• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Design Patterns for Digital Identity

Design Patterns for Digital Identity



Digital Identity panel discussion at University of Bath, Centre for Information Management. 21st October 2009.

Digital Identity panel discussion at University of Bath, Centre for Information Management. 21st October 2009.



Total Views
Views on SlideShare
Embed Views



14 Embeds 1,987

http://digitaldisruptions.org 1827
http://workhardbutwork.blogspot.com.es 37
http://www.te-learning.nl 32
http://workhardbutwork.blogspot.com 20
http://wilfredrubens.typepad.com 19
http://www.rhizomeproject.org 14
http://www.slideshare.net 11
http://rhizomeproject.org 10
http://1100051926.nvmodules.netvibes.com 5
http://translate.googleusercontent.com 4
http://workhardbutwork.blogspot.fr 3
http://1103760572.nvmodules.netvibes.com 2 2
http://www.ranksit.com 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • Our digital identity is not merely an extension of our non-digital identity. It is an integral part. It is another performance space. In fact it provides multiple spaces for performing our identities.

Design Patterns for Digital Identity Design Patterns for Digital Identity Presentation Transcript

  • Design Patterns for Digital Identity
    • Exploring Digital Selves:
    Dr Steven Warburton King’s College London Digital Identity Seminar University of Bath 21 st October 2009
  • http://www.nytimes.com/external/readwriteweb/2009/10/16/16readwriteweb-how-safe-are-facebook-applications-57362.html
  • http://news.bbc.co.uk/2/hi/technology/3955913.stm
  • Digital ID Fixed Access Identity theft Security Digital Self Mutable Performance Reputation Control D IMENSIONS OF D IGITAL I DENTITY
  • Self Dialectic Identity Person Internal External Identification Other Collective I DENTITY F RAMEWORK Similarity Difference
  • … a technologically mediated extension of the self formed from any available electronic data that references ‘you’
  • Rather than ask what is digital identity – perhaps it is better to observe how identities are performed in digital spaces?
  • digital Identity spaces my personal space my professional space my social life my lifestyle my ego search my shared media
  • Strand 1 – what successful practices do individuals already employ when creating, developing and managing their digital identity? Strand 2 – what kinds of tools would be valuable to help support individuals in the productive use of their digital identity? Approach: share narratives of successful practice using participatory pattern workshops to uncover DI design patterns Approach: design usability extensions to the Euro pass CV plug-in tool to manage identity resources
  • Rhizome Strand 1 - The Problem What kind of knowledge can we share? How do we elicit it? In what ways do we capture and transfer it?
  • Design patterns and pattern languages Other Areas Many authors and titles. Pedagogy, Social Action, HCI, Virtual Worlds, Learning, Collaboration, Assessment, Web design, Usability, Project Management 2009 Gang of Four Design Patterns: Elements of Reusable. Object Orientated Software. Object Orientated Software Design 1995 Christopher Alexander The Timeless Way of Building. A Pattern Language: Towns , Buildings, Construction. Architecture 1977
  • Capture and re-use expert design knowledge Establish common terminology and language Provide the necessary level of abstraction for solving novel problems Why design patterns?
  • Problem Solution Context
  • Participatory Pattern Workshops
  • Participatory pattern workshops
  • Case-story workshop Engender collaborative reflection among practitioners by a structured process of sharing narratives of successful practice (STARR) Three Hats Table-top Concept Mapping
  • Three Hats
  • Pattern Mining workshop Identify commonalities across case-stories and abstract transferable design knowledge in a semi-structured form Paper 2.0 Force Mapping
  • Force Mapping Actors Beliefs Conditions Desires
  • Future Scenarios workshop Validate design patterns by applying them to new problem scenarios in real contexts Pattern Mapping Poster Session
  • Pattern Mapping
  • Digital Identity Panic Facet Me Leaving Trails Others First Permissioned Aggregation Purposeful Delay Space for Lurking What is My Name Digital Identity Pattern Collection at http://purl.org/planet/Main/ Personal Professional Openness Control
  • Pattern: Others First
  • Case-stories: Flickr photo-sharing
  • Problem Context Solution How do we manage the tension between building our personal identity and our responsibility to others. Photographs form an important part in presenting, reflecting and understanding our identity, and preserving our memories. But when we use images to project our identities online and include images of others, we are invariably adding to the digital identity of all those who are represented. Although this pattern is drawn from case-stories that focus on the practice of putting children’s pictures on line it is applicable to many situations where the sharing of digital content impacts on others.
    • Service choice
    • Adjust privacy settings and default settings
    • Set access permissions
    • Prevent automated aggregation
    • Prune data – delete potentially embarrassing images
    • Consultation with ‘other’
    • Monitor and control tagging
  • Image courtesy Ed Brodzinsky http://www.flickr.com/photos/atelier79033/3540593966/ Scenario - designing online identity spaces
  • Alexander Pattern #127 - Intimacy Gradient: Conflict: Unless the spaces in a building are arranged in a sequence which corresponds to their degrees of privateness, the visits made by strangers, friends, guests, clients, family, will always be a little awkward. Resolution: Lay out the spaces of a building so that they create a sequence which begins with the entrance and the most public parts of the building, then leads into the slightly more private areas, and finally to the most private domains.
  • 1. Awareness – ego search, context, history 2. Trusted source – professional profile, authoritative 3. Aggregation – triangulation, rich picture 4. Compartmentalisation – permissions, separate identity spaces F OUR R ECURRING T HEMES within D IGITAL I DENTITY P ATTERNS
  • 3. It is impossible to control every context 2. The reader is ultimately the one who determines the meaning
    • A map not a picture, our perspective is only ever partial
    Three stubborn facts
  • Where next? Writer’s Workshop: 17 th November 2009 London Knowledge Lab
  • http://warburton.typepad.com/liquidlearning/2009/09/digital-identity-and-social-media-cfc.html
  • Acknowledgements: The Pattern Language Network (Planet) project was a collaboration between Leeds Metropolitan University, Coventry University, Glasgow Caledonian University, King’s College London and London Knowledge Lab. It was funded by JISC under the Users and Innovation Programme. For more information see http://patternlanguagenetwork.org Learning Patterns was a  Jointly Executed Integrating Research Project  of the  Kaleidoscope Network of Excellence . It was co-directed by Dave Pratt, from Warwick university, and Niall Winters from the London Knowledge Lab. Additional partners were: The Freudenthal Institute, the Educational Technology Lab, Dept of Education, University of Athens, Istituto per le Tecnologie Didattiche, Centre for Research in IT in Education (CRITE), Trinity College Dublin and the Faculty of Education at the IT University of Göteborg. For further work on the PPW project please also see Yishay Mor and Niall Winters http://www.slideshare.net/yish Funded by Eduserv http://www.rhizomeproject.org