SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Trust and Inclusion
7th Academics and Practitioners Roundtable
The Information Architecture Conference
March 13-14, 2019
Noreen Whysel
What Is Trust?
Trust is relational
Throughout history, Trust has always been
● Contractual
● Relational
● Emotional
● Transactional
● Easy to revoke, hard to reinstate
Rules of Interpersonal Trust Are Complex
Digital Trust is Transactional
In digital systems, Trust is
● Contractual
● Transactional
● Instantaneous
● Easy to revoke and to reinstate
Rules of Digital Systems Are Less Complex
How About Inclusion?
Inclusion Is Both Among and Different
Trust and inclusion go hand in hand
● Without trust, a service provider will not provide
service.
● Without trust, an individual will neither ask for nor
receive needed services.
● Without services, vulnerable individuals are at risk.
What Are the Credentials Of Vulnerable Populations?
Who Are Vulnerable
Individuals?
Who Are Vulnerable?
● Children
● Women
● Minorities
● LGBT+
● Immigrants/Refugees
● Homeless
● Disabled
● Mentally Ill
● Unemployed
● Incarcerated/Formerly incarcerated
● Aged
We All Have Some
Experience With
Vulnerability
Contexts of Vulnerability
● Registering for welfare benefits
● Online dating
● Accessing healthcare
● Applying for a passport or driver’s license
● Registering to vote
● Registering for the military
● Etc.
Context may be very different if you are a minor, an immigrant or refugee
or a member of another unprotected class
How Do I Know Who
You Are?
Trusting Digital Entities
● Attributes
● Identifiers
All digital entities (users, service providers and relying
parties) have identifiers composed of attributes
Handling of Attributes May Be Governed by Law
Example: Personally identifiable information or PII is
information that, alone or in combination, can be used to
trace a person’s identity. PII risk is contextual.
Digital ID
A digital ID is used to authenticate individuals.
The authentication process collects data and matches it
against attributes connected to the ID.
This might be a name, birthdate, Social Security Number,
password, biometric data or it may require a second factor
authentication external to the system.
Authentication is a result of an algorithm (rules) for
matching an ID to an authenticated User.
Three components of Digital Trust
● Data Source: Where is the data from? Who else knows it?
● Coding: How is it coded? Does it recognize alternative
categories or attributes?
● Device: What device is reading it?
Vulnerable Populations have Low identity assurance Often
because they don’t have credentials that match coded
categories or attributes
How Do You Know Who
They Are?
Who Authenticates the Service?
Identity Service Provider: Do you know what data they
collect on you?
How do they protect you from:
● Phishing: Do you know if the entity collecting your data
is who they say they are?
● Identity Theft: How easy is it to access and use your
data?
● Transfer: Is your data being sold to third parties?
Is the Identity Provider Regulated? How Is Your Data Protected?
Future Opportunities
Blockchain ID
“The humanitarian community exists in a bubble, so access to an existing
community of experts and new technologies to help us better serve communities
in crisis is an amazing opportunity,” said Nathan Cooper, Senior Adviser at
Red Cross.
“We hit the realization that we can no longer do this with a spreadsheet and
beneficiary ID cards. We need something more sustainable, something people can
establish, create, hold, and access their identities. It brings dignity,
choice and economic stimulus to the local markets where humanitarian aid is
needed,” said Caroline Holt, head of global cash distribution, Red Cross.
Trustmarks and Ratings
● Regulations: FINRA, HIPPA, COPPA, GDPR
● National Institute for Standards and Technology 800.63
● Consumer Reports
● Identity Ecosystem Framework: idefregistry.org
● RDR Corporate Accountability Index:
rankingdigitalrights.org
● Trustable Technology Mark (IoT): trustabletech.org
Bibliography
Identity Ecosystem Steering Group, IDESG.org
IDESG, Vulnerable Populations,
https://wiki.idesg.org/wiki/index.php/Vulnerable_Populations
GSA Privacy Program, Rules and Policies Protecting PII,
http://gsa.gov/reference/GSA-privacy-program/rules-and-polic
ies-protecting-pii-privacy-act
THANKS!
@nwhysel

Mais conteúdo relacionado

Semelhante a Trust and inclusion

How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfmilewits415
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesKavitha Gupta, CIPP-Asia
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfssuser264cc11
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...CharityComms
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yetLaura Bell
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?MicheleNati
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 

Semelhante a Trust and inclusion (20)

How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdf
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 

Mais de Noreen Whysel

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxNoreen Whysel
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentNoreen Whysel
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxNoreen Whysel
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfNoreen Whysel
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfNoreen Whysel
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gatewaysNoreen Whysel
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...Noreen Whysel
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Noreen Whysel
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitNoreen Whysel
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Noreen Whysel
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryNoreen Whysel
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer DevelopmentNoreen Whysel
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a differenceNoreen Whysel
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaNoreen Whysel
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonNoreen Whysel
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayNoreen Whysel
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving PerformanceNoreen Whysel
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open SourceNoreen Whysel
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaNoreen Whysel
 
DH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionDH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionNoreen Whysel
 

Mais de Noreen Whysel (20)

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer Development
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdf
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdf
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gateways
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon Entry
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer Development
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a difference
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in Wikipedia
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thon
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning Gateway
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving Performance
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open Source
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, Atlanta
 
DH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionDH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as Exhibition
 

Último

Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 

Último (20)

Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 

Trust and inclusion

  • 1. Trust and Inclusion 7th Academics and Practitioners Roundtable The Information Architecture Conference March 13-14, 2019 Noreen Whysel
  • 3. Trust is relational Throughout history, Trust has always been ● Contractual ● Relational ● Emotional ● Transactional ● Easy to revoke, hard to reinstate Rules of Interpersonal Trust Are Complex
  • 4. Digital Trust is Transactional In digital systems, Trust is ● Contractual ● Transactional ● Instantaneous ● Easy to revoke and to reinstate Rules of Digital Systems Are Less Complex
  • 6. Inclusion Is Both Among and Different
  • 7. Trust and inclusion go hand in hand ● Without trust, a service provider will not provide service. ● Without trust, an individual will neither ask for nor receive needed services. ● Without services, vulnerable individuals are at risk. What Are the Credentials Of Vulnerable Populations?
  • 9. Who Are Vulnerable? ● Children ● Women ● Minorities ● LGBT+ ● Immigrants/Refugees ● Homeless ● Disabled ● Mentally Ill ● Unemployed ● Incarcerated/Formerly incarcerated ● Aged We All Have Some Experience With Vulnerability
  • 10. Contexts of Vulnerability ● Registering for welfare benefits ● Online dating ● Accessing healthcare ● Applying for a passport or driver’s license ● Registering to vote ● Registering for the military ● Etc. Context may be very different if you are a minor, an immigrant or refugee or a member of another unprotected class
  • 11. How Do I Know Who You Are?
  • 12. Trusting Digital Entities ● Attributes ● Identifiers All digital entities (users, service providers and relying parties) have identifiers composed of attributes Handling of Attributes May Be Governed by Law Example: Personally identifiable information or PII is information that, alone or in combination, can be used to trace a person’s identity. PII risk is contextual.
  • 13. Digital ID A digital ID is used to authenticate individuals. The authentication process collects data and matches it against attributes connected to the ID. This might be a name, birthdate, Social Security Number, password, biometric data or it may require a second factor authentication external to the system. Authentication is a result of an algorithm (rules) for matching an ID to an authenticated User.
  • 14. Three components of Digital Trust ● Data Source: Where is the data from? Who else knows it? ● Coding: How is it coded? Does it recognize alternative categories or attributes? ● Device: What device is reading it? Vulnerable Populations have Low identity assurance Often because they don’t have credentials that match coded categories or attributes
  • 15. How Do You Know Who They Are?
  • 16. Who Authenticates the Service? Identity Service Provider: Do you know what data they collect on you? How do they protect you from: ● Phishing: Do you know if the entity collecting your data is who they say they are? ● Identity Theft: How easy is it to access and use your data? ● Transfer: Is your data being sold to third parties? Is the Identity Provider Regulated? How Is Your Data Protected?
  • 18. Blockchain ID “The humanitarian community exists in a bubble, so access to an existing community of experts and new technologies to help us better serve communities in crisis is an amazing opportunity,” said Nathan Cooper, Senior Adviser at Red Cross. “We hit the realization that we can no longer do this with a spreadsheet and beneficiary ID cards. We need something more sustainable, something people can establish, create, hold, and access their identities. It brings dignity, choice and economic stimulus to the local markets where humanitarian aid is needed,” said Caroline Holt, head of global cash distribution, Red Cross.
  • 19. Trustmarks and Ratings ● Regulations: FINRA, HIPPA, COPPA, GDPR ● National Institute for Standards and Technology 800.63 ● Consumer Reports ● Identity Ecosystem Framework: idefregistry.org ● RDR Corporate Accountability Index: rankingdigitalrights.org ● Trustable Technology Mark (IoT): trustabletech.org
  • 20. Bibliography Identity Ecosystem Steering Group, IDESG.org IDESG, Vulnerable Populations, https://wiki.idesg.org/wiki/index.php/Vulnerable_Populations GSA Privacy Program, Rules and Policies Protecting PII, http://gsa.gov/reference/GSA-privacy-program/rules-and-polic ies-protecting-pii-privacy-act