Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Identity and VPEC-T


Published on

Understanding Identity and Privacy through the VPEC-T lens.

Published in: Business, Technology
  • Be the first to comment

Identity and VPEC-T

  1. 1. Understanding Identity with VPEC-T v alues p olicies e vents c ontent t rust
  2. 2. Complex Identity Example: Ulysses <ul><li>&quot;The Ulysses who arrives in Ithaca as a poor beggar unrecognized by everyone is no longer the same person as the Ulysses who departed for Troy. It is no coincidence that he had once saved his life by pretending his name was Nobody. The only immediate and spontaneous recognition comes from his dog, Argos, as if the continuity of the individual could make itself manifest through signs perceptible only to an animal. For the nurse, the proof of his identity was the scar left him by a boar's tusk, for his wife the secret of the manufacture of their marriage bed out of the roots of an olive tree, and for his father a list of fruit trees. These signs have nothing regal about them; they put the hero on the level of a poacher, a carpenter, a gardener.&quot;  </li></ul><ul><li>[Italo Calvino, The Literature Machine (trans Patrick Creagh, Pan Books, London, 1989) pp 140-1] </li></ul>
  3. 3. Identity as Content <ul><li>A collection of attributes, preferences, and traits. </li></ul><ul><li>Some of this content may be stored in a computer record or smartcard. </li></ul><ul><li>Our brains contain much richer content. </li></ul><ul><li>But what exactly does this content mean? </li></ul><ul><li>Protecting identity is about verifying the content and protecting the container. Or is it? </li></ul>v alues p olicies e vents c ontent t rust
  4. 4. Identity as Event <ul><li>A signal that allows someone or something to be identified. </li></ul><ul><li>Disclosure as an event making identity information available to the identifying party. </li></ul><ul><li>Identity management is about sending, receiving and interpreting appropriate signals. Among other things. </li></ul>v alues p olicies e vents c ontent t rust
  5. 5. Identity as Policy <ul><li>A rule defining when something could be regarded as the same again … </li></ul><ul><li>yields a set of choices </li></ul><ul><li>what to present about oneself </li></ul><ul><li>what to discover about others </li></ul>v alues p olicies e vents c ontent t rust
  6. 6. Identity as Value <ul><li>How do identity and privacy conflict with other possible values? </li></ul>v alues p olicies e vents c ontent t rust Security / Safety  Privacy Innovation  Brand Identity Corporate Identity Adaptation to Reality, Viability  Identity Preservation
  7. 7. Identity as Trust v alues p olicies e vents c ontent t rust … not just a different context but a different person. Remus Lupin as Werewolf Remus Lupin as Human Guy Fawkes after torture Guy Fawkes Manager with gun-to-head Manager John-Drunk John-Sober Unreliable Reliable
  8. 8. Identity Challenges Transitive trust? Trust Repurposed content? Content Disclosure / breach? Events Blanket consent? Policies Your identity has an economic value to someone else. Values
  9. 9. Some Questions about Identity and Privacy <ul><li>How do privacy values interact with other competing values? </li></ul><ul><li>How do personal preferences get embedded in policies? </li></ul><ul><li>What events trigger attention to identity and privacy? </li></ul><ul><li>What is the underlying meaning and content of identity and privacy? </li></ul><ul><li>What forms of trust exist? How can the requisite forms of trust be sustained? </li></ul>
  10. 10. Ecological Thinking about Identity and Privacy <ul><li>What are the forces fragmenting identity? </li></ul><ul><li>What are the forces homogenizing identity? </li></ul><ul><li>What are the forces exploiting identity? </li></ul><ul><li>How can ethical notions of identity and privacy be sustained against these forces? </li></ul>
  11. 11. Richard Veryard <ul><li>Director, Next Practice Research Initiative </li></ul><ul><li> </li></ul><ul><li>http:// demandingchange . / </li></ul><ul><li> </li></ul>