This is a presentation of a poster at ISIC2020 which considers the relationship between the established concept of "information intermediaries" and a new concept of "digital proxy", which is initially defined here to be “individuals who assist others manage their online information presence”. This is done in the context of information behaviour and everyday life information practices. It is comprised of the findings from two studies (informal support for managing digital identity provided by information professionals; proxied management of social media presences for people with dementia) which have helped to identify different issues relevant to the concept of proxies in online environments.
Co-authors: Dr Gemma Webster, Dr Frances Ryan
2. ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan30 Sep 20 2
3. The authors
30 Sep 20 ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan 3
Peter Cruickshank
p.cruickshank@napier.ac.uk
@spartakan
Dr Gemma Webster
g.webster@napier.ac.uk
Dr Frances Ryan
frances@francesryanphd.com
@francesryanphd
The slides are available on Slideshare
at https://www.slideshare.net/spartakan
4. ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
Aim: Test digital proxy as a concept
The themes
in the
literature
Testing the
concept
What is a
Digital
Proxy?
What next
30 Sep 20
This is a poster (not a short paper)
4
5. Initial analysis
The projects
30 Sep 20 5
Social Media
by Proxy
Survey
February-May
2019
Interviews
June-August
2019
Focus group
September 2019
Emergent
themes
Digital Identity
Information practices
Workshop
27 February
Draft report
March 2020
Final report
March 2020
Call for stories
December 2019
ISIC2020
Poster
Emergent
themes
Cruickshank & Ryan
DISIPRAC
?
ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
care workers, family
members: working
with older adults and
people with dementia
Workshop with third
sector works and digital
inclusion officersWebster & Ryan
6. ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
Same words, different meanings
Law Digital Social
Service user Principal Account holder Person / Service user
Identity (Birth) Certificates
Incorporation
Digital id. Individual.
Fixed (authentication)
Constructed / contextual /
changing
Trust Fiduciary duty
Contract
Proof based: Yes/No
(authorisation)
Conditional Fuzzy
Two-way
Proxy Principal vs agent
Guardianship
Delegation rules Proxy, or Information
intermediary…?
Notes Long history, many
precedents
Varies between
legal systems
Outcomes are binary,
often lacking in legal
support, and not
reflecting social reality.
Supported by PKI,
blockchain… confuses
identifier with identity
Goffman…
Fuzzy, constantly
changing, generally co-
constructed/ negotiated
30 Sep 20 6
Identifier: A record id in
an information system
Identity: Who you are
7. Crosscuttingliterature:
Source Keywords/ Themes
Information science
Buchanan Jardine and Ruthven (2019), JASIST Information intermediary, deprivation, needs recognition,
information sharing
Kaczmarek, Shankar, and Nathan (2019), AIS&T
Proceedings
Information Practice, Responsibility, Practice Theory, Networked
Systems, Information Policy
Moncur, Durrant, & Martindale (2014), CHI Workshop, Digital lifespan, digital natives, information avoidance,
design
Vitak, Liao, Kumar, and Subramaniam (2018), iConference
2018
Libraries, Technology, Digital literacy, Privacy, Trust, Liability
HCI/ Information systems
Dourish and Anderson (2006), HCI Collective Information practice, privacy, security, culture
Zahedi and Song (2008), Journal of Management
Information Systems
Agency theory, change in trust beliefs, emotional trust, information
integration theory, satisfaction, trust attitude
Medicine/care
Clare, Rowlands, and Quin (2008), Dementia Dementia Advocacy and Support International, interpretative
phenomenological analysis, self-concept, self-help, social power,
support groups
Fiske, Buyx, and Prainsack (2019), Academic Medicine Health information, counsellors, big data, communication, medico-
legal aspects
Information security
Coles-Kemp and Hansen (2017), Conference on Human
Aspect of Information Security
Post-digital; post-digital security; lived experience; critical security
design
Jøsang, Fabre, Hay, Dalziel and Pope (2005), Australasian
Information Security Workshop
Trust, identity management, computer networks, authentication,
authorisation
Zagouras, Kalloniatis, and Gritzalis (2017), International
Conference on Human Aspects of Information Security,
Privacy, and Trust
User experience, Usability, Security, Interaction
30 Sep 20 7ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
8. Information intermediary
Example, from Buchanan, Jardine & Ruthven (2019, p127):
“…trusting non-judgmental relationships built over time,
our intermediaries play a key role in
recognizing, understanding, and progressing
information needs in the problematic context.”
30 Sep 20 8ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
9. 30 Sep 20 9
Emergent issues
Self-
awareness
Trust
Setting
limits
Protecting
the ‘client’
Self-
protection
Changes
over time
ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
10. Towards a definition of digital proxy
Extending information intermediary
Co-management of digital environment
• Online presence: social media and online identity generally
• Digital identity: digital identifiers such as online login details
Information practice
• the broader information practices of digital proxies
• risk behaviours related to digital information
Trust and liability
• When no prior relationship in place
• eg professionals or volunteers at public libraries or computer clubs
30 Sep 20 11ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
11. It’s more than a spectrum:
Dimensions to digital proxy
Motivation:
• Perception of what is
happening
Level and depth of
engagement
Relationship
• Friend/family
• Volunteer
• Professional
Role
• Advocate or helper ?
• (co-)management or
empowerment?
Time period
• long or short term
Level of
transaction
• Quick fix?
• Information intensive?
Level of formality /
recording
• Desired or forced
Client capacity
• high / low
• (how) is it changing
30 Sep 20 12ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan
12. Possible directions for future research
▪ What are the underlying concepts, and issues with, the term digital proxy?
▪ How do proxies and account holders define terms or determine the scope
of the help to be provided (e.g. on a practical or legal basis)?
▪ What information practices do digital proxies undertake for the people
they support?
▪ How is risk and trust handled within the proxy relationship, and in what
manner does the proxy relationship change over time?
▪ Application to developing digital identity infrastructures, such as
self-sovereign identity
30 Sep 20 ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan 13
13. More info
▪ DISIPRAC
▪ Funding: Edinburgh Napier University
▪ Report
▪ https://www.napier.ac.uk/research-and-innovation/research-
search/outputs/workshop-report-for-disiprac-digital-identity-security-
information-practices-of-citizens
▪ Blog posts:
▪ http://www.francesryanphd.com/2020/01/registrations-open-disiprac/
▪ http://www.francesryanphd.com/2020/04/workshop-report-for-disiprac/
▪ Social Media by Proxy
▪ Funding: The Carnegie Trust (RIG007767)
30 Sep 20 ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan 14
14. References
Buchanan, S., Jardine, C., & Ruthven, I. (2019). Information behaviors in disadvantaged and dependent circumstances and the role of
information intermediaries. Journal of the Association for Information Science and Technology, 70(2), 117–129.
https://doi.org/10.1002/asi.24110
Clare, L., Rowlands, J. M., & Quin, R. (2008). Collective strength: The impact of developing a shared social identity in early-stage dementia.
Dementia, 7(1), 9–30. https://doi.org/10.1177/1471301207085365
Coles-Kemp, L., & Hansen, R. R. (2017). Walking the Line: The Everyday Security Ties that Bind. In T. Tryfonas (Ed.), HAS 2017:
International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 464–480). https://doi.org/10.1007/978-3-
319-58460-7_32
Dourish, P., & Anderson, K. (2006). Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena.
Human-Computer Interaction, 21(3), 319–342. https://doi.org/10.1207/s15327051hci2103_2
Fiske, A., Buyx, A., & Prainsack, B. (2019). Health Information Counselors. Academic Medicine, 94(1), 37–41.
https://doi.org/10.1097/ACM.0000000000002395
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., & Pope, S. (2005). Trust requirements in identity management. Conferences in Research and
Practice in Information Technology Series, 44, 99–108.
Kaczmarek, M., Shankar, S., & Nathan, L. P. (2019). Information practice, responsibility, and the ability to respond. Proceedings of the
Association for Information Science and Technology, 55(1), 837–838. https://doi.org/10.1002/pra2.2018.14505501138
Moncur, W., Durrant, A., & Martindale, S. (2014). An introduction to charting the digital lifespan. Paper presented at CHI 2014 Workshop on
Designing Technology for Major Life Events, Toronto, Canada.
Vitak, J., Liao, Y., Kumar, P., & Subramaniam, M. (2018). Librarians as Information Intermediaries: Navigating Tensions Between Being
Helpful and Being Liable. In Lecture Notes in Computer Science: Vol. 10766 LNCS (pp. 693–702). https://doi.org/10.1007/978-3-319-
78105-1_80
Zagouras, P., Kalloniatis, C., & Gritzalis, S. (2017). Managing User Experience: Usability and Security in a New Era of Software Supremacy.
In T. Tryfonas (Ed.), HAS 2017: International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 174–188).
https://doi.org/10.1007/978-3-319-58460-7_12
Zahedi, F., & Song, J. (2008). Dynamics of Trust Revision: Using Health Infomediaries. Journal of Management Information Systems, 24(4),
225-248. Retrieved April 3, 2020, from www.jstor.org/stable/40398918
30 Sep 20 ISIC 2020 - From information intermediary to digital proxy - Cruickshank, Webster, Ryan - @spartakan 15