SlideShare une entreprise Scribd logo
1  sur  62
rebooting digital identity
            how the social web is transforming citizen
                  behaviours and expectations




Patrick McCormick         @solutist
Special Adviser and MAMS Program Director
Department of Premier and Cabinet
Identity Conference 2012
1 May 2012 - Wellington, NZ
the views expressed today are my own
rebooting digital identity
 how the social web is transforming citizen
       behaviours and expectations

  1   we are here now
  2   trust but verify
  3   silos and shoe boxes
  4   new directions
1. we are here now
Australians spending more time online
 according to ComScore State of the Internet 2010

 • 18.8 hours per month online on average
 • 36.3% used Apple iTunes
 • 42.6% used online banking services
 • 81.6% used social networks
and increasingly access web on mobiles

            Australians with web capable mobiles
            • 43% - 2009
            • 65% - 2010

            Internet access via mobiles in Australia
            • 29% - 2009
            • 52% - 2010

            Nielson White Paper 2011
mind the analog divide
citizen expectations are changing
3 types of expectations - Charlie Leadbeater
• I need – essential services government must provide
• I want – discretionary services responding to demand
• I can – option to self select, participate, co-produce

why now?
• Internet 1.0 – low or no cost production and distribution
• netizens 1.0 – surplus computing and doing capacity
• web 2.0 - new tools, behaviours, expectations
the Internet has something to do with it
it is compact yet immense, a ‘small world’
• 10x growth adds „one hop‟
                                     power law distribution
• growth is organic and ad hoc       mostly below and above mean
  In Search of Jefferson‟s Moose - David G. Post       •   few with many links
                                                       •   many with few links




                                             power law distribution
                                             mostly below and above the mean
                                             •few with many links
                                             •many with few links
the public sector is evolving
                                                              read-only
1.   20th century administrative bureaucracy rigid, prescriptive, hierarchical
2.   new public management - performance
3.   triple bottom line – shareholders, stakeholders
                                                         read-write
4.   co-productive, shared enterprise, Gov 2.0 agile, principled, collaborative
what is the significance of Gov 2.0?

                                              Gov 2.0

government             web 2.0

 the new economy begins with technology and ends with trust
                                      - Alan Webber 1993
the public sector develops policy, delivers
services and manages goods
laws regulating drinking are enforced by police in parks


               public            public
               sector            policy


               public            public
              services           goods
we need to go back to first principles to
identify, agree on public purpose

  public purpose

            public        public
            sector        policy


           public         public
          services        goods
new tools, changing citizen behaviours
and the Internet are driving change


       citizens          technology


                  internet


         PSI            government
but trust is key to exploiting opportunities
of collective public purpose




  public
                                     trust
 purpose
16

Gov 2.0 begins with public
purpose and ends with trust



                            technology
           citizens

 public               internet           trust
purpose
             PSI            government
the public sector needs to change
a new approach
• share (not cede) power, when and where appropriate
• maintain authority in old and new models
• government as a platform, providing a citizen „API‟

key challenges
• culture of experimentation and collaboration
• open access to public sector data and information
• voice of authenticity, uncertainty and contestability
an emerging policy platform
Victoria
• parliamentary inquiry into PSI
• VPS innovation action plan
• government 2.0 action plan

Commonwealth
• Gov 2.0 Taskforce report
• APSC online engagement guidelines
• declaration of open government
Banks
                      y

2. trust but verify
co-production with or without us
“information wants to be free”
  - Stewart Brand
    at first Hackers' Conference 1984
making government accountable
peer to peer support in real time




CNNhttp://edition.cnn.com/2011/WORLD/asiapcf/07/14/india.blasts.help/index.html?hpt=hp_bn2




                                      2011 Mumbai bomb blasts spark social media response
Department of Justice Victoria
social media policy and identity




http://www.youtube.com/watch?v=8iQLkt5CG8I&feature=youtu.be
permission to rate, comment, contest
seeking and rating ideas openly
changing community engagement
• 31,852   followers - Victoria Police on Twitter
• 51,133   downloads - CFA FireReady mobile app
• 261,270 likes - Queensland Police on Facebook




                                                    27
establishing a trusted presence
and authentic voice
public conversations with government

               (cc @justice_vic) Working with Children
               check was 90% done (almost 11 weeks),
               lodged an Employ instead, and it will restart
               and take another 12 weeks. What a stupid
               system…



    @deonwentworth Deon - thx for your
    feedback. Don't know right now what
    happened or why it's like that - but will have
    someone look into ^D
responding to citizens openly, honestly

                 @deonwentworth Have chased up and have
                 an answer for you. Pls dm your email addy or
                 contact # as response won't fit in 140 spaces.
                 Thanks ^J




   @justice_vic No need, got the check
   yesterday, start 2morrow. Thx a lot 4
   following this up, thought You'd forgotten. If
   you still need to, you can email me at…
establishing trust in peer to peer context

    @deonwentworth Simple answer: starts over
    when changing categ. - makes extra sure no
    charges after applying. Annoying yes, but we
    err on side of extra protection for kids. ^D


               @justice_vic thanks. Got my card earlier in
               the week.



    #goodjob @justice_vic for not giving up on
    customer enquiries and following through
    right to the end
going where people are with useful information




    15,450 fans x average of 150 friends = 2,317,500 people
mobile apps extend frontline crisis
response but raise identity questions
communities rely on identity, reputation
Map of Online Communities 2010: Randall Munroe/xkcd, Ethan Bloch/Flowtown



      3. silos and shoe boxes
expectations for digital identity today
• mediating experience of own identity and of other people
• authenticating trust-based attribution – assurance between entities
• identifiers used by parties to agree on entity being represented
• self-determination and freedom of expression
   Source: http://en.wikipedia.org/wiki/Digital_identity
citizen comfort level online is inconsistent
United States Social Security Administration
• pioneering 1990s initiative moved services online
• users query retirement accounts – same as phone
• backlash against perceived privacy and security risks
but many people are comfortable sharing…
• shopping histories for „informed advertising‟
• activities and location for social connectivity
• problems and questions for support and assistance
acceptable boundaries still emerging
• Apple caught tracking iPhone user movements
• Australian court convicts jilted boyfriend for sharing
  nude photos on Facebook*
• Maryland law forbids employers from accessing
  Facebook accounts*
• Obama administration says CISPA does not sufficiently
  protect privacy, civil liberties*




                                                  *all in April 2012
digital identity on the web - freedom to be…


                                                        1. unidentified
                                                        2. pseudonymous
                                                        3. identified




     http://googlepublicpolicy.blogspot.com.au/2011/02/freedom-to-be-who-you-want-to-be.html
pseudonymous identity relies on reputation

• identity and reputation as
  interdependent, tightly linked
• social filtering, meritocracy used to
  establish trust
• pseudonyms could be privately
  verified with government ID or other
  standard
• user could remain publicly
  pseudonymous but privately verified
  by reputation system
current state of identity, personal information
sharing fragmented
                                                         suppliers
  individuals                     our data               central government
   circumstance                                          local government
                                  claims, assertions     banks, utilities
   assets, liabilities            interactions
   preferences                                           retail, products, services
                                  transactions
   peer to peer interactions      entitlements                    guesswork:
   future intentions              service end points              your preferences
                                                                  your requirements
                                                                  your intentions
                                    name
            identifiers             address            identifiers
                                    date of birth
                                    gender


                                                       third parties
   public bodies                                       marketing
     postal address                                    credit bureau
     electoral role                                    credit applications
     geo-codes                                         court judgments
     calendar                                          bankruptcies
                                                       vehicle data
               Source: TVC 2002
challenges in technology and
policy dimensions
                            medium                               high
technology sophistication




                            low                                medium
                                     policy/services breadth
mostly simple identity solutions
                            medium                               high
technology sophistication




                            low                                medium
                                     policy/services breadth
some more advanced in one dimension
                              medium                               high
  technology sophistication




                              low                                medium
                                       policy/services breadth
few solutions advance in both
dimensions
                               medium                               high
   technology sophistication




                               low                                medium
                                        policy/services breadth
CFA, Black Saturday, Flickr




                              4. new directions
what is government’s role in digital identity?
Competing policy interests range from protecting citizen
freedoms, privacy and other prerogatives on one end of the
scale to ensuring law, order, national security, and
institutional efficiencies on the other end.

Philosophical and political implications of choosing various
proposed solutions cut to the core of the relationship between
government and citizen – is creation and use of a person‟s
identity flatly subject to central decree or must it be based
upon consent of the governed?

 Authentication and Identity Management: Information Age Policy Considerations - Daniel J. Greenwood
Australia’s legacy of resistance
• NO universal identifying number
  – TFN, Medicare number, state
    driver's license
  – 1987 Australia Card abandoned
  – 2007 Access Card abandoned
• National Authentication Service for Health (Nash) 2011
  – to underpin personally-controlled e-health records

• databases free from regulation –biometrics not covered by
  privacy laws i.e. left to discretion of technology vendors
   Source: 1 Feb 2011 http://news.cnet.com/8301-31921_3-20030234-281.html#ixzz1HT8C9mGB
similar history of resistance in U.S.
• NO universal identifying number – SSN de facto national ID

“We are not talking about a national ID card.
What we are talking about is enhancing online
security and privacy, and reducing and perhaps
even eliminating the need to memorize a dozen
passwords, through creation and use of more
trusted digital identities.”
     Commerce Secretary Gary Locke – Jan 2011

• government will enable creation of verified identities, to support
  “identity ecosystem”
• getting verified identity will be elective
• user would be able to use one login for all sites
   source: http://www.readwriteweb.com/archives/us_commerce_department_in_charge_of_national_inter.php
Estonia’s citizen centric approach
cultural and social norms – law and identity
civil law tradition
• rules determined from
  sovereign above
• code is law – trace history to
  Roman law, Napoleonic code
common law tradition
• judge discovers law from
  practices of the people
• stare decisis - similar cases
  should be decided by consistent
  rules to reach similar results
virtues of forgetting in digital age
• 2011 EU data protection goals included
  clarifying right to be forgotten
• right of individuals to have their data deleted
  when no longer needed for legitimate purpose



                        “Regulating the Internet to correct the
                        excesses and abuses that come from
                        the total absence of rules is a moral
                        imperative!” French President Sarkozy
making the case for user control
      Wherever possible we believe that
      personal data should be controlled by
      individual citizens themselves.

                                                 Rather than owning and controlling their
         The UK Conservative Party               own personal data, people very often find
         Manifesto – Apr 2010                    that they have lost control over it.

This „data vault‟ concept, an intermediary
collecting user data and giving 3rd parties           The Economist Special Report:
access to this data in line with individual users‟    the Data Deluge – Feb 2010
specifications, is one potential solution that
offers many theoretical advantages


          World Economic Forum: Rethinking
          Personal Data Project – Jun 2010
PDS (personal data stores) for user control
• individuals as data managers – user control and choice
• lower costs and new opportunities for organisations
• environment of trust and platform for innovation




  Source: MyDex, The Case for Personal Information Empowerment: The rise of the personal data store
federated social identity networks
• consider open-source federated social network software so
  anyone can re-use to create and maintain profiles
• use common language so profiles can talk to one another
• choose from array of "profile providers” like email providers
• option to set up own server, provide own social profile
• profiles are interoperable even on different servers
   http://www.eff.org/deeplinks/2011/03/introduction-distributed-social-network
Jericho Forum IdEA commandments
14 commandments across 5 areas to inform Identity,
Entitlement & Access Management systems
1. Identity and Core Identity
2. Multiple Identities (Persona)
3. Persona (Identity) Attributes
4. Entitlement management and resource access
5. Usage and Delegation
trust frameworks
• U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC)
  – to enable trusted identity through policies of party issuing credentials
  – proposed solutions currently under review
• open identity trust framework provider OIX
  – Open Identity Exchange founded by Google, PayPal, Equifax, VeriSign, Verizon, CA
    and Booz Allen Hamilton in 2010
  – enables exchange of credentials across public and private sectors to certify identity
    providers to federal standards
  – different from OpenID which lets sites share same credentials
                                                  Source: http://mashable.com/2010/03/03/google-paypal-oix/
digital identity – emerging principles
• one size does not fit all
• support different types of identity
• privacy and security expectations vary
• maximise user control and choice
• trusted relationships critical, contextual
• identity and reputation are linked
• information may need expiration date
rebooting digital identity
 how the social web is transforming citizen
       behaviours and expectations

  1   we are here now
  2   trust but verify
  3   silos and shoe boxes
  4   new directions
thanks!
                                   questions?
                                   kia ora.


Patrick McCormick
patrick.mccormick@dpc.vic.gov.au
@solutist
re-using this presentation? the fine print…



• Parts of this presentation not under copyright or licensed to others (as indicated) have been
  made available under the Creative Commons Licence 3.0
• Put simply, this means:
   – you are free to share, copy and distribute this work
   – you can remix and adapt this work
• Under the following conditions
   – you must attribute the work to the author:
           Patrick McCormick - paddy@post.harvard.edu
   – you must share alike – so if you alter or build upon this work you have to keep these same conditions
• Unless stated otherwise, the information in this presentation is the personal
  view of the author and does not represent official policy or position of his employer

Contenu connexe

Tendances

Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
The Compound Elements of the Digital Divide
The Compound Elements of the Digital DivideThe Compound Elements of the Digital Divide
The Compound Elements of the Digital DivideTAFE SWSI
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Ict and communication
Ict and communicationIct and communication
Ict and communicationnazri88
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionChris Marsden
 
Digital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsDigital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsBeth Schoren
 
Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com
Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com
Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com Kapil Khandelwal (KK)
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacyTrevor Fox
 
WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011Vincent Ducrey
 
INFORMATION AND COMMUNICATION TECHNOLOGIES
INFORMATION AND COMMUNICATION TECHNOLOGIESINFORMATION AND COMMUNICATION TECHNOLOGIES
INFORMATION AND COMMUNICATION TECHNOLOGIESKeyziiiTorres
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)Steven Clift
 
Future is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and CommunityFuture is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and CommunitySteven Clift
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communicationsPawan Gupta
 

Tendances (20)

Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Web Trends
Web TrendsWeb Trends
Web Trends
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
New Digital Divide And Frontier
New Digital Divide And FrontierNew Digital Divide And Frontier
New Digital Divide And Frontier
 
The Compound Elements of the Digital Divide
The Compound Elements of the Digital DivideThe Compound Elements of the Digital Divide
The Compound Elements of the Digital Divide
 
Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Ict and communication
Ict and communicationIct and communication
Ict and communication
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
Convergence legal aspects- regulatory framework - patrick van eecke
Convergence   legal aspects- regulatory framework - patrick van eeckeConvergence   legal aspects- regulatory framework - patrick van eecke
Convergence legal aspects- regulatory framework - patrick van eecke
 
Digital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and SuggestionsDigital Divide The Factors, Developments and Suggestions
Digital Divide The Factors, Developments and Suggestions
 
Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com
Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com
Slates makeover for healthcare : Kapil Khandelwal : www.kapilkhandelwal.com
 
What every product manager needs to know about online privacy
What every product manager needs to know about online privacyWhat every product manager needs to know about online privacy
What every product manager needs to know about online privacy
 
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew InternetGovernment Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
 
WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011WEF - Personal Data New Asset Report2011
WEF - Personal Data New Asset Report2011
 
INFORMATION AND COMMUNICATION TECHNOLOGIES
INFORMATION AND COMMUNICATION TECHNOLOGIESINFORMATION AND COMMUNICATION TECHNOLOGIES
INFORMATION AND COMMUNICATION TECHNOLOGIES
 
Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014
 
E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)E-Democracy Meets E-Journalism (Transparency, Engagement)
E-Democracy Meets E-Journalism (Transparency, Engagement)
 
Future is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and CommunityFuture is Now - Online Engagement for Democracy and Community
Future is Now - Online Engagement for Democracy and Community
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communications
 

Similaire à Rebooting digital identity: how the social web is transforming citizen behaviours and expectations

co-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagementco-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagementPatrick McCormick
 
Moving to a read-write government
Moving to a read-write governmentMoving to a read-write government
Moving to a read-write governmentPatrick McCormick
 
lessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside outlessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside outPatrick McCormick
 
P2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsP2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsPatrick McCormick
 
navigating the new social: Gov 2.0 and community engagement
navigating the new social: Gov 2.0 and community engagementnavigating the new social: Gov 2.0 and community engagement
navigating the new social: Gov 2.0 and community engagementPatrick McCormick
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Learning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementLearning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementPatrick McCormick
 
Egovmon
EgovmonEgovmon
Egovmonosimod
 
2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJW2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJWSeebas85
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaPatrick McCormick
 
Gov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaGov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaPatrick McCormick
 
Osimopolitika20v2
Osimopolitika20v2Osimopolitika20v2
Osimopolitika20v2osimod
 
social media and networking drive changes in financial services
social media and networking drive changes in financial servicessocial media and networking drive changes in financial services
social media and networking drive changes in financial servicesBoni
 
Presentation at ENISA summer school
Presentation at ENISA summer schoolPresentation at ENISA summer school
Presentation at ENISA summer schoolosimod
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
Engage -- eGovernment strategies for success
Engage -- eGovernment strategies for successEngage -- eGovernment strategies for success
Engage -- eGovernment strategies for successNIC Inc | EGOV
 
decoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectdecoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectPatrick McCormick
 
3CMA Regional Conf: Government Website Trends - Why Email is Fundamental
3CMA Regional Conf: Government Website Trends - Why Email is Fundamental3CMA Regional Conf: Government Website Trends - Why Email is Fundamental
3CMA Regional Conf: Government Website Trends - Why Email is FundamentalGranicus
 

Similaire à Rebooting digital identity: how the social web is transforming citizen behaviours and expectations (20)

co-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagementco-production @Justice_Vic - online collaboration and citizen engagement
co-production @Justice_Vic - online collaboration and citizen engagement
 
Moving to a read-write government
Moving to a read-write governmentMoving to a read-write government
Moving to a read-write government
 
lessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside outlessons in Gov 2.0: building strategy from the inside out
lessons in Gov 2.0: building strategy from the inside out
 
P2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commonsP2P government: public purpose and the bounty of the commons
P2P government: public purpose and the bounty of the commons
 
navigating the new social: Gov 2.0 and community engagement
navigating the new social: Gov 2.0 and community engagementnavigating the new social: Gov 2.0 and community engagement
navigating the new social: Gov 2.0 and community engagement
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Learning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementLearning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagement
 
Egovmon
EgovmonEgovmon
Egovmon
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 
2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJW2014 IE Application- Social Interaction SJW
2014 IE Application- Social Interaction SJW
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
 
Gov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaGov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social media
 
Osimopolitika20v2
Osimopolitika20v2Osimopolitika20v2
Osimopolitika20v2
 
social media and networking drive changes in financial services
social media and networking drive changes in financial servicessocial media and networking drive changes in financial services
social media and networking drive changes in financial services
 
Presentation at ENISA summer school
Presentation at ENISA summer schoolPresentation at ENISA summer school
Presentation at ENISA summer school
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
Engage -- eGovernment strategies for success
Engage -- eGovernment strategies for successEngage -- eGovernment strategies for success
Engage -- eGovernment strategies for success
 
decoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectdecoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effect
 
3CMA Regional Conf: Government Website Trends - Why Email is Fundamental
3CMA Regional Conf: Government Website Trends - Why Email is Fundamental3CMA Regional Conf: Government Website Trends - Why Email is Fundamental
3CMA Regional Conf: Government Website Trends - Why Email is Fundamental
 
Canberra Gov2 0 Oct09 Pm
Canberra Gov2 0 Oct09 PmCanberra Gov2 0 Oct09 Pm
Canberra Gov2 0 Oct09 Pm
 

Plus de Patrick McCormick

USQ CAC Smart City infrastructure and ideas
USQ CAC Smart City infrastructure and ideasUSQ CAC Smart City infrastructure and ideas
USQ CAC Smart City infrastructure and ideasPatrick McCormick
 
connecting Justice: social media and citizen engagement
connecting Justice: social media and citizen engagementconnecting Justice: social media and citizen engagement
connecting Justice: social media and citizen engagementPatrick McCormick
 
Tinkering with Justice 2.0: opportunities for citizen shaped innovation
Tinkering with Justice 2.0: opportunities for citizen shaped innovationTinkering with Justice 2.0: opportunities for citizen shaped innovation
Tinkering with Justice 2.0: opportunities for citizen shaped innovationPatrick McCormick
 
Government20 Taskforce Report
Government20 Taskforce ReportGovernment20 Taskforce Report
Government20 Taskforce ReportPatrick McCormick
 
the Victorian Public Service Innovation Action Plan
the Victorian Public Service Innovation Action Planthe Victorian Public Service Innovation Action Plan
the Victorian Public Service Innovation Action PlanPatrick McCormick
 

Plus de Patrick McCormick (8)

The Legacy of inBloom
The Legacy of inBloomThe Legacy of inBloom
The Legacy of inBloom
 
mit data vr jan17
mit data vr jan17mit data vr jan17
mit data vr jan17
 
USQ CAC Smart City infrastructure and ideas
USQ CAC Smart City infrastructure and ideasUSQ CAC Smart City infrastructure and ideas
USQ CAC Smart City infrastructure and ideas
 
connecting Justice: social media and citizen engagement
connecting Justice: social media and citizen engagementconnecting Justice: social media and citizen engagement
connecting Justice: social media and citizen engagement
 
What I Learned @ #G2e 2010
What I Learned @ #G2e 2010What I Learned @ #G2e 2010
What I Learned @ #G2e 2010
 
Tinkering with Justice 2.0: opportunities for citizen shaped innovation
Tinkering with Justice 2.0: opportunities for citizen shaped innovationTinkering with Justice 2.0: opportunities for citizen shaped innovation
Tinkering with Justice 2.0: opportunities for citizen shaped innovation
 
Government20 Taskforce Report
Government20 Taskforce ReportGovernment20 Taskforce Report
Government20 Taskforce Report
 
the Victorian Public Service Innovation Action Plan
the Victorian Public Service Innovation Action Planthe Victorian Public Service Innovation Action Plan
the Victorian Public Service Innovation Action Plan
 

Rebooting digital identity: how the social web is transforming citizen behaviours and expectations

  • 1. rebooting digital identity how the social web is transforming citizen behaviours and expectations Patrick McCormick @solutist Special Adviser and MAMS Program Director Department of Premier and Cabinet Identity Conference 2012 1 May 2012 - Wellington, NZ
  • 2. the views expressed today are my own
  • 3. rebooting digital identity how the social web is transforming citizen behaviours and expectations 1 we are here now 2 trust but verify 3 silos and shoe boxes 4 new directions
  • 4. 1. we are here now
  • 5. Australians spending more time online according to ComScore State of the Internet 2010 • 18.8 hours per month online on average • 36.3% used Apple iTunes • 42.6% used online banking services • 81.6% used social networks
  • 6. and increasingly access web on mobiles Australians with web capable mobiles • 43% - 2009 • 65% - 2010 Internet access via mobiles in Australia • 29% - 2009 • 52% - 2010 Nielson White Paper 2011
  • 8. citizen expectations are changing 3 types of expectations - Charlie Leadbeater • I need – essential services government must provide • I want – discretionary services responding to demand • I can – option to self select, participate, co-produce why now? • Internet 1.0 – low or no cost production and distribution • netizens 1.0 – surplus computing and doing capacity • web 2.0 - new tools, behaviours, expectations
  • 9. the Internet has something to do with it it is compact yet immense, a ‘small world’ • 10x growth adds „one hop‟ power law distribution • growth is organic and ad hoc mostly below and above mean In Search of Jefferson‟s Moose - David G. Post • few with many links • many with few links power law distribution mostly below and above the mean •few with many links •many with few links
  • 10. the public sector is evolving read-only 1. 20th century administrative bureaucracy rigid, prescriptive, hierarchical 2. new public management - performance 3. triple bottom line – shareholders, stakeholders read-write 4. co-productive, shared enterprise, Gov 2.0 agile, principled, collaborative
  • 11. what is the significance of Gov 2.0? Gov 2.0 government web 2.0 the new economy begins with technology and ends with trust - Alan Webber 1993
  • 12. the public sector develops policy, delivers services and manages goods laws regulating drinking are enforced by police in parks public public sector policy public public services goods
  • 13. we need to go back to first principles to identify, agree on public purpose public purpose public public sector policy public public services goods
  • 14. new tools, changing citizen behaviours and the Internet are driving change citizens technology internet PSI government
  • 15. but trust is key to exploiting opportunities of collective public purpose public trust purpose
  • 16. 16 Gov 2.0 begins with public purpose and ends with trust technology citizens public internet trust purpose PSI government
  • 17. the public sector needs to change a new approach • share (not cede) power, when and where appropriate • maintain authority in old and new models • government as a platform, providing a citizen „API‟ key challenges • culture of experimentation and collaboration • open access to public sector data and information • voice of authenticity, uncertainty and contestability
  • 18. an emerging policy platform Victoria • parliamentary inquiry into PSI • VPS innovation action plan • government 2.0 action plan Commonwealth • Gov 2.0 Taskforce report • APSC online engagement guidelines • declaration of open government
  • 19. Banks y 2. trust but verify
  • 20. co-production with or without us “information wants to be free” - Stewart Brand at first Hackers' Conference 1984
  • 22. peer to peer support in real time CNNhttp://edition.cnn.com/2011/WORLD/asiapcf/07/14/india.blasts.help/index.html?hpt=hp_bn2 2011 Mumbai bomb blasts spark social media response
  • 24. social media policy and identity http://www.youtube.com/watch?v=8iQLkt5CG8I&feature=youtu.be
  • 25. permission to rate, comment, contest
  • 26. seeking and rating ideas openly
  • 27. changing community engagement • 31,852 followers - Victoria Police on Twitter • 51,133 downloads - CFA FireReady mobile app • 261,270 likes - Queensland Police on Facebook 27
  • 28. establishing a trusted presence and authentic voice
  • 29. public conversations with government (cc @justice_vic) Working with Children check was 90% done (almost 11 weeks), lodged an Employ instead, and it will restart and take another 12 weeks. What a stupid system… @deonwentworth Deon - thx for your feedback. Don't know right now what happened or why it's like that - but will have someone look into ^D
  • 30. responding to citizens openly, honestly @deonwentworth Have chased up and have an answer for you. Pls dm your email addy or contact # as response won't fit in 140 spaces. Thanks ^J @justice_vic No need, got the check yesterday, start 2morrow. Thx a lot 4 following this up, thought You'd forgotten. If you still need to, you can email me at…
  • 31. establishing trust in peer to peer context @deonwentworth Simple answer: starts over when changing categ. - makes extra sure no charges after applying. Annoying yes, but we err on side of extra protection for kids. ^D @justice_vic thanks. Got my card earlier in the week. #goodjob @justice_vic for not giving up on customer enquiries and following through right to the end
  • 32. going where people are with useful information 15,450 fans x average of 150 friends = 2,317,500 people
  • 33. mobile apps extend frontline crisis response but raise identity questions
  • 34. communities rely on identity, reputation
  • 35. Map of Online Communities 2010: Randall Munroe/xkcd, Ethan Bloch/Flowtown 3. silos and shoe boxes
  • 36. expectations for digital identity today • mediating experience of own identity and of other people • authenticating trust-based attribution – assurance between entities • identifiers used by parties to agree on entity being represented • self-determination and freedom of expression Source: http://en.wikipedia.org/wiki/Digital_identity
  • 37. citizen comfort level online is inconsistent United States Social Security Administration • pioneering 1990s initiative moved services online • users query retirement accounts – same as phone • backlash against perceived privacy and security risks
  • 38. but many people are comfortable sharing… • shopping histories for „informed advertising‟ • activities and location for social connectivity • problems and questions for support and assistance
  • 39. acceptable boundaries still emerging • Apple caught tracking iPhone user movements • Australian court convicts jilted boyfriend for sharing nude photos on Facebook* • Maryland law forbids employers from accessing Facebook accounts* • Obama administration says CISPA does not sufficiently protect privacy, civil liberties* *all in April 2012
  • 40. digital identity on the web - freedom to be… 1. unidentified 2. pseudonymous 3. identified http://googlepublicpolicy.blogspot.com.au/2011/02/freedom-to-be-who-you-want-to-be.html
  • 41. pseudonymous identity relies on reputation • identity and reputation as interdependent, tightly linked • social filtering, meritocracy used to establish trust • pseudonyms could be privately verified with government ID or other standard • user could remain publicly pseudonymous but privately verified by reputation system
  • 42. current state of identity, personal information sharing fragmented suppliers individuals our data central government circumstance local government claims, assertions banks, utilities assets, liabilities interactions preferences retail, products, services transactions peer to peer interactions entitlements guesswork: future intentions service end points your preferences your requirements your intentions name identifiers address identifiers date of birth gender third parties public bodies marketing postal address credit bureau electoral role credit applications geo-codes court judgments calendar bankruptcies vehicle data Source: TVC 2002
  • 43. challenges in technology and policy dimensions medium high technology sophistication low medium policy/services breadth
  • 44. mostly simple identity solutions medium high technology sophistication low medium policy/services breadth
  • 45. some more advanced in one dimension medium high technology sophistication low medium policy/services breadth
  • 46. few solutions advance in both dimensions medium high technology sophistication low medium policy/services breadth
  • 47. CFA, Black Saturday, Flickr 4. new directions
  • 48. what is government’s role in digital identity? Competing policy interests range from protecting citizen freedoms, privacy and other prerogatives on one end of the scale to ensuring law, order, national security, and institutional efficiencies on the other end. Philosophical and political implications of choosing various proposed solutions cut to the core of the relationship between government and citizen – is creation and use of a person‟s identity flatly subject to central decree or must it be based upon consent of the governed? Authentication and Identity Management: Information Age Policy Considerations - Daniel J. Greenwood
  • 49. Australia’s legacy of resistance • NO universal identifying number – TFN, Medicare number, state driver's license – 1987 Australia Card abandoned – 2007 Access Card abandoned • National Authentication Service for Health (Nash) 2011 – to underpin personally-controlled e-health records • databases free from regulation –biometrics not covered by privacy laws i.e. left to discretion of technology vendors Source: 1 Feb 2011 http://news.cnet.com/8301-31921_3-20030234-281.html#ixzz1HT8C9mGB
  • 50. similar history of resistance in U.S. • NO universal identifying number – SSN de facto national ID “We are not talking about a national ID card. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.” Commerce Secretary Gary Locke – Jan 2011 • government will enable creation of verified identities, to support “identity ecosystem” • getting verified identity will be elective • user would be able to use one login for all sites source: http://www.readwriteweb.com/archives/us_commerce_department_in_charge_of_national_inter.php
  • 52. cultural and social norms – law and identity civil law tradition • rules determined from sovereign above • code is law – trace history to Roman law, Napoleonic code common law tradition • judge discovers law from practices of the people • stare decisis - similar cases should be decided by consistent rules to reach similar results
  • 53. virtues of forgetting in digital age • 2011 EU data protection goals included clarifying right to be forgotten • right of individuals to have their data deleted when no longer needed for legitimate purpose “Regulating the Internet to correct the excesses and abuses that come from the total absence of rules is a moral imperative!” French President Sarkozy
  • 54. making the case for user control Wherever possible we believe that personal data should be controlled by individual citizens themselves. Rather than owning and controlling their The UK Conservative Party own personal data, people very often find Manifesto – Apr 2010 that they have lost control over it. This „data vault‟ concept, an intermediary collecting user data and giving 3rd parties The Economist Special Report: access to this data in line with individual users‟ the Data Deluge – Feb 2010 specifications, is one potential solution that offers many theoretical advantages World Economic Forum: Rethinking Personal Data Project – Jun 2010
  • 55. PDS (personal data stores) for user control • individuals as data managers – user control and choice • lower costs and new opportunities for organisations • environment of trust and platform for innovation Source: MyDex, The Case for Personal Information Empowerment: The rise of the personal data store
  • 56. federated social identity networks • consider open-source federated social network software so anyone can re-use to create and maintain profiles • use common language so profiles can talk to one another • choose from array of "profile providers” like email providers • option to set up own server, provide own social profile • profiles are interoperable even on different servers http://www.eff.org/deeplinks/2011/03/introduction-distributed-social-network
  • 57. Jericho Forum IdEA commandments 14 commandments across 5 areas to inform Identity, Entitlement & Access Management systems 1. Identity and Core Identity 2. Multiple Identities (Persona) 3. Persona (Identity) Attributes 4. Entitlement management and resource access 5. Usage and Delegation
  • 58. trust frameworks • U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC) – to enable trusted identity through policies of party issuing credentials – proposed solutions currently under review • open identity trust framework provider OIX – Open Identity Exchange founded by Google, PayPal, Equifax, VeriSign, Verizon, CA and Booz Allen Hamilton in 2010 – enables exchange of credentials across public and private sectors to certify identity providers to federal standards – different from OpenID which lets sites share same credentials Source: http://mashable.com/2010/03/03/google-paypal-oix/
  • 59. digital identity – emerging principles • one size does not fit all • support different types of identity • privacy and security expectations vary • maximise user control and choice • trusted relationships critical, contextual • identity and reputation are linked • information may need expiration date
  • 60. rebooting digital identity how the social web is transforming citizen behaviours and expectations 1 we are here now 2 trust but verify 3 silos and shoe boxes 4 new directions
  • 61. thanks! questions? kia ora. Patrick McCormick patrick.mccormick@dpc.vic.gov.au @solutist
  • 62. re-using this presentation? the fine print… • Parts of this presentation not under copyright or licensed to others (as indicated) have been made available under the Creative Commons Licence 3.0 • Put simply, this means: – you are free to share, copy and distribute this work – you can remix and adapt this work • Under the following conditions – you must attribute the work to the author: Patrick McCormick - paddy@post.harvard.edu – you must share alike – so if you alter or build upon this work you have to keep these same conditions • Unless stated otherwise, the information in this presentation is the personal view of the author and does not represent official policy or position of his employer