SlideShare une entreprise Scribd logo
1  sur  78
Kaliya
Augmented Reality Standards Meeting
May 29th
, 2013, NYC
Saving the World with User-Centric Identity
MyIndustryAffiliations
I’m like Christine bring people together…
…at the Internet Identity Workshop every 6 months since 2005 + satellites around world
We are working on this….(from a citizen/person in daily life point of view)
A Protocol Family Tree up to 2010
Community Org evolution to 2008
Purpose
The purpose of Identity Commons is to support,
facilitate, and promote the creation of an open
identity layer for the Internet, one that maximizes
control, convenience, and privacy for the individual
while encouraging the development of healthy,
interoperable communities.
Principles
Self-Organization. Enable any working group to self-organize at any time, on any scale, in any
form, around any activity consistent with the Purpose and Principles.
Transparency. Fully and transparently disclose the Purpose and Principles of each working
group, any requirement of participation, and any license or restriction of usage of its work product.
Inclusion. Conduct deliberations and make decisions by bodies and methods that reasonably
represent all relevant and affected parties.
Empowerment. Vest authority, perform functions, and use resources in the smallest or most
local part that includes all relevant and affected parties.
Collaboration. Resolve conflict without resort to economic, legal, or other duress.
Openness. Conduct, publish, and archive communications in a manner that facilitates open and
trusted interactions within and across all working groups and the public Internet.
Internet Identity Workshop
Identity isIdentity is
socially constructedsocially constructed
and contextual.and contextual.
?
Anonymous
?
?
? ?
Per-Post Per-Session
Anonymous
?
Anonymous

Verified  
Verified
 
Documentation In Person
Verification
Biometric
Capture
?
Anonymous
One Site Multi-Site
Self-Asserted VerifiedSocially
Validated

Pseudonymous
Identity is social.
Identity is subjective.
Identity is valuable.
Identity is referential.
Identity is composite.
Identity is consequential.
Identity is dynamic.
Identity is contextual.
Identity is equivocal.
OECD Paper At a Crossroads: "Personhood” and the Digital Identity in the Information Society
Properties of Identity
Identity
=
Personal Data
21
ASSET DATA
22
RELATIONSHIPS
23
24
25
HEALTH DATA
26
COMMUNICATIONS
27
ACTIVITY
28
CONTENT
29
CONTEXT
30
IDENTITY
I created this mind map of Personal Data Sources and it is in the 2011 WEF report.
It is based on the list in the 2010 WEF drawn from the summer 2010 pre-read document that I contributed to.
Where does this data go?
Who has control of it?
Directly Linked to
an Individual
Identity
Linkable to
Identity through
combination
Individual
attributes without
link to Identity
Not linked to
Individuals
Identity
Volunteered Observed Inferred
Nature/Source of Data
LinkagetoIndividual
Directly Linked to
an Individual
Identity
Linkable to
Identity through
combination
Individual
attributes without
link to Identity
Not linked to
Individuals
Identity
Volunteered Observed Inferred
Nature/Source of Data
LinkagetoIndividual
2011 2012
Knowledge Based Opportunities (CIC)
pde.cc/startup-circle
Personal
Cloud
Personal
Data
Analytics
INDIVIDUAL
DATA
Context
Shared &
Personal
Devices
Roles/
Persone
Public Data
Commercial Data
My
Augmented
Reality
Personal Data
Public Data
Commercial Data
My
Augmented
Reality
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Group Data
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Group Data
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Group Data
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Group Data
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Group Data
Personal Data
Public Data
Commercial Data
Intermediaries
Matching Services
My
Augmented
Reality
Group Data
http://cmykern.com/?p=1112
People are complex and cross many different contexts they do not want linked
Why James Chartrand Wears
Women’s Underpants
http://www.copyblogger.com/james-chartrand-underpants/
Custodianship?
http://www.flickr.com/photos/seektan/2582803300/sizes/z/in/photostream/
Children
Elders
Elders
Custodianship?
FAMILIES
Custodianship?
http://www.flickr.com/photos/jeanlouis_zimmermann/8752148306/sizes/o/in/photostream/
Internet Identity Workshop
#17 is October 22-24 in Mountain View California
Bonus Slides on Market Models
for Personal Clouds
http://hepowerofpull.com/pull/the-perso
A good place to start is watching this video by
David Seigel who paints a visionof a person
interacting with the data in their personal data
store/personal cloud
68
On the individual side, people produce data
69
Vendor Relationships Management
70
How will you play in markets for your data?
Infomediary Services
71
How will you play in markets for your data?
Data Aggregation Services
72
73
Invomediary Model
74
Invomediary Model
75
Invomediary Model
76
Invomediary Model
77
Invomediary Model
Lessig’s model of forces articulated in Code & Code 2.0
that shape the world/reality/society we construct.

Contenu connexe

Tendances

The Future of Human Services, CITSA Conference
The Future of Human Services, CITSA ConferenceThe Future of Human Services, CITSA Conference
The Future of Human Services, CITSA Conference
Fred J. Best, Ph.D., MBA
 
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
Nick Norman
 
Digital assets ep article february 2015
Digital assets ep article february 2015Digital assets ep article february 2015
Digital assets ep article february 2015
robertpperry
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
George Roberts
 
Towards “Deep” Personalisation of E-Government Services
Towards “Deep” Personalisation of E-Government ServicesTowards “Deep” Personalisation of E-Government Services
Towards “Deep” Personalisation of E-Government Services
Adegboyega Ojo
 
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOUIFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
Nicole Fucile-Borsian
 

Tendances (20)

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
The Future of Human Services, CITSA Conference
The Future of Human Services, CITSA ConferenceThe Future of Human Services, CITSA Conference
The Future of Human Services, CITSA Conference
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Update on Access to Digital Assets: Are We There Yet?
Update on Access to Digital Assets: Are We There Yet?Update on Access to Digital Assets: Are We There Yet?
Update on Access to Digital Assets: Are We There Yet?
 
Who and how am I online
Who and how am I onlineWho and how am I online
Who and how am I online
 
Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008
 
Digital Identity by Roxana Nasoi Transylvania Crypto Conference #TCConf
Digital Identity by Roxana Nasoi Transylvania Crypto Conference #TCConf Digital Identity by Roxana Nasoi Transylvania Crypto Conference #TCConf
Digital Identity by Roxana Nasoi Transylvania Crypto Conference #TCConf
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
NET 303: Online Policy Primer
NET 303: Online Policy Primer NET 303: Online Policy Primer
NET 303: Online Policy Primer
 
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilitySocial Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
 
Digital assets ep article february 2015
Digital assets ep article february 2015Digital assets ep article february 2015
Digital assets ep article february 2015
 
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...IRJET-  	  Identity & Relationship Resolution Approach Supported with Sample ...
IRJET- Identity & Relationship Resolution Approach Supported with Sample ...
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 
Towards “Deep” Personalisation of E-Government Services
Towards “Deep” Personalisation of E-Government ServicesTowards “Deep” Personalisation of E-Government Services
Towards “Deep” Personalisation of E-Government Services
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOUIFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
 

En vedette

En vedette (8)

Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
Chip Rewards Health and Wellness Incentives
Chip Rewards Health and Wellness IncentivesChip Rewards Health and Wellness Incentives
Chip Rewards Health and Wellness Incentives
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 
Data Accountability & Consumer Trust
Data Accountability & Consumer TrustData Accountability & Consumer Trust
Data Accountability & Consumer Trust
 
ID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomenID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomen
 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
 

Similaire à Personal Clouds + Augmented Reality

Data fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalismData fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalism
Mary Aviles
 
What Is Enterprise 2.0 Public
What Is Enterprise 2.0   PublicWhat Is Enterprise 2.0   Public
What Is Enterprise 2.0 Public
Tanya Ney
 

Similaire à Personal Clouds + Augmented Reality (20)

From Collaborative Economy to Collaborative Organization
From Collaborative Economy to Collaborative OrganizationFrom Collaborative Economy to Collaborative Organization
From Collaborative Economy to Collaborative Organization
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Mooc project slide show nancy gg
Mooc project slide show nancy ggMooc project slide show nancy gg
Mooc project slide show nancy gg
 
Data fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalismData fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalism
 
Creating Impact with Open Data
Creating Impact with Open DataCreating Impact with Open Data
Creating Impact with Open Data
 
Introduction to Autelic
Introduction to AutelicIntroduction to Autelic
Introduction to Autelic
 
Vertical Initiatives
Vertical InitiativesVertical Initiatives
Vertical Initiatives
 
Silverman Research: Collective Intelligence In Organisations Report
Silverman Research: Collective Intelligence In Organisations ReportSilverman Research: Collective Intelligence In Organisations Report
Silverman Research: Collective Intelligence In Organisations Report
 
Meetup #4 - IoE - 2nd cybernetics approach
Meetup #4 - IoE - 2nd cybernetics approachMeetup #4 - IoE - 2nd cybernetics approach
Meetup #4 - IoE - 2nd cybernetics approach
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
 
The Roles of Social Networks In Knowledge Management
The Roles of Social Networks In Knowledge ManagementThe Roles of Social Networks In Knowledge Management
The Roles of Social Networks In Knowledge Management
 
About the ODI slides + notes for potential investors
About the ODI slides + notes for potential investors About the ODI slides + notes for potential investors
About the ODI slides + notes for potential investors
 
Social capital sustainability Second Life 4 14 09
Social capital sustainability Second Life 4 14 09Social capital sustainability Second Life 4 14 09
Social capital sustainability Second Life 4 14 09
 
Km World 09 Pkm Wkshp Sbjh111609
Km World 09 Pkm Wkshp Sbjh111609Km World 09 Pkm Wkshp Sbjh111609
Km World 09 Pkm Wkshp Sbjh111609
 
Introduction to Autelic
Introduction to AutelicIntroduction to Autelic
Introduction to Autelic
 
civ.works: A powerful, private social platform for civic engagement.
civ.works: A powerful, private social platform for civic engagement.civ.works: A powerful, private social platform for civic engagement.
civ.works: A powerful, private social platform for civic engagement.
 
Social media in government
Social media in governmentSocial media in government
Social media in government
 
Indonesia, Internet Governance Forum and Multistakeholder
Indonesia, Internet Governance Forum and MultistakeholderIndonesia, Internet Governance Forum and Multistakeholder
Indonesia, Internet Governance Forum and Multistakeholder
 
What Is Enterprise 2.0 Public
What Is Enterprise 2.0   PublicWhat Is Enterprise 2.0   Public
What Is Enterprise 2.0 Public
 
Essay: Multistakeholder Model
Essay: Multistakeholder ModelEssay: Multistakeholder Model
Essay: Multistakeholder Model
 

Plus de Kaliya "Identity Woman" Young

Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 

Plus de Kaliya "Identity Woman" Young (12)

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
 
Iiw11introtalk
Iiw11introtalkIiw11introtalk
Iiw11introtalk
 
IIW-East Introduction to Identity Community
IIW-East Introduction to Identity CommunityIIW-East Introduction to Identity Community
IIW-East Introduction to Identity Community
 
Us our Organizations and the Evolving Web v2
Us our Organizations and the Evolving Web  v2Us our Organizations and the Evolving Web  v2
Us our Organizations and the Evolving Web v2
 
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
 

Personal Clouds + Augmented Reality

Notes de l'éditeur

  1. All user-centric models of the personal data landscape start with people. They make data as they move through the world. They have shared and personal devices that hold, capture, or help create data. They play multiple roles that affect how they choose to share that data an d present themselves. Those roles, and the contexts we experience at work, at home, and in relation to our goals and other people and institutions, inform what we expect from our personal clouds. Our personal clouds store our information, put it to use, and share it with other services. One type of service is called Personal Data Analysis, providing insights into your behavior, financial health, physical wellbeing, or your relationships using your data.
  2. Personal clouds are also how we share our data and use our personas with organizations we know and trust. You’ll want your personal cloud services to be smart about understanding the way each organizations understands personal data and act accordingly. Same for policies and terms of service an organization commits to related to your data.
  3. It may me useful to share personal data, like your shopping history with market researchers or your driving patterns with a highway traffic analyst. You could partner with a trusted “individual business agent” service. Your agent can negotiate for you with buyers of aggregated personal data, assuring fair terms and your minimum assurances. A market research firm might pay for your anonymous shopping data. Or you might feel civic minded and freely share your transit data.
  4. Data aggregation services take data from many people and offer clean, fresh, normalized sets in data markets. Data vertical services specialize in areas like health records or home ownership paperwork, or professional credentials. Again, your personal cloud is your first point of control and interaction.
  5. Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII) and protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Vendor Relationship Management: a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly shares information under favorable terms they the user set.
  6. Framework Creators: Organizations that create contractual legal-policy/technology frameworks that govern complex multi-party networks. Individual: A person Devices: Mobile phones, computers, self tracking devices, medical monitoring devices, e- readers. Context: Where a person is (home, school, work). The Role they are playing (parent, coach, spouse, employee, supervisor, athletic team member). Persona they are presenting (video game player, professional, goofy hobby identity). Data: The bits generated explicitly such as photos, tweets, status updates. Frameworks: Contractual mutli-party frameworks connect legal/policy agreements to technical interoperability to protect the individual and enable markets. The Personal Cloud service provider is at the heart of these frameworks, chosen by the end user, and works on their behalf managing their data and its participation in the framework. Personal Data Analytics: Services that help people gain insight into their own personal data. An example being one’s daily health status or a personal annual report. [Trusted Organizations] Product Producer: This is an example of a Vendor Relationship Management connection where a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly share information under favorable terms they the individual set. Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII), protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Public Services: Governments delivering services to their constituents can enable use of personal data stores for better access and data quality. [The Market] Market Place: This is where an Individual’s business agents with PII meet Vendor agents without PII. Retailers: Companies that sell goods to customers. Service Providers: Companies that provide services to people. Vendor Agents: Companies that help retailers and service providers find good potential leads. They do not have personally identifiable information.
  7. [Governance] How systems are regulated take many forms. Governance starts with laws and regulation but also includes cultural practices, business norms, and, in digital systems, how identifiers are allocated and the code that connects them. CODE: Computer code and how it runs determines what is possible in computer systems. The phrase “Code is Law” was popularized by Lawrence Lessig. Standards Development Organizations: Bruce Sterling said “If code is law then standards are like the Senate.” Standards bodies agree on how code works regardless of the particular language it is written in or system it is running on. For example, the W3C standardizes the HTML specification for presenting web pages.
  8. LEGAL: Government: plays many roles in the systems: Regulator: Governments set baseline rules for how markets work. They provide the court system where contract law is adjudicated. Public Records: Governments record births, marriages, divorces, deaths along with licensing, and property title registries. Public Safety: Policing and law enforcement. Ombudsman: Many states have a data protection commissioner who protects constituents. International Treaty Organizations: They support the coordination of international treaties and provide a meta-international law that hold governments accountable to each other.
  9. IDENTIFIER: Networks run on identifiers for each endpoint. How these are allocated, and the terms and conditions of use in a network, govern the network. Global Identifier Registries: Examples include the phone system, Domain Names, ISBN numbers, RFID. Private Name Spaces: examples include Twitter, Skype, Google, Facebook etc.
  10. PEER: This kind of governance is the most powerful in many ways and helps social systems operate. Peer-to-Peer: People have opinions about each other and also about businesses and services they interact with - like Yelp for small businesses. Professional: Doctors, lawyers, engineers, geologists, and architects are professions that peer regulate. Institutional: Institutions figure out what other peer institutions are - such as banks worldwide in SWIFT.