Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Identification and  Social Justice            Bob BlakleyKaliya “Identity Woman” Hamlin Cloud Identity Summit   July 19 2012
Identity issocially constructedand contextual.
NO IDENTITY                                             =                                         NO ACCESS    No rights  ...
BIRTH AND CITIZENSHIP                                RECORDS                        SUBSTANTIALLY DECREASE                ...
BUT MORE IDENTITY                             INFORMATION                                 IS NOT                          ...
IDENTIFICATION TRANSFERS RISK                             FROM THE IDENTIFYING PARTY                               TO THE ...
SOCIETY USES IDENTIFICATION                 TO TAKE RISK FROM                    INSTITUTIONS             AND GIVE IT TO I...
Information Asymmetry and Power Asymmetry
BUILDING DOSSIERS INCREASES RISKS             TO IDENTIFIED PARTIES          BY APPLYING INFORMATION            TO MANY TR...
ADDING FAVORABLE INFORMATION             TO AN IDENTITY DOSSIER               CAN DECREASE RISK        TO IDENTIFIED PARTI...
INDIVIDUAL Roles/                             PersonalPersone                                     Cloud                DAT...
BUT ADDING ADVERSE INFORMATION           TO AN IDENTITY DOSSIER              CAN INCREASE RISK         TO IDENTIFIED PARTI...
Services                        IDENTITY DOSSIERS                              DO NOT ALLOCATE RISKS                      ...
THE POOR ARE MORE LIKELY                    TO HAVE ADVERSE                      INFORMATION                   ADDED TO DO...
THE RICH ARE                   MORE LIKELY TO HAVE                  ADVERSE INFORMATION                 REMOVED FROMDOSSIE...
Infomediary Markets             Retailer                                                                                  ...
DOSSIERS TEND TO                        ALLOCATE RISKS TO                       THOSE LEAST ABLE TO                       ...
CITIZENS OPT OUT OF OR             SUBVERT IDENTITY SYSTEMS            WHICH CREATEEXCESSIVE RISKS                        ...
RISK                        Optimal identity   Maximum identity                        information        information     ...
R    I    S    K Felons           IDENTITY INFORMATION PREFERENCE                                                        P...
Anonymous   ?            ?Anonymous            ?            ?           ?        Per-Post     Per-Session
Verified   ?                                                   üAnonymous                                            Veri...
?            One Site   Multi-Site                                      üAnonymous                           Verified    ...
?            One Site   Multi-Site                                                                  üAnonymous           ...
Planning Considerations        for Identity Systems•  Involve the citizens meaningfully   in the system’s design
What are the different contexts that you navigate in your life?
What are the different contexts that you navigate in your life?          Daughter     Friend: Confidante, Encourager,     ...
What are the different contexts that you navigate in your life?school volunteerVolunteer at the Space and Science CenterVo...
What are the different contexts that you navigate in your life?Work: Mentor, collaborator, driver of work, InnovatorProjec...
What are the different contexts that you navigate in your life?Facebook: Funny, Wry posting links about tech, politics, hu...
How do you manage persona’sand your identities with differentcontexts and social roles?I handed out paper and invited the ...
Planning Considerations               for Identity Systems•  Make social justice   an explicit design goal	        o  Care...
?            One Site   Multi-Site                                                                    üAnonymous         ...
?            One Site   Multi-Site                                                                  üAnonymous           ...
?            One Site   Multi-Site                                                                  üAnonymous           ...
?            One Site   Multi-Site                                                                     üAnonymous        ...
Planning Considerations         for Identity Systems•  Design the system to forget   history information after a while	  o...
Planning Considerations           for Identity Systems•  Legally enumerate permitted and   forbidden uses of identity data...
What would it look like have citizens meaningfully involved?      http://farm5.staticflickr.com/4132/5010483557_3869b9f716...
Kaliya’s NSTIC – Governance NOI Response            http://www.identitywoman.net/            insight-for-governance       ...
The Core Principles for Public Engagement1.  Careful Planning and Preparation2.  Inclusion and Demographic Diversity3.  Co...
High performance collaborationamongst industry stakeholdersis needed for NSTIC to succeed.       Shared Understanding     ...
ncdd.org
A Pattern Language for Bringing Life   to Meetings and other Gatherings    groupworksdeck.org
nist.gov/nstic/notices.html         idecosystem.org/Inviting community engagement on NSTIC Charter & BylawsMailing List:  ...
Find a resource list and reference links on our blogsBob Blakleyhttp://notabob.blogspot.com/Kaliya “Identity Woman” Hamlin...
Identification and social justice
Identification and social justice
Identification and social justice
Identification and social justice
Identification and social justice
Identification and social justice
Upcoming SlideShare
Loading in …5
×

Identification and social justice

1,512 views

Published on

Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.

Published in: Business, Economy & Finance
  • Be the first to comment

Identification and social justice

  1. 1. Identification and Social Justice Bob BlakleyKaliya “Identity Woman” Hamlin Cloud Identity Summit July 19 2012
  2. 2. Identity issocially constructedand contextual.
  3. 3. NO IDENTITY = NO ACCESS No rights or redress TO JUSTICE OR SERVICESRISK IDENTITY INFORMATION
  4. 4. BIRTH AND CITIZENSHIP RECORDS SUBSTANTIALLY DECREASE CITIZENS’ RISKSRISK Access to rights and legal system IDENTITY INFORMATION
  5. 5. BUT MORE IDENTITY INFORMATION IS NOT NECESSARILY BETTERRISK ? IDENTITY INFORMATION
  6. 6. IDENTIFICATION TRANSFERS RISK FROM THE IDENTIFYING PARTY TO THE IDENTIFIED PARTYR Identified party bears risk of beingI Each party’s initial risk denied service if identity informationS is adverseK Identifying party avoids risk by denying service if identity information is adverse IDENTITY INFORMATION
  7. 7. SOCIETY USES IDENTIFICATION TO TAKE RISK FROM INSTITUTIONS AND GIVE IT TO INDIVIDUALSRISK Individual citizen needs resources; must submit to identification Business or agency has resources; may require identification IDENTITY INFORMATION
  8. 8. Information Asymmetry and Power Asymmetry
  9. 9. BUILDING DOSSIERS INCREASES RISKS TO IDENTIFIED PARTIES BY APPLYING INFORMATION TO MANY TRANSACTIONS Risk in future transactionsR Individual citizenISK Risk in current transaction Business or agency IDENTITY INFORMATION
  10. 10. ADDING FAVORABLE INFORMATION TO AN IDENTITY DOSSIER CAN DECREASE RISK TO IDENTIFIED PARTIES A LITTLE…RISK Benefits granted based on history IDENTITY INFORMATION
  11. 11. INDIVIDUAL Roles/ PersonalPersone Cloud DATAShared &Personal PersonalDevices Context Data AnalyticsWhat if we collected our own data in our own dossiers?
  12. 12. BUT ADDING ADVERSE INFORMATION TO AN IDENTITY DOSSIER CAN INCREASE RISK TO IDENTIFIED PARTIES A LOTRISK Benefits denied based on history IDENTITY INFORMATION
  13. 13. Services IDENTITY DOSSIERS DO NOT ALLOCATE RISKS EQUALLY TO RICH AND POORGood history =Many service providers =Easy access to resources = No history or bad history =Many opportunities Few service providers = to build good history Little access to resources = Few opportunities to build good history
  14. 14. THE POOR ARE MORE LIKELY TO HAVE ADVERSE INFORMATION ADDED TO DOSSIERS Low access toR resourcesI and legalS servicesK IDENTITY INFORMATION
  15. 15. THE RICH ARE MORE LIKELY TO HAVE ADVERSE INFORMATION REMOVED FROMDOSSIERSRI High access toS resourcesK and legal services IDENTITY INFORMATION
  16. 16. Infomediary Markets Retailer Market Vendor INDIVIDUAL Individual Business Place Agent Agent Service Roles/ Provider Personae Personal Data Aggregation Markets DATA CloudShared & DataPersonalDevices Aggregation Context Services Market Vendor Place Agent Utilities Local Retailor Retailer Service Social Profit Product Provider Organization Service Producer Provider Vendor Relationship Management NO PII
  17. 17. DOSSIERS TEND TO ALLOCATE RISKS TO THOSE LEAST ABLE TO ABSORB THEM High Risk PoorRIS RichK Low Risk IDENTITY INFORMATION
  18. 18. CITIZENS OPT OUT OF OR SUBVERT IDENTITY SYSTEMS WHICH CREATEEXCESSIVE RISKS C O OR PI ES RK A T I O N IDENTITY INFORMATION
  19. 19. RISK Optimal identity Maximum identity information information IDENTITY INFORMATION No identity information WELL-DESIGNED IDENTITY SYSTEMS COLLECT, MAINTAIN, AND USE THE SOCIALLY OPTIMAL AMOUNT AND TYPEOF IDENTITY INFORMATION
  20. 20. R I S K Felons IDENTITY INFORMATION PREFERENCE Police Liberals ConservativesTax & Banks Privacy Persecutedwelfare advocates minorities General Publiccheats FINDING THE OPTIMAL RISK/BENEFIT TRADEOFF REQUIRES CAREFUL STUDY AND CITIZEN INVOLVEMENT
  21. 21. Anonymous ? ?Anonymous ? ? ? Per-Post Per-Session
  22. 22. Verified ? üAnonymous Verified ü ü ü ü ü ü Documentation In Person Biometric Verification Capture
  23. 23. ? One Site Multi-Site üAnonymous Verified Pseudonymous
  24. 24. ? One Site Multi-Site üAnonymous Self-Asserted Socially Verified Pseudonymous Validated
  25. 25. Planning Considerations for Identity Systems•  Involve the citizens meaningfully in the system’s design
  26. 26. What are the different contexts that you navigate in your life?
  27. 27. What are the different contexts that you navigate in your life? Daughter Friend: Confidante, Encourager, Daughter Fun, Listener, Confider DaughterPartner Mother Daughter Great FriendSpouse Mother Friend MotherWife Sister Friend MotherWife Sister Friend MotherWife Sister Friend Mother-in-Wife Sister Friend LawWife Sister-in-LawWife MomWife Pet Sitting Parent Aunt Dog Lover Parent Cousin Dog Owner ParentEurope Family Dog Owner/Companion
  28. 28. What are the different contexts that you navigate in your life?school volunteerVolunteer at the Space and Science CenterVolunteer at the Animal Shelter StudentVolunteer at Community Outreach StudentMember SVForum Tech Women StudentBook Club: hostess, humorous, well read, insightful Student StudentMeetup Organizer Student Girl ScoutsOrganizer Girl ScoutsPresident (club) SoccerSecretary of School Club School Soccer TeamA School Club Member Member NCAA Fencing Team School Newspaper Energy club Leader
  29. 29. What are the different contexts that you navigate in your life?Work: Mentor, collaborator, driver of work, InnovatorProject Management Professional at ____Airline Industry Expert MBATechnologist LinkedIn - Professional OnlineAnthropologist LinkedIn: professional ExecutiveInternational Artist At work- OnlineIDDirector in my CompanyFinance Executive Mentor for StartupSales Director Cultural MentorSales Enablement Manager MentorInternational Project Manager Mentor EmployeeProgram Manger Mentor Co-WorkerOrganizational Planning Meeting ColleagueDesign Thinker EmployeeConnector Intern
  30. 30. What are the different contexts that you navigate in your life?Facebook: Funny, Wry posting links about tech, politics, humor, familyFace to face: Celebration Party Arabic Language Learner WalkerDancing: Free in the Flow CyclistMoose Chef Formulal FunCreative Traveler Sports Car EnthusiastPiano PhotographerArtist Blogger ContrarianArtistic Social Media Personal pain in the side Movie AddictOnline: get educated review before purchaseOnline: Research, Learn InspirationOnline: Buy/place orders Energetic
  31. 31. How do you manage persona’sand your identities with differentcontexts and social roles?I handed out paper and invited the womento draw their own map of how they do thisand then to share it with their neighbor.
  32. 32. Planning Considerations for Identity Systems•  Make social justice an explicit design goal o  Carefully balance stakeholder interests •  Consider a system of loosely-linked special-purpose systems o  Instead of a single centralized system o  Design systems that inherently don’t link personas together - Example: LLP
  33. 33. ? One Site Multi-Site üAnonymous Self-Asserted Socially Verified Pseudonymous Validated Over 18 years ? Ms.Sue Donna Woman DOB = 1/21/1982 Voter ü 1823 6th Ave. Alameda, CA CA District 9 Verified Anonymous Attributes
  34. 34. ? One Site Multi-Site üAnonymous Self-Asserted Socially Verified Pseudonymous Validated
  35. 35. ? One Site Multi-Site üAnonymous Self-Asserted Socially Verified Pseudonymous Validated
  36. 36. ? One Site Multi-Site üAnonymous Self-Asserted Socially Verified Pseudonymous Validated ü ü Limited Liability Persona
  37. 37. Planning Considerations for Identity Systems•  Design the system to forget history information after a while o  Or not to compile dossiers at all
  38. 38. Planning Considerations for Identity Systems•  Legally enumerate permitted and forbidden uses of identity data o Forbid secondary uses and establish sanctions •  Regulate use, not collection (per danah boyd) o  Explicitly enumerate permitted uses in the data itself o  Using context metadata
  39. 39. What would it look like have citizens meaningfully involved? http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpg http://farm5.staticflickr.com/4132/5010483557_3869b9f716_z.jpghttp: //far m4.sta ticfli ckr.co m/35 32/4 0152 5698 5_b1 3d64
  40. 40. Kaliya’s NSTIC – Governance NOI Response http://www.identitywoman.net/ insight-for-governance taoofdemocracy.comTom Atlee co-intelligence.org
  41. 41. The Core Principles for Public Engagement1.  Careful Planning and Preparation2.  Inclusion and Demographic Diversity3.  Collaboration and Shared Purpose4.  Openness and Learning5.  Transparency and Trust6.  Impact and Action7.  Sustained Engagement and Participatory Culture
  42. 42. High performance collaborationamongst industry stakeholdersis needed for NSTIC to succeed. Shared Understanding Shared Languagehttp://www.identitywoman.net/ ecosystems-collaborate-using-shared-language-nstic alignment-of-nstic-stakeholders
  43. 43. ncdd.org
  44. 44. A Pattern Language for Bringing Life to Meetings and other Gatherings groupworksdeck.org
  45. 45. nist.gov/nstic/notices.html idecosystem.org/Inviting community engagement on NSTIC Charter & BylawsMailing List: NSTIC.UShttp://lists.idcommons.net /lists/subscribe/nstic-idm
  46. 46. Find a resource list and reference links on our blogsBob Blakleyhttp://notabob.blogspot.com/Kaliya “Identity Woman” Hamlinhttp://www.identitywoman.netCloud Identity Summit July 19 2012

×