SlideShare a Scribd company logo
1 of 43
Download to read offline
ePortfolio als Digitale Identiteit

Expertmeeting ePortfolio en Privacy
              Utrecht, 28 Maart 2012

          Irma van der Ploeg
  Infonomics & New Media Research Centre
 Zuyd University, Maastricht ,The Netherlands
Inhoud


•   1   Lectoraat INM
•   2   DigIDeas Project
•   3   Identiteit/Identificatie
•   4   Voorbeelden praktijkonderzoek
•   5   ePortfolios en identiteit
•   6   Potentiele issues
1 Lectoraat Infonomie en Nieuwe Media


Hogeschool Zuyd
KC ICT (Facs Recht, Commercieel Management, International
           Business & Communication, ABK)
10-12 medewerkers
Interdisciplinair: Science & Technology Studies, sociologie,
                   filosofie, ethiek, software engineering,
                   surveillance studies, critical marketing studies

Onderzoeksprogramma:
Digitaliserende Samenleving
Onderzoek
    Digitaliserende Samenleving
Twee uitgangspunten

1    Wie technologie wil ontwikkelen moet de maatschappij
     of context waarin die technologie moet functioneren
     in z’n complexiteit begrijpen.

2    Wie de hedendaagse samenleving wil begrijpen moet
     technologie in de analyse betrekken.
DigIDeas
  Social and Ethical Aspects
         of Digital Identities
  Towards a Value Sensitive Identity Management.
•   Funded by a Starting Grant generously
    provided by the European Research Council
•   Oktober 2008 - Sept 2013 (60 months)
•   PI, 3 PhD projects, 2 Postdocs
•   Hosted by the Infonomics & New Media Research Centre
    of Zuyd University of Applied Sciences at Maastricht
DigIDeas’ Overall Aims


• Development of fine-grained knowledge about contemporary
  transformations of identities in the information society
• To identify and reframe social and ethical
  implications of digital identities
• To contribute to international academic and policy debates
• To contribute to value sensitive IDM design
3 PROJECT DESIGN
Social and Ethical Aspects of
Digital Identities: Towards a Value Sensitive IDM




                               DigIDeas
                                General
                               Framework


-
3 PROJECT DESIGN
six empirical studies:
six IDM application areas
                            E-govern
                              ment

             Web 2.0,                   Security &
              Social                     Border
             Software                    Manage
                                          ment

                            DigIDeas
                             General
                            Framework

             E-Com                        Law
             merce,                      Enforce
            Marketing,                   ment &
              CRM                       Forensics
                              Ubiqui
                               tous
                            computing
                               AmI
                             A bi
3 PROJECT DESIGN
six empirical studies:
six IDM application areas      Civic IDs

                                 E-
                             government


            Personal IDs                      Secure IDs

              Web 2.0,                        Security &
               Social                           Border
              Software                        Managemnt


                             DigIDeas
                              General
                             Framework

            Profitable IDs                    Suspect IDs

            E-Commerce,                          Law
             Marketing,                       Enforcemnt
                CRM                           & Forensics
                             Ubiquitous IDs

3 PhD projects                Embedded
                              Pervasive
1 Civic and Secure IDs         Ambient
3 PROJECT DESIGN
six empirical studies:
six IDM application areas          Civic IDs

                                     E-
                                 government


                Personal IDs                      Secure IDs

                  Web 2.0,                        Security &
                   Social                           Border
                  Software                        Managemnt


                                 DigIDeas
                                  General
                                 Framework

                Profitable IDs                    Suspect IDs

                E-Commerce,                          Law
                 Marketing,                       Enforcemnt
                    CRM                           & Forensics
                                 Ubiquitous IDs

3 PhD projects                    Embedded
                                  Pervasive
1 Civic and Secure IDs             Ambient
2 Personal & Profitable IDs
3 PROJECT DESIGN
six empirical studies:
six IDM application areas           Civic IDs

                                      E-
                                  government


                 Personal IDs                      Secure IDs

                   Web 2.0,                        Security &
                    Social                           Border
                   Software                        Managemnt


                                  DigIDeas
                                   General
                                  Framework

                 Profitable IDs                    Suspect IDs

                E-Commerce,                           Law
                 Marketing,                        Enforcemnt
                    CRM                            & Forensics
                                  Ubiquitous IDs
3 PhD projects
1 Civic and Secure IDs             Embedded
                                   Pervasive
2 Personal & Profitable IDs         Ambient
3 Suspect & Ubiquitous IDs
3 Identiteit / Identificatie


• Een smalle en een brede definitie.

• Smalle in IT: ID is een dataset , user account, PNR,
  of ‘personalia’.

• Brede in sociale theorie én in sociale leven
1   `Identity’ = ….
            ...Any answer to the questions:
             Who are you ?     Who is this?
Technological mediation of identity



• Writing, spelling and counting techniques
• Printing
• Photography and other visualisation techniques
   (DNA, fingerprint, etc.)
• Document production and certification techiques
• Body dressing, adorning and enhancing
• Telling stories, histories, biographies

• …
Summing up


•   ID is done in practices
•   Technology is constitutive of ID
•   These practices are multiple
•   No privileged language/means: no core or most true ID:
         e.g. biology does not beat social,
             PNR does not beat preferences or biography
             1st person does not beat 3rd person ID :
             (no epistemological privilege, perhaps moral?)
Identification:
    Any means or practice to establish (or verify)
    someone’ s identity
Purposes:
• Establishing rights, duties, entitlements
   (soc benefits, education, taxing, voting, etc…)
• Crime solution and prevention
• Security and access control
• Victim identification
• Establishing credentials and background checks
• Individualising and customising care, services, and marketing

All in order to realise societal goals/values of
trust , security , justice
A fundamental Paradox:

Identification
   is simultaneously about:
Unicity AND Classification

• • your unique identity, as testified by your passport,
   is ‘proven’ by virtue of the passport being part of a series
   issued by a government and proclaiming you te be
  a citizen of a particular country, that is,
  a member of a particular category.

• • A facial image or fingerprint in a police database may help
  in identifying a particular suspect, but simultaneously defines
  the person in question as belonging to the category
  of registered deviants.
Identification and classification:


Identification/authentication leads to assigning category:
• Member/non-member
• National/non-national
• Trusted/distrusted
• Low risk/high risk
• Eligible/non-eligible
• known/unknown
• Etc
Paradox no 2:

                 Identification
                is simultaneously about:


       Registration of sth pregiven
                   AND
         construction of sth new

The method/technology is never neutral
3 Digitising Identification…
       .
…with many uncharted, potentially problematic implications and effects…
Digital Identities…

… “Never shrink, always grow”            (Andreas Pfitzmann)

… are infinitely replicable and retainable

… are accessible from a innumerable points of

      entry far removed in space and time

… are (near-)impossible to reconstruct, control, check or correct
New practices – and their problems
                                       •   Loss of privacy
•   Databases
•   Ubiquitous identification
•   Transaction data & log- files      •   Informatisation of the body
•   Data mining                            (integrity and dignity issues)
•   Interoperability & interconnectivity
•   Standardisation                    •   Surveillance (power and freedom issues)
•   Biometrics
•   Networking                         •   Social sorting and categorisation
•   Sensors                                (social justice and discrimination issues)
•   Social Sign-on
•   Mobile communication
                                       •   Preemptive law enforcement
•   Wireless communication
•   Profiling                              and other prevention policies
•   Tracking and tracing
                                       •   Transparency
                                           (informed choice and democratic issues)
4
Voorbeelden praktijkonderzoek
(DigIDeas Project)
• Suspect identities:
  Nieuwe technologieen in politiewerk:
  Constructie van suspecte identiteiten, wat heet ‘verdacht’?
Suspect Identities
Cameras increasingly combined with
image analysis : face / object detection, facial recognition,
licence plate recognition.

.
4
Voorbeelden praktijkonderzoek
(DigIDeas Project)
• Nieuwe technologieen in politiewerk:
  Constructie van suspecte identiteiten, wat heet ‘verdacht…’

• Van Criminaliteitspreventie tot Jeugdzorg
• Wie / wat is een ‘ risicokind’ ?
Identity & security

Keteninformatisering

Vroegsignalering

Identificatie van
‘Risicojeugd’
Security & Identification


 Wat heet ‘ riscico’
 Wie loopt risico
 Wie vormt risico
4
Voorbeelden praktijkonderzoek
(DigIDeas Project)
• Nieuwe technologieen in politiewerk:
  Constructie van suspecte identiteiten, wat heet ‘verdacht…’

• Van Criminaliteitspreventie tot Jeugdzorg
  Wie / wat is een ‘ risicokind’ ?

• Migratie, identificatie en veiligheid:
  wie is de echte vluchteling?
  grensbewaking en migratiemanagement
Kinderen Online
Marketing
of bescherming?
Vaardig of naief?
Social sign on &
.
    consumer identity
5 ePortfolio als Digitale Identiteit


• Een antwoord op de vraag ‘ Wie is dit?’, ‘Wie ben ik?’
• Beroep en opleiding sterk verbonden met identitieit &
  zelfbeeld
• Biografie: educatieve en professionele levensgeschiedenis
• Competenties als attributen
6 Potentiele Issues


• Méér dan toegang, authenticatie, en veilig beheer.
  méér dan alleen ‘de privacy kwestie’ of ‘compliance’

• Brede vorm van identiteit heeft bredere
  sociaal-maatschappelijke en ethische aspecten
ePortfolios


Verbeterde kansen voor werkgevers én werknemers:

•    Efficiente manier om vraag en aanbod bij elkaar te brengen
•    Centralisatie en standaardisatie van vraag en aanbod
•    Rijkere zelfpresentatie
•    Maatwerk: gericht zoeken naar bepaalde profielen
     op basis van objectieve competenties



• ‘Empowerment’ en maatschappelijke kansen
Potentiele issues
Maar ook mogelijk:

• Normen over ambitie, motivatie, ‘kwalificaties’, goed
  werknemerschap (LLL, mobiliteit, nwe media competenties)
• Nieuwe vormen van kwetsbaarheid en uitsluiting
• Sociaal-maatschappelijke in-en uitsluiting, c.q. discriminatie
• Filteren op leeftijd / geslacht / huidskleur?
• Classificatie, standaardisatie, en labeling
• Transparante werknemers on display
• Contextloze weergave
Samenvattend


• (Digitale) Identiteit heeft betrekking op meer dan toegang
   en beheer , is meer dan dataset

• Heeft sterke maatschappelijke en ethische implicaties

• ePortfolios kennen wellicht meer maatschappelijke
  risico’s dan die afgedekt worden door ‘ compliance’.
Thank you
for your attention

More Related Content

What's hot

Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business EthicsRahul Sharma
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gviL2MM
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!Identive
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 

What's hot (20)

Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
120 i143
120 i143120 i143
120 i143
 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 

Viewers also liked

10052012 theo mensen introductie thema semantische operabiliteit
10052012 theo mensen introductie thema semantische operabiliteit10052012 theo mensen introductie thema semantische operabiliteit
10052012 theo mensen introductie thema semantische operabiliteitStichting ePortfolio Support
 
10052012 marius monen semantische operabiliteit in let's connect
10052012 marius monen semantische operabiliteit in let's connect10052012 marius monen semantische operabiliteit in let's connect
10052012 marius monen semantische operabiliteit in let's connectStichting ePortfolio Support
 
Nepc11 eportfolio vanuit werkgeversorganisatie van der steen
Nepc11 eportfolio vanuit werkgeversorganisatie van der steenNepc11 eportfolio vanuit werkgeversorganisatie van der steen
Nepc11 eportfolio vanuit werkgeversorganisatie van der steenStichting ePortfolio Support
 
Childhood obesity powerpoint updated
Childhood obesity powerpoint updatedChildhood obesity powerpoint updated
Childhood obesity powerpoint updatedTpeoples
 
10122012 ton wilthagen e portfolio als wapen in de crisis
10122012 ton wilthagen e portfolio als wapen in de crisis10122012 ton wilthagen e portfolio als wapen in de crisis
10122012 ton wilthagen e portfolio als wapen in de crisisStichting ePortfolio Support
 
10122012 jean pierre deroo subsessie persoonlijk ontwikkelplan voor iedereen
10122012 jean pierre deroo subsessie  persoonlijk ontwikkelplan voor iedereen 10122012 jean pierre deroo subsessie  persoonlijk ontwikkelplan voor iedereen
10122012 jean pierre deroo subsessie persoonlijk ontwikkelplan voor iedereen Stichting ePortfolio Support
 
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...Stichting ePortfolio Support
 
AP - Group 4
AP - Group 4AP - Group 4
AP - Group 4yanuuuh
 
Noli Me Tangere Kabanata 16-20 (ADN)
Noli Me Tangere Kabanata 16-20 (ADN)Noli Me Tangere Kabanata 16-20 (ADN)
Noli Me Tangere Kabanata 16-20 (ADN)yanuuuh
 

Viewers also liked (16)

10052012 theo mensen introductie thema semantische operabiliteit
10052012 theo mensen introductie thema semantische operabiliteit10052012 theo mensen introductie thema semantische operabiliteit
10052012 theo mensen introductie thema semantische operabiliteit
 
10052012 marius monen semantische operabiliteit in let's connect
10052012 marius monen semantische operabiliteit in let's connect10052012 marius monen semantische operabiliteit in let's connect
10052012 marius monen semantische operabiliteit in let's connect
 
Bibliography
BibliographyBibliography
Bibliography
 
Nepc11 eportfolio vanuit werkgeversorganisatie van der steen
Nepc11 eportfolio vanuit werkgeversorganisatie van der steenNepc11 eportfolio vanuit werkgeversorganisatie van der steen
Nepc11 eportfolio vanuit werkgeversorganisatie van der steen
 
Eportfolio en NTA2035 plugfest
Eportfolio en NTA2035 plugfestEportfolio en NTA2035 plugfest
Eportfolio en NTA2035 plugfest
 
Resume
ResumeResume
Resume
 
Childhood obesity powerpoint updated
Childhood obesity powerpoint updatedChildhood obesity powerpoint updated
Childhood obesity powerpoint updated
 
10122012 ton wilthagen e portfolio als wapen in de crisis
10122012 ton wilthagen e portfolio als wapen in de crisis10122012 ton wilthagen e portfolio als wapen in de crisis
10122012 ton wilthagen e portfolio als wapen in de crisis
 
10122012 jean pierre deroo subsessie persoonlijk ontwikkelplan voor iedereen
10122012 jean pierre deroo subsessie  persoonlijk ontwikkelplan voor iedereen 10122012 jean pierre deroo subsessie  persoonlijk ontwikkelplan voor iedereen
10122012 jean pierre deroo subsessie persoonlijk ontwikkelplan voor iedereen
 
19032013 Wouter Keller Burger Bediend 2005 2015
19032013 Wouter Keller Burger Bediend 2005 201519032013 Wouter Keller Burger Bediend 2005 2015
19032013 Wouter Keller Burger Bediend 2005 2015
 
Nepc11 investeren in vrijwilligers arcon
Nepc11 investeren in vrijwilligers arconNepc11 investeren in vrijwilligers arcon
Nepc11 investeren in vrijwilligers arcon
 
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
 
Swaminathan
SwaminathanSwaminathan
Swaminathan
 
Rpp cix
Rpp cixRpp cix
Rpp cix
 
AP - Group 4
AP - Group 4AP - Group 4
AP - Group 4
 
Noli Me Tangere Kabanata 16-20 (ADN)
Noli Me Tangere Kabanata 16-20 (ADN)Noli Me Tangere Kabanata 16-20 (ADN)
Noli Me Tangere Kabanata 16-20 (ADN)
 

Similar to 28032012 Irma vander Ploeg: e portfolio als digitale identiteit

FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Business2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data ManagementBusiness2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data ManagementMorne Olivier
 
Unveiling the Reddy Anna Book ID: A Dive into its Features and Security
Unveiling the Reddy Anna Book ID: A Dive into its Features and SecurityUnveiling the Reddy Anna Book ID: A Dive into its Features and Security
Unveiling the Reddy Anna Book ID: A Dive into its Features and SecurityReddy Anna
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdfseotechinator
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurityArjitDas2
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxAmrit Chhetri
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעZeev Shetach
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)JISC.AM
 

Similar to 28032012 Irma vander Ploeg: e portfolio als digitale identiteit (20)

FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Loqr
LoqrLoqr
Loqr
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Business2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data ManagementBusiness2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data Management
 
Unveiling the Reddy Anna Book ID: A Dive into its Features and Security
Unveiling the Reddy Anna Book ID: A Dive into its Features and SecurityUnveiling the Reddy Anna Book ID: A Dive into its Features and Security
Unveiling the Reddy Anna Book ID: A Dive into its Features and Security
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
 

More from Stichting ePortfolio Support

19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management Stichting ePortfolio Support
 
10122012 yvonne van mierlo open innovatie in de human capital agenda
10122012 yvonne van mierlo open innovatie in de human capital agenda10122012 yvonne van mierlo open innovatie in de human capital agenda
10122012 yvonne van mierlo open innovatie in de human capital agendaStichting ePortfolio Support
 
10122012 carel van nahuijs e portfolio powered by ldc
10122012 carel van nahuijs e portfolio powered by ldc10122012 carel van nahuijs e portfolio powered by ldc
10122012 carel van nahuijs e portfolio powered by ldcStichting ePortfolio Support
 
10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...
10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...
10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...Stichting ePortfolio Support
 
10122012 wim winter werkervaring altijd mee waard dan je denkt
10122012 wim winter werkervaring altijd mee waard dan je denkt10122012 wim winter werkervaring altijd mee waard dan je denkt
10122012 wim winter werkervaring altijd mee waard dan je denktStichting ePortfolio Support
 
10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...
10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...
10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...Stichting ePortfolio Support
 
10052012 erwin folmer tno quality of semantic standards
10052012 erwin folmer tno quality of semantic standards10052012 erwin folmer tno quality of semantic standards
10052012 erwin folmer tno quality of semantic standardsStichting ePortfolio Support
 
28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens
28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens
28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevensStichting ePortfolio Support
 
28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...
28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...
28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...Stichting ePortfolio Support
 
28032012 Riek Joosten TNO Privacy just. gegevens en wbp
28032012 Riek Joosten TNO Privacy just. gegevens en wbp28032012 Riek Joosten TNO Privacy just. gegevens en wbp
28032012 Riek Joosten TNO Privacy just. gegevens en wbpStichting ePortfolio Support
 
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...Stichting ePortfolio Support
 
28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...
28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...
28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...Stichting ePortfolio Support
 
Nepc11 eporfolio vanuit werknemersorganisatie jongejan
Nepc11 eporfolio vanuit werknemersorganisatie jongejan Nepc11 eporfolio vanuit werknemersorganisatie jongejan
Nepc11 eporfolio vanuit werknemersorganisatie jongejan Stichting ePortfolio Support
 
Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones
Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones
Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones Stichting ePortfolio Support
 
Nepc11 eportfolio bij loopbaanontwikkeling matchcare
Nepc11 eportfolio bij loopbaanontwikkeling matchcareNepc11 eportfolio bij loopbaanontwikkeling matchcare
Nepc11 eportfolio bij loopbaanontwikkeling matchcareStichting ePortfolio Support
 

More from Stichting ePortfolio Support (20)

19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management
 
19032013 Jeroen Pepers Digitale markt
19032013  Jeroen Pepers Digitale markt 19032013  Jeroen Pepers Digitale markt
19032013 Jeroen Pepers Digitale markt
 
10122012 yvonne van mierlo open innovatie in de human capital agenda
10122012 yvonne van mierlo open innovatie in de human capital agenda10122012 yvonne van mierlo open innovatie in de human capital agenda
10122012 yvonne van mierlo open innovatie in de human capital agenda
 
10122012 carel van nahuijs e portfolio powered by ldc
10122012 carel van nahuijs e portfolio powered by ldc10122012 carel van nahuijs e portfolio powered by ldc
10122012 carel van nahuijs e portfolio powered by ldc
 
10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...
10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...
10122012 peter smulders skills@school, inzet eportfolio in techn installatieb...
 
10122012 wim winter werkervaring altijd mee waard dan je denkt
10122012 wim winter werkervaring altijd mee waard dan je denkt10122012 wim winter werkervaring altijd mee waard dan je denkt
10122012 wim winter werkervaring altijd mee waard dan je denkt
 
10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...
10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...
10122012 jean pierre deroo voorbeeld vlaanderen een persoonlijk ontwikkelplan...
 
10052012 erwin folmer tno quality of semantic standards
10052012 erwin folmer tno quality of semantic standards10052012 erwin folmer tno quality of semantic standards
10052012 erwin folmer tno quality of semantic standards
 
10052012 dries pruis casus de lift
10052012 dries pruis casus de lift10052012 dries pruis casus de lift
10052012 dries pruis casus de lift
 
28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens
28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens
28032012 Geert Klei mile-stones e-portfolio's bescherming persoonsgegevens
 
28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...
28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...
28032012 Pruis en Polman Kenteq,Trusted Architecture for Securely Shared Serv...
 
28032012 Riek Joosten TNO Privacy just. gegevens en wbp
28032012 Riek Joosten TNO Privacy just. gegevens en wbp28032012 Riek Joosten TNO Privacy just. gegevens en wbp
28032012 Riek Joosten TNO Privacy just. gegevens en wbp
 
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
 
28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...
28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...
28032012 Jan Peter Bergfeld, 10 Aandachtspunten voor ePortfoliosystemen op ba...
 
Nepc11 opleiden of werkervaring inctrl
Nepc11 opleiden of werkervaring inctrlNepc11 opleiden of werkervaring inctrl
Nepc11 opleiden of werkervaring inctrl
 
Nepc11 eporfolio vanuit werknemersorganisatie jongejan
Nepc11 eporfolio vanuit werknemersorganisatie jongejan Nepc11 eporfolio vanuit werknemersorganisatie jongejan
Nepc11 eporfolio vanuit werknemersorganisatie jongejan
 
Nepc11 uitwisseling e portfolio gegevens kenteq
Nepc11 uitwisseling e portfolio gegevens kenteqNepc11 uitwisseling e portfolio gegevens kenteq
Nepc11 uitwisseling e portfolio gegevens kenteq
 
Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones
Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones
Nepc11 van speciaal onderwijs naar werk met eportfolio oba milestones
 
Nepc11 eportfolio bij loopbaanontwikkeling matchcare
Nepc11 eportfolio bij loopbaanontwikkeling matchcareNepc11 eportfolio bij loopbaanontwikkeling matchcare
Nepc11 eportfolio bij loopbaanontwikkeling matchcare
 
Nepc11 sturing geven aan je loopbaan cinop
Nepc11 sturing geven aan je loopbaan cinopNepc11 sturing geven aan je loopbaan cinop
Nepc11 sturing geven aan je loopbaan cinop
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

28032012 Irma vander Ploeg: e portfolio als digitale identiteit

  • 1. ePortfolio als Digitale Identiteit Expertmeeting ePortfolio en Privacy Utrecht, 28 Maart 2012 Irma van der Ploeg Infonomics & New Media Research Centre Zuyd University, Maastricht ,The Netherlands
  • 2. Inhoud • 1 Lectoraat INM • 2 DigIDeas Project • 3 Identiteit/Identificatie • 4 Voorbeelden praktijkonderzoek • 5 ePortfolios en identiteit • 6 Potentiele issues
  • 3. 1 Lectoraat Infonomie en Nieuwe Media Hogeschool Zuyd KC ICT (Facs Recht, Commercieel Management, International Business & Communication, ABK) 10-12 medewerkers Interdisciplinair: Science & Technology Studies, sociologie, filosofie, ethiek, software engineering, surveillance studies, critical marketing studies Onderzoeksprogramma: Digitaliserende Samenleving
  • 4.
  • 5. Onderzoek Digitaliserende Samenleving Twee uitgangspunten 1 Wie technologie wil ontwikkelen moet de maatschappij of context waarin die technologie moet functioneren in z’n complexiteit begrijpen. 2 Wie de hedendaagse samenleving wil begrijpen moet technologie in de analyse betrekken.
  • 6. DigIDeas Social and Ethical Aspects of Digital Identities Towards a Value Sensitive Identity Management. • Funded by a Starting Grant generously provided by the European Research Council • Oktober 2008 - Sept 2013 (60 months) • PI, 3 PhD projects, 2 Postdocs • Hosted by the Infonomics & New Media Research Centre of Zuyd University of Applied Sciences at Maastricht
  • 7. DigIDeas’ Overall Aims • Development of fine-grained knowledge about contemporary transformations of identities in the information society • To identify and reframe social and ethical implications of digital identities • To contribute to international academic and policy debates • To contribute to value sensitive IDM design
  • 8. 3 PROJECT DESIGN Social and Ethical Aspects of Digital Identities: Towards a Value Sensitive IDM DigIDeas General Framework -
  • 9. 3 PROJECT DESIGN six empirical studies: six IDM application areas E-govern ment Web 2.0, Security & Social Border Software Manage ment DigIDeas General Framework E-Com Law merce, Enforce Marketing, ment & CRM Forensics Ubiqui tous computing AmI A bi
  • 10. 3 PROJECT DESIGN six empirical studies: six IDM application areas Civic IDs E- government Personal IDs Secure IDs Web 2.0, Security & Social Border Software Managemnt DigIDeas General Framework Profitable IDs Suspect IDs E-Commerce, Law Marketing, Enforcemnt CRM & Forensics Ubiquitous IDs 3 PhD projects Embedded Pervasive 1 Civic and Secure IDs Ambient
  • 11. 3 PROJECT DESIGN six empirical studies: six IDM application areas Civic IDs E- government Personal IDs Secure IDs Web 2.0, Security & Social Border Software Managemnt DigIDeas General Framework Profitable IDs Suspect IDs E-Commerce, Law Marketing, Enforcemnt CRM & Forensics Ubiquitous IDs 3 PhD projects Embedded Pervasive 1 Civic and Secure IDs Ambient 2 Personal & Profitable IDs
  • 12. 3 PROJECT DESIGN six empirical studies: six IDM application areas Civic IDs E- government Personal IDs Secure IDs Web 2.0, Security & Social Border Software Managemnt DigIDeas General Framework Profitable IDs Suspect IDs E-Commerce, Law Marketing, Enforcemnt CRM & Forensics Ubiquitous IDs 3 PhD projects 1 Civic and Secure IDs Embedded Pervasive 2 Personal & Profitable IDs Ambient 3 Suspect & Ubiquitous IDs
  • 13. 3 Identiteit / Identificatie • Een smalle en een brede definitie. • Smalle in IT: ID is een dataset , user account, PNR, of ‘personalia’. • Brede in sociale theorie én in sociale leven
  • 14. 1 `Identity’ = …. ...Any answer to the questions: Who are you ? Who is this?
  • 15. Technological mediation of identity • Writing, spelling and counting techniques • Printing • Photography and other visualisation techniques (DNA, fingerprint, etc.) • Document production and certification techiques • Body dressing, adorning and enhancing • Telling stories, histories, biographies • …
  • 16. Summing up • ID is done in practices • Technology is constitutive of ID • These practices are multiple • No privileged language/means: no core or most true ID: e.g. biology does not beat social, PNR does not beat preferences or biography 1st person does not beat 3rd person ID : (no epistemological privilege, perhaps moral?)
  • 17. Identification: Any means or practice to establish (or verify) someone’ s identity Purposes: • Establishing rights, duties, entitlements (soc benefits, education, taxing, voting, etc…) • Crime solution and prevention • Security and access control • Victim identification • Establishing credentials and background checks • Individualising and customising care, services, and marketing All in order to realise societal goals/values of trust , security , justice
  • 18. A fundamental Paradox: Identification is simultaneously about: Unicity AND Classification • • your unique identity, as testified by your passport, is ‘proven’ by virtue of the passport being part of a series issued by a government and proclaiming you te be a citizen of a particular country, that is, a member of a particular category. • • A facial image or fingerprint in a police database may help in identifying a particular suspect, but simultaneously defines the person in question as belonging to the category of registered deviants.
  • 19. Identification and classification: Identification/authentication leads to assigning category: • Member/non-member • National/non-national • Trusted/distrusted • Low risk/high risk • Eligible/non-eligible • known/unknown • Etc
  • 20. Paradox no 2: Identification is simultaneously about: Registration of sth pregiven AND construction of sth new The method/technology is never neutral
  • 22. …with many uncharted, potentially problematic implications and effects…
  • 23. Digital Identities… … “Never shrink, always grow” (Andreas Pfitzmann) … are infinitely replicable and retainable … are accessible from a innumerable points of entry far removed in space and time … are (near-)impossible to reconstruct, control, check or correct
  • 24. New practices – and their problems • Loss of privacy • Databases • Ubiquitous identification • Transaction data & log- files • Informatisation of the body • Data mining (integrity and dignity issues) • Interoperability & interconnectivity • Standardisation • Surveillance (power and freedom issues) • Biometrics • Networking • Social sorting and categorisation • Sensors (social justice and discrimination issues) • Social Sign-on • Mobile communication • Preemptive law enforcement • Wireless communication • Profiling and other prevention policies • Tracking and tracing • Transparency (informed choice and democratic issues)
  • 25. 4 Voorbeelden praktijkonderzoek (DigIDeas Project) • Suspect identities: Nieuwe technologieen in politiewerk: Constructie van suspecte identiteiten, wat heet ‘verdacht’?
  • 27. Cameras increasingly combined with image analysis : face / object detection, facial recognition, licence plate recognition. .
  • 28.
  • 29.
  • 30. 4 Voorbeelden praktijkonderzoek (DigIDeas Project) • Nieuwe technologieen in politiewerk: Constructie van suspecte identiteiten, wat heet ‘verdacht…’ • Van Criminaliteitspreventie tot Jeugdzorg • Wie / wat is een ‘ risicokind’ ?
  • 32. Security & Identification Wat heet ‘ riscico’ Wie loopt risico Wie vormt risico
  • 33. 4 Voorbeelden praktijkonderzoek (DigIDeas Project) • Nieuwe technologieen in politiewerk: Constructie van suspecte identiteiten, wat heet ‘verdacht…’ • Van Criminaliteitspreventie tot Jeugdzorg Wie / wat is een ‘ risicokind’ ? • Migratie, identificatie en veiligheid: wie is de echte vluchteling? grensbewaking en migratiemanagement
  • 34.
  • 36. Social sign on & . consumer identity
  • 37. 5 ePortfolio als Digitale Identiteit • Een antwoord op de vraag ‘ Wie is dit?’, ‘Wie ben ik?’ • Beroep en opleiding sterk verbonden met identitieit & zelfbeeld • Biografie: educatieve en professionele levensgeschiedenis • Competenties als attributen
  • 38. 6 Potentiele Issues • Méér dan toegang, authenticatie, en veilig beheer. méér dan alleen ‘de privacy kwestie’ of ‘compliance’ • Brede vorm van identiteit heeft bredere sociaal-maatschappelijke en ethische aspecten
  • 39. ePortfolios Verbeterde kansen voor werkgevers én werknemers: • Efficiente manier om vraag en aanbod bij elkaar te brengen • Centralisatie en standaardisatie van vraag en aanbod • Rijkere zelfpresentatie • Maatwerk: gericht zoeken naar bepaalde profielen op basis van objectieve competenties • ‘Empowerment’ en maatschappelijke kansen
  • 40. Potentiele issues Maar ook mogelijk: • Normen over ambitie, motivatie, ‘kwalificaties’, goed werknemerschap (LLL, mobiliteit, nwe media competenties) • Nieuwe vormen van kwetsbaarheid en uitsluiting • Sociaal-maatschappelijke in-en uitsluiting, c.q. discriminatie • Filteren op leeftijd / geslacht / huidskleur? • Classificatie, standaardisatie, en labeling • Transparante werknemers on display • Contextloze weergave
  • 41. Samenvattend • (Digitale) Identiteit heeft betrekking op meer dan toegang en beheer , is meer dan dataset • Heeft sterke maatschappelijke en ethische implicaties • ePortfolios kennen wellicht meer maatschappelijke risico’s dan die afgedekt worden door ‘ compliance’.
  • 42.
  • 43. Thank you for your attention