor
R
I
S                                 Rich
K       Low Risk




    IDENTITY INFORMATION
CITIZENS OPT OUT OF OR
             SUBVERT IDENTITY SYSTEMS
            WHICH CREATEEXCESSIVE RISKS

                                     C
                                     O
                                     O
R
                                     P
I
                                     E
S
                                     R
K
                                     A
                                     T
                                     I
                                     O
                                     N


    IDENTITY INFORMATION
R
I
S
K


                        Optimal identity   Maximum identity
                        information        information


                    IDENTITY INFORMATION
      No identity
      information


    WELL-DESIGNED IDENTITY SYSTEMS COLLECT, MAINTAIN,
          AND USE THE SOCIALLY OPTIMAL AMOUNT
            AND TYPEOF IDENTITY INFORMATION
R
    I
    S
    K




 Felons           IDENTITY INFORMATION PREFERENCE
                                                        Police
                  Liberals       Conservatives
Tax &                                               Banks
          Privacy   Persecuted
welfare   advocates minorities     General Public
cheats

              FINDING THE OPTIMAL RISK/BENEFIT TRADEOFF
           REQUIRES CAREFUL STUDY AND CITIZEN INVOLVEMENT
Anonymous
   ?
            ?
Anonymous
            ?

            ?           ?
        Per-Post     Per-Session
Verified
   ?                                                   ü
Anonymous                                            Verified
                ü           ü
                             ü            ü
                                           ü
                                           ü
            Documentation In Person      Biometric
                          Verification    Capture
?
            One Site   Multi-Site
                                      ü
Anonymous                           Verified
            Pseudonymous
?
            One Site   Multi-Site
                                                                  ü
Anonymous                           Self-Asserted   Socially    Verified
            Pseudonymous                            Validated
Planning Considerations
        for Identity Systems


•  Involve the citizens meaningfully
   in the system’s design
What are the different contexts that you navigate in your life?
What are the different contexts that you navigate in your life?

          Daughter     Friend: Confidante, Encourager,
          Daughter     Fun, Listener, Confider
          Daughter
Partner                                         Mother
          Daughter            Great Friend
Spouse                                          Mother
                              Friend            Mother
Wife     Sister               Friend            Mother
Wife     Sister               Friend            Mother
Wife     Sister               Friend            Mother-in-
Wife     Sister               Friend            Law
Wife     Sister-in-Law
Wife                                            Mom
Wife                       Pet Sitting          Parent
         Aunt              Dog Lover            Parent
         Cousin            Dog Owner            Parent
Europe Family              Dog Owner/Companion
What are the different contexts that you navigate in your life?

school volunteer
Volunteer at the Space and Science Center
Volunteer at the Animal Shelter                         Student
Volunteer at Community Outreach                         Student
Member SVForum Tech Women                               Student
Book Club: hostess, humorous, well read, insightful     Student
                                                        Student
Meetup Organizer                                        Student
                             Girl Scouts
Organizer                    Girl Scouts
President (club)             Soccer
Secretary of School Club     School Soccer Team
A School Club Member         Member NCAA Fencing Team
                             School Newspaper

                             Energy club Leader
What are the different contexts that you navigate in your life?
Work: Mentor, collaborator, driver of work, Innovator
Project Management Professional at ____
Airline Industry Expert                               MBA
Technologist                LinkedIn - Professional Online
Anthropologist              LinkedIn: professional Executive
International Artist        At work- OnlineID
Director in my Company
Finance Executive                      Mentor for Startup
Sales Director                         Cultural Mentor
Sales Enablement Manager               Mentor
International Project Manager          Mentor         Employee
Program Manger                         Mentor         Co-Worker
Organizational Planning Meeting                       Colleague
Design Thinker                                        Employee
Connector                                             Intern
What are the different contexts that you navigate in your life?

Facebook: Funny, Wry posting links about tech, politics, humor, family

Face to face: Celebration Party        Arabic Language Learner
                                       Walker
Dancing: Free in the Flow              Cyclist
Moose
                    Chef               Formulal Fun
Creative            Traveler           Sports Car Enthusiast
Piano     Photographer
Artist    Blogger                                  Contrarian
Artistic  Social Media Personal                    pain in the side
                                                   Movie Addict
Online: get educated review before purchase
Online: Research, Learn                            Inspiration
Online: Buy/place orders                           Energetic
How do you manage persona’s
and your identities with different
contexts and social roles?

I handed out paper and invited the women
to draw their own map of how they do this
and then to share it with their neighbor.
Planning Considerations
               for Identity Systems

•  Make social justice
   an explicit design goal	

        o  Carefully balance stakeholder interests	

  	


•  Consider a system of loosely-linked
   special-purpose systems	

  o  Instead of a single centralized system	

  o  Design systems that inherently don’t link personas
     together - Example: LLP
?
            One Site   Multi-Site
                                                                    ü
Anonymous                            Self-Asserted   Socially    Verified
            Pseudonymous                             Validated


     Over 18 years                      ?          Ms.Sue Donna
         Woman                                    DOB = 1/21/1982
         Voter                         ü          1823 6th Ave.
                                                    Alameda, CA
     CA District 9
                                      Verified
                                    Anonymous
                                     Attributes
?
            One Site   Multi-Site
                                                                  ü
Anonymous                           Self-Asserted   Socially    Verified
            Pseudonymous                            Validated
?
            One Site   Multi-Site
                                                                  ü
Anonymous                           Self-Asserted   Socially    Verified
            Pseudonymous                            Validated
?
            One Site   Multi-Site
                                                                     ü
Anonymous                           Self-Asserted      Socially    Verified
            Pseudonymous                               Validated


                                            ü
                                            ü

                                                    Limited
                                                    Liability
                                                    Persona
Planning Considerations
         for Identity Systems


•  Design the system to forget
   history information after a while	

  o  Or not to compile dossiers at all
Planning Considerations
           for Identity Systems
•  Legally enumerate permitted and
   forbidden uses of identity data	

   o Forbid secondary uses and establish sanctions	



•  Regulate use, not collection 	

    	

 	

  	

  	

(per danah boyd)	

  o  Explicitly enumerate permitted uses in the data itself 	

     o  Using context metadata
What would it look like have citizens meaningfully involved?




      http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg         http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg




http:
     //far
          m4.sta
                   ticfli
                          ckr.co
                                   m/35
                                          32/4
                                                 0152
                                                        5698
                                                               5_b1
                                                                      3d64
Kaliya’s NSTIC – Governance NOI Response

            http://www.identitywoman.net/
            insight-for-governance

                            taoofdemocracy.com
Tom Atlee

               co-intelligence.org
The Core Principles for Public Engagement
1.  Careful Planning and Preparation
2.  Inclusion and Demographic Diversity
3.  Collaboration and Shared Purpose
4.  Openness and Learning
5.  Transparency and Trust
6.  Impact and Action
7.  Sustained Engagement
    and Participatory Culture
High performance collaboration
amongst industry stakeholders
is needed for NSTIC to succeed.
       Shared Understanding
           Shared Language
http://www.identitywoman.net/
     ecosystems-collaborate-using-shared-language-nstic

     alignment-of-nstic-stakeholders
ncdd.org
A Pattern Language for Bringing Life
   to Meetings and other Gatherings

    groupworksdeck.org
nist.gov/nstic/notices.html
         idecosystem.org/
Inviting community engagement 
on NSTIC Charter & Bylaws

Mailing List:        NSTIC.US
http://lists.idcommons.net 
        /lists/subscribe/nstic-idm
Find a resource list and reference links on our blogs


Bob Blakley
http://notabob.blogspot.com/

Kaliya “Identity Woman” Hamlin
http://www.identitywoman.net

Cloud Identity Summit           July 19 2012

Mais conteúdo relacionado

Semelhante a Identification and social justice

Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Khazret Sapenov
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Open Standards for Trusted and Universal ID Systems
Open Standards for Trusted and Universal ID SystemsOpen Standards for Trusted and Universal ID Systems
Open Standards for Trusted and Universal ID SystemsTRUSTECH Event
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Surveyadremllc
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability managementInterop
 

Semelhante a Identification and social justice (11)

Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
QualyCloud
QualyCloudQualyCloud
QualyCloud
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Open Standards for Trusted and Universal ID Systems
Open Standards for Trusted and Universal ID SystemsOpen Standards for Trusted and Universal ID Systems
Open Standards for Trusted and Universal ID Systems
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Survey
 
Opening keynote gianni cooreman
Opening keynote gianni cooremanOpening keynote gianni cooreman
Opening keynote gianni cooreman
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability management
 
Belgian public sector interoperability
Belgian public sector interoperabilityBelgian public sector interoperability
Belgian public sector interoperability
 
The Human Rights and Business Country Risk Portal
The Human Rights and Business Country Risk PortalThe Human Rights and Business Country Risk Portal
The Human Rights and Business Country Risk Portal
 

Mais de Kaliya "Identity Woman" Young

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Kaliya "Identity Woman" Young
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.Kaliya "Identity Woman" Young
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemKaliya "Identity Woman" Young
 

Mais de Kaliya "Identity Woman" Young (20)

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 

Último

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 

Último (20)

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 

Identification and social justice

  • 1. Identification and Social Justice Bob Blakley Kaliya “Identity Woman” Hamlin Cloud Identity Summit July 19 2012
  • 3. NO IDENTITY = NO ACCESS No rights or redress TO JUSTICE OR SERVICES R I S K IDENTITY INFORMATION
  • 4. BIRTH AND CITIZENSHIP RECORDS SUBSTANTIALLY DECREASE CITIZENS’ RISKS R I S K Access to rights and legal system IDENTITY INFORMATION
  • 5. BUT MORE IDENTITY INFORMATION IS NOT NECESSARILY BETTER R I S K ? IDENTITY INFORMATION
  • 6. IDENTIFICATION TRANSFERS RISK FROM THE IDENTIFYING PARTY TO THE IDENTIFIED PARTY R Identified party bears risk of being I Each party’s initial risk denied service if identity information S is adverse K Identifying party avoids risk by denying service if identity information is adverse IDENTITY INFORMATION
  • 7. SOCIETY USES IDENTIFICATION TO TAKE RISK FROM INSTITUTIONS AND GIVE IT TO INDIVIDUALS R I S K Individual citizen needs resources; must submit to identification Business or agency has resources; may require identification IDENTITY INFORMATION
  • 8. Information Asymmetry and Power Asymmetry
  • 9. BUILDING DOSSIERS INCREASES RISKS TO IDENTIFIED PARTIES BY APPLYING INFORMATION TO MANY TRANSACTIONS Risk in future transactions R Individual citizen I S K Risk in current transaction Business or agency IDENTITY INFORMATION
  • 10. ADDING FAVORABLE INFORMATION TO AN IDENTITY DOSSIER CAN DECREASE RISK TO IDENTIFIED PARTIES A LITTLE… R I S K Benefits granted based on history IDENTITY INFORMATION
  • 11. INDIVIDUAL Roles/ Personal Persone Cloud DATA Shared & Personal Personal Devices Context Data Analytics What if we collected our own data in our own dossiers?
  • 12. BUT ADDING ADVERSE INFORMATION TO AN IDENTITY DOSSIER CAN INCREASE RISK TO IDENTIFIED PARTIES A LOT R I S K Benefits denied based on history IDENTITY INFORMATION
  • 13. Services IDENTITY DOSSIERS DO NOT ALLOCATE RISKS EQUALLY TO RICH AND POOR Good history = Many service providers = Easy access to resources = No history or bad history = Many opportunities Few service providers = to build good history Little access to resources = Few opportunities to build good history
  • 14. THE POOR ARE MORE LIKELY TO HAVE ADVERSE INFORMATION ADDED TO DOSSIERS Low access to R resources I and legal S services K IDENTITY INFORMATION
  • 15. THE RICH ARE MORE LIKELY TO HAVE ADVERSE INFORMATION REMOVED FROMDOSSIERS R I High access to S resources K and legal services IDENTITY INFORMATION
  • 16. Infomediary Markets Retailer Market Vendor INDIVIDUAL Individual Business Place Agent Agent Service Roles/ Provider Personae Personal Data Aggregation Markets DATA Cloud Shared & Data Personal Devices Aggregation Context Services Market Vendor Place Agent Utilities Local Retailor Retailer Service Social Profit Product Provider Organization Service Producer Provider Vendor Relationship Management NO PII
  • 17.
  • 18. DOSSIERS TEND TO ALLOCATE RISKS TO THOSE LEAST ABLE TO ABSORB THEM High Risk Poor R I S Rich K Low Risk IDENTITY INFORMATION
  • 19. CITIZENS OPT OUT OF OR SUBVERT IDENTITY SYSTEMS WHICH CREATEEXCESSIVE RISKS C O O R P I E S R K A T I O N IDENTITY INFORMATION
  • 20. R I S K Optimal identity Maximum identity information information IDENTITY INFORMATION No identity information WELL-DESIGNED IDENTITY SYSTEMS COLLECT, MAINTAIN, AND USE THE SOCIALLY OPTIMAL AMOUNT AND TYPEOF IDENTITY INFORMATION
  • 21. R I S K Felons IDENTITY INFORMATION PREFERENCE Police Liberals Conservatives Tax & Banks Privacy Persecuted welfare advocates minorities General Public cheats FINDING THE OPTIMAL RISK/BENEFIT TRADEOFF REQUIRES CAREFUL STUDY AND CITIZEN INVOLVEMENT
  • 22. Anonymous ? ? Anonymous ? ? ? Per-Post Per-Session
  • 23. Verified ? ü Anonymous Verified ü ü ü ü ü ü Documentation In Person Biometric Verification Capture
  • 24. ? One Site Multi-Site ü Anonymous Verified Pseudonymous
  • 25. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated
  • 26. Planning Considerations for Identity Systems •  Involve the citizens meaningfully in the system’s design
  • 27. What are the different contexts that you navigate in your life?
  • 28. What are the different contexts that you navigate in your life? Daughter Friend: Confidante, Encourager, Daughter Fun, Listener, Confider Daughter Partner Mother Daughter Great Friend Spouse Mother Friend Mother Wife Sister Friend Mother Wife Sister Friend Mother Wife Sister Friend Mother-in- Wife Sister Friend Law Wife Sister-in-Law Wife Mom Wife Pet Sitting Parent Aunt Dog Lover Parent Cousin Dog Owner Parent Europe Family Dog Owner/Companion
  • 29. What are the different contexts that you navigate in your life? school volunteer Volunteer at the Space and Science Center Volunteer at the Animal Shelter Student Volunteer at Community Outreach Student Member SVForum Tech Women Student Book Club: hostess, humorous, well read, insightful Student Student Meetup Organizer Student Girl Scouts Organizer Girl Scouts President (club) Soccer Secretary of School Club School Soccer Team A School Club Member Member NCAA Fencing Team School Newspaper Energy club Leader
  • 30. What are the different contexts that you navigate in your life? Work: Mentor, collaborator, driver of work, Innovator Project Management Professional at ____ Airline Industry Expert MBA Technologist LinkedIn - Professional Online Anthropologist LinkedIn: professional Executive International Artist At work- OnlineID Director in my Company Finance Executive Mentor for Startup Sales Director Cultural Mentor Sales Enablement Manager Mentor International Project Manager Mentor Employee Program Manger Mentor Co-Worker Organizational Planning Meeting Colleague Design Thinker Employee Connector Intern
  • 31. What are the different contexts that you navigate in your life? Facebook: Funny, Wry posting links about tech, politics, humor, family Face to face: Celebration Party Arabic Language Learner Walker Dancing: Free in the Flow Cyclist Moose Chef Formulal Fun Creative Traveler Sports Car Enthusiast Piano Photographer Artist Blogger Contrarian Artistic Social Media Personal pain in the side Movie Addict Online: get educated review before purchase Online: Research, Learn Inspiration Online: Buy/place orders Energetic
  • 32. How do you manage persona’s and your identities with different contexts and social roles? I handed out paper and invited the women to draw their own map of how they do this and then to share it with their neighbor.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Planning Considerations for Identity Systems •  Make social justice an explicit design goal o  Carefully balance stakeholder interests •  Consider a system of loosely-linked special-purpose systems o  Instead of a single centralized system o  Design systems that inherently don’t link personas together - Example: LLP
  • 39. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated Over 18 years ? Ms.Sue Donna Woman DOB = 1/21/1982 Voter ü 1823 6th Ave. Alameda, CA CA District 9 Verified Anonymous Attributes
  • 40. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated
  • 41. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated
  • 42. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated ü ü Limited Liability Persona
  • 43. Planning Considerations for Identity Systems •  Design the system to forget history information after a while o  Or not to compile dossiers at all
  • 44. Planning Considerations for Identity Systems •  Legally enumerate permitted and forbidden uses of identity data o Forbid secondary uses and establish sanctions •  Regulate use, not collection (per danah boyd) o  Explicitly enumerate permitted uses in the data itself o  Using context metadata
  • 45. What would it look like have citizens meaningfully involved? http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg http: //far m4.sta ticfli ckr.co m/35 32/4 0152 5698 5_b1 3d64
  • 46. Kaliya’s NSTIC – Governance NOI Response http://www.identitywoman.net/ insight-for-governance taoofdemocracy.com Tom Atlee co-intelligence.org
  • 47. The Core Principles for Public Engagement 1.  Careful Planning and Preparation 2.  Inclusion and Demographic Diversity 3.  Collaboration and Shared Purpose 4.  Openness and Learning 5.  Transparency and Trust 6.  Impact and Action 7.  Sustained Engagement and Participatory Culture
  • 48. High performance collaboration amongst industry stakeholders is needed for NSTIC to succeed. Shared Understanding Shared Language http://www.identitywoman.net/ ecosystems-collaborate-using-shared-language-nstic alignment-of-nstic-stakeholders
  • 50. A Pattern Language for Bringing Life to Meetings and other Gatherings groupworksdeck.org
  • 51. nist.gov/nstic/notices.html idecosystem.org/ Inviting community engagement on NSTIC Charter & Bylaws Mailing List: NSTIC.US http://lists.idcommons.net /lists/subscribe/nstic-idm
  • 52. Find a resource list and reference links on our blogs Bob Blakley http://notabob.blogspot.com/ Kaliya “Identity Woman” Hamlin http://www.identitywoman.net Cloud Identity Summit July 19 2012