SlideShare uma empresa Scribd logo
1 de 46
Baixar para ler offline
Kaliya Hamlin, Executive Director

PERSONAL DATA
ECOSYSTEM CONSORTIUM
Presentation at the NSTIC Privacy Workshop
                               June 28, 2011
                    Boston, Massachusetts

    identitycommons
)




    NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
End user advocate since 2003 with the handle:




    Saving the World with User-Centric Identity


                                      Co-Founder, Co-Producer, Co-Facilitator
                                              Internet Identity Workshop
                                              A hub of innovation focused
                                                on user-centric identity.

    identitycommons Began in 2005 & # 13 is this October.
)




      NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Fair Information Practice Principles

                                                        1973
Transparency
  Purpose Specification
    Individual Participation
           Data Minimization
                  Use Limitation
                        Data Quality and Integrity
                               Security
                                     Accountability and Auditing
    NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Personal
                                                        Network
                                                         Nodes
                                                               Blogs
                                                            MicroBlogs
                                                              Profiles:
                                                           *Professional
                                                             *Personal

Can new and emerging technologies can be
 applied towards making FIPPs real today?
  NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
from a submission to FTC




http://www.ftc.gov/bcp/workshops/privacyroundtables/personalDataEcosystem.pdf

                     NSTIC Privacy Workshop, June 28, 2011                 PERSONAL DATA ECOSYSTEM CONSORTIUM
NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Track Business as Usual
        Do Not Track                           Privacy

Track Business as Usual
          Do Not Track Privacy
Business as Usual                    Track

           Do Not Track Privacy
Business as Usual Track
         Do Not Track                           Privacy
     NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Do Not Track
 & Privacy
         +le Way
 Mi    d d New Business
           Opportunities

  PERSONAL DATA
  ECOSYSTEM CONSORTIUM
People can track themselves and
         gain value from their own data.
                          Leveraging
                      Personal Devices &
                       Network Nodes




NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Individuals must be at
  the center of their
    own data lives.




Diagram from
Personal Data:
The Emergence of a New Asset Class
A World Economic Forum Report, February 2011




                 NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Why Does this Matter?
Individuals move across contexts.




                                                        Contexts the
                                                        Individual does
                                                        not want linked
                                                        (without their
                                                        knowledge and
                                                        consent).
               http://cmykern.com/?p=1112

    NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Women having the freedom not to present as women.

“James” is a women who
resorted to a male persona to
                                              Why James Chartrand
get work as a copy editor.
Originally she had presented                    Wears Women’s
as herself, a woman,but was
unable to get copy editing                        Underpants
jobs. Faced with the need to
feed her family she resorted to
create a male persona and the
site Men with Pens (http://
menwithpens.ca/) and got lots
of good paying work. After 2
years James “came out” about
really being a woman.


  http://www.copyblogger.com/james-chartrand-underpants/
      NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
1. Live Journal Friends
 2. Professional ID
                       1. Me linked to real name
 3. Feminist Identity
                       2. Spiritual
                       3. Gaming
  1. Totally Professional on Domain, GMail, LinkedIN
  2. Social but me on Facebook
  3. Spiritual under pseudonym on Live Journal

Real examples of personae separation by women
attending my She’s Geeky conference.
     NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Religious Expression



             http://religions.iloveindia.com/buddhism.html


       Buddhist in Tennessee




http://wwp.greenwichmeantime.com/time-zone/usa/tennessee/map.htm

                   NSTIC Privacy Workshop, June 28, 2011           PERSONAL DATA ECOSYSTEM CONSORTIUM
Ethnic and Racial Minorities




                                                  http://www.hhs.state.ne.us/healthdisparities/MHfocusgroups.htm




 NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Sexual Minorities
http://en.wikipedia.org/wiki/Sexual_minority




                          http://rowantinne.tripod.com/id28.html
NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Political Expression




                                     Personal Expression
   NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Medical Issues




Family Issues                                 http://huehueteotl.wordpress.com/2009/11/24/mental-health-32-times-more-cost-effective-at-increasing-happiness-than-money/




                                     Mental Health Issues
   NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Goofy Habits or Hobbies
                      Goofy Hobbies
                        and Habits




NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Freedom of Action

Young people free to
 explore themselves
                                             Teachers being able to drink
                                              socially when on own time.

                                                      Gammers:
                                              Blizzard WoW in game ID
                                                 vs “RealID” change.


     NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
People need tools to manage:
 • Contexts
 • Personae
 • Linking and data sharing
 • Control inferences made from data
 • Rights to use and share specific data
 • Allowing data to be a part of aggregate sets

 Business models and opportunities that
incentivize these capabilities are needed.
    NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
The Value of Personal Data is High




   NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Today’s data brokers admit:
 “50% of our data is inaccurate.
  We don’t know which 50%.”




NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
World Economic Forum Report
Personal Data: The Emergence of a New Asset Class
                                                1) Innovate around user-
                                                centricity and trust. 
                                                2) Define global principles
                                                for using and sharing
                                                personal data.
                                                3) Strengthen the dialogue
                                                between regulators and the
                                                private sector. 
                                                4) Focus on interoperability
                                                and open standards.
                                                5) Continually share
                                                knowledge. 
     NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Types of Personal Data




   Personal data types in this diagram are drawn from the types identified in Rethinking Personal Data Pre-Read Document
   published by the World Economic Forum written by Marc Davis et al published in June, 2010.

           NSTIC Privacy Workshop, June 28, 2011       PERSONAL DATA ECOSYSTEM CONSORTIUM
People are the only
 ethical integrators
of their own diverse
    data streams.
NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
From NSTIC
Key operational roles:
 • subjects
 • relying parties
 • identity providers
 • attribute providers
 • accreditation authorities
                    Vision of Self Sustaining Ecosystem
                    “will require new business models each of
                    the service provider roles”

   My question: What about the individual’s
   (the subject’s) business model?
     NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
We need business
   and market models
 for business agents that
work on the users behalf.

 NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Personal Data
    Stores
    Banks
   Lockers
   Services
    Vaults
  Tools for individuals to manage their own
    information and collect their own data
   and get value from that in new markets.
  NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
One example of a market model with user business agents.
       NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
PDEC
S TA RT



      P
   U



          CI R CL E




           NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
PDEC
                                          Open Standards
S TA RT



      P                                   & Interoperability
   U



          CI R CL E
                             Adoption of OAuth
                          Data Representation JSON
                   Considering Federated Social Web
                      OStatus, Activity Streams
           Debates about semantic options and tools
                 RDF, Linked Data, XRI/XDI
             Innovation to solve new things: TeleHash
           NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
PDEC
                                         Legal Innovation
S TA RT



                                           Information
      P
   U



          CI R CL E                Sharing Work Group

                                Owner Agreement Highlights
      • You Own Your Data. You contractually own all your data.
      • Data You Grant Access To Is Legally Protected. Personal will never
        share or use your data. Only you can grant access to your data or
        request access to data from others.
      • You Control Who Gets Access. Personal will never share or use your
        data. Only you can grant access to your data or request access to data
        from others
      • Take Your Data With You. You can easily export your data and
        permanently delete it from Personal.


                                                    Trust Framework
           NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
Some say people “don’t care”......




                       http://www.unisyssecurityindex.com/usi/us

NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
PDEC                                  Project 1: Exploring overall market
                                         models using Value Network
IN D
 CO



     ST                                    Mapping and Analysis.
     U
     LL



   AB R Y
     O R ATIV E




                                                          Questions to be considered
                                                          include: How personal data
                                                            stores and services make
                                                           money and not turn against
                                                          the interest of the end user?


          NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
PDEC
S TA RT




                                                 Screen Shots
      P
   U




          CI R CL E




    NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM
PDEC
S TA RT

                      Screen Shot
      P
   U



          CI R CL E
PDEC
S TA RT

                      Screen Shot
      P
   U



          CI R CL E
PDEC
S TA RT

                                            Screen Shot
      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.
                      5) Continually share knowledge.
PDEC
S TA RT

                                            Screen Shot
      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.
                      5) Continually share knowledge.
PDEC
S TA RT

                                            Screen Shot
      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.
                      5) Continually share knowledge.
PDEC
S TA RT

                                            Screen Shot
      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.
                      5) Continually share knowledge.
PDEC
S TA RT

                                            Screen Shot
      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.
                      5) Continually share knowledge.
PDEC
S TA RT



      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.




     Screen
                      5) Continually share knowledge.




      Shot
PDEC
S TA RT



      P
   U



          CI R CL E   1) Innovate around user-centricity and trust. 
                      2) Define global principles for using and sharing personal data.
                      3) Strengthen the dialogue between regulators and the private sector. 
                      4) Focus on interoperability and open standards.




     Screen
                      5) Continually share knowledge.




      Shot
PERSONAL DATA
ECOSYSTEM CONSORTIUM
Kaliya Hamlin
Executive Director (650) 260-4491
director@personaldataecosystem.org

                                      Internet Identity Workshop
                                          #13 October 18-20
                                                      identitycommons
                                                  )
                                                        identitywoman.net
                                                         @identitywoman
     NSTIC Privacy Workshop, June 28, 2011   PERSONAL DATA ECOSYSTEM CONSORTIUM

Mais conteúdo relacionado

Mais procurados

Open networking 2011 01-20 shared
Open networking 2011 01-20 sharedOpen networking 2011 01-20 shared
Open networking 2011 01-20 sharedvaxelrod
 
Developing a Community Networking Strategy – Steps to Take
Developing a Community Networking Strategy – Steps to TakeDeveloping a Community Networking Strategy – Steps to Take
Developing a Community Networking Strategy – Steps to TakeJenny Ambrozek
 
Emerging trends (internal presentation)
Emerging trends (internal presentation)Emerging trends (internal presentation)
Emerging trends (internal presentation)Andrea Pesoli
 
RW privacy-technology-outlook
RW privacy-technology-outlookRW privacy-technology-outlook
RW privacy-technology-outlookracingsnake
 
Towards a Peer-to-peer Technium
Towards a Peer-to-peer TechniumTowards a Peer-to-peer Technium
Towards a Peer-to-peer TechniumTony Smith
 
Folksonomy hated word but loved resource
Folksonomy hated word but loved resourceFolksonomy hated word but loved resource
Folksonomy hated word but loved resourceThomas Vander Wal
 
A point of view on digital citizenship essentials
A point of view on digital citizenship essentialsA point of view on digital citizenship essentials
A point of view on digital citizenship essentialsEduwebinar
 
Mydex CIC - Young Foundation The Future of Personal Data & MiData
Mydex CIC - Young Foundation The Future of Personal Data & MiDataMydex CIC - Young Foundation The Future of Personal Data & MiData
Mydex CIC - Young Foundation The Future of Personal Data & MiDataMydex CIC
 
Riseptis report 1
Riseptis report 1Riseptis report 1
Riseptis report 1vafopoulos
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and OutcomesWikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomesjodischneider
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media GovernanceJesse Wilkins
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 Timothy Holborn
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
 
Open net∞WORKing Organizations: Creating Sustainable Enterprises
Open net∞WORKing Organizations: Creating Sustainable EnterprisesOpen net∞WORKing Organizations: Creating Sustainable Enterprises
Open net∞WORKing Organizations: Creating Sustainable EnterprisesJenny Ambrozek
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts Timothy Holborn
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
Gemma Frisius Lecture 2011
Gemma Frisius Lecture 2011Gemma Frisius Lecture 2011
Gemma Frisius Lecture 2011Jaap van Till
 

Mais procurados (20)

Open networking 2011 01-20 shared
Open networking 2011 01-20 sharedOpen networking 2011 01-20 shared
Open networking 2011 01-20 shared
 
Developing a Community Networking Strategy – Steps to Take
Developing a Community Networking Strategy – Steps to TakeDeveloping a Community Networking Strategy – Steps to Take
Developing a Community Networking Strategy – Steps to Take
 
Bottom Up Tagging
Bottom Up TaggingBottom Up Tagging
Bottom Up Tagging
 
Emerging trends (internal presentation)
Emerging trends (internal presentation)Emerging trends (internal presentation)
Emerging trends (internal presentation)
 
RW privacy-technology-outlook
RW privacy-technology-outlookRW privacy-technology-outlook
RW privacy-technology-outlook
 
Towards a Peer-to-peer Technium
Towards a Peer-to-peer TechniumTowards a Peer-to-peer Technium
Towards a Peer-to-peer Technium
 
Folksonomy hated word but loved resource
Folksonomy hated word but loved resourceFolksonomy hated word but loved resource
Folksonomy hated word but loved resource
 
A point of view on digital citizenship essentials
A point of view on digital citizenship essentialsA point of view on digital citizenship essentials
A point of view on digital citizenship essentials
 
Mydex CIC - Young Foundation The Future of Personal Data & MiData
Mydex CIC - Young Foundation The Future of Personal Data & MiDataMydex CIC - Young Foundation The Future of Personal Data & MiData
Mydex CIC - Young Foundation The Future of Personal Data & MiData
 
Riseptis report 1
Riseptis report 1Riseptis report 1
Riseptis report 1
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and OutcomesWikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
 
Open net∞WORKing Organizations: Creating Sustainable Enterprises
Open net∞WORKing Organizations: Creating Sustainable EnterprisesOpen net∞WORKing Organizations: Creating Sustainable Enterprises
Open net∞WORKing Organizations: Creating Sustainable Enterprises
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
Gemma Frisius Lecture 2011
Gemma Frisius Lecture 2011Gemma Frisius Lecture 2011
Gemma Frisius Lecture 2011
 

Destaque

Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemKaliya "Identity Woman" Young
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.Kaliya "Identity Woman" Young
 
Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy Ericsson Slides
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy researchbbw1984
 
Constraintsand challenges
Constraintsand challengesConstraintsand challenges
Constraintsand challengesjyotikhadake
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin Asia
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingJan Seidl
 
Processing of Personal Data. What’s new?
Processing of Personal Data. What’s new?Processing of Personal Data. What’s new?
Processing of Personal Data. What’s new?Awara Direct Search
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentationguest019923
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)Jan Seidl
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Naval OPSEC
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsJan Seidl
 

Destaque (20)

Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 
Personal Data Store Project
Personal Data Store ProjectPersonal Data Store Project
Personal Data Store Project
 
Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 
Chip Rewards Health and Wellness Incentives
Chip Rewards Health and Wellness IncentivesChip Rewards Health and Wellness Incentives
Chip Rewards Health and Wellness Incentives
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 
Global privacy research
Global privacy researchGlobal privacy research
Global privacy research
 
Constraintsand challenges
Constraintsand challengesConstraintsand challenges
Constraintsand challenges
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
 
Catch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hackingCatch-me if you can - TOR tricks for bots, shells and general hacking
Catch-me if you can - TOR tricks for bots, shells and general hacking
 
Processing of Personal Data. What’s new?
Processing of Personal Data. What’s new?Processing of Personal Data. What’s new?
Processing of Personal Data. What’s new?
 
Conley Group Operational Security Presentation
Conley Group Operational Security PresentationConley Group Operational Security Presentation
Conley Group Operational Security Presentation
 
NSA-Proof communications (mostly)
NSA-Proof communications (mostly)NSA-Proof communications (mostly)
NSA-Proof communications (mostly)
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutionsReducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
 

Semelhante a Personal Data Ecosystem - NSTIC Privacy Workshop

The Concept of E-Collaboration Culture
The Concept of E-Collaboration CultureThe Concept of E-Collaboration Culture
The Concept of E-Collaboration CultureCKBGShare
 
Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]
Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]
Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]Dr.-Ing. Thomas Hartmann
 
Personal Informatics Workshop at CHI 2010 (Poster)
Personal Informatics Workshop at CHI 2010 (Poster)Personal Informatics Workshop at CHI 2010 (Poster)
Personal Informatics Workshop at CHI 2010 (Poster)Ian Li
 
PDEC ID in the Browser W3C Presentation
PDEC ID in the Browser W3C PresentationPDEC ID in the Browser W3C Presentation
PDEC ID in the Browser W3C Presentationmaryhodder
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Jessica Vitak
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksJPINFOTECH JAYAPRAKASH
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...Martha Russell
 
Masters thesis presentation 0413 melissa sorrick interaction design_installat...
Masters thesis presentation 0413 melissa sorrick interaction design_installat...Masters thesis presentation 0413 melissa sorrick interaction design_installat...
Masters thesis presentation 0413 melissa sorrick interaction design_installat...Melissa Sorrick
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Amit Sheth
 
Multimedia Semantics - SSMS 2010
Multimedia Semantics - SSMS 2010Multimedia Semantics - SSMS 2010
Multimedia Semantics - SSMS 2010Raphael Troncy
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Creating Impact with Open Data
Creating Impact with Open DataCreating Impact with Open Data
Creating Impact with Open DataePSI Platform
 
Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...
Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...
Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...Thierry Nabeth
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...The Higher Education Academy
 
The Expropriation of Digital Labor 
and What to Do About It
The Expropriation of Digital Labor 
and What to Do About ItThe Expropriation of Digital Labor 
and What to Do About It
The Expropriation of Digital Labor 
and What to Do About ItThe New School
 

Semelhante a Personal Data Ecosystem - NSTIC Privacy Workshop (20)

Uma sec council_june_22_v4
Uma sec council_june_22_v4Uma sec council_june_22_v4
Uma sec council_june_22_v4
 
The Concept of E-Collaboration Culture
The Concept of E-Collaboration CultureThe Concept of E-Collaboration Culture
The Concept of E-Collaboration Culture
 
Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]
Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]
Towards the Discovery of Person-Level Data (SemStats, ISWC 2013) [2013.10]
 
Personal Informatics Workshop at CHI 2010 (Poster)
Personal Informatics Workshop at CHI 2010 (Poster)Personal Informatics Workshop at CHI 2010 (Poster)
Personal Informatics Workshop at CHI 2010 (Poster)
 
PDEC ID in the Browser W3C Presentation
PDEC ID in the Browser W3C PresentationPDEC ID in the Browser W3C Presentation
PDEC ID in the Browser W3C Presentation
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Designing open infrastructures for open learning and innovation
Designing open infrastructures for open learning and innovationDesigning open infrastructures for open learning and innovation
Designing open infrastructures for open learning and innovation
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Designing open infrastructures for professional development
Designing open infrastructures for professional developmentDesigning open infrastructures for professional development
Designing open infrastructures for professional development
 
Internal and External Innovation Ecosystems in China 2.0
Internal and External Innovation Ecosystems in China 2.0Internal and External Innovation Ecosystems in China 2.0
Internal and External Innovation Ecosystems in China 2.0
 
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
 
Masters thesis presentation 0413 melissa sorrick interaction design_installat...
Masters thesis presentation 0413 melissa sorrick interaction design_installat...Masters thesis presentation 0413 melissa sorrick interaction design_installat...
Masters thesis presentation 0413 melissa sorrick interaction design_installat...
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
 
Multimedia Semantics - SSMS 2010
Multimedia Semantics - SSMS 2010Multimedia Semantics - SSMS 2010
Multimedia Semantics - SSMS 2010
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
Creating Impact with Open Data
Creating Impact with Open DataCreating Impact with Open Data
Creating Impact with Open Data
 
Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...
Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...
Social networking in organisations: Trends & challenges. SEA-SoNS Workshop - ...
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
 
The Expropriation of Digital Labor 
and What to Do About It
The Expropriation of Digital Labor 
and What to Do About ItThe Expropriation of Digital Labor 
and What to Do About It
The Expropriation of Digital Labor 
and What to Do About It
 

Mais de Kaliya "Identity Woman" Young

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Kaliya "Identity Woman" Young
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 

Mais de Kaliya "Identity Woman" Young (17)

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
 
ID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomenID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomen
 
Us our Organizations and the Evolving Web v2
Us our Organizations and the Evolving Web  v2Us our Organizations and the Evolving Web  v2
Us our Organizations and the Evolving Web v2
 

Último

Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Último (20)

Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

Personal Data Ecosystem - NSTIC Privacy Workshop

  • 1. Kaliya Hamlin, Executive Director PERSONAL DATA ECOSYSTEM CONSORTIUM Presentation at the NSTIC Privacy Workshop June 28, 2011 Boston, Massachusetts identitycommons ) NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 2. End user advocate since 2003 with the handle: Saving the World with User-Centric Identity Co-Founder, Co-Producer, Co-Facilitator Internet Identity Workshop A hub of innovation focused on user-centric identity. identitycommons Began in 2005 & # 13 is this October. ) NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 3. Fair Information Practice Principles 1973 Transparency Purpose Specification Individual Participation Data Minimization Use Limitation Data Quality and Integrity Security Accountability and Auditing NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 4. Personal Network Nodes Blogs MicroBlogs Profiles: *Professional *Personal Can new and emerging technologies can be applied towards making FIPPs real today? NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 5. from a submission to FTC http://www.ftc.gov/bcp/workshops/privacyroundtables/personalDataEcosystem.pdf NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 6. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 7. Track Business as Usual Do Not Track Privacy Track Business as Usual Do Not Track Privacy Business as Usual Track Do Not Track Privacy Business as Usual Track Do Not Track Privacy NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 8. Do Not Track & Privacy +le Way Mi d d New Business Opportunities PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 9. People can track themselves and gain value from their own data. Leveraging Personal Devices & Network Nodes NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 10. Individuals must be at the center of their own data lives. Diagram from Personal Data: The Emergence of a New Asset Class A World Economic Forum Report, February 2011 NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 11. Why Does this Matter? Individuals move across contexts. Contexts the Individual does not want linked (without their knowledge and consent). http://cmykern.com/?p=1112 NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 12. Women having the freedom not to present as women. “James” is a women who resorted to a male persona to Why James Chartrand get work as a copy editor. Originally she had presented Wears Women’s as herself, a woman,but was unable to get copy editing Underpants jobs. Faced with the need to feed her family she resorted to create a male persona and the site Men with Pens (http:// menwithpens.ca/) and got lots of good paying work. After 2 years James “came out” about really being a woman. http://www.copyblogger.com/james-chartrand-underpants/ NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 13. 1. Live Journal Friends 2. Professional ID 1. Me linked to real name 3. Feminist Identity 2. Spiritual 3. Gaming 1. Totally Professional on Domain, GMail, LinkedIN 2. Social but me on Facebook 3. Spiritual under pseudonym on Live Journal Real examples of personae separation by women attending my She’s Geeky conference. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 14. Religious Expression http://religions.iloveindia.com/buddhism.html Buddhist in Tennessee http://wwp.greenwichmeantime.com/time-zone/usa/tennessee/map.htm NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 15. Ethnic and Racial Minorities http://www.hhs.state.ne.us/healthdisparities/MHfocusgroups.htm NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 16. Sexual Minorities http://en.wikipedia.org/wiki/Sexual_minority http://rowantinne.tripod.com/id28.html NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 17. Political Expression Personal Expression NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 18. Medical Issues Family Issues http://huehueteotl.wordpress.com/2009/11/24/mental-health-32-times-more-cost-effective-at-increasing-happiness-than-money/ Mental Health Issues NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 19. Goofy Habits or Hobbies Goofy Hobbies and Habits NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 20. Freedom of Action Young people free to explore themselves Teachers being able to drink socially when on own time. Gammers: Blizzard WoW in game ID vs “RealID” change. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 21. People need tools to manage: • Contexts • Personae • Linking and data sharing • Control inferences made from data • Rights to use and share specific data • Allowing data to be a part of aggregate sets Business models and opportunities that incentivize these capabilities are needed. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 22. The Value of Personal Data is High NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 23. Today’s data brokers admit: “50% of our data is inaccurate. We don’t know which 50%.” NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 24. World Economic Forum Report Personal Data: The Emergence of a New Asset Class 1) Innovate around user- centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. 5) Continually share knowledge.  NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 25. Types of Personal Data Personal data types in this diagram are drawn from the types identified in Rethinking Personal Data Pre-Read Document published by the World Economic Forum written by Marc Davis et al published in June, 2010. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 26. People are the only ethical integrators of their own diverse data streams. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 27. From NSTIC Key operational roles: • subjects • relying parties • identity providers • attribute providers • accreditation authorities Vision of Self Sustaining Ecosystem “will require new business models each of the service provider roles” My question: What about the individual’s (the subject’s) business model? NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 28. We need business and market models for business agents that work on the users behalf. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 29. Personal Data Stores Banks Lockers Services Vaults Tools for individuals to manage their own information and collect their own data and get value from that in new markets. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 30. One example of a market model with user business agents. NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 31. PDEC S TA RT P U CI R CL E NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 32. PDEC Open Standards S TA RT P & Interoperability U CI R CL E Adoption of OAuth Data Representation JSON Considering Federated Social Web OStatus, Activity Streams Debates about semantic options and tools RDF, Linked Data, XRI/XDI Innovation to solve new things: TeleHash NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 33. PDEC Legal Innovation S TA RT Information P U CI R CL E Sharing Work Group Owner Agreement Highlights • You Own Your Data. You contractually own all your data. • Data You Grant Access To Is Legally Protected. Personal will never share or use your data. Only you can grant access to your data or request access to data from others. • You Control Who Gets Access. Personal will never share or use your data. Only you can grant access to your data or request access to data from others • Take Your Data With You. You can easily export your data and permanently delete it from Personal. Trust Framework NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 34. Some say people “don’t care”...... http://www.unisyssecurityindex.com/usi/us NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 35. PDEC Project 1: Exploring overall market models using Value Network IN D CO ST Mapping and Analysis. U LL AB R Y O R ATIV E Questions to be considered include: How personal data stores and services make money and not turn against the interest of the end user? NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 36. PDEC S TA RT Screen Shots P U CI R CL E NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM
  • 37. PDEC S TA RT Screen Shot P U CI R CL E
  • 38. PDEC S TA RT Screen Shot P U CI R CL E
  • 39. PDEC S TA RT Screen Shot P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. 5) Continually share knowledge.
  • 40. PDEC S TA RT Screen Shot P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. 5) Continually share knowledge.
  • 41. PDEC S TA RT Screen Shot P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. 5) Continually share knowledge.
  • 42. PDEC S TA RT Screen Shot P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. 5) Continually share knowledge.
  • 43. PDEC S TA RT Screen Shot P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. 5) Continually share knowledge.
  • 44. PDEC S TA RT P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. Screen 5) Continually share knowledge. Shot
  • 45. PDEC S TA RT P U CI R CL E 1) Innovate around user-centricity and trust.  2) Define global principles for using and sharing personal data. 3) Strengthen the dialogue between regulators and the private sector.  4) Focus on interoperability and open standards. Screen 5) Continually share knowledge. Shot
  • 46. PERSONAL DATA ECOSYSTEM CONSORTIUM Kaliya Hamlin Executive Director (650) 260-4491 director@personaldataecosystem.org Internet Identity Workshop #13 October 18-20 identitycommons ) identitywoman.net @identitywoman NSTIC Privacy Workshop, June 28, 2011 PERSONAL DATA ECOSYSTEM CONSORTIUM

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. An example of this is a woman who attends she’s Geeky her handle in that context is Isis Machine, she “is” that person. She registers under this name, uses it in public at the event. She is attending as part of her work life but doesn’t want her participation linked back to an different persona that is just professional. \n\nOther women at that event talked explicitly about their management of 3-5 persona for various reasons...\n\n1) Live Journal Friends\n2) Professional ID\n3) Feminist Identity\n\n\n1) Totally Professional on Domain, GMail, Linked In\n2) Social but me on Facebook\n3) Spiritual under psydonym on LJ\n\n\nMe linked to real name\nSpiritual\nGaming\n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. It is vital that we be able to have freedom of action - that all contexts we participate in are not linked together. \n\nThat we have choice on when and how linking happens. \n\nIt is vital that we be able to have freedom of action - that all contexts we participate in are not linked together. \n\nThat we have choice on when and how linking happens. \n\nFacebook is ultimate context masher....\n\n\n\n\n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n