Your SlideShare is downloading. ×
0
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Identity and VPEC-T
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Identity and VPEC-T

874

Published on

Understanding Identity and Privacy through the VPEC-T lens.

Understanding Identity and Privacy through the VPEC-T lens.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
874
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • A policy defining what the identifying party chooses / wishes to know about the identified. How (and when and how much) do we choose to present ourselves? What do we make of what others present?
  • http://www.answers.com/topic/principle-of-identity-preservation Maturana
  • http://demandingchange.blogspot.com/2006/05/identity-differentiation.html
  • Transcript

    • 1. Understanding Identity with VPEC-T v alues p olicies e vents c ontent t rust
    • 2. Complex Identity Example: Ulysses <ul><li>&quot;The Ulysses who arrives in Ithaca as a poor beggar unrecognized by everyone is no longer the same person as the Ulysses who departed for Troy. It is no coincidence that he had once saved his life by pretending his name was Nobody. The only immediate and spontaneous recognition comes from his dog, Argos, as if the continuity of the individual could make itself manifest through signs perceptible only to an animal. For the nurse, the proof of his identity was the scar left him by a boar's tusk, for his wife the secret of the manufacture of their marriage bed out of the roots of an olive tree, and for his father a list of fruit trees. These signs have nothing regal about them; they put the hero on the level of a poacher, a carpenter, a gardener.&quot;  </li></ul><ul><li>[Italo Calvino, The Literature Machine (trans Patrick Creagh, Pan Books, London, 1989) pp 140-1] </li></ul>
    • 3. Identity as Content <ul><li>A collection of attributes, preferences, and traits. </li></ul><ul><li>Some of this content may be stored in a computer record or smartcard. </li></ul><ul><li>Our brains contain much richer content. </li></ul><ul><li>But what exactly does this content mean? </li></ul><ul><li>Protecting identity is about verifying the content and protecting the container. Or is it? </li></ul>v alues p olicies e vents c ontent t rust
    • 4. Identity as Event <ul><li>A signal that allows someone or something to be identified. </li></ul><ul><li>Disclosure as an event making identity information available to the identifying party. </li></ul><ul><li>Identity management is about sending, receiving and interpreting appropriate signals. Among other things. </li></ul>v alues p olicies e vents c ontent t rust
    • 5. Identity as Policy <ul><li>A rule defining when something could be regarded as the same again … </li></ul><ul><li>yields a set of choices </li></ul><ul><li>what to present about oneself </li></ul><ul><li>what to discover about others </li></ul>v alues p olicies e vents c ontent t rust
    • 6. Identity as Value <ul><li>How do identity and privacy conflict with other possible values? </li></ul>v alues p olicies e vents c ontent t rust Security / Safety  Privacy Innovation  Brand Identity Corporate Identity Adaptation to Reality, Viability  Identity Preservation
    • 7. Identity as Trust v alues p olicies e vents c ontent t rust … not just a different context but a different person. Remus Lupin as Werewolf Remus Lupin as Human Guy Fawkes after torture Guy Fawkes Manager with gun-to-head Manager John-Drunk John-Sober Unreliable Reliable
    • 8. Identity Challenges Transitive trust? Trust Repurposed content? Content Disclosure / breach? Events Blanket consent? Policies Your identity has an economic value to someone else. Values
    • 9. Some Questions about Identity and Privacy <ul><li>How do privacy values interact with other competing values? </li></ul><ul><li>How do personal preferences get embedded in policies? </li></ul><ul><li>What events trigger attention to identity and privacy? </li></ul><ul><li>What is the underlying meaning and content of identity and privacy? </li></ul><ul><li>What forms of trust exist? How can the requisite forms of trust be sustained? </li></ul>
    • 10. Ecological Thinking about Identity and Privacy <ul><li>What are the forces fragmenting identity? </li></ul><ul><li>What are the forces homogenizing identity? </li></ul><ul><li>What are the forces exploiting identity? </li></ul><ul><li>How can ethical notions of identity and privacy be sustained against these forces? </li></ul>
    • 11. Richard Veryard <ul><li>Director, Next Practice Research Initiative </li></ul><ul><li>http://npri.wikispaces.com/ </li></ul><ul><li>http:// demandingchange . blogspot.com / </li></ul><ul><li>http://www.linkedin.com/groups?gid=2201459 </li></ul>

    ×