SlideShare a Scribd company logo
1 of 14
Download to read offline
Digital Identity:
What's Driving the Shift and How to Navigate
An online or
networked identity adopted
or claimed in cyberspace by
an individual, organization or
electronic device.
Source: Techopedia
2
What is a digital identity?
Currently, digital identity is very fragmented.
This has created an “every man for himself” approach to
creating or confirming digital identities
3
Reasons for fragmentation:
4
•Instability of identities
•Lack of identity standards and commercial guidelines
Name Changes: Approx. 3M
changes in marital status and
50K applications for name
changes each year
Address Changes: Approx.
40M people move annually
and 40% never notify the
Post Office
SSN Error and Misuse: 20+%
of people have multiple SSNs
associated with their names
This presents a big challenge for consumers.
5
…and the problem will only continue to grow as Millennials drive greater
adoption of digital technologies, and change the face of digital identities.
23 4.0 Shopping accounts
3.2 Financial accounts
2.7 Email accounts
2.3 Entertainment accounts
2.3 Social network accounts
2.2 Communication accounts
The average number of
password protected
online accounts held by
U.S. adults, including:
The future of identity is being shaped by and for millennials.
6
Millennials (born between 1980 & mid-2000’s) represent 1/3 of the U.S. population
and are the most diverse, educated and tech savvy generation in history.
The U.S. Bureau
of Labor Statistics
estimates that
of the American
workforce will be
Millennials by 202050%
9 out of 10
own smartphones
Source: Nielsen
9 out of 10 use social networks
Source: Pew Research Center
…and 34% turn to their social
networks when making
purchase decisions
Source: Association of National Advertisers, Barkley, SMG, BCG
Over 90% have logged
into a website or
mobile app using an
existing identity from
a social network
Source: Gigya)
Millennials are very different than other customer groups.
7
81% of Millennials are less about
“friendly” service than “fast” service.
87% of Millennials are Facebook users.
29%
Online Uploads of Videos and Images
Source: Fromm & Garton, Marketing to Millennials (2013)
262%
more likely to
be influenced
by smartphone
apps.
Millennials
60%
Millennials Non-Millennials
The future of identity is being shaped by and for millennials.
8
As Millennials, smartphones and social networks collide, it’s creating an
increased demand for federated identity. Federated identity allows users to log
onto third-party websites, applications, mobile devices and gaming systems with
their existing identity.
It’s also referred to as “Bring Your Own Identity” (BYOID) or “Bring Your Own
Credential” (BYOC).
Account 1
Federated
Identity
Credential
Account 2
Account 3
Account 4
Account 5
Identity federation has many benefits.
USERS
• Better customer experience
• Less friction during
registration/onboarding
• Need to manage fewer accts
COMPANIES
• Ease of implementation
• User verification/enhanced proofing
• Access to identity attributes
• Reduced failed login attempts
• Reduced forgotten p/w requests
9
• Transferred, implied trust
• Increased user control
• Enhanced privacy
Social login is the most common form of federated identity today.
10
…but it’s not the only form of federated identity.
Facebook
Google+
Twitter
Yahoo
Other
LinkedIn
66%
20%
6%
4%
2%
2%
Source: Gigya, Q2 2015
Social login is actually low on the trust spectrum of identity
attributes and login proxies.
11
Expert/electronic ID
document authentication
Verified bank account
Dynamic knowledge
based authentication
Electronic copy of drivers license
Mobile number
Social login
Email address
LOW TRUST
Biometrics
Electronic copy of passport
HIGH TRUST
The future of identity will move beyond social logins.
12
Federation doesn’t stop with social logins. A wide variety of commercial and
government organizations can be identity providers.
Becoming an identity provider is about trust.
13
To participate in the world of federated identity, identify the companies with
whom you share common customers and can build a logical network or trust
relationship…a trust framework.
Account 1
Account 2
Account 3
Account 4
Account 5
For more information and best practices around
managing digital identities, visit our blog at
http://blogs.lexisnexis.com/identity-management/

More Related Content

What's hot

Your Digital Dossier
Your Digital DossierYour Digital Dossier
Your Digital Dossierdont96
 
The Self Directed (Corporate) Life
The Self Directed (Corporate) LifeThe Self Directed (Corporate) Life
The Self Directed (Corporate) Lifesocialmedia
 
Friendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the WorkplaceFriendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the WorkplaceJoe McCarthy
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Online Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & SafeguardsOnline Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & SafeguardsSandra Annette Rogers
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securitySilicon Valley ProductCamp
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Introduction to Web 2.0
Introduction to Web 2.0Introduction to Web 2.0
Introduction to Web 2.0EPWN
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
 
Mi Bridges General Info.
Mi Bridges General Info.Mi Bridges General Info.
Mi Bridges General Info.cbaker369
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer CentreSimran Grover
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
 
e-Learning in Civil Engineering
e-Learning in Civil Engineeringe-Learning in Civil Engineering
e-Learning in Civil EngineeringMartin Ebner
 

What's hot (20)

Virtual communities
Virtual communitiesVirtual communities
Virtual communities
 
Your Digital Dossier
Your Digital DossierYour Digital Dossier
Your Digital Dossier
 
The Self Directed (Corporate) Life
The Self Directed (Corporate) LifeThe Self Directed (Corporate) Life
The Self Directed (Corporate) Life
 
Friendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the WorkplaceFriendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the Workplace
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Online Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & SafeguardsOnline Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & Safeguards
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Introduction to Web 2.0
Introduction to Web 2.0Introduction to Web 2.0
Introduction to Web 2.0
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
Mi Bridges General Info.
Mi Bridges General Info.Mi Bridges General Info.
Mi Bridges General Info.
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer Centre
 
Etech activity
Etech activityEtech activity
Etech activity
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
e-Learning in Civil Engineering
e-Learning in Civil Engineeringe-Learning in Civil Engineering
e-Learning in Civil Engineering
 
Virtual Communities at Work
Virtual Communities at WorkVirtual Communities at Work
Virtual Communities at Work
 

Similar to Digital Identities

White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101Gigya
 
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersWhite Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersGigya
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-worldMEDICI
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Stanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer EngagementStanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer EngagementMatterport
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdfIdentity Herald
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?itio Innovex Pvt Ltv
 
Citizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsCitizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsConor Bronsdon
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineHector Hoyos
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
 

Similar to Digital Identities (20)

White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101
 
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersWhite Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-world
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Stanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer EngagementStanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdf
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?
 
Citizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsCitizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutions
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de Colombia
 

More from LexisNexis Risk Solutions

Navigating the new environment for liens and judgments
Navigating the new environment for liens and judgmentsNavigating the new environment for liens and judgments
Navigating the new environment for liens and judgmentsLexisNexis Risk Solutions
 
Navigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy RegulationsNavigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy RegulationsLexisNexis Risk Solutions
 
Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...LexisNexis Risk Solutions
 
Patient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping PointPatient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping PointLexisNexis Risk Solutions
 

More from LexisNexis Risk Solutions (6)

2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
Navigating the new environment for liens and judgments
Navigating the new environment for liens and judgmentsNavigating the new environment for liens and judgments
Navigating the new environment for liens and judgments
 
Navigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy RegulationsNavigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy Regulations
 
Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...
 
2015 LexisNexis® Fraud Mitigation Study
2015 LexisNexis® Fraud Mitigation Study2015 LexisNexis® Fraud Mitigation Study
2015 LexisNexis® Fraud Mitigation Study
 
Patient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping PointPatient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping Point
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Digital Identities

  • 1. Digital Identity: What's Driving the Shift and How to Navigate
  • 2. An online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device. Source: Techopedia 2 What is a digital identity?
  • 3. Currently, digital identity is very fragmented. This has created an “every man for himself” approach to creating or confirming digital identities 3
  • 4. Reasons for fragmentation: 4 •Instability of identities •Lack of identity standards and commercial guidelines Name Changes: Approx. 3M changes in marital status and 50K applications for name changes each year Address Changes: Approx. 40M people move annually and 40% never notify the Post Office SSN Error and Misuse: 20+% of people have multiple SSNs associated with their names
  • 5. This presents a big challenge for consumers. 5 …and the problem will only continue to grow as Millennials drive greater adoption of digital technologies, and change the face of digital identities. 23 4.0 Shopping accounts 3.2 Financial accounts 2.7 Email accounts 2.3 Entertainment accounts 2.3 Social network accounts 2.2 Communication accounts The average number of password protected online accounts held by U.S. adults, including:
  • 6. The future of identity is being shaped by and for millennials. 6 Millennials (born between 1980 & mid-2000’s) represent 1/3 of the U.S. population and are the most diverse, educated and tech savvy generation in history. The U.S. Bureau of Labor Statistics estimates that of the American workforce will be Millennials by 202050% 9 out of 10 own smartphones Source: Nielsen 9 out of 10 use social networks Source: Pew Research Center …and 34% turn to their social networks when making purchase decisions Source: Association of National Advertisers, Barkley, SMG, BCG Over 90% have logged into a website or mobile app using an existing identity from a social network Source: Gigya)
  • 7. Millennials are very different than other customer groups. 7 81% of Millennials are less about “friendly” service than “fast” service. 87% of Millennials are Facebook users. 29% Online Uploads of Videos and Images Source: Fromm & Garton, Marketing to Millennials (2013) 262% more likely to be influenced by smartphone apps. Millennials 60% Millennials Non-Millennials
  • 8. The future of identity is being shaped by and for millennials. 8 As Millennials, smartphones and social networks collide, it’s creating an increased demand for federated identity. Federated identity allows users to log onto third-party websites, applications, mobile devices and gaming systems with their existing identity. It’s also referred to as “Bring Your Own Identity” (BYOID) or “Bring Your Own Credential” (BYOC). Account 1 Federated Identity Credential Account 2 Account 3 Account 4 Account 5
  • 9. Identity federation has many benefits. USERS • Better customer experience • Less friction during registration/onboarding • Need to manage fewer accts COMPANIES • Ease of implementation • User verification/enhanced proofing • Access to identity attributes • Reduced failed login attempts • Reduced forgotten p/w requests 9 • Transferred, implied trust • Increased user control • Enhanced privacy
  • 10. Social login is the most common form of federated identity today. 10 …but it’s not the only form of federated identity. Facebook Google+ Twitter Yahoo Other LinkedIn 66% 20% 6% 4% 2% 2% Source: Gigya, Q2 2015
  • 11. Social login is actually low on the trust spectrum of identity attributes and login proxies. 11 Expert/electronic ID document authentication Verified bank account Dynamic knowledge based authentication Electronic copy of drivers license Mobile number Social login Email address LOW TRUST Biometrics Electronic copy of passport HIGH TRUST
  • 12. The future of identity will move beyond social logins. 12 Federation doesn’t stop with social logins. A wide variety of commercial and government organizations can be identity providers.
  • 13. Becoming an identity provider is about trust. 13 To participate in the world of federated identity, identify the companies with whom you share common customers and can build a logical network or trust relationship…a trust framework. Account 1 Account 2 Account 3 Account 4 Account 5
  • 14. For more information and best practices around managing digital identities, visit our blog at http://blogs.lexisnexis.com/identity-management/