SlideShare a Scribd company logo
1 of 55
Download to read offline
Shaping the Future of Trusted
Digital Identity
The IDEF Registry
with Health Information Use Cases
Kantara Initiative Educational Foundation
1
www.IDEFRegistry.org
Background
“By making online transactions more trustworthy and
better protecting privacy, we will prevent costly crime,
we will give businesses and consumers new confidence,
and we will foster growth and untold innovation.”
— President Barack Obama, April 2011
National Strategy for Trusted Identities in Cyberspace
3
From NSTIC to IDESG
• April 2011 – White House introduced the National Strategy for
Trusted Identities in Cyberspace (NSTIC) to:
o work collaboratively with the private sector, advocacy
groups, public sector agencies and other organizations;
o improve privacy, security and convenience of online
transactions; and
o create a “trusted” online environment because of agreed
upon standards for obtaining and authenticating digital
identities.
Guiding Principles
• NSTIC established guiding principles for the creation of
solutions for the Identity Ecosystem that are:
o Privacy-enhancing and voluntary;
o Secure and resilient;
o Interoperable; and
o Cost-effective and easy to use.
The IDESG
• The NSTIC vests responsibility for the creation of policy and
standards for the Identity Ecosystem in the private sector-led,
Identity Ecosystem Steering Group (IDESG).
• IDESG works closely with the National Institute of Standards
NSTIC National Program Office, which manages the day-to-day
activities of the NSTIC implementation.
• The IDESG is now an independent, non-profit association
continuing to drive standards for the Identity Ecosystem.
Building a Better Digital Ecosystem With
The Identity Ecosystem Framework
What Is the IDEF?
First rules of the road
for navigating the
evolving landscape
of online identity
Asserts capabilities and
responsibilities for
individuals, companies,
government agencies
and organizations in the
identity ecosystem
Creates policy
foundation for
strengthening privacy
and security protections
for organizations and
consumers alike
What is the IDEF? What does it do? Why is it necessary?
Three Components of the IDEF
Baseline Requirements, Supplemental
Guidance and Best Practices
Establishes 8 interoperability, 15
privacy, 15 security and 7 usability
guidelines
Scoping
Statement
Defines scope of
IDESG work to
create a safe and
trustworthy
identity
ecosystem
Functional
Model
Depicts how IDEF
guidelines apply
to identity
stakeholders
Scoping Statement
• Defines the scope of IDESG work to create a safe and
trustworthy identity ecosystem
• Expressed in objective and testable statements suitable
for 3rd
party assessment
• Extensive enough that specific communities can
determine applicability of IDEF requirements based on
individual needs
Baseline Requirements
• Establishes a baseline of 8 operability, 15 privacy, 15
security and 7 usability requirements
• Serves as the FAQs for the IDEF
• Supplemental Guidance & Best Practices
Baseline Requirements
INTEROPERABILITY
• Third Party
Authentication
• Third Party Credentials
• Standardized
Credentials
• Standardized Data
Exchanges
• Documented
Processes
• Third Party
Compliance
• User Redress
• Accountability
PRIVACY
• Data Minimization
• Purpose Limitation
• Attribute Minimization
• Credential Limitation
• Data Aggregation Risk
• Usage Notice
• User Data Control
• Third Party Limitations
• User Notice of Changes
• User Option to Decline
• Optional Information
• Anonymity
• Controls Proportionate
to Risks
• Data Retention and
Disposal
• Attribute Segregation
• Security Practices
• Data Integrity
• Credential Reproduction
• Credential Production
• Credential Issuance
• Credential Uniqueness
• Token Control
• Multifactor Authentication
• Authentication Risk
Assessment
• Uptime
• Key Management
• Recovery & Reissuance
• Revocation
• Security Logs
• Security Audits
SECURITY USABILITY
• Usability Practices
• Usability
Assessment
• Plain Language
• Navigation
• Accessibility
• Usability
Feedback
• User Requests
Ethics?
Functional Model
Governance &
Accountability
ACTIVITIES: ROLES:
• Policy, Rules &
Requirements
• Development
• Accreditation Body
• Certification Body
• Assessors/Auditors
• Community of Interest
• Certification
• Accreditation
• Assessment/Audit
Interoperability
ACTIVITIES: ROLES:
• Standards Development
• Specification Development
• Exchange
• Standards Development Body
• Specification Development Body
• Interoperability Providers
Administration &
Operations
ACTIVITIES: ROLES:
• Redress
• Recovery
• Enterprise Governance & Policy
Development
• Internal Audit
• Service Optimization
• Updates (Periodic & Event Based
Functional
CORE OPERATIONS: ROLES:
• Registration
• Credentialing
• Authentication
• Authorization
• Transaction Intermediation
• Users
• Identity Providers
• Credential Service
Providers
• Reg Authorities
• Intermediaries
• Attribute
Providers
• Relying Parties
Functional Elements
IDESG FUNCTIONAL ELEMENTS
CORE OPERATIONS
FUNCTIONS
REGISTRATION CREDENTIALING AUTHENTICATION AUTHORIZATION TRANSACTION
INTERMEDIATION
Application
Attribute Control
Attribute Verification
Eligibility Decision
Credential
Provisioning
Token Binding
Attribute Binding
Revocation
Authentication
Request
Credential
Presentation
Credential Validation
Authentication
Decision
Authorization
Request
Attribute Control
Attribute Verification
Authorization
Decision
Blinding
Pseudonymization/
Anonymization
Exchange
IDEF Stakeholder Groups
Drives business value
and consumer trust for
those issuing or
consuming credentials
Enables truly
trustworthy digital
credentials to protect
identities
Offers foundational set of
principles to which all
frameworks can align
to demonstrate
interoperability
Trust Frameworks Relying Parties Consumers
IDESG
The Identity Ecosystem Steering Group (IDESG) is the source of expertise,
guidance, best practices, and tools for trusted digital identities.
17
INDIVIDUALS!
This is the only requirement set for certifications
(businesses care about those!) written from the
*individual’s* perspective.
That’s RADICAL.
What REALLY makes this unique?
What is our VALUE ADD?
• Privacy, Usability & Interoperability added to pre-existing
Security Certifications.
• Many Security frameworks are out there and required.
• Ours is Individually focused and comprehensive.
• Ratings? No one else does this. Is complementary to other
certifications.
• Ethics? Combining privacy and security with interoperablility
and usability gives users control of how their data is
managed.
19
Trustmarks and Ratings
The IDEF Registry
Patient Data Privacy Case Studies
Assumptions
• Patient outcomes are better when the patient and family is fully
engaged
• Clearly the provider needs patient data to create good outcomes
• Patient consent will take precedence except for emergencies and
regulation
• The US Health Care ecosystem will be fragmented for the near term
• Governmental Pressure to share data will succeed
Health Profile for Digital Ecosystem
● All of the detail that makes a trust registry work for Health Care
● Focus on Medical records locator and access to data by the patient
● Patient needs access to all medical records wherever they may be
● PEW research report – need to match the patient to the record
● Still in development – looking for input from the community
https://wiki.idesg.org/wiki/index.php/Health_Care_Profile
Distributed Attribute Use Case
● At registration a new patient needs to bring a variety of identifiers
– e.g.
○ Driver’s license – linked to a governmental network
○ Health Insurance Card – linked to a health care network
○ Payment card – linked to a financial network
● Health history – focus on technology (e.g. Blue Button FHIR API)
● Artificial Intelligence is used ensure ID is sufficient for registration
https://wiki.idesg.org/wiki/index.php/Patient_Registration_with_Dist
ributed_Attributes
Prototype sandbox
Start with one use case and allow anyone to contribute use cases
• Example use case – Emergency contacts
o Family Contacts
o Source of patient directives (POLST etc.)
o Medical conditions and medical contacts
o Targeted to First Responders (e.g. FirstNet and FEMA)
https://wiki.idesg.org/wiki/index.php/Emergency_Contact_Informa
tion_Use_Case
Tying It All Together
● Any patient needs IAL2 authorization to access their records
● Individual practices need and use other information, such as
payment assurance, contacts, patient directives
● Authenticated patients can send records anywhere
○ To other compliant entities, to family, to lawyers as a matter of
patient choice
● It seems no practice need care about others authorization
● If this is wrong, we would like to understand why
● If the patient wants cross-practice authorization, that should be a
Trusted 3rd Party
Thanks!
Noreen Whysel
IDEF Registry
Kantara Initiative Educational Foundation
nwhysel@gmail.com
Additional Slides
The IDEF Registry
Phase I
29
9 Registrants
Various
industries, all
working with
identity systems
Assumption:
B to B or
B to G users
IDEF Registry at start of Phase II
30
Assumption: People
come to register
products
What they really
wanted:
Browse registrant’s
products & get easy
understanding of
scores
Burying the lede: Phase I Site UI
31
Scores:
Tough to
understand and
pie charts didn’t
give good
representation.
Conclusion:
Confusing,
complicated, not
helpful
IDEF Registry: Phase I Scores
32
Problem areas:
● Scores &
Symbols
● Linking offsite
● Lack of easy
access to
Supplemental
Guidance
● Not enough
context
Phase I Usability Learnings:
Change areas:
● Lack of easy
access to
Supplemental
Guidance
● Not enough
context
● Categories didn’t
work
● No tracking
● Buried the
lead from top
of site
● Forms hard to
use
● Hard to see
requirements
and SG, other
supporting
docs
The IDEF Registry
Phase II Design
34
● Usability testing
● Chalkmark surveys
for navigation and
information
architecture
● Design iterations
● Mark and scores in
“Design Challenge”
● Flip the whole site
Phase II: Clean Up and Evolve with Design
35
New Front page with
context and links to all
aspects of the project
and registry, IDESG
Phase II
36
● Step by step process
● Simplified data
collection on
products and
services
● Easy way to check
application status
● Easy ways to find
help and information
Phase II: Registrant data collection
improved
37
● Requirements
shown with the
Supplemental
Guidance
● Simplified
columns
● Easy movement
between types of
questions
● Easy answering
Phase II: New Data Collection Pages
38
● Local Knowledge
Base instead of
clicking away
● Easy way to see
the whole
Framework
● Simple way to
“read the
framework”
Phase II: Knowledge Base
The IDEF Registry
Phase II Scoring
40
Iterate Iterate Iterate, Test Test Test
41
Iterate Iterate Iterate, Test Test Test
42
Iterate Iterate Iterate, Test Test Test
43
Iterate Iterate Iterate, Test Test Test
44
Iterate Iterate Iterate, Test Test Test
45
What
happens
when people
can compare
providers?
Iterate Iterate Iterate, Test Test Test
46
Iterate Iterate Iterate, Test Test Test
The IDEF Registry
Testing the Requirements
Requirements Testing
• Interviews with attesting companies
• Open-ended interviews are useful in identifying specific issues that
participants may have had with the attestation process.
• Focused questions on requirements and supplemental guidance that
either were known to have issues for the attester, due to comments
provided on the attestation form, or that were implied due to their
incomplete or N/A status.
• The insight from participants informs potential changes or
corrections to the language or significance of individual IDEF
Baseline Requirements.
General Questions About the Requirements
• Were there any requirements that you recall that were particularly
difficult or time consuming to complete?
• Were there any requirements that you recall that were irrelevant or
unreasonable to the attested service? Why?
• Did you consult the supplemental guidance for the requirements?
Was it helpful? Why?
• Are there any issues or requirements that you hadn't thought about?
• Now that you have completed the attestation, do you feel IDESG
certification is of value to your company? Why or why not?
•11 Questions total
Recommendations for Improvement
51
Iterate Iterate Iterate, Test Test Test
52
Iterate Iterate Iterate, Test Test Test
What happens
when people
can compare
providers?
The IDEF Registry
Phase III Proposal:
3rd
Party Ratings for Consumers
54
3rd
Party Ratings Business Model
3rd
Party Ratings made sustainable:
• Provide ratings via api calls
• Charge for use via
micropayments
• Charge for those rated to use in
marketing
• 3rd Party certified raters can
scale
3rd
Party Ratings Trusted
in Marketplace:
• Reqs made by IDESG,
a non-profit neutral
party
• Ratings by trained 3rd
party assessors
• No pay to play
55
3rd
Party Ratings with our Reqs
3rd
Party Ratings could be
done for all consumer
products:
• Rate within sectors
• Health
• Children’s products
• Financial products
• Or Consumer
generally
Redesigned for mass consumption:

More Related Content

What's hot

BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...
Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...
Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...Cognizant
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet BankingGoutama Bachtiar
 
The Digital Innovation Award - Waterdrop Inc.
The Digital Innovation Award - Waterdrop Inc.The Digital Innovation Award - Waterdrop Inc.
The Digital Innovation Award - Waterdrop Inc.The Digital Insurer
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Financial Poise
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013Mydex CIC
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID Inc
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems OverviewRuss Holmes
 
Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...Shahid Shah
 
After Exchange Launch--Preparing for 2015
After Exchange Launch--Preparing for 2015After Exchange Launch--Preparing for 2015
After Exchange Launch--Preparing for 2015Andy Arends
 
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...Shahid Shah
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA CompliancePrecisely
 
Demand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRsDemand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRsShahid Shah
 
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...Shahid Shah
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitNoreen Whysel
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Fraud Analytics - Discussion
Fraud Analytics - DiscussionFraud Analytics - Discussion
Fraud Analytics - DiscussionAditya Madiraju
 

What's hot (20)

BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...
Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...
Healthcare: Blockchain’s Curative Potential for Healthcare Efficiency and Qua...
 
Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora Technology Innovation Trends In Insurance | Navdeep Arora
Technology Innovation Trends In Insurance | Navdeep Arora
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
 
The Digital Innovation Award - Waterdrop Inc.
The Digital Innovation Award - Waterdrop Inc.The Digital Innovation Award - Waterdrop Inc.
The Digital Innovation Award - Waterdrop Inc.
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
Procurement & Government Contracting Compliance (Series: Corporate & Regulato...
 
William for citizen2013
William for citizen2013William for citizen2013
William for citizen2013
 
BigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy managementBigID IAPP webinar on data-driven enterprise privacy management
BigID IAPP webinar on data-driven enterprise privacy management
 
Centrifuge Systems Overview
Centrifuge Systems OverviewCentrifuge Systems Overview
Centrifuge Systems Overview
 
Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...Architecting, designing and building medical devices in an outcomes focused B...
Architecting, designing and building medical devices in an outcomes focused B...
 
After Exchange Launch--Preparing for 2015
After Exchange Launch--Preparing for 2015After Exchange Launch--Preparing for 2015
After Exchange Launch--Preparing for 2015
 
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...HxRefactored: Stop dreaming about fluid data interoperability and start focus...
HxRefactored: Stop dreaming about fluid data interoperability and start focus...
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
Demand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRsDemand connected medical devices to improve military EHRs
Demand connected medical devices to improve military EHRs
 
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...How to Use Open Source Technologies in Safety-critical Digital Health Applica...
How to Use Open Source Technologies in Safety-critical Digital Health Applica...
 
Case Study
Case StudyCase Study
Case Study
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Fraud Analytics - Discussion
Fraud Analytics - DiscussionFraud Analytics - Discussion
Fraud Analytics - Discussion
 

Similar to Shaping the Future of Trusted Digital Identity

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
Provider Authentication for Health Information Exchange
Provider Authentication for Health Information ExchangeProvider Authentication for Health Information Exchange
Provider Authentication for Health Information ExchangeBrian Ahier
 
Smart card kantara pids presentation grey
Smart card kantara pids presentation greySmart card kantara pids presentation grey
Smart card kantara pids presentation greyDan Combs
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Jisc
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageTogar Simatupang
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordseHealth Forum
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointDr Rachel O'Connell
 

Similar to Shaping the Future of Trusted Digital Identity (20)

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
Provider Authentication for Health Information Exchange
Provider Authentication for Health Information ExchangeProvider Authentication for Health Information Exchange
Provider Authentication for Health Information Exchange
 
Smart card kantara pids presentation grey
Smart card kantara pids presentation greySmart card kantara pids presentation grey
Smart card kantara pids presentation grey
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital age
 
Blockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical RecordsBlockchain Technology for Patients Medical Records
Blockchain Technology for Patients Medical Records
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 

More from Noreen Whysel

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxNoreen Whysel
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentNoreen Whysel
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxNoreen Whysel
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfNoreen Whysel
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfNoreen Whysel
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gatewaysNoreen Whysel
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...Noreen Whysel
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Noreen Whysel
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Noreen Whysel
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryNoreen Whysel
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer DevelopmentNoreen Whysel
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a differenceNoreen Whysel
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaNoreen Whysel
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonNoreen Whysel
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayNoreen Whysel
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving PerformanceNoreen Whysel
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open SourceNoreen Whysel
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaNoreen Whysel
 
DH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionDH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionNoreen Whysel
 

More from Noreen Whysel (20)

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer Development
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdf
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdf
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gateways
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon Entry
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer Development
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a difference
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in Wikipedia
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thon
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning Gateway
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving Performance
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open Source
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, Atlanta
 
DH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionDH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as Exhibition
 

Recently uploaded

FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Shaping the Future of Trusted Digital Identity

  • 1. Shaping the Future of Trusted Digital Identity The IDEF Registry with Health Information Use Cases Kantara Initiative Educational Foundation 1
  • 3. “By making online transactions more trustworthy and better protecting privacy, we will prevent costly crime, we will give businesses and consumers new confidence, and we will foster growth and untold innovation.” — President Barack Obama, April 2011 National Strategy for Trusted Identities in Cyberspace 3
  • 4. From NSTIC to IDESG • April 2011 – White House introduced the National Strategy for Trusted Identities in Cyberspace (NSTIC) to: o work collaboratively with the private sector, advocacy groups, public sector agencies and other organizations; o improve privacy, security and convenience of online transactions; and o create a “trusted” online environment because of agreed upon standards for obtaining and authenticating digital identities.
  • 5. Guiding Principles • NSTIC established guiding principles for the creation of solutions for the Identity Ecosystem that are: o Privacy-enhancing and voluntary; o Secure and resilient; o Interoperable; and o Cost-effective and easy to use.
  • 6. The IDESG • The NSTIC vests responsibility for the creation of policy and standards for the Identity Ecosystem in the private sector-led, Identity Ecosystem Steering Group (IDESG). • IDESG works closely with the National Institute of Standards NSTIC National Program Office, which manages the day-to-day activities of the NSTIC implementation. • The IDESG is now an independent, non-profit association continuing to drive standards for the Identity Ecosystem.
  • 7. Building a Better Digital Ecosystem With The Identity Ecosystem Framework
  • 8. What Is the IDEF? First rules of the road for navigating the evolving landscape of online identity Asserts capabilities and responsibilities for individuals, companies, government agencies and organizations in the identity ecosystem Creates policy foundation for strengthening privacy and security protections for organizations and consumers alike What is the IDEF? What does it do? Why is it necessary?
  • 9. Three Components of the IDEF Baseline Requirements, Supplemental Guidance and Best Practices Establishes 8 interoperability, 15 privacy, 15 security and 7 usability guidelines Scoping Statement Defines scope of IDESG work to create a safe and trustworthy identity ecosystem Functional Model Depicts how IDEF guidelines apply to identity stakeholders
  • 10. Scoping Statement • Defines the scope of IDESG work to create a safe and trustworthy identity ecosystem • Expressed in objective and testable statements suitable for 3rd party assessment • Extensive enough that specific communities can determine applicability of IDEF requirements based on individual needs
  • 11. Baseline Requirements • Establishes a baseline of 8 operability, 15 privacy, 15 security and 7 usability requirements • Serves as the FAQs for the IDEF • Supplemental Guidance & Best Practices
  • 12. Baseline Requirements INTEROPERABILITY • Third Party Authentication • Third Party Credentials • Standardized Credentials • Standardized Data Exchanges • Documented Processes • Third Party Compliance • User Redress • Accountability PRIVACY • Data Minimization • Purpose Limitation • Attribute Minimization • Credential Limitation • Data Aggregation Risk • Usage Notice • User Data Control • Third Party Limitations • User Notice of Changes • User Option to Decline • Optional Information • Anonymity • Controls Proportionate to Risks • Data Retention and Disposal • Attribute Segregation • Security Practices • Data Integrity • Credential Reproduction • Credential Production • Credential Issuance • Credential Uniqueness • Token Control • Multifactor Authentication • Authentication Risk Assessment • Uptime • Key Management • Recovery & Reissuance • Revocation • Security Logs • Security Audits SECURITY USABILITY • Usability Practices • Usability Assessment • Plain Language • Navigation • Accessibility • Usability Feedback • User Requests Ethics?
  • 13. Functional Model Governance & Accountability ACTIVITIES: ROLES: • Policy, Rules & Requirements • Development • Accreditation Body • Certification Body • Assessors/Auditors • Community of Interest • Certification • Accreditation • Assessment/Audit Interoperability ACTIVITIES: ROLES: • Standards Development • Specification Development • Exchange • Standards Development Body • Specification Development Body • Interoperability Providers Administration & Operations ACTIVITIES: ROLES: • Redress • Recovery • Enterprise Governance & Policy Development • Internal Audit • Service Optimization • Updates (Periodic & Event Based Functional CORE OPERATIONS: ROLES: • Registration • Credentialing • Authentication • Authorization • Transaction Intermediation • Users • Identity Providers • Credential Service Providers • Reg Authorities • Intermediaries • Attribute Providers • Relying Parties
  • 14. Functional Elements IDESG FUNCTIONAL ELEMENTS CORE OPERATIONS FUNCTIONS REGISTRATION CREDENTIALING AUTHENTICATION AUTHORIZATION TRANSACTION INTERMEDIATION Application Attribute Control Attribute Verification Eligibility Decision Credential Provisioning Token Binding Attribute Binding Revocation Authentication Request Credential Presentation Credential Validation Authentication Decision Authorization Request Attribute Control Attribute Verification Authorization Decision Blinding Pseudonymization/ Anonymization Exchange
  • 15. IDEF Stakeholder Groups Drives business value and consumer trust for those issuing or consuming credentials Enables truly trustworthy digital credentials to protect identities Offers foundational set of principles to which all frameworks can align to demonstrate interoperability Trust Frameworks Relying Parties Consumers
  • 16. IDESG The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices, and tools for trusted digital identities.
  • 17. 17 INDIVIDUALS! This is the only requirement set for certifications (businesses care about those!) written from the *individual’s* perspective. That’s RADICAL. What REALLY makes this unique?
  • 18. What is our VALUE ADD? • Privacy, Usability & Interoperability added to pre-existing Security Certifications. • Many Security frameworks are out there and required. • Ours is Individually focused and comprehensive. • Ratings? No one else does this. Is complementary to other certifications. • Ethics? Combining privacy and security with interoperablility and usability gives users control of how their data is managed.
  • 20. The IDEF Registry Patient Data Privacy Case Studies
  • 21. Assumptions • Patient outcomes are better when the patient and family is fully engaged • Clearly the provider needs patient data to create good outcomes • Patient consent will take precedence except for emergencies and regulation • The US Health Care ecosystem will be fragmented for the near term • Governmental Pressure to share data will succeed
  • 22. Health Profile for Digital Ecosystem ● All of the detail that makes a trust registry work for Health Care ● Focus on Medical records locator and access to data by the patient ● Patient needs access to all medical records wherever they may be ● PEW research report – need to match the patient to the record ● Still in development – looking for input from the community https://wiki.idesg.org/wiki/index.php/Health_Care_Profile
  • 23. Distributed Attribute Use Case ● At registration a new patient needs to bring a variety of identifiers – e.g. ○ Driver’s license – linked to a governmental network ○ Health Insurance Card – linked to a health care network ○ Payment card – linked to a financial network ● Health history – focus on technology (e.g. Blue Button FHIR API) ● Artificial Intelligence is used ensure ID is sufficient for registration https://wiki.idesg.org/wiki/index.php/Patient_Registration_with_Dist ributed_Attributes
  • 24. Prototype sandbox Start with one use case and allow anyone to contribute use cases • Example use case – Emergency contacts o Family Contacts o Source of patient directives (POLST etc.) o Medical conditions and medical contacts o Targeted to First Responders (e.g. FirstNet and FEMA) https://wiki.idesg.org/wiki/index.php/Emergency_Contact_Informa tion_Use_Case
  • 25. Tying It All Together ● Any patient needs IAL2 authorization to access their records ● Individual practices need and use other information, such as payment assurance, contacts, patient directives ● Authenticated patients can send records anywhere ○ To other compliant entities, to family, to lawyers as a matter of patient choice ● It seems no practice need care about others authorization ● If this is wrong, we would like to understand why ● If the patient wants cross-practice authorization, that should be a Trusted 3rd Party
  • 26. Thanks! Noreen Whysel IDEF Registry Kantara Initiative Educational Foundation nwhysel@gmail.com
  • 29. 29 9 Registrants Various industries, all working with identity systems Assumption: B to B or B to G users IDEF Registry at start of Phase II
  • 30. 30 Assumption: People come to register products What they really wanted: Browse registrant’s products & get easy understanding of scores Burying the lede: Phase I Site UI
  • 31. 31 Scores: Tough to understand and pie charts didn’t give good representation. Conclusion: Confusing, complicated, not helpful IDEF Registry: Phase I Scores
  • 32. 32 Problem areas: ● Scores & Symbols ● Linking offsite ● Lack of easy access to Supplemental Guidance ● Not enough context Phase I Usability Learnings: Change areas: ● Lack of easy access to Supplemental Guidance ● Not enough context ● Categories didn’t work ● No tracking ● Buried the lead from top of site ● Forms hard to use ● Hard to see requirements and SG, other supporting docs
  • 34. 34 ● Usability testing ● Chalkmark surveys for navigation and information architecture ● Design iterations ● Mark and scores in “Design Challenge” ● Flip the whole site Phase II: Clean Up and Evolve with Design
  • 35. 35 New Front page with context and links to all aspects of the project and registry, IDESG Phase II
  • 36. 36 ● Step by step process ● Simplified data collection on products and services ● Easy way to check application status ● Easy ways to find help and information Phase II: Registrant data collection improved
  • 37. 37 ● Requirements shown with the Supplemental Guidance ● Simplified columns ● Easy movement between types of questions ● Easy answering Phase II: New Data Collection Pages
  • 38. 38 ● Local Knowledge Base instead of clicking away ● Easy way to see the whole Framework ● Simple way to “read the framework” Phase II: Knowledge Base
  • 40. 40 Iterate Iterate Iterate, Test Test Test
  • 41. 41 Iterate Iterate Iterate, Test Test Test
  • 42. 42 Iterate Iterate Iterate, Test Test Test
  • 43. 43 Iterate Iterate Iterate, Test Test Test
  • 44. 44 Iterate Iterate Iterate, Test Test Test
  • 46. 46 Iterate Iterate Iterate, Test Test Test
  • 47. The IDEF Registry Testing the Requirements
  • 48. Requirements Testing • Interviews with attesting companies • Open-ended interviews are useful in identifying specific issues that participants may have had with the attestation process. • Focused questions on requirements and supplemental guidance that either were known to have issues for the attester, due to comments provided on the attestation form, or that were implied due to their incomplete or N/A status. • The insight from participants informs potential changes or corrections to the language or significance of individual IDEF Baseline Requirements.
  • 49. General Questions About the Requirements • Were there any requirements that you recall that were particularly difficult or time consuming to complete? • Were there any requirements that you recall that were irrelevant or unreasonable to the attested service? Why? • Did you consult the supplemental guidance for the requirements? Was it helpful? Why? • Are there any issues or requirements that you hadn't thought about? • Now that you have completed the attestation, do you feel IDESG certification is of value to your company? Why or why not? •11 Questions total
  • 51. 51 Iterate Iterate Iterate, Test Test Test
  • 52. 52 Iterate Iterate Iterate, Test Test Test What happens when people can compare providers?
  • 53. The IDEF Registry Phase III Proposal: 3rd Party Ratings for Consumers
  • 54. 54 3rd Party Ratings Business Model 3rd Party Ratings made sustainable: • Provide ratings via api calls • Charge for use via micropayments • Charge for those rated to use in marketing • 3rd Party certified raters can scale 3rd Party Ratings Trusted in Marketplace: • Reqs made by IDESG, a non-profit neutral party • Ratings by trained 3rd party assessors • No pay to play
  • 55. 55 3rd Party Ratings with our Reqs 3rd Party Ratings could be done for all consumer products: • Rate within sectors • Health • Children’s products • Financial products • Or Consumer generally Redesigned for mass consumption: