Successfully reported this slideshow.
Your SlideShare is downloading. ×

Identification and social justice

Ad

Identification and
  Social Justice
            Bob Blakley

Kaliya “Identity Woman” Hamlin

 Cloud Identity Summit   July ...

Ad

Identity is
socially constructed
and contextual.

Ad

NO IDENTITY
                                             =
                                         NO ACCESS
    No right...

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Ad

Loading in …3
×

Check these out next

1 of 52 Ad
1 of 52 Ad

Identification and social justice

Download to read offline

Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.

Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.

Advertisement
Advertisement

More Related Content

More from Kaliya "Identity Woman" Young (20)

Advertisement

Identification and social justice

  1. 1. Identification and Social Justice Bob Blakley Kaliya “Identity Woman” Hamlin Cloud Identity Summit July 19 2012
  2. 2. Identity is socially constructed and contextual.
  3. 3. NO IDENTITY = NO ACCESS No rights or redress TO JUSTICE OR SERVICES R I S K IDENTITY INFORMATION
  4. 4. BIRTH AND CITIZENSHIP RECORDS SUBSTANTIALLY DECREASE CITIZENS’ RISKS R I S K Access to rights and legal system IDENTITY INFORMATION
  5. 5. BUT MORE IDENTITY INFORMATION IS NOT NECESSARILY BETTER R I S K ? IDENTITY INFORMATION
  6. 6. IDENTIFICATION TRANSFERS RISK FROM THE IDENTIFYING PARTY TO THE IDENTIFIED PARTY R Identified party bears risk of being I Each party’s initial risk denied service if identity information S is adverse K Identifying party avoids risk by denying service if identity information is adverse IDENTITY INFORMATION
  7. 7. SOCIETY USES IDENTIFICATION TO TAKE RISK FROM INSTITUTIONS AND GIVE IT TO INDIVIDUALS R I S K Individual citizen needs resources; must submit to identification Business or agency has resources; may require identification IDENTITY INFORMATION
  8. 8. Information Asymmetry and Power Asymmetry
  9. 9. BUILDING DOSSIERS INCREASES RISKS TO IDENTIFIED PARTIES BY APPLYING INFORMATION TO MANY TRANSACTIONS Risk in future transactions R Individual citizen I S K Risk in current transaction Business or agency IDENTITY INFORMATION
  10. 10. ADDING FAVORABLE INFORMATION TO AN IDENTITY DOSSIER CAN DECREASE RISK TO IDENTIFIED PARTIES A LITTLE… R I S K Benefits granted based on history IDENTITY INFORMATION
  11. 11. INDIVIDUAL Roles/ Personal Persone Cloud DATA Shared & Personal Personal Devices Context Data Analytics What if we collected our own data in our own dossiers?
  12. 12. BUT ADDING ADVERSE INFORMATION TO AN IDENTITY DOSSIER CAN INCREASE RISK TO IDENTIFIED PARTIES A LOT R I S K Benefits denied based on history IDENTITY INFORMATION
  13. 13. Services IDENTITY DOSSIERS DO NOT ALLOCATE RISKS EQUALLY TO RICH AND POOR Good history = Many service providers = Easy access to resources = No history or bad history = Many opportunities Few service providers = to build good history Little access to resources = Few opportunities to build good history
  14. 14. THE POOR ARE MORE LIKELY TO HAVE ADVERSE INFORMATION ADDED TO DOSSIERS Low access to R resources I and legal S services K IDENTITY INFORMATION
  15. 15. THE RICH ARE MORE LIKELY TO HAVE ADVERSE INFORMATION REMOVED FROMDOSSIERS R I High access to S resources K and legal services IDENTITY INFORMATION
  16. 16. Infomediary Markets Retailer Market Vendor INDIVIDUAL Individual Business Place Agent Agent Service Roles/ Provider Personae Personal Data Aggregation Markets DATA Cloud Shared & Data Personal Devices Aggregation Context Services Market Vendor Place Agent Utilities Local Retailor Retailer Service Social Profit Product Provider Organization Service Producer Provider Vendor Relationship Management NO PII
  17. 17. DOSSIERS TEND TO ALLOCATE RISKS TO THOSE LEAST ABLE TO ABSORB THEM High Risk Poor R I S Rich K Low Risk IDENTITY INFORMATION
  18. 18. CITIZENS OPT OUT OF OR SUBVERT IDENTITY SYSTEMS WHICH CREATEEXCESSIVE RISKS C O O R P I E S R K A T I O N IDENTITY INFORMATION
  19. 19. R I S K Optimal identity Maximum identity information information IDENTITY INFORMATION No identity information WELL-DESIGNED IDENTITY SYSTEMS COLLECT, MAINTAIN, AND USE THE SOCIALLY OPTIMAL AMOUNT AND TYPEOF IDENTITY INFORMATION
  20. 20. R I S K Felons IDENTITY INFORMATION PREFERENCE Police Liberals Conservatives Tax & Banks Privacy Persecuted welfare advocates minorities General Public cheats FINDING THE OPTIMAL RISK/BENEFIT TRADEOFF REQUIRES CAREFUL STUDY AND CITIZEN INVOLVEMENT
  21. 21. Anonymous ? ? Anonymous ? ? ? Per-Post Per-Session
  22. 22. Verified ? ü Anonymous Verified ü ü ü ü ü ü Documentation In Person Biometric Verification Capture
  23. 23. ? One Site Multi-Site ü Anonymous Verified Pseudonymous
  24. 24. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated
  25. 25. Planning Considerations for Identity Systems •  Involve the citizens meaningfully in the system’s design
  26. 26. What are the different contexts that you navigate in your life?
  27. 27. What are the different contexts that you navigate in your life? Daughter Friend: Confidante, Encourager, Daughter Fun, Listener, Confider Daughter Partner Mother Daughter Great Friend Spouse Mother Friend Mother Wife Sister Friend Mother Wife Sister Friend Mother Wife Sister Friend Mother-in- Wife Sister Friend Law Wife Sister-in-Law Wife Mom Wife Pet Sitting Parent Aunt Dog Lover Parent Cousin Dog Owner Parent Europe Family Dog Owner/Companion
  28. 28. What are the different contexts that you navigate in your life? school volunteer Volunteer at the Space and Science Center Volunteer at the Animal Shelter Student Volunteer at Community Outreach Student Member SVForum Tech Women Student Book Club: hostess, humorous, well read, insightful Student Student Meetup Organizer Student Girl Scouts Organizer Girl Scouts President (club) Soccer Secretary of School Club School Soccer Team A School Club Member Member NCAA Fencing Team School Newspaper Energy club Leader
  29. 29. What are the different contexts that you navigate in your life? Work: Mentor, collaborator, driver of work, Innovator Project Management Professional at ____ Airline Industry Expert MBA Technologist LinkedIn - Professional Online Anthropologist LinkedIn: professional Executive International Artist At work- OnlineID Director in my Company Finance Executive Mentor for Startup Sales Director Cultural Mentor Sales Enablement Manager Mentor International Project Manager Mentor Employee Program Manger Mentor Co-Worker Organizational Planning Meeting Colleague Design Thinker Employee Connector Intern
  30. 30. What are the different contexts that you navigate in your life? Facebook: Funny, Wry posting links about tech, politics, humor, family Face to face: Celebration Party Arabic Language Learner Walker Dancing: Free in the Flow Cyclist Moose Chef Formulal Fun Creative Traveler Sports Car Enthusiast Piano Photographer Artist Blogger Contrarian Artistic Social Media Personal pain in the side Movie Addict Online: get educated review before purchase Online: Research, Learn Inspiration Online: Buy/place orders Energetic
  31. 31. How do you manage persona’s and your identities with different contexts and social roles? I handed out paper and invited the women to draw their own map of how they do this and then to share it with their neighbor.
  32. 32. Planning Considerations for Identity Systems •  Make social justice an explicit design goal o  Carefully balance stakeholder interests •  Consider a system of loosely-linked special-purpose systems o  Instead of a single centralized system o  Design systems that inherently don’t link personas together - Example: LLP
  33. 33. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated Over 18 years ? Ms.Sue Donna Woman DOB = 1/21/1982 Voter ü 1823 6th Ave. Alameda, CA CA District 9 Verified Anonymous Attributes
  34. 34. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated
  35. 35. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated
  36. 36. ? One Site Multi-Site ü Anonymous Self-Asserted Socially Verified Pseudonymous Validated ü ü Limited Liability Persona
  37. 37. Planning Considerations for Identity Systems •  Design the system to forget history information after a while o  Or not to compile dossiers at all
  38. 38. Planning Considerations for Identity Systems •  Legally enumerate permitted and forbidden uses of identity data o Forbid secondary uses and establish sanctions •  Regulate use, not collection (per danah boyd) o  Explicitly enumerate permitted uses in the data itself o  Using context metadata
  39. 39. What would it look like have citizens meaningfully involved? http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg http: //far m4.sta ticfli ckr.co m/35 32/4 0152 5698 5_b1 3d64
  40. 40. Kaliya’s NSTIC – Governance NOI Response http://www.identitywoman.net/ insight-for-governance taoofdemocracy.com Tom Atlee co-intelligence.org
  41. 41. The Core Principles for Public Engagement 1.  Careful Planning and Preparation 2.  Inclusion and Demographic Diversity 3.  Collaboration and Shared Purpose 4.  Openness and Learning 5.  Transparency and Trust 6.  Impact and Action 7.  Sustained Engagement and Participatory Culture
  42. 42. High performance collaboration amongst industry stakeholders is needed for NSTIC to succeed. Shared Understanding Shared Language http://www.identitywoman.net/ ecosystems-collaborate-using-shared-language-nstic alignment-of-nstic-stakeholders
  43. 43. ncdd.org
  44. 44. A Pattern Language for Bringing Life to Meetings and other Gatherings groupworksdeck.org
  45. 45. nist.gov/nstic/notices.html idecosystem.org/ Inviting community engagement on NSTIC Charter & Bylaws Mailing List: NSTIC.US http://lists.idcommons.net /lists/subscribe/nstic-idm
  46. 46. Find a resource list and reference links on our blogs Bob Blakley http://notabob.blogspot.com/ Kaliya “Identity Woman” Hamlin http://www.identitywoman.net Cloud Identity Summit July 19 2012

×