SlideShare uma empresa Scribd logo
1 de 62
Baixar para ler offline
us, our organizations &
           the evolving social web
                         NTEN, Webinar June 30, 2010


                         Kaliya Hamlin, Identity Woman
                         “saving the world with user-centric identity”
                                  www.identitywoman.net

                                  @identitywoman
Sunday, August 1, 2010
Outline for Talk
      Context
      * My Organizations - IIW, She’s Geeky, Planetwork, & tool use
      * The ASN Vision - civil society & the distributed social web
      * The User-Centric Identity Vision
      The User-Centric Identity Results
      * OpenID
      * Information Cards
      * OAuth
      * Discovery
      * Connect
      Looking Ahead
      * Trust Frameworks
      * Vendor (Organization) Relationship Management
      * Personal Data Banks
      * National Strategy for Trusted Identities in Cyberspace
Sunday, August 1, 2010
Confession Time

            I struggle with constituent identity management.




                                        IIWX   INTERNE T IDENTIT Y
                                               WORKSHOP May 17-19 2010




Sunday, August 1, 2010
Successes on Social Web
      Twitter Lists for events    Eventbrite lists of attendees




Sunday, August 1, 2010
The Trouble with Facebook
   • rooted in networked individualism not built for groups and
     communities
   • it is like being in a room with everyone you ever met all the
     time
   • the company has violated the social contract with users &
     communities several times
    • Making the pages people follow public without warning
    • Making the “friends” people have public without warning
   • It is pushing people to share more information then they
     realize to monetize
   • Against the Terms of Service to not use one’s real name and
     have multiple personas

Sunday, August 1, 2010
One of the 10 most influential people in the industry told me last week, over email, that I had to get in
   line. They demanded that I apologize to Zuck now that he held his “we can do better” press conference,
   and that I had to turn my Facebook page back on.
   Walking around the D conference I felt like Serpico. It feels like I crossed the Blue Line, where technology
                                                 There are a lot of folks
   executives don’t get into big public fights that are bad for business.
   who are getting rich selling Facebook shares on SecondMarket today,
   and there are many more people–including friends of mine–who have a
   large percentage of their net worth in Facebook shares.
   The sad part about the situation is that the person who sent me the email demands has massive influence
   over the industry, the people I work with. He could buy and sell me many times over. In short, this power
   broker could make my life and career in technology miserable.
   In fact, he could probably get me fired… and he let me know that in so many words.

   He insisted that Facebook is the future of the internet, and remembering the
   “Mark Cuban” rule I volleyed back that if Facebook’s closed ecosystem–that is pissing in the pool of
   internet users–is the future I don’t want any part of it. He wouldn’t have to get me fired–I would retire
   before seeing Facebook become the internet.

   We built the internet on open standards and carring for users.
   Zuckerberg and Facebook are trying to reverse open standards, is
   stealing every startup idea to put into his closed ecosystem and
   screwing our collective users. He’s screwing all businesses by screwing
   over the entire userbase.



                  http://calacanis.com/2010/06/04/steve-jobs-mark-zuckerberg-and-serpico/
Sunday, August 1, 2010
I advocated for people to:
         ★ understand your community use-cases/narratives
         ★ focus on the usability of tools
         ★ consider using open source software
         ★ think about adopting user-centric identity tools
         ★ consider network formation across organizations
Sunday, August 1, 2010
Augmented Social Network:
           Building Identity and Trust into the Next Generation Internet

           Presented in June 2004 at the Planetwork conference
           Published in August 2004 in First Monday              asn.planetwork.net

Sunday, August 1, 2010
The ASN had three main objectives.

        1.   To create an Internet-wide system that enables
             more efficient and effective knowledge sharing
             between people across institutional, geographic,
             and social boundaries.

        2.   To establish a form of persistent online identity
             that supports the public commons and the values of
             civil society.

        3.   To enhance the ability of citizens to form
             relationships and self-organize around shared
             interests in communities of practice in order to
             better engage in the process of democratic
             governance.
Sunday, August 1, 2010
The four main elements of the ASN are:

         1.Enabling individuals online to maintain a
         persistent identity as they move between different
         Internet communities, and to have personal control
         over that identity.
         2.Interoperability Between Online Communities
         3.Brokered Relationships.
         4.Matching technologies need to be broad and
         robust enough to include the full range of political
         discussion about issues of public interest.


Sunday, August 1, 2010
Sunday, August 1, 2010
OR




Sunday, August 1, 2010
Sunday, August 1, 2010
SHARED VISION
             for people’s identity on the scale of the web.




Sunday, August 1, 2010
Freedom
                             and
                         Autonomy
                         for People
Sunday, August 1, 2010
Open Standards
                          are Essential


Sunday, August 1, 2010
No One
                         Dominant Player


Sunday, August 1, 2010
There will be a
                          Big Bang
      With all new technologies there is a point at which new things start
       happening that the creators of the technology did not envision:
                        this is the Big Bang in identity.


Sunday, August 1, 2010
Big Co.




                         Web 1.0    Web 2.0




Sunday, August 1, 2010
Sunday, August 1, 2010
Sunday, August 1, 2010
The issue at hand is fundamentally about FREEDOM:
       * the freedom to choose who hosts your identity online
       (with the freedom to set up and host your own),
       * the freedom to choose your persona – how you present
       yourself, what your
       * gender is,
       * your age,
       * your race,
       * your sex,
       * where you are in the world.

       A prime example of WHY these freedoms are vital is the
       story of James Chartrand – you can read for yourself her
       story of being a “him” online as a single mother seeking
       work as a copy editor. Having a male identity was the
       way she succeeded.
Sunday, August 1, 2010
Laws of Identity




                          Kim Cameron in May 2005

Sunday, August 1, 2010
1.User Control and Consent
     2.Minimal Disclosure for a Constrained Use
     3.Justifiable Parties
     4.Directed Identity
     5.Pluralism of Operators and Technologies
     6.Human Integration
     7.Consistent Experience Across Contexts



Sunday, August 1, 2010
Key Terms



            Identifiers                               Claims
                         Single String                     Pairs
                                                 A claim is by one party about
        Identifiers link things together          another or itself.
        and enable correlation.
                                                 It does not have to be linked to
        They can be endpoints on the             an identifier.
        internet.
                                                 Proving you are over 18 for
                                                 example and not giving your
                                                 real name.


Sunday, August 1, 2010
Key Terms




Sunday, August 1, 2010
Text
                          Text
                         +
                         ?


Sunday, August 1, 2010
Sunday, August 1, 2010
Information Cards




Sunday, August 1, 2010
OAuth




Sunday, August 1, 2010
OAuth




                   The user belongs to two different sites.
Sunday, August 1, 2010
How can the user move photos from photo site to the
             social network site without giving away the password
                 for the photo site to the social network site?
Sunday, August 1, 2010
The user asked if they want to share - then
              redirected to the site to give their permission

Sunday, August 1, 2010
The photo site gives the social network site a token
               to the social network that gives it access to their account.
Sunday, August 1, 2010
A data tunnel is created between the user’s
                                   accounts on both sites
Sunday, August 1, 2010
A user posts photos and they can flow from
            one to the other - and they didn’t give away their password.

Sunday, August 1, 2010
Discovery




Sunday, August 1, 2010
Discovery =
                          Patterns +
                         Interfaces +
                         Descriptors

Sunday, August 1, 2010
Evolution of Discovery
             XRDS --> XRD-Simple --> XRD
              (within XRI spec)




Sunday, August 1, 2010
Application of




                                          XRI/XDI


Sunday, August 1, 2010
OStatus isn't a new protocol; it
         applies some great protocols in a natural
         and reasonable way to make distributed
         social networking possible.
         • Activity Streams encode social events in
           standard Atom or RSS feeds.
         • PubSubHubbub pushes those feeds in
           realtime to subscribers across the Web.
         • Salmon notifies people of responses to
           their status updates.
         • Webfinger makes it easy to find people
           across social sites.
Sunday, August 1, 2010
“Connect”




Sunday, August 1, 2010
Users take actions on your site
    Users come to your site to
    consume your unique content.
    They take actions like
    commenting, reviewing, making
    purchases, rating, and more.

    Users share with friends, who
    discover your site
    With Facebook Connect, users can
    easily share your content and their
    actions with their friends on
    Facebook. As these friends
    discover your content, they click
    back to your site, engaging with
    your content and completing the
    viral loop.

    Social features increase
    engagement
    Creating deeper, more social
    integrations keeps users engaged
    with your site longer, and more
    likely to take actions they share
    with their friends. (For example —
    don't just show users what's most
    popular on your site, but what's
    most popular with their friends on
    your site.)




Sunday, August 1, 2010
OpenID Connect
                                     (under consideration)

                 The response is a JSON object which contains some (or all) of the
                 following reserved keys:
                  • user_id - e.g. "https://graph.facebook.com/24400320"
                  • asserted_user - true if the access token presented was issued by
                    this user, false if it is for a different user
                  • profile_urls - an array of URLs that belong to the user
                  • display_name - e.g. "David Recordon"
                  • given_name - e.g. "David"
                  • family_name - e.g. "Recordon"
                  • email - e.g. "recordond@gmail.com"
                  • picture - e.g. "http://graph.facebook.com/davidrecordon/picture"

                 The server is free to add additional data to this response (such as
                 Portable Contacts) so long as they do not change the reserved OpenID
                 Connect keys.




Sunday, August 1, 2010
Organizations Responsibility to their Constituents

   • Help them understand how linkable their actions are
          on the web
        • using the same e-mail address in multiple contexts
              means those context are linked
        • sharing information on facebook means “all your
              friends” can see it
   • support people understanding how to create/manage
          persona’s - like a twitter handle
   • support trusted forums/spaces where you know the
          people there belong
Sunday, August 1, 2010
Trust Frameworks




Sunday, August 1, 2010
Sunday, August 1, 2010
Open Identity Exchange
           Policy Repository                                              Levels of
                   for                  Auditors    Levels of Assurance   Protection
           Trust Frameworks                          Identity Providers Relying Parties

                           ICAM
                                           John            Google
                                                                           Relying Party
                                         Steensen

                          OCLC                             PayPal

                                         Other
                                                                           Relying Party
                                         Auditor
                         PBS Kids                          Equifax


                                         Other
                                         Auditor           Yahoo!
                          XAuth




Sunday, August 1, 2010
National Strategy for Trusted Identities in Cyberspace

           Identity Ecology

           Diverse providers of identities and attributes

           Transactions online are more trustable

           Government working with industry for open
           standards



Sunday, August 1, 2010
Project VRM - 4th Parties




                             http://bit.ly/VRM4thParty


Sunday, August 1, 2010
EmanciPay is a relationship management and voluntary payment
           framework in which buyers and sellers can present to each other
           the requirements and options by which they are willing to engage,
           or are already engaging. These include:
            ■ choices concerning payment (though not payment itself)
            ■ preferences
            ■ policies
           EmanciPay makes use the r-button (two red "magnets") to signal
           the presence of willingness-to-engage on either or both the buy
           and sell sides

           ListenLog, or Listen Log is a form of Media Logging. It is required
           for EmanciPay to work. EmanciPay is a new business model for
           otherwise free media goods -- one that sharply reduces the
           frictions involved in paying for media. By increasing the number
           of people who pay for free media, PayChoice also helps
           stigmatize non-payment for those goods.


Sunday, August 1, 2010
What does
                           Organization
                           Relationship
                           Management
                            look like?


                         join in at projectvrm.org

Sunday, August 1, 2010
Coming soon!

                         Personal Data Banks




Sunday, August 1, 2010
Sunday, August 1, 2010
Sunday, August 1, 2010
Personal Data Stores
                          / User Data Banks
                                              $

                                        APPLICATIONS

                                         EXCHANGE
                                        REFINEMENT
                                          STORAGE
                                       ID + ENCRYPTION

                                      DATA + META DATA
                                         SOURCES




                         Invention Arts Stack for User Data Banks
Sunday, August 1, 2010
Context Engines
                                 for
                         Purpose Driven Apps
                               Kynetx.com



Sunday, August 1, 2010
Sunday, August 1, 2010
We are still missing a
         Vision for Communities and Groups across contexts




Sunday, August 1, 2010
There are still a lot of questions:



                                   TECHNOLOGY




              SOCIAL                     ?            BUSINESS



                                      LEGAL


Sunday, August 1, 2010
Internet Identity Workshops

              East Coast #1 - September 9-10, Washington, DC

                         Europe #1 - October 10-11, London, UK


                     #11 - November 9-11, Mountain View, CA
                          www.internetidentityworkshop.com
Sunday, August 1, 2010
Kaliya Hamlin @identitywoman




Sunday, August 1, 2010

Mais conteúdo relacionado

Semelhante a Us our Organizations and the Evolving Web v2

Social Media Evolution - Revolution - So What?
Social Media Evolution - Revolution - So What?Social Media Evolution - Revolution - So What?
Social Media Evolution - Revolution - So What?Tommi Pelkonen
 
3 big trends changing media
3 big trends changing media3 big trends changing media
3 big trends changing mediacoco4658
 
Social networks v2
Social networks v2Social networks v2
Social networks v2Tran Thang
 
It's 2010. is your business social. milena regos
It's 2010. is your business social. milena regosIt's 2010. is your business social. milena regos
It's 2010. is your business social. milena regosMilena Regos
 
Social networks v2
Social networks v2Social networks v2
Social networks v2Tran Thang
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Bootcamp dec 1 (1)
Bootcamp   dec 1 (1)Bootcamp   dec 1 (1)
Bootcamp dec 1 (1)GOSO
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016suresh sood
 
Technologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldTechnologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldCarlos Dominguez
 
Vertical Initiatives
Vertical InitiativesVertical Initiatives
Vertical InitiativesNicole Jones
 
The Social Web for Skeptics (or, Using the Social Web for Social Change)
The Social Web for Skeptics (or, Using the Social Web for Social Change)The Social Web for Skeptics (or, Using the Social Web for Social Change)
The Social Web for Skeptics (or, Using the Social Web for Social Change)Lauren Bacon
 
The effect of personality styles on social media use
The effect of personality styles on social media useThe effect of personality styles on social media use
The effect of personality styles on social media useKrishna De
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Knowledge Sharing and Education
Knowledge Sharing and EducationKnowledge Sharing and Education
Knowledge Sharing and EducationKaitlin Thaney
 
how to make people do stuff
how to make people do stuffhow to make people do stuff
how to make people do stuffAndy Whitlock
 

Semelhante a Us our Organizations and the Evolving Web v2 (20)

Social Media Evolution - Revolution - So What?
Social Media Evolution - Revolution - So What?Social Media Evolution - Revolution - So What?
Social Media Evolution - Revolution - So What?
 
GA Tech FutureMedia Fest
GA Tech FutureMedia FestGA Tech FutureMedia Fest
GA Tech FutureMedia Fest
 
3 big trends changing media
3 big trends changing media3 big trends changing media
3 big trends changing media
 
3big trends
3big trends3big trends
3big trends
 
Social networks v2
Social networks v2Social networks v2
Social networks v2
 
It's 2010. is your business social. milena regos
It's 2010. is your business social. milena regosIt's 2010. is your business social. milena regos
It's 2010. is your business social. milena regos
 
Social networks v2
Social networks v2Social networks v2
Social networks v2
 
Walking The Walk
Walking The WalkWalking The Walk
Walking The Walk
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Bootcamp dec 1 (1)
Bootcamp   dec 1 (1)Bootcamp   dec 1 (1)
Bootcamp dec 1 (1)
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
 
Technologies and Trends that are Changing the World
Technologies and Trends that are Changing the WorldTechnologies and Trends that are Changing the World
Technologies and Trends that are Changing the World
 
Vertical Initiatives
Vertical InitiativesVertical Initiatives
Vertical Initiatives
 
The Social Web for Skeptics (or, Using the Social Web for Social Change)
The Social Web for Skeptics (or, Using the Social Web for Social Change)The Social Web for Skeptics (or, Using the Social Web for Social Change)
The Social Web for Skeptics (or, Using the Social Web for Social Change)
 
The effect of personality styles on social media use
The effect of personality styles on social media useThe effect of personality styles on social media use
The effect of personality styles on social media use
 
Managing government use of social media
Managing government use of social mediaManaging government use of social media
Managing government use of social media
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Knowledge Sharing and Education
Knowledge Sharing and EducationKnowledge Sharing and Education
Knowledge Sharing and Education
 
how to make people do stuff
how to make people do stuffhow to make people do stuff
how to make people do stuff
 

Mais de Kaliya "Identity Woman" Young

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Kaliya "Identity Woman" Young
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemKaliya "Identity Woman" Young
 

Mais de Kaliya "Identity Woman" Young (20)

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
 

Us our Organizations and the Evolving Web v2

  • 1. us, our organizations & the evolving social web NTEN, Webinar June 30, 2010 Kaliya Hamlin, Identity Woman “saving the world with user-centric identity” www.identitywoman.net @identitywoman Sunday, August 1, 2010
  • 2. Outline for Talk Context * My Organizations - IIW, She’s Geeky, Planetwork, & tool use * The ASN Vision - civil society & the distributed social web * The User-Centric Identity Vision The User-Centric Identity Results * OpenID * Information Cards * OAuth * Discovery * Connect Looking Ahead * Trust Frameworks * Vendor (Organization) Relationship Management * Personal Data Banks * National Strategy for Trusted Identities in Cyberspace Sunday, August 1, 2010
  • 3. Confession Time I struggle with constituent identity management. IIWX INTERNE T IDENTIT Y WORKSHOP May 17-19 2010 Sunday, August 1, 2010
  • 4. Successes on Social Web Twitter Lists for events Eventbrite lists of attendees Sunday, August 1, 2010
  • 5. The Trouble with Facebook • rooted in networked individualism not built for groups and communities • it is like being in a room with everyone you ever met all the time • the company has violated the social contract with users & communities several times • Making the pages people follow public without warning • Making the “friends” people have public without warning • It is pushing people to share more information then they realize to monetize • Against the Terms of Service to not use one’s real name and have multiple personas Sunday, August 1, 2010
  • 6. One of the 10 most influential people in the industry told me last week, over email, that I had to get in line. They demanded that I apologize to Zuck now that he held his “we can do better” press conference, and that I had to turn my Facebook page back on. Walking around the D conference I felt like Serpico. It feels like I crossed the Blue Line, where technology There are a lot of folks executives don’t get into big public fights that are bad for business. who are getting rich selling Facebook shares on SecondMarket today, and there are many more people–including friends of mine–who have a large percentage of their net worth in Facebook shares. The sad part about the situation is that the person who sent me the email demands has massive influence over the industry, the people I work with. He could buy and sell me many times over. In short, this power broker could make my life and career in technology miserable. In fact, he could probably get me fired… and he let me know that in so many words. He insisted that Facebook is the future of the internet, and remembering the “Mark Cuban” rule I volleyed back that if Facebook’s closed ecosystem–that is pissing in the pool of internet users–is the future I don’t want any part of it. He wouldn’t have to get me fired–I would retire before seeing Facebook become the internet. We built the internet on open standards and carring for users. Zuckerberg and Facebook are trying to reverse open standards, is stealing every startup idea to put into his closed ecosystem and screwing our collective users. He’s screwing all businesses by screwing over the entire userbase. http://calacanis.com/2010/06/04/steve-jobs-mark-zuckerberg-and-serpico/ Sunday, August 1, 2010
  • 7. I advocated for people to: ★ understand your community use-cases/narratives ★ focus on the usability of tools ★ consider using open source software ★ think about adopting user-centric identity tools ★ consider network formation across organizations Sunday, August 1, 2010
  • 8. Augmented Social Network: Building Identity and Trust into the Next Generation Internet Presented in June 2004 at the Planetwork conference Published in August 2004 in First Monday asn.planetwork.net Sunday, August 1, 2010
  • 9. The ASN had three main objectives. 1. To create an Internet-wide system that enables more efficient and effective knowledge sharing between people across institutional, geographic, and social boundaries. 2. To establish a form of persistent online identity that supports the public commons and the values of civil society. 3. To enhance the ability of citizens to form relationships and self-organize around shared interests in communities of practice in order to better engage in the process of democratic governance. Sunday, August 1, 2010
  • 10. The four main elements of the ASN are: 1.Enabling individuals online to maintain a persistent identity as they move between different Internet communities, and to have personal control over that identity. 2.Interoperability Between Online Communities 3.Brokered Relationships. 4.Matching technologies need to be broad and robust enough to include the full range of political discussion about issues of public interest. Sunday, August 1, 2010
  • 14. SHARED VISION for people’s identity on the scale of the web. Sunday, August 1, 2010
  • 15. Freedom and Autonomy for People Sunday, August 1, 2010
  • 16. Open Standards are Essential Sunday, August 1, 2010
  • 17. No One Dominant Player Sunday, August 1, 2010
  • 18. There will be a Big Bang With all new technologies there is a point at which new things start happening that the creators of the technology did not envision: this is the Big Bang in identity. Sunday, August 1, 2010
  • 19. Big Co. Web 1.0 Web 2.0 Sunday, August 1, 2010
  • 22. The issue at hand is fundamentally about FREEDOM: * the freedom to choose who hosts your identity online (with the freedom to set up and host your own), * the freedom to choose your persona – how you present yourself, what your * gender is, * your age, * your race, * your sex, * where you are in the world. A prime example of WHY these freedoms are vital is the story of James Chartrand – you can read for yourself her story of being a “him” online as a single mother seeking work as a copy editor. Having a male identity was the way she succeeded. Sunday, August 1, 2010
  • 23. Laws of Identity Kim Cameron in May 2005 Sunday, August 1, 2010
  • 24. 1.User Control and Consent 2.Minimal Disclosure for a Constrained Use 3.Justifiable Parties 4.Directed Identity 5.Pluralism of Operators and Technologies 6.Human Integration 7.Consistent Experience Across Contexts Sunday, August 1, 2010
  • 25. Key Terms Identifiers Claims Single String Pairs A claim is by one party about Identifiers link things together another or itself. and enable correlation. It does not have to be linked to They can be endpoints on the an identifier. internet. Proving you are over 18 for example and not giving your real name. Sunday, August 1, 2010
  • 27. Text Text + ? Sunday, August 1, 2010
  • 31. OAuth The user belongs to two different sites. Sunday, August 1, 2010
  • 32. How can the user move photos from photo site to the social network site without giving away the password for the photo site to the social network site? Sunday, August 1, 2010
  • 33. The user asked if they want to share - then redirected to the site to give their permission Sunday, August 1, 2010
  • 34. The photo site gives the social network site a token to the social network that gives it access to their account. Sunday, August 1, 2010
  • 35. A data tunnel is created between the user’s accounts on both sites Sunday, August 1, 2010
  • 36. A user posts photos and they can flow from one to the other - and they didn’t give away their password. Sunday, August 1, 2010
  • 38. Discovery = Patterns + Interfaces + Descriptors Sunday, August 1, 2010
  • 39. Evolution of Discovery XRDS --> XRD-Simple --> XRD (within XRI spec) Sunday, August 1, 2010
  • 40. Application of XRI/XDI Sunday, August 1, 2010
  • 41. OStatus isn't a new protocol; it applies some great protocols in a natural and reasonable way to make distributed social networking possible. • Activity Streams encode social events in standard Atom or RSS feeds. • PubSubHubbub pushes those feeds in realtime to subscribers across the Web. • Salmon notifies people of responses to their status updates. • Webfinger makes it easy to find people across social sites. Sunday, August 1, 2010
  • 43. Users take actions on your site Users come to your site to consume your unique content. They take actions like commenting, reviewing, making purchases, rating, and more. Users share with friends, who discover your site With Facebook Connect, users can easily share your content and their actions with their friends on Facebook. As these friends discover your content, they click back to your site, engaging with your content and completing the viral loop. Social features increase engagement Creating deeper, more social integrations keeps users engaged with your site longer, and more likely to take actions they share with their friends. (For example — don't just show users what's most popular on your site, but what's most popular with their friends on your site.) Sunday, August 1, 2010
  • 44. OpenID Connect (under consideration) The response is a JSON object which contains some (or all) of the following reserved keys: • user_id - e.g. "https://graph.facebook.com/24400320" • asserted_user - true if the access token presented was issued by this user, false if it is for a different user • profile_urls - an array of URLs that belong to the user • display_name - e.g. "David Recordon" • given_name - e.g. "David" • family_name - e.g. "Recordon" • email - e.g. "recordond@gmail.com" • picture - e.g. "http://graph.facebook.com/davidrecordon/picture" The server is free to add additional data to this response (such as Portable Contacts) so long as they do not change the reserved OpenID Connect keys. Sunday, August 1, 2010
  • 45. Organizations Responsibility to their Constituents • Help them understand how linkable their actions are on the web • using the same e-mail address in multiple contexts means those context are linked • sharing information on facebook means “all your friends” can see it • support people understanding how to create/manage persona’s - like a twitter handle • support trusted forums/spaces where you know the people there belong Sunday, August 1, 2010
  • 48. Open Identity Exchange Policy Repository Levels of for Auditors Levels of Assurance Protection Trust Frameworks Identity Providers Relying Parties ICAM John Google Relying Party Steensen OCLC PayPal Other Relying Party Auditor PBS Kids Equifax Other Auditor Yahoo! XAuth Sunday, August 1, 2010
  • 49. National Strategy for Trusted Identities in Cyberspace Identity Ecology Diverse providers of identities and attributes Transactions online are more trustable Government working with industry for open standards Sunday, August 1, 2010
  • 50. Project VRM - 4th Parties http://bit.ly/VRM4thParty Sunday, August 1, 2010
  • 51. EmanciPay is a relationship management and voluntary payment framework in which buyers and sellers can present to each other the requirements and options by which they are willing to engage, or are already engaging. These include: ■ choices concerning payment (though not payment itself) ■ preferences ■ policies EmanciPay makes use the r-button (two red "magnets") to signal the presence of willingness-to-engage on either or both the buy and sell sides ListenLog, or Listen Log is a form of Media Logging. It is required for EmanciPay to work. EmanciPay is a new business model for otherwise free media goods -- one that sharply reduces the frictions involved in paying for media. By increasing the number of people who pay for free media, PayChoice also helps stigmatize non-payment for those goods. Sunday, August 1, 2010
  • 52. What does Organization Relationship Management look like? join in at projectvrm.org Sunday, August 1, 2010
  • 53. Coming soon! Personal Data Banks Sunday, August 1, 2010
  • 56. Personal Data Stores / User Data Banks $ APPLICATIONS EXCHANGE REFINEMENT STORAGE ID + ENCRYPTION DATA + META DATA SOURCES Invention Arts Stack for User Data Banks Sunday, August 1, 2010
  • 57. Context Engines for Purpose Driven Apps Kynetx.com Sunday, August 1, 2010
  • 59. We are still missing a Vision for Communities and Groups across contexts Sunday, August 1, 2010
  • 60. There are still a lot of questions: TECHNOLOGY SOCIAL ? BUSINESS LEGAL Sunday, August 1, 2010
  • 61. Internet Identity Workshops East Coast #1 - September 9-10, Washington, DC Europe #1 - October 10-11, London, UK #11 - November 9-11, Mountain View, CA www.internetidentityworkshop.com Sunday, August 1, 2010