rebooting digital identity            how the social web is transforming citizen                  behaviours and expectati...
the views expressed today are my own
rebooting digital identity how the social web is transforming citizen       behaviours and expectations  1   we are here n...
1. we are here now
Australians spending more time online according to ComScore State of the Internet 2010 • 18.8 hours per month online on av...
and increasingly access web on mobiles            Australians with web capable mobiles            • 43% - 2009            ...
mind the analog divide
citizen expectations are changing3 types of expectations - Charlie Leadbeater• I need – essential services government must...
the Internet has something to do with itit is compact yet immense, a ‘small world’• 10x growth adds „one hop‟             ...
the public sector is evolving                                                              read-only1.   20th century admi...
what is the significance of Gov 2.0?                                              Gov 2.0government             web 2.0 th...
the public sector develops policy, deliversservices and manages goodslaws regulating drinking are enforced by police in pa...
we need to go back to first principles toidentify, agree on public purpose  public purpose            public        public...
new tools, changing citizen behavioursand the Internet are driving change       citizens          technology              ...
but trust is key to exploiting opportunitiesof collective public purpose  public                                     trust...
16Gov 2.0 begins with publicpurpose and ends with trust                            technology           citizens public   ...
the public sector needs to changea new approach• share (not cede) power, when and where appropriate• maintain authority in...
an emerging policy platformVictoria• parliamentary inquiry into PSI• VPS innovation action plan• government 2.0 action pla...
Banks                      y2. trust but verify
co-production with or without us“information wants to be free”  - Stewart Brand    at first Hackers Conference 1984
making government accountable
peer to peer support in real timeCNNhttp://edition.cnn.com/2011/WORLD/asiapcf/07/14/india.blasts.help/index.html?hpt=hp_bn...
Department of Justice Victoria
social media policy and identityhttp://www.youtube.com/watch?v=8iQLkt5CG8I&feature=youtu.be
permission to rate, comment, contest
seeking and rating ideas openly
changing community engagement• 31,852   followers - Victoria Police on Twitter• 51,133   downloads - CFA FireReady mobile ...
establishing a trusted presenceand authentic voice
public conversations with government               (cc @justice_vic) Working with Children               check was 90% don...
responding to citizens openly, honestly                 @deonwentworth Have chased up and have                 an answer f...
establishing trust in peer to peer context    @deonwentworth Simple answer: starts over    when changing categ. - makes ex...
going where people are with useful information    15,450 fans x average of 150 friends = 2,317,500 people
mobile apps extend frontline crisisresponse but raise identity questions
communities rely on identity, reputation
Map of Online Communities 2010: Randall Munroe/xkcd, Ethan Bloch/Flowtown      3. silos and shoe boxes
expectations for digital identity today• mediating experience of own identity and of other people• authenticating trust-ba...
citizen comfort level online is inconsistentUnited States Social Security Administration• pioneering 1990s initiative move...
but many people are comfortable sharing…• shopping histories for „informed advertising‟• activities and location for socia...
acceptable boundaries still emerging• Apple caught tracking iPhone user movements• Australian court convicts jilted boyfri...
digital identity on the web - freedom to be…                                                        1. unidentified       ...
pseudonymous identity relies on reputation• identity and reputation as  interdependent, tightly linked• social filtering, ...
current state of identity, personal informationsharing fragmented                                                         ...
challenges in technology andpolicy dimensions                            medium                               hightechnolo...
mostly simple identity solutions                            medium                               hightechnology sophistica...
some more advanced in one dimension                              medium                               high  technology sop...
few solutions advance in bothdimensions                               medium                               high   technolo...
CFA, Black Saturday, Flickr                              4. new directions
what is government’s role in digital identity?Competing policy interests range from protecting citizenfreedoms, privacy an...
Australia’s legacy of resistance• NO universal identifying number  – TFN, Medicare number, state    drivers license  – 198...
similar history of resistance in U.S.• NO universal identifying number – SSN de facto national ID“We are not talking about...
Estonia’s citizen centric approach
cultural and social norms – law and identitycivil law tradition• rules determined from  sovereign above• code is law – tra...
virtues of forgetting in digital age• 2011 EU data protection goals included  clarifying right to be forgotten• right of i...
making the case for user control      Wherever possible we believe that      personal data should be controlled by      in...
PDS (personal data stores) for user control• individuals as data managers – user control and choice• lower costs and new o...
federated social identity networks• consider open-source federated social network software so  anyone can re-use to create...
Jericho Forum IdEA commandments14 commandments across 5 areas to inform Identity,Entitlement & Access Management systems1....
trust frameworks• U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC)  – to enable trusted identity throug...
digital identity – emerging principles• one size does not fit all• support different types of identity• privacy and securi...
rebooting digital identity how the social web is transforming citizen       behaviours and expectations  1   we are here n...
thanks!                                   questions?                                   kia ora.Patrick McCormickpatrick.mc...
re-using this presentation? the fine print…• Parts of this presentation not under copyright or licensed to others (as indi...
Upcoming SlideShare
Loading in...5
×

Rebooting digital identity: how the social web is transforming citizen behaviours and expectations

621

Published on

the talk I gave at the New Zealand Digital Identity in a Networked World conference on 1 May 2012 in Wellington

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
621
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Rebooting digital identity: how the social web is transforming citizen behaviours and expectations"

  1. 1. rebooting digital identity how the social web is transforming citizen behaviours and expectationsPatrick McCormick @solutistSpecial Adviser and MAMS Program DirectorDepartment of Premier and CabinetIdentity Conference 20121 May 2012 - Wellington, NZ
  2. 2. the views expressed today are my own
  3. 3. rebooting digital identity how the social web is transforming citizen behaviours and expectations 1 we are here now 2 trust but verify 3 silos and shoe boxes 4 new directions
  4. 4. 1. we are here now
  5. 5. Australians spending more time online according to ComScore State of the Internet 2010 • 18.8 hours per month online on average • 36.3% used Apple iTunes • 42.6% used online banking services • 81.6% used social networks
  6. 6. and increasingly access web on mobiles Australians with web capable mobiles • 43% - 2009 • 65% - 2010 Internet access via mobiles in Australia • 29% - 2009 • 52% - 2010 Nielson White Paper 2011
  7. 7. mind the analog divide
  8. 8. citizen expectations are changing3 types of expectations - Charlie Leadbeater• I need – essential services government must provide• I want – discretionary services responding to demand• I can – option to self select, participate, co-producewhy now?• Internet 1.0 – low or no cost production and distribution• netizens 1.0 – surplus computing and doing capacity• web 2.0 - new tools, behaviours, expectations
  9. 9. the Internet has something to do with itit is compact yet immense, a ‘small world’• 10x growth adds „one hop‟ power law distribution• growth is organic and ad hoc mostly below and above mean In Search of Jefferson‟s Moose - David G. Post • few with many links • many with few links power law distribution mostly below and above the mean •few with many links •many with few links
  10. 10. the public sector is evolving read-only1. 20th century administrative bureaucracy rigid, prescriptive, hierarchical2. new public management - performance3. triple bottom line – shareholders, stakeholders read-write4. co-productive, shared enterprise, Gov 2.0 agile, principled, collaborative
  11. 11. what is the significance of Gov 2.0? Gov 2.0government web 2.0 the new economy begins with technology and ends with trust - Alan Webber 1993
  12. 12. the public sector develops policy, deliversservices and manages goodslaws regulating drinking are enforced by police in parks public public sector policy public public services goods
  13. 13. we need to go back to first principles toidentify, agree on public purpose public purpose public public sector policy public public services goods
  14. 14. new tools, changing citizen behavioursand the Internet are driving change citizens technology internet PSI government
  15. 15. but trust is key to exploiting opportunitiesof collective public purpose public trust purpose
  16. 16. 16Gov 2.0 begins with publicpurpose and ends with trust technology citizens public internet trustpurpose PSI government
  17. 17. the public sector needs to changea new approach• share (not cede) power, when and where appropriate• maintain authority in old and new models• government as a platform, providing a citizen „API‟key challenges• culture of experimentation and collaboration• open access to public sector data and information• voice of authenticity, uncertainty and contestability
  18. 18. an emerging policy platformVictoria• parliamentary inquiry into PSI• VPS innovation action plan• government 2.0 action planCommonwealth• Gov 2.0 Taskforce report• APSC online engagement guidelines• declaration of open government
  19. 19. Banks y2. trust but verify
  20. 20. co-production with or without us“information wants to be free” - Stewart Brand at first Hackers Conference 1984
  21. 21. making government accountable
  22. 22. peer to peer support in real timeCNNhttp://edition.cnn.com/2011/WORLD/asiapcf/07/14/india.blasts.help/index.html?hpt=hp_bn2 2011 Mumbai bomb blasts spark social media response
  23. 23. Department of Justice Victoria
  24. 24. social media policy and identityhttp://www.youtube.com/watch?v=8iQLkt5CG8I&feature=youtu.be
  25. 25. permission to rate, comment, contest
  26. 26. seeking and rating ideas openly
  27. 27. changing community engagement• 31,852 followers - Victoria Police on Twitter• 51,133 downloads - CFA FireReady mobile app• 261,270 likes - Queensland Police on Facebook 27
  28. 28. establishing a trusted presenceand authentic voice
  29. 29. public conversations with government (cc @justice_vic) Working with Children check was 90% done (almost 11 weeks), lodged an Employ instead, and it will restart and take another 12 weeks. What a stupid system… @deonwentworth Deon - thx for your feedback. Dont know right now what happened or why its like that - but will have someone look into ^D
  30. 30. responding to citizens openly, honestly @deonwentworth Have chased up and have an answer for you. Pls dm your email addy or contact # as response wont fit in 140 spaces. Thanks ^J @justice_vic No need, got the check yesterday, start 2morrow. Thx a lot 4 following this up, thought Youd forgotten. If you still need to, you can email me at…
  31. 31. establishing trust in peer to peer context @deonwentworth Simple answer: starts over when changing categ. - makes extra sure no charges after applying. Annoying yes, but we err on side of extra protection for kids. ^D @justice_vic thanks. Got my card earlier in the week. #goodjob @justice_vic for not giving up on customer enquiries and following through right to the end
  32. 32. going where people are with useful information 15,450 fans x average of 150 friends = 2,317,500 people
  33. 33. mobile apps extend frontline crisisresponse but raise identity questions
  34. 34. communities rely on identity, reputation
  35. 35. Map of Online Communities 2010: Randall Munroe/xkcd, Ethan Bloch/Flowtown 3. silos and shoe boxes
  36. 36. expectations for digital identity today• mediating experience of own identity and of other people• authenticating trust-based attribution – assurance between entities• identifiers used by parties to agree on entity being represented• self-determination and freedom of expression Source: http://en.wikipedia.org/wiki/Digital_identity
  37. 37. citizen comfort level online is inconsistentUnited States Social Security Administration• pioneering 1990s initiative moved services online• users query retirement accounts – same as phone• backlash against perceived privacy and security risks
  38. 38. but many people are comfortable sharing…• shopping histories for „informed advertising‟• activities and location for social connectivity• problems and questions for support and assistance
  39. 39. acceptable boundaries still emerging• Apple caught tracking iPhone user movements• Australian court convicts jilted boyfriend for sharing nude photos on Facebook*• Maryland law forbids employers from accessing Facebook accounts*• Obama administration says CISPA does not sufficiently protect privacy, civil liberties* *all in April 2012
  40. 40. digital identity on the web - freedom to be… 1. unidentified 2. pseudonymous 3. identified http://googlepublicpolicy.blogspot.com.au/2011/02/freedom-to-be-who-you-want-to-be.html
  41. 41. pseudonymous identity relies on reputation• identity and reputation as interdependent, tightly linked• social filtering, meritocracy used to establish trust• pseudonyms could be privately verified with government ID or other standard• user could remain publicly pseudonymous but privately verified by reputation system
  42. 42. current state of identity, personal informationsharing fragmented suppliers individuals our data central government circumstance local government claims, assertions banks, utilities assets, liabilities interactions preferences retail, products, services transactions peer to peer interactions entitlements guesswork: future intentions service end points your preferences your requirements your intentions name identifiers address identifiers date of birth gender third parties public bodies marketing postal address credit bureau electoral role credit applications geo-codes court judgments calendar bankruptcies vehicle data Source: TVC 2002
  43. 43. challenges in technology andpolicy dimensions medium hightechnology sophistication low medium policy/services breadth
  44. 44. mostly simple identity solutions medium hightechnology sophistication low medium policy/services breadth
  45. 45. some more advanced in one dimension medium high technology sophistication low medium policy/services breadth
  46. 46. few solutions advance in bothdimensions medium high technology sophistication low medium policy/services breadth
  47. 47. CFA, Black Saturday, Flickr 4. new directions
  48. 48. what is government’s role in digital identity?Competing policy interests range from protecting citizenfreedoms, privacy and other prerogatives on one end of thescale to ensuring law, order, national security, andinstitutional efficiencies on the other end.Philosophical and political implications of choosing variousproposed solutions cut to the core of the relationship betweengovernment and citizen – is creation and use of a person‟sidentity flatly subject to central decree or must it be basedupon consent of the governed? Authentication and Identity Management: Information Age Policy Considerations - Daniel J. Greenwood
  49. 49. Australia’s legacy of resistance• NO universal identifying number – TFN, Medicare number, state drivers license – 1987 Australia Card abandoned – 2007 Access Card abandoned• National Authentication Service for Health (Nash) 2011 – to underpin personally-controlled e-health records• databases free from regulation –biometrics not covered by privacy laws i.e. left to discretion of technology vendors Source: 1 Feb 2011 http://news.cnet.com/8301-31921_3-20030234-281.html#ixzz1HT8C9mGB
  50. 50. similar history of resistance in U.S.• NO universal identifying number – SSN de facto national ID“We are not talking about a national ID card.What we are talking about is enhancing onlinesecurity and privacy, and reducing and perhapseven eliminating the need to memorize a dozenpasswords, through creation and use of moretrusted digital identities.” Commerce Secretary Gary Locke – Jan 2011• government will enable creation of verified identities, to support “identity ecosystem”• getting verified identity will be elective• user would be able to use one login for all sites source: http://www.readwriteweb.com/archives/us_commerce_department_in_charge_of_national_inter.php
  51. 51. Estonia’s citizen centric approach
  52. 52. cultural and social norms – law and identitycivil law tradition• rules determined from sovereign above• code is law – trace history to Roman law, Napoleonic codecommon law tradition• judge discovers law from practices of the people• stare decisis - similar cases should be decided by consistent rules to reach similar results
  53. 53. virtues of forgetting in digital age• 2011 EU data protection goals included clarifying right to be forgotten• right of individuals to have their data deleted when no longer needed for legitimate purpose “Regulating the Internet to correct the excesses and abuses that come from the total absence of rules is a moral imperative!” French President Sarkozy
  54. 54. making the case for user control Wherever possible we believe that personal data should be controlled by individual citizens themselves. Rather than owning and controlling their The UK Conservative Party own personal data, people very often find Manifesto – Apr 2010 that they have lost control over it.This „data vault‟ concept, an intermediarycollecting user data and giving 3rd parties The Economist Special Report:access to this data in line with individual users‟ the Data Deluge – Feb 2010specifications, is one potential solution thatoffers many theoretical advantages World Economic Forum: Rethinking Personal Data Project – Jun 2010
  55. 55. PDS (personal data stores) for user control• individuals as data managers – user control and choice• lower costs and new opportunities for organisations• environment of trust and platform for innovation Source: MyDex, The Case for Personal Information Empowerment: The rise of the personal data store
  56. 56. federated social identity networks• consider open-source federated social network software so anyone can re-use to create and maintain profiles• use common language so profiles can talk to one another• choose from array of "profile providers” like email providers• option to set up own server, provide own social profile• profiles are interoperable even on different servers http://www.eff.org/deeplinks/2011/03/introduction-distributed-social-network
  57. 57. Jericho Forum IdEA commandments14 commandments across 5 areas to inform Identity,Entitlement & Access Management systems1. Identity and Core Identity2. Multiple Identities (Persona)3. Persona (Identity) Attributes4. Entitlement management and resource access5. Usage and Delegation
  58. 58. trust frameworks• U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC) – to enable trusted identity through policies of party issuing credentials – proposed solutions currently under review• open identity trust framework provider OIX – Open Identity Exchange founded by Google, PayPal, Equifax, VeriSign, Verizon, CA and Booz Allen Hamilton in 2010 – enables exchange of credentials across public and private sectors to certify identity providers to federal standards – different from OpenID which lets sites share same credentials Source: http://mashable.com/2010/03/03/google-paypal-oix/
  59. 59. digital identity – emerging principles• one size does not fit all• support different types of identity• privacy and security expectations vary• maximise user control and choice• trusted relationships critical, contextual• identity and reputation are linked• information may need expiration date
  60. 60. rebooting digital identity how the social web is transforming citizen behaviours and expectations 1 we are here now 2 trust but verify 3 silos and shoe boxes 4 new directions
  61. 61. thanks! questions? kia ora.Patrick McCormickpatrick.mccormick@dpc.vic.gov.au@solutist
  62. 62. re-using this presentation? the fine print…• Parts of this presentation not under copyright or licensed to others (as indicated) have been made available under the Creative Commons Licence 3.0• Put simply, this means: – you are free to share, copy and distribute this work – you can remix and adapt this work• Under the following conditions – you must attribute the work to the author: Patrick McCormick - paddy@post.harvard.edu – you must share alike – so if you alter or build upon this work you have to keep these same conditions• Unless stated otherwise, the information in this presentation is the personal view of the author and does not represent official policy or position of his employer

×