Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
Citizen Digital Identity: Enabling and empowering individuals and institutionsConor Bronsdon
A 2019 paper (which I contributed to) demonstrating how governments can enable citizen services and inclusive economic gains through Citizen Digital Identity.
Part of Microsoft Services' eBook series exploring how digital transformation and Digital Identity are changing industries and cybersecurity across the world.
Innovation in the Digital Identity space is crucial for progress. Here’s a fact: a new identity is generated with every birth. Now consider this: by the time you finish your day today, a staggering 360,000 children will be eligible for an identity document.
Future value of data Final report - Draft summary lr 15 dec 2018Future Agenda
Throughout 2018 a series of 30 workshops were undertaken around the world exploring the key topic of the future value of data. Engaging with around 1000 experts in 25 countries, this major research project has looked at the key issues driving change for how we see data value and their implications for the next ten years - globally and locally.
This is the draft PPT summary of the research findings and will be followed up in the New Year with a detailed Future Agenda global synthesis report plus regional versions in multiple languages.
If you have any comments or questions on this summary, the research or its future use, please do not hesitate to get in touch with either tim.jones@futureagenda.org or caroline.dewing@futureagenda.org or via twitter @futureagenda and @thevalueofdata
Cartesian assesses the current state of identity management, and outlines the opportunity for trusted service providers such as MNOs, financial institutions and governments to act as “digital identity authorities”.
Future of digital identity initial perspective - final lrFuture Agenda
Our interconnected digital world has started to make a mockery of traditional forms of identification. Being asked to produce ‘two forms of ID; at least one from each of the two following lists’ already seems hopelessly anachronistic in a world of automated password-managers, RFID-driven payments systems, and bio-metric authenticators on our mobile phones. The idea of having a single digital identity (Digital ID) that can replace the need to hold a plethora of cards and documents, from your passport and driving license to your library card and even your CV, is not only one whose time has come, it is one that is all but presumed to exist already. Although it doesn’t quite yet.
This ‘initial perspective’ is intended to provide a provocation for thinking and deeper discussion about the impending implementation, and future, of Digital Identity and its role and value in society.
In addition, we are also undertaking a set of 5 expert workshops across 4 continents in Q4 2018 (London, Singapore, Sydney, San Francisco and Brussels). If you are interested in joining, we would welcome your feedback and contribution to help build a richer view. Do let us know.
The future of digital identity 2019 future agendaFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
In the short term, new solutions are likely to move us towards the promise of a single Digital ID that allows us to simply, safely and securely navigate a connected world.
Looking further forward, the changes could be even more profound. The ways that we digitally manage, share and verify our personal information could well come to completely redefine the human digital experience. Current digital business models that seem immutable could collapse. Centres of digital power might shift radically. And the current personal data ‘land grab’ could be replaced by a new digital norm in which individuals can finally make meaningful claims to data ownership and control.
However, there are a number of potentially calamitous pitfalls to navigate along the way. Some of these could lead to whole new kinds of digital dystopia.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
Citizen Digital Identity: Enabling and empowering individuals and institutionsConor Bronsdon
A 2019 paper (which I contributed to) demonstrating how governments can enable citizen services and inclusive economic gains through Citizen Digital Identity.
Part of Microsoft Services' eBook series exploring how digital transformation and Digital Identity are changing industries and cybersecurity across the world.
Innovation in the Digital Identity space is crucial for progress. Here’s a fact: a new identity is generated with every birth. Now consider this: by the time you finish your day today, a staggering 360,000 children will be eligible for an identity document.
Future value of data Final report - Draft summary lr 15 dec 2018Future Agenda
Throughout 2018 a series of 30 workshops were undertaken around the world exploring the key topic of the future value of data. Engaging with around 1000 experts in 25 countries, this major research project has looked at the key issues driving change for how we see data value and their implications for the next ten years - globally and locally.
This is the draft PPT summary of the research findings and will be followed up in the New Year with a detailed Future Agenda global synthesis report plus regional versions in multiple languages.
If you have any comments or questions on this summary, the research or its future use, please do not hesitate to get in touch with either tim.jones@futureagenda.org or caroline.dewing@futureagenda.org or via twitter @futureagenda and @thevalueofdata
Cartesian assesses the current state of identity management, and outlines the opportunity for trusted service providers such as MNOs, financial institutions and governments to act as “digital identity authorities”.
How Blockchain App Development is Paving the Way for the FutureDamco Solutions
Blockchain applications can serve as a trading and financing instrument to ensure distributed ledger-backed payments. Finance and Banking services have taken a lead in Blockchain app development. For more in detail, please visit - https://www.damcogroup.com/blogs/how-blockchain-app-development-is-paving-the-way-for-the-future/
2018 has been a roller-coaster ride for blockchain technology mostly at the hands of cryptocurrencies – blockchain’s main beneficiary. Extreme price volatility, unsuccessful ICOs, fraud, cyber security issues, and negative press around cryptocurrency would have all but killed most emerging technologies. But not blockchain.
Blockchain is entering into a new evolutionary phase with the help of tech giants like IBM, Amazon and Google who recognize the wider applicability of blockchain as a game changer in data storage, commerce, and security. Even cryptocurrency is showing promising signs as it moves out of the domain of overnight Bitcoin millionaires (and more who have lost fortunes when speculating on cryptocurrencies) to risk averse financial heavyweights such as Goldman Sachs and JP Morgan. Like the Internet, e-commerce, social media, and cloud computing before it, blockchain is on a fast track to become a ubiquitous technology.
Learn about the Kantara Consent & Information Sharing WG and their major deliverable the digital Consent Receipt - an Alpha project designed to upgrade the way a person provides consent on-line. This is an open standardization project.
Proof of immunity and the demise of privacy 2020 world in 2030Future Agenda
Public concerns about health security override worries about privacy. Governments integrate immunity and health data with national identities facilitated by digital identity platforms. Insufficient regulatory control risks the possibility of pervasive and invasive surveillance.
A pragmatic response to a pandemic is to dial up tracking, tracing and wider bio-surveillance in order to isolate the virus and manage the contagion. But this may come at a cost. Privacy advocates warn that it is precisely in times of crisis that governments focus too much on short term need without robustly exploring the potential consequences; the impact on the right to a private life or the risk of greater surveillance, for example.
This 2030 foresight explores why, while proof of immunity is just one way in which the merging of health and identity technologies can be used, it is also the catalyst for wider change. This will not only be about creating and sharing new kinds of health data but also about new access credentials. Indeed, being asked for proof of immunity could well see people being limited in their freedom of movement, not on the basis of citizenship or wealth, but on their individual health.
For more details see www.futureagenda.org @futureagenda
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
os comparto mi presentacion de Blockchain y el papel de arquitecto de aplicaciones para los estudiantes de la maestría de arquitectura de tecnología de la Universidad de los Andes en Colombia.
Kantara Initiative is increasingly known globally as the 'go to' place for operationalized identity and consent based privacy services. This overview provides viewers an insight into Kantara's aims and objectives, services and members. Join us!
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. The Global Growth of Digital Identity - cases studies on Digital Identity in the UK, Open Banking and The Passenger Journey.
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
At HIMSS 2015 Kantara Initiative will focus on the User Managed Access (UMA) initiative with a networking breakfast held on April 15th sponsored by ForgeRock and MedAllies. More information about HIMSS15 and registration.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Blockchain and Fintech in Melbourne AustraliaSusan Dart
I put together this presentation for a client who wanted insights into blockchain and healthcare. In my enthusiasm i also included many of the blockchain events surrounding the Fintech festival in Melbourne. I'm thrilled in particular to have gained insights into how Estonia handles its digital economy for its citizens. There's a wealth of information here for blockchain lovers. Enjoy.
A presentation about the Kantara Identity Assurance Trust Framework Program. Kantara is THE organization to Accredit and Certify Levels 1,2 and 3 non-crypto Assurance.
The Internet of Things (IoT) has been developing over the last 20 years and is often referred to as Industry 4.0 or the “fourth industrial revolution.” It is an umbrella term for all the digital assets and entities connected to the internet. Many of these are intangibles, such as data, human capital via artificial intelligence (AI), intellectual property (IP), and cyber; as such, they need to be made tangible to address value on a balance sheet. Others are connected entities, such as sensor devices, collecting and receiving information in an intelligent fashion across networks.
"Show me the industry that lacks Trust, Transparency, Security, and Privacy and I will show you the use case of blockchain technology in that industry."
Blockchain is a Global, Decentralized, and Distributed transactional database/ ledger that records the provenance of a digital asset. It is Highly Transparent, Secure, and Immutable.
We at Blockchain Developments offers Enterprise Blockchain development services. We use blockchain technology for possible benefits in business operations and security.
What is blockchain beyond cryptocurrencies - 16 use casesAppinventiv
From Banking to Healthcare to Ride sharing, Blockchain will have a huge impact on our future. Understanding Blockchain technology can be a little tricky, but understanding its influence on different sectors of our society can make it easier.
Blockchain has presented itself as a crucial tool in building a fraudulent proof and transparent society. Now it’s upon us to implement the good of it. Although, just like any other thing, Blockchain is also encircled by controversies and cynicism.
Nonetheless, let us have a look at the industries in which blockchain presents a strong promise for service.
I present this to government departments to help understand blockchain technology and how governments are using it as well as the opportunities that blockchain start-ups could have.
Inside the following year, individuals will confront
new troubles to the ability to guarantee the insurance and
security of their own information. With these sorts of security
strategies being utilized, there is much weakness. Another
option is bio-metric confirmation. Biometrics are propelled ver-
ification systems; it prompts numerous protection and security
issues. Real security what’s more, security issues on Radio
Frequency Identification (RFID) chips were distinguished and
dissected. Likewise, Biometric security dangers that connected
to e-international ID have been dissected and a few proposals
were given which have been investigated for numerous years.
Cryptography innovation and a few conventions are utilized
to counter-measure the dangers and assaults. Nowadays, E-
passports permits are generally sent in the vast majority
of the created nations that stores the bio-metric data on a
modest RFID chip. So that’s why, Identity Theft has forced
incalculable hardships upon its casualties which is a major
challenge in this new era. In this paper, we investigate the
powerlessness of informal community clients to Identity Theft
when they share individual distinguishing proof data on the
web. Personality crooks abuse informal organization clients and
the shortcomings of interpersonal interaction destinations to
assemble the data expected to submit Identity Theft what’s
more, character misrepresentation utilizing this id data. A
trouble in having precaution components set up is that person
to person communication locales have a personal stake in
advancing as opposed to keeping the sharing of information.
Further, character wrong-doing is unavoidable which makes
the improvement of dangers troublesome. Taking everything
into account, endeavors have been made in this paper to
blueprint contentions that will help with settling the wrong-
doings given helplessness of informal organization clients to
Identity Theft.
How Blockchain App Development is Paving the Way for the FutureDamco Solutions
Blockchain applications can serve as a trading and financing instrument to ensure distributed ledger-backed payments. Finance and Banking services have taken a lead in Blockchain app development. For more in detail, please visit - https://www.damcogroup.com/blogs/how-blockchain-app-development-is-paving-the-way-for-the-future/
2018 has been a roller-coaster ride for blockchain technology mostly at the hands of cryptocurrencies – blockchain’s main beneficiary. Extreme price volatility, unsuccessful ICOs, fraud, cyber security issues, and negative press around cryptocurrency would have all but killed most emerging technologies. But not blockchain.
Blockchain is entering into a new evolutionary phase with the help of tech giants like IBM, Amazon and Google who recognize the wider applicability of blockchain as a game changer in data storage, commerce, and security. Even cryptocurrency is showing promising signs as it moves out of the domain of overnight Bitcoin millionaires (and more who have lost fortunes when speculating on cryptocurrencies) to risk averse financial heavyweights such as Goldman Sachs and JP Morgan. Like the Internet, e-commerce, social media, and cloud computing before it, blockchain is on a fast track to become a ubiquitous technology.
Learn about the Kantara Consent & Information Sharing WG and their major deliverable the digital Consent Receipt - an Alpha project designed to upgrade the way a person provides consent on-line. This is an open standardization project.
Proof of immunity and the demise of privacy 2020 world in 2030Future Agenda
Public concerns about health security override worries about privacy. Governments integrate immunity and health data with national identities facilitated by digital identity platforms. Insufficient regulatory control risks the possibility of pervasive and invasive surveillance.
A pragmatic response to a pandemic is to dial up tracking, tracing and wider bio-surveillance in order to isolate the virus and manage the contagion. But this may come at a cost. Privacy advocates warn that it is precisely in times of crisis that governments focus too much on short term need without robustly exploring the potential consequences; the impact on the right to a private life or the risk of greater surveillance, for example.
This 2030 foresight explores why, while proof of immunity is just one way in which the merging of health and identity technologies can be used, it is also the catalyst for wider change. This will not only be about creating and sharing new kinds of health data but also about new access credentials. Indeed, being asked for proof of immunity could well see people being limited in their freedom of movement, not on the basis of citizenship or wealth, but on their individual health.
For more details see www.futureagenda.org @futureagenda
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. Digital Identity in the style of an age-old wedding rhyme, how digital identity in 2018 can be explained through something old (Facebook), something new (GDPR, AI, Blockchain Identity), something borrowed (Consent Receipts), something blue (Ubisecure!).
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
os comparto mi presentacion de Blockchain y el papel de arquitecto de aplicaciones para los estudiantes de la maestría de arquitectura de tecnología de la Universidad de los Andes en Colombia.
Kantara Initiative is increasingly known globally as the 'go to' place for operationalized identity and consent based privacy services. This overview provides viewers an insight into Kantara's aims and objectives, services and members. Join us!
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. The Global Growth of Digital Identity - cases studies on Digital Identity in the UK, Open Banking and The Passenger Journey.
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
At HIMSS 2015 Kantara Initiative will focus on the User Managed Access (UMA) initiative with a networking breakfast held on April 15th sponsored by ForgeRock and MedAllies. More information about HIMSS15 and registration.
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and as recent Pew surveys have demonstrated, people have begun to (ahem) notice. The discipline of privacy engineering aspires to “craft”, but finds it hard to break out the “compliance” rut. The User-Managed Access (UMA) standard and the OpenUMA open-source project are stepping into the breach with two essential elements that change the game: asynchronous consent and centralized consent management.
Blockchain and Fintech in Melbourne AustraliaSusan Dart
I put together this presentation for a client who wanted insights into blockchain and healthcare. In my enthusiasm i also included many of the blockchain events surrounding the Fintech festival in Melbourne. I'm thrilled in particular to have gained insights into how Estonia handles its digital economy for its citizens. There's a wealth of information here for blockchain lovers. Enjoy.
A presentation about the Kantara Identity Assurance Trust Framework Program. Kantara is THE organization to Accredit and Certify Levels 1,2 and 3 non-crypto Assurance.
The Internet of Things (IoT) has been developing over the last 20 years and is often referred to as Industry 4.0 or the “fourth industrial revolution.” It is an umbrella term for all the digital assets and entities connected to the internet. Many of these are intangibles, such as data, human capital via artificial intelligence (AI), intellectual property (IP), and cyber; as such, they need to be made tangible to address value on a balance sheet. Others are connected entities, such as sensor devices, collecting and receiving information in an intelligent fashion across networks.
"Show me the industry that lacks Trust, Transparency, Security, and Privacy and I will show you the use case of blockchain technology in that industry."
Blockchain is a Global, Decentralized, and Distributed transactional database/ ledger that records the provenance of a digital asset. It is Highly Transparent, Secure, and Immutable.
We at Blockchain Developments offers Enterprise Blockchain development services. We use blockchain technology for possible benefits in business operations and security.
What is blockchain beyond cryptocurrencies - 16 use casesAppinventiv
From Banking to Healthcare to Ride sharing, Blockchain will have a huge impact on our future. Understanding Blockchain technology can be a little tricky, but understanding its influence on different sectors of our society can make it easier.
Blockchain has presented itself as a crucial tool in building a fraudulent proof and transparent society. Now it’s upon us to implement the good of it. Although, just like any other thing, Blockchain is also encircled by controversies and cynicism.
Nonetheless, let us have a look at the industries in which blockchain presents a strong promise for service.
I present this to government departments to help understand blockchain technology and how governments are using it as well as the opportunities that blockchain start-ups could have.
Inside the following year, individuals will confront
new troubles to the ability to guarantee the insurance and
security of their own information. With these sorts of security
strategies being utilized, there is much weakness. Another
option is bio-metric confirmation. Biometrics are propelled ver-
ification systems; it prompts numerous protection and security
issues. Real security what’s more, security issues on Radio
Frequency Identification (RFID) chips were distinguished and
dissected. Likewise, Biometric security dangers that connected
to e-international ID have been dissected and a few proposals
were given which have been investigated for numerous years.
Cryptography innovation and a few conventions are utilized
to counter-measure the dangers and assaults. Nowadays, E-
passports permits are generally sent in the vast majority
of the created nations that stores the bio-metric data on a
modest RFID chip. So that’s why, Identity Theft has forced
incalculable hardships upon its casualties which is a major
challenge in this new era. In this paper, we investigate the
powerlessness of informal community clients to Identity Theft
when they share individual distinguishing proof data on the
web. Personality crooks abuse informal organization clients and
the shortcomings of interpersonal interaction destinations to
assemble the data expected to submit Identity Theft what’s
more, character misrepresentation utilizing this id data. A
trouble in having precaution components set up is that person
to person communication locales have a personal stake in
advancing as opposed to keeping the sharing of information.
Further, character wrong-doing is unavoidable which makes
the improvement of dangers troublesome. Taking everything
into account, endeavors have been made in this paper to
blueprint contentions that will help with settling the wrong-
doings given helplessness of informal organization clients to
Identity Theft.
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITYLiveplex
The concept of digital identity has become a cornerstone in our digital age. It represents an individual's presence in the digital world, encompassing various identifiers like usernames, passwords, and more complex attributes like online behavior patterns and transaction histories. Traditionally, digital identity has been managed through centralized systems, often controlled by major tech corporations or government entities. This centralization poses several issues, including privacy concerns, data breaches, and the misuse of personal data.
Enter Web 3.0 – a new paradigm in the internet's evolution. This iteration of the web introduces a decentralized architecture, fundamentally altering how digital identities are created, managed, and utilized. At its core, Web 3.0 leverages technologies like blockchain, decentralized applications (dApps), and smart contracts to shift control from centralized authorities to individual users.
This transition heralds a significant shift in digital identity management.
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
Over the past few months we have run a series of expert workshops exploring the future of digital identity. Supported by Mastercard five events took place in London, Singapore, Sydney, San Francisco and Brussels building a collaborative expert view.
The project online and initial perspective is here https://www.futureagenda.org/news/the-future-of-digital-identity
The full report will be published in the New Year
Trustful and Trustworthy: Manufacturing trust in the digital era.ESADE
At the beginning of the so-called Fourth Industrial Revolution,
speaking about social innovation means looking at the Digital
Economy. This is a new economic paradigm, which not only
makes the Internet an infrastructure and a communication
channel but also a way of creating value. The disruption this
causes places us in a digital world that is ever more connected,
flexible and swifter, changing the social relationships we have
known hitherto out of all recognition. We are shifting from
Business-to-Consumer (B2C)1 models to bilateral or Peer-to-
Peer (P2P) models, where we can both buy and sell and link to
other users through platforms that set the economic heartbeat
of our societies.
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
My presentation from IDnext 2015, the European Digital Identity Event. "UK government identity initiatives past, present, future: policy and technology perspectives"
"LIBRA: IS IT REALLY ABOUT MONEY?" de Valerie Khan Vice President Digital Equity Association valerie.khan@d-eq.org Geoffrey Goodell Centre for Blockchain Technologies University College London
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
Technicall report created by Gartner analyst in which they explore Telefonica & Eleven Paths technologies to provide Authentication & Authorization as a Service. In it they analyse Mobile Connect, Latch, SealSign and SmartID
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
How we prove that we are who or what we say we are during digital transactions and interactions is set to become one of the defining features of the next stage of the human digital transformation. Today, we are living with early attempts to solve the problem that are no longer fit for purpose. At best, the multitude of different ways we login, confirm our identities, and establish trust in claims made during digital exchanges, has become profoundly inconvenient. At worst, they have left us in a connected world which is neither safe nor secure, and in which we seem to have completely lost control of our most personal information. The next generation solutions to the digital identity challenge could change all of this.
At the end of 2018, Future Agenda undertook a major project exploring the Future of Digital Identity. With the generous support of Mastercard, the Future Agenda team ran a series of expert workshops in different locations around the world that explored the key factors that are likely to shape the future of digital identity. The programme began with an initial perspective as a provocation. Participants in the workshops then gave us new, more fully formed, insights which were in turn explored further during one-to-one interviews with major stakeholders and thinkers in the space.
We are proud to launch this report of the findings of that work
We would like to extend our sincerest thanks to all of those who contributed to the programme.
As always, we consider our reports to be the start point for further conversations, and would welcome further input. If you would like to join the conversation, you can join our LinkedIn Group here. If you have any further questions or would like to have a conversation about how your organisation can best make use of our respond to the implications of the Future of Digital Identity please contact
Dr Robin Pharoah https://www.linkedin.com/in/robinpharoah,
James Alexander https://uk.linkedin.com/pub/james-alexander/0/747/617 or
Patrick Harris https://www.linkedin.com/in/patrick-harris-777767/
This is the initial perspective:
https://www.slideshare.net/futureagenda2/the-future-of-digital-identity-initial-perspective
This was the initial summary:
https://www.slideshare.net/futureagenda2/future-of-digital-identity-programme-summary-15-dec-2018-lr
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
W3Coins makes earning money, monitoring income, paying bills, making purchases and even transferring funds, effortless and available to everybody through the use of mobile devices and laptops.
Talk given at the Evolve/Educamp ORT'09, 16 February 2009. See
http://educamps.elearning2null.de/2009/02/09/ort09-session-2-karrierefalle-internet/#english
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snowereraser Juan José Calderón
The Digital Freedom Pass: Emancipation from Digital Slavery.
Dennis J. Snower
Abstract
Digital identity management is currently undertaken by central identity providers, with users providing their data free to digital networks that own their digital identities. If users leave their digital networks, they must leave all their digital possessions, including their digital identities, behind. This system is analogous to slavery. It is neither efficient nor equitable. Users have no assurance that the value of the free data they provide bears any relation to the value of the free services they receive. The digital networks have overwhelming market power relative to their users. This column argues for reform in the form of a Digital Freedom Pass, - the digital equivalent of a wallet containing verified pieces of an individual's digital identity. The person can then choose which identification to share, with whom, and when, allowing emancipation from our current digital slavery
Similar to The future of digital identity initial perspective (20)
Future of Off-Premise Dining - Emerging View.pdfFuture Agenda
From ‘dark kitchens’ to ubiquitous delivery brands and grocery on-demand, where, what and how we all eat is undergoing significant and rapid change.
In a collaborative project, put together in partnership with McCain, we have been looking out to 2030 to explore and define how Off-Premise Dining might further evolve, and which of the multiple current trends are likely to stick? The emerging view is a first step toward answering the question. It reflects the key insights gathered from interviews and in-depth workshops with key industry stakeholders in Europe, the Americas and Asia, as well as the Future Agenda database and synthesised desk research.
The fight for future market share is already well underway, and significant bets are being placed on a wide range of future opportunities; from health-focused vending machines, through increasingly sophisticated mobile apps, to personalisation of food flavours. With so many significant shifts taking place simultaneously across the entire off-premise dining value chain, there will inevitably be winners and losers. We hope our insights can serve as a jumping off point for further discussion as to where the winners might emerge.
As with all Future Agenda projects, the aim is to challenge assumptions, identify emerging trends, and build an informed assessment of the changes ahead and their implications for strategy, policy, innovation and action.
If you’d like to be involved and add your views into the mix please do get in touch james.alexander@futureagenda.org
As companies and governments around the world grapple with accommodating changes in the workplace, the workforce and the nature of work itself, we are pleased to be continuing our Future of Work foresight programme. Building on previous global research undertaken over the past few years, we are now looking in depth at six pivotal issues that have been prioritised as areas of major potential change. These are digital skills, soft skills, reinventing roles, the blurring of work, green jobs and digital productivity. Initially taking a European focus, with the support of Amazon, over the next couple of months a series of expert digital workshops are exploring the core shifts ahead and their implications for organisations and wider policy.
This PDF sets the scene for the dialogue both within the workshops and more widely. If you would like to be involved or have comments on the potential changes ahead, do let us know and we can accommodate. As always all discussions are under the Chatham House Rule and so there is no attribution and, as we progress with each area, we will be sharing a synthesis of all new insights and recommendations over the rest of the year.
Future of asthma care a global expert view - summary - august 2021Future Agenda
Future of Asthma Care in 2030
Often hidden by many, asthma is a set of chronic conditions that will, some believe, impact around 1bn of us by the end of the decade. It will see new diagnostics, new treatments as well as gain new social and economic perspectives in many nations. As part of a global Open Foresight programme to bring together an informed outlook for all to use, this is a draft synthesis based on dialogue with 100 experts worldwide. At a time when lung health is front of mind for many, this is an important topic for our future health.
We are keen to understand your view on this. What do you agree with, what is missing and what may need an alternative perspective? Please do share any comments and feedback to douglas.jones@futureagenda.org and we will include everything in the final report that will made available later this year.
Future of work employability and digital skills march 2021Future Agenda
The Future of Work, Employability and Digital Skills
This interim summary identifies 50 key insights for the next decade on this critical topic. These open foresight findings are based on the results of 20 workshops and 150 interviews with over 400 informed experts from across academia, business and government conduced in the last 12 months. These were primarily across Europe, but also include views from US and SE Asia.
The varied discussions identified multiple key shifts that expected to have greatest impact over the next decade. The top 3 of these are seen as pivotal for society, for government, for employers and for future workers.
Building Digital Skills
Reinventing Roles
Developing Soft Skills
To build a richer, deeper view, we would very much welcome your feedback – especially on which shifts may deliver most benefit in the next ten years, and what is missing that ought to be included in the mix.
The UK in 2030 - An expert informed view on some key trendsFuture Agenda
At a time when there is much speculation on what the next twelve months may bring, some are also looking ahead to prepare for the longer term. What will the UK be like in 2030 when the nation is post-Covid, post-Brexit and post-Johnson? Now that vaccines are being rolled out and the initial outline hard Brexit deal has been done, how will the UK fair over the decade – economically, socially and demographically? What changes are already locked-in and what is open to future variation? Based on numerous discussions with a wide range of experts across the UK in late 2020, this document explores some of the key potential trends for the next decade and highlights where the UK may be heading.
Having a well-defined future view is never easy – particularly in times of uncertainty. However, if we can differentiate between the certain, the probable and the possible we can build a clearer picture of the future which may help to challenge assumptions. Since 2010, Future Agenda has been using open foresight to explore decade-long trends with a high degree of accuracy. The World in 2020, written in 2010 for example, accurately anticipated a range of developments such as a global pandemic, the challenges around data privacy, the scaling up of electric and autonomous vehicles, the widespread use of drones and the building impact of solar energy. All of these were anticipated through extensive expert dialogue across multiple disciplines to curate an integrated, informed perspectives which can be accessed by everyone.
We used a similar approach to explore the pivotal shifts ahead for the UK. Following multiple expert discussions including academics, regional and central government, social and business leaders, as well as the military, this document summarises eight areas of alignment about UK 2030 but also highlights three fields where there is substantial difference of opinion.
Our conversations identified eight core areas where we can have confidence that changes will take place. These trends are:
1. A Changing Demographic Mix
2. Accelerating to Zero Carbon
3. Improved Digital Connectivity
4. Declining Economic Influence
5. More Devolved Power
6. Rising Inequality
7. Emphasis on the Local
8. UK Leadership
Future of retail - Five key future trends - 9 Dec 2020Future Agenda
Future of Retail – Five Key Trends
The pandemic has accelerated change across many sectors – and especially retail. More online, less physical and empty malls have been evident globally. So what about the next ten years? What changes will continue to accelerate, which will rebalance, and which new ones will emerge?
Based on extensive dialogue with retail, tech and city leaders globally, this new point of view brings together the major shifts in the mix collated under five key trends – Reemphasis on the Local, Identity Insights, Automated Retail, Continuous Interaction and Informed Consumers.
Now being used to stimulate new thinking, innovation and strategy development in multiple projects around the world, this is being shared to continue dialogue on changes and impact.
We welcome your views @futureagenda
The third programme has taken place during 2020, engaging more experts on the pivotal shifts via virtual workshops and wider community debate.Here are ten issues that will provide future challenge and opportunity.
E7 Not G7
As global GDP rises, the seven largest emerging economies (E7) have increasing economic power. The relative influence of the old G7 Western powers declines.
Data Sovereignty
Large-population emerging economies see the protection of their data as a national priority. Wider data sharing is restricted to within national borders.
The Race to Net Zero
Cities, countries and companies compete to set the standards for the planet.Fully reducing emissions is central for energy, health and economic targets.
Electric Aviation
As the pressure to decarbonise aviation builds and technology challenges are addressed, using electric planes for short / medium-haul flights gathers support.
The Stakeholder Society
The shift from maximising shareholder value to a stakeholder focus accelerates. Organisations’ purpose, action and performance measurement realign.
Migrating Diseases
Health systems struggle to address the impact of climate change. The increased spread of ‘old’ vector-borne diseases challenge nations for whom they are ‘new’.
Peak Soil
After water and air quality, attention shifts to soil. It impacts everything from food and health to conflict and migration. Action follows deeper understanding.
True Personalisation
Ubiquitous facial recognition and digital identity combine with wider AI adoption to enable the creation and delivery of truly individualised experiences.
Resilience by Design
Global supply chains evolve to be more flexible, shared regional supply webs. Competitors access shared, not proprietary, networks and systems.
Proof of Immunity
Public concerns about health security override worries about privacy. Governments integrate immunity and health data with national identities.
More details on www.futureagenda.org
Future of work employability and digital skills nov 2020Future Agenda
Future of Work, Employability and Digital Skills
As the world of work changes, how will organisations, society and individuals adapt to ensure that the current and the next generation will be able to acquire the skills necessary for future jobs? Building on previous Future Agenda research that focussed on key policy areas primarily in the Asian market and, more recently, an updated outlook on the future of work and skills development developed in partnership with the University of Bristol, School of Management, we are very pleased to be starting a new phase of research. As well as an analysis of the future of work, this will specifically explore the shifting nature of employability and how and where digital skills will have impact.
Over the next few months, expert views from across Europe will be shared in order to develop a richer understanding of key issues and how they vary across different jurisdictions. As with all Future Agenda projects, the aim is to challenge assumptions, identify emerging trends and build an informed assessment of the changes ahead and their implications for policy and action.
If you would like to be involved and add your views into the mix, please get in touch.
Future of retail global trends summary nov 2020Future Agenda
This is an updated summary of 60 global trends that may impact the world of retail over the next decade. Multiple expert discussions across Asia, Europe, MENA and North America have developed and shared these insights that have been curated into ten key shifts.
As we finalise the future views before wider public sharing, we very much welcome your feedback on these and which may have greatest future impact.
douglas.jones@futureagenda.org
@futureagenda
The UK in 2030
In the midst of all the current uncertainty, many people are seeking greater clarity around how the future may unfold – both globally and locally. Therefore, as part of the World in 2030 project, we have curated a specific perspective on the UK in 2030.
As with all our Open Foresight projects, UK 2030 is built through dialogue with informed individuals holding alternative outlooks on how things may unfold. This PDF provides an initial collation of some of their views on what is certain, probable and possible. We will use it to initiate further period of consultation over the next month.
With this in mind we would very much welcome your thoughts – especially around the areas that you agree with, those you disagree with and your suggestions about what is missing. Your knowledge will add both richness and depth to this point of view. We will share an updated and more detailed summary before Christmas. The ambition is that this can then be used to both inform and challenge assumptions so we can all gain a clearer perspective on the future of the UK.
@futureagenda
london@futureagenda.org
The world's most innovative cities past present future - oct 2020Future Agenda
Cities are where innovation happens, where most ideas form and economic growth largely stems. For centuries, the world’s most innovative cities have been acting as global catalysts for change, and will continue to do so. As more cities seek to have impact over the next decades, we need to better understand what drives success and so identify those that may have greatest lasting impact.
APPROACH – Getting Clarity
Future Agenda has been conducting multiple discussions around the world on the future of cities (www.futureofcities.city). Our aim is to explore the range of views about what makes one city more successful, more influential and more innovative than other, and also consider key related issues such as the future of work, health, trade, trust, transport and data.
In addition, we have applied a similar modelling technique to those applied to Innovation Leaders which, for twenty years, has identified the companies that have been the best and most sustained innovators, in order to assess what potentially makes one city more innovative than another. Exploring multiple criteria, we have highlighted some core global catalysts for change.
To accompany a speech at the WRLDCTY event, this presentation shares some of the salient insights: It profiles some of most innovative cities of the past, identifying the key elements that contributed to their success, highlights some of the pivotal cities having greatest impact today, and, lastly, suggests ten cities for future global innovation leadership.
https://www.futureofcities.city
https://www.wrldcty.com
https://www.futureagenda.org/the-world-in-2030/
Data as an Asset – A Top Risk?
The concept of data being accounted for as an 'asset' is increasingly considered to be a top future risk. The fifth of our 2030 digital workshops in collaboration with The Conference Board explored varied potential data risks (Many thanks to Ellen Hexter and Sara Murray for organising).
Rated top by 50 business leaders for future impact, and second for likely change, was a foresight that “organisations will be obliged to account for what data they own or access. As such they will be required to regularly report on their full data portfolio.” (See attached PDF)
Particular concerns were raised on; how organisations will best assign value to their data; how it will be treated as an asset; who will audit this; whether ownership will be transferred with use and how, if valued, data will be taxed.
Some felt that by 2030 there will be guidelines, standards and frameworks in place – other were less convinced. Most however agreed that many business models will change.
To explore this topic more see section 4.6 in the global report on https://www.deliveringvaluethroughdata.org
Add your view via @futureagenda on twitter or via LinkedIn on https://www.linkedin.com/posts/innovationstrategy_future-data-risk-workshop-stimulus-activity-6714470359971700736-MunM
While some regions gain from better water management, much of the world’s population increasingly depend on water moved from one river basin to another. New options are explored to achieve this economically and with reduced socio-environmental damage.
As part of the World in 2030 global open foresight project, this point of view shares some perspective on changes ahead.
With climate change, increasing urbanisation, growing contamination, higher water consumption, more intensive farming and rising industrial use in many economies all having significant and combined impact, as the global population approaches 10 billion, but the net amount of water on the planet stays constant, concerns over water stress have been building. With 70% of water used for agriculture, a quarter of humanity is now facing a looming water crisis. A broadening range of urban areas need multiple innovations to provide water to cities throughout the year.
Although better water management and the decreasing cost of desalination are having impact in some regions, in many others, and especially for fast-growing inland cities, the task of ensuring continued water access is mounting. Simply moving water from one river basin to another is not straightforward. It is fraught with technological, environmental, economic and socio-political challenge. There are however several developments underway to enable more effective long-distance movement of water – some focused on building new infrastructure at scale and others looking to imaginatively repurpose existing assets to help meet the inevitable future demand.
Share your views @futureagenda
Future of hospital design initial perspective - sept 2020Future Agenda
Hospitals of the Future
In partnership with Mott MacDonald we are exploring how hospital design will change in the next decade. Building on insights gained from multiple healthcare expert workshops around the world, this is an initial perspective that share some key thoughts on how and where we may see most change. Starting with context on shifts in healthcare more generally, from slide 28 onwards it includes 22 proposals for future design focus. These range from hub and spoke ecosystems and post-Covid reconfiguration to more flexible spaces and the impact of digital theatres.
As part of a global Open Foresight programme, we are now sharing these views to gain feedback for inclusion in a more detailed point of view that will be published later in the year. If you would like to add in your opinions on which issues will be driving most change in hospitals of the future, we would welcome input either directly to us by email (tim.jones@futureagenda.rg) or via this short survey: https://www.surveymonkey.co.uk/r/J9S8SB6
Many thanks in advance for your collaboration on another key topic for future change.
Future Risk: 12 Key Issues for Insurance in the Next DecadeFuture Agenda
The insurance sector is facing major change - from both within and outside. What will be the major shifts over the next decade that have greatest impact? As part of the World in 2030 project, this is an initial view of 12 major trends that will influence insurance globally - looking across data shifts, market trends and in-sector innovations.
What do you think? Which will have greatest impact? Will it be automatic insurance? or N=1 personalisation?
Let us know your views and we can include them in an updated foresight in the next month or so.
Get in touch via douglas.jones@futureagenda.org
For more on The World in 2030 see: https://www.futureagenda.org/the-world-in-2030/
Porous Organisations
Here is our latest 2030 foresight.
This time we focus on the challenges for the future of work. Increasing competition for talent forces organisations to open their doors to a growing number of independent workers. This makes it difficult to maintain corporate knowledge and becomes a challenge for business big and small. In a highly volatile and increasingly complex landscape, many must learn how to manage a seamless flow of knowledge and ideas so they can adapt to changing customer demands, ensure capabilities are maintained and keep the doors to innovation open. Looking ahead, it seems that only the wealthiest and most attractive organisations (in the main technology companies) will be able to retain the loyalty of their employees. For everyone else, building and preserving corporate know-how within increasingly porous organisational boundaries will become a priority. As ever your thoughts and provocations are very welcome.
To access via website https://www.futureagenda.org/foresights/porous-organisations/
New solid-state batteries offer safer, higher performance than existing options and become viable options for use across multiple sectors. Competitive pricing and proactive policymaking accelerate global uptake.
This foresight is part of the World in 2030 project exploring the key global shifts for the next decade - https://www.futureagenda.org/the-world-in-2030/
Battery development has become a priority area for a broadening range of companies in recent years. Significant investment is underway as a number of new technologies compete for fast-growing markets. Five years ago, we identified that energy storage was the missing piece of the renewables jigsaw: “If solved, it can enable truly distributed solar energy as well as accelerate the electrification of the transport industry.” Today, as economies focus on faster decarbonisation and increasing electrification, particularly in transportation, the speed of new battery development has become a central issue for many researchers, policy makers, investors and companies.
Why is this? If we can get significantly more energy from a lighter, more compact, but affordable battery then the implications are enormous. Not only will this accelerate the adoption of electric vehicles by extending their range and providing a cheap way to store renewable, particularly low cost solar, energy, but it will also release a host of new developments in other areas from wearable electronics to electric planes, drones and scooters.
Given the demand for high performing batteries is building, it is hardly surprising that there is as much focus today on creating the batteries of tomorrow as there was when the first rechargeable battery was invented 160 years ago: according to a USPTO search in the past decade or so over 200,000 battery related patents have been issued. The rush to deliver the next generation technology is bringing together a host of new partnerships and foremost in many discussions is the potential impact of solid-state batteries. Within the next decade these could become the catalysts for substantial and lasting change across many sectors.
Soil is fundamental, fragile and finite. It impacts everything from food and health to conflict and migration. Deeper understanding of its degradation raises the significance of soil to equal that of climate change and biodiversity loss.
We know that the quality of our soil is the key to the food we grow, the clothes we wear and the water we drink. It recycles nutrients, sequesters carbon, is fundamental to biodiversity, helps keep our ecosystems in balance and is an essential part of our general wellbeing. But, although soil represents the difference between survival and extinction for most terrestrial life, human activities have caused it harm leading to compaction, loss of structure, nutrient degradation, increasing salinity and denuding landscapes. Furthermore, the urgent need to preserve soil receives relatively little attention from governments. An unsung hero of our planet, it is fragile, infinitely important and finite. Why do we treat it with such disregard?
As part of the World in 2030 programme, this foresight explores the future of soil and the stresses ahead https://www.futureagenda.org/foresights/peaksoil/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
4. 4
TheFutureofDigitalIdentityAnInitialPerspective
This paper provides a provocation for a discussion on the future of
digital identity. It emphasises pressing questions raised rather than
necessarily attempting to resolve them, and outlines some of the key
future issues, as well as opportunities, going forward.
One of the trickiest aspects of writing a paper like this for such a vast
and complex topic, is the need to tread a fine line between keeping
things simple and broad enough to allow all potential stakeholders
and participants to see where their own expertise plays a vital part in
discussion, and yet recognise the deep complexities (both social and
technical) involved in any discussion of digital identity. We fully accept
that many of the concepts we casually introduce here deserve much
deeper consideration. Where we have over-simplified, we apologise.
Our hope is that this paper will serve as a point of departure for deeper
and more meaningful conversations about the future of digital identity,
or rather, conversations about our future in which the question of how
we resolve our digital identity is going to play a significant part.
5. 5
TheFutureofDigitalIdentityAnInitialPerspective
Our interconnected digital world has started to
make a mockery of traditional forms of identification.
Being asked to produce ‘two forms of ID; at least
one from each of the two following lists’ already
seems hopelessly anachronistic in a world of
automated password-managers, RFID-driven
payments systems, and bio-metric authenticators
on our mobile phones. The need to rifle through
one drawer looking for your most recent utility bill,
another to find your passport, and your bags and
back pockets for a driving license or ID card, is
surely not an experience that your children are going
to have to live through. Is it?
The idea of having a single digital identity that can
replace the need for all of these documents is not
only one whose time has come, it is one that is all
but presumed to exist already. Although it doesn’t
quite. Yet.
That is not to say that digital identities and digital
identification and authentication systems do not
already exist. They do, of course. From the earliest
days of the internet, people have been developing
digital identities. Originally, they may have been
no more complex than a username or ‘handle’,
sometimes accompanied by an ‘avatar’, used to
indicate that it was the same person posting on,
say, a UseNet thread. Such ‘handles’ might have
had a connotation of gender or race or political
affiliation, but these attributes were not verifiable as
such. Someone’s online identity might have reflected
their true (offline) selves, or not. In the early days of
the internet, verifying the truth of the matter, often
didn’t matter.
With the true dawn of ‘web 2.0’ in the early 2000s,
and the subsequent avalanche of social and
interactive web and internet services that defined
it, the creation and use of digital identities saw a
period of rapid expansion. Online ‘accounts’ for
social media services, retailers, dating services,
membership organisations and so on, invited
users to store many of their ‘real-life’ personal
attributes such as gender, race, location, age, and
photographs in ‘profiles’. Sensitive information such
as credit card details, national identification numbers
and bank account numbers, often sat alongside.
At the same time, digital payments systems were
rapidly out-moding chequebooks and signatures,
with instant online bank transfers and credit card
transactions. The need to protect these accounts,
and the information contained within them,
alongside the need to verify and authenticate those
engaged in financial transactions online, brought
the tsunami of account, username and password
combinations that still define much of the landscape
of digital identity and authentication today.
Today identifying and authenticating ourselves
digitally in order to access services is a familiar
exercise. That is exactly why the continued use
of, and reliance on, paper-based identification
documents in order to access certain services feels
so out-dated. And yet it is precisely this dizzyingly
fast and haphazard explosion of opportunities to
create digital identities, and the accompanying
labyrinth of digital identification and authentication
protocols, that has left us with a problem when
it comes to releasing a truly reliable, secure and
interoperable digital identification system. What we
have now is wide familiarity with the concept, but
an identification infrastructure defined by confusion,
inconsistency, muddled expectations, contradictory
social norms, and, as continuing high-profile
data-breaches make painfully clear, a profound lack
of security.
Identification in a digital world
Our interconnected digital world
has started to make a mockery of
traditional forms of identification.
6. 6
TheFutureofDigitalIdentityAnInitialPerspective
Before going any further, it is worth perhaps
outlining exactly what we mean by a ‘digital identity’
and in particular clear up the difference between two
distinct but overlapping ways of understanding
the term:
1) An ‘online’ or digital ‘persona’ created by a
user (or collection of users) for use in one or
other digital space. Examples of different digital
identities might include characters created by
players in video games, profiles on digital dating
services, the collection of attributes inside
accounts on social media profiles etc. A single
individual may create multiple digital identities
within just one digital context, or across multiple
contexts, and these identities may be similar
to each other, or differ wildly. They may bear
some relation to the individual’s offline (real world)
identity… or none at all. It is about how an
individual chooses (or individuals choose) to
represent themselves in digital spaces.
2) A digitally stored set of verified data ‘attributes’
(such as age, gender, citizenship etc.) that can
be used to identify that people (or entities, within
a digital system, exchange or transaction) are
who they say they are, or have the attributes they
say they have.
It might be useful to think of the first of these
definitions as a social and/or cultural definition,
whilst the second is a more technical definition that
has arisen from the digitisation of various social and
institutional interactions, and financial transactions
that require formal identification (such as paying for
goods and services, applying to use public services,
etc.).
The latter definition of digital identity is perhaps
better thought of as the digital equivalent of an
official ID card or document like a passport or
driving license, that can be ‘shown’ during digital
interactions or transactions in much the same
way as we might produce a passport at an
international border.
Just like identity documents, the primary purpose
of a ‘Digital ID’ would be to verify that someone
is who they say they are and/or has the attributes
they claim to have, such as the right to travel
freely. The immediate differences are simply that
(i) whereas physical identity documents tend to
contain just certain specific bits of information, a
‘digital ID’ can hold a potentially limitless number
of data points or ‘attributes’, and (ii) that the digital
equivalent of ‘showing your ID’ needs a slightly more
complicated, technology-enabled set of protocols
and infrastructure than does pulling a document
out of your bag. Assuming that such a ‘digital
identity system’ existed however, there would then
be no reason why a digital ID could not be used
anywhere that had access to that system, including
during face-to-face interactions (entering a club,
buying alcohol, or hiring a car etc), where we might
currently use physical ID documents.
This paper focuses on this latter, technical, definition
of digital identity as a ‘Digital ID’, whilst recognising
that the choices we make now in regard to it, may
in turn, have profound effects on our social, cultural
‘digital identities’. After all, as the first section of
this paper makes clear, we are currently in a world
in which aspects of both understandings of digital
identity have been mixed up and mashed together
in countless ways, on countless different digital
platforms and in countless different digital contexts.
Digital identity and ‘Digital ID’
7. 7
TheFutureofDigitalIdentityAnInitialPerspective
Authentication
Just as we have attempted to define digital
identities and Digital ID, it may also be necessary
to draw the distinction between a Digital ID on the
one hand, and the process of authentication on
the other. It is easy to confuse the two, not least
because authentication processes often involve
the use of attributes that are also contained within
an ID, such as a fingerprint. The distinction is
important however, because strong authentication
is sometimes mistaken for strong ID. Take, as an
example, a social media profile in which a collected
set of attributes constitute a digital identity. The
account which stores this profile may have a
strong set of authentication protocols associated
with it such that the owner must use a variety of
authentication methods (a fingerprint, a one-time-
code, a password etc.) to gain access to it, or to
use it as a gateway to another service. Yet nothing
about this strong set of authentication protocols
means that the profile contains verified information
that could be used as a ‘Digital ID’ in contexts that
require a high degree of confidence that the owner
of the account has the attributes they claim to have
in that profile. By going through the authentication
protocols, the owner of the account has simply
verified that they are the owner of the account and
of the digital identity it contains. Nothing about how
the attributes in the digital identity relate to the ‘real
life’ attributes of its owner have been verified.
That said, strong authentication processes are
critical to the success of any Digital ID system, since
their rates of success and failure will ultimately be a
key factor in determining overall levels of trust in the
reliability and security of that system. The methods
and tools that we use to authenticate ourselves
can today be categorised according to a simple
taxonomy: something you own (like a phone, or
credit card), something you know (like a password),
something you are (a biometric attribute, such as
your fingerprint). New technologies and techniques
in authentication are likely to bring innovations in all
of these areas, some of which may actually begin
to feed back into identities themselves and lead to
entirely new ways of thinking about who we are.
Strong authentication processes
are critical to the success of any
Digital ID system.
8. 8
TheFutureofDigitalIdentityAnInitialPerspective
For many, the development of fully realised Digital
ID that can replace traditional forms of ID is an
inevitable evolution, and certainly as we write this
paper, the call for strong digital identity systems is
getting louder.
Convenience
The most obvious reason to develop Digital ID
is convenience, as many processes that require
formal identification feel so anachronistic today.
Job applications, airline bookings, opening a bank
account, applications for parking permits or state
benefits, even mobile phone contracts etc. can
all still involve cumbersome exercises in repetitive
form filling, document scanning, face-to-face
presentations and so on. These processes can
be more and less secure, but they all feel slow in
today’s world.
Security and accuracy
The development of strong and secure systems
of digital identification is important as it could play
a significant role in enhancing cyber security for
individuals, organisations and states. Cases of
identity theft and cyber-fraud are a growing problem
(whether measured in terms of scale or severity),
and are often driven by the large-scale theft or
distribution of databases full of identity attributes
commonly used for identification and authentication
(i.e. ‘data breaches’). Cyber-security incidents
are also increasing in severity, with critical state
infrastructures now facing the same kinds of threat
as an individual’s credit card. High profiles incidents,
such as the hacking of Democratic Party emails in
the USA in 2016, or the attack on Ukraine’s energy
infrastructure at the end of the same year, are often
popularly portrayed as highly technological, involving
‘injections of malware’, for example. It is worth
remembering that attack of this kind most often
start with the very same kinds of identity and/or
credential theft that drive simpler credit-card frauds.
With cyber-criminals becoming increasingly
organised and sophisticated, the number of cyber-
crime victims rising, quite literally, by the second,
and the proceeds of highly organised cyber-crime
being used to fund some of the most abhorrent
of ‘real world’ crimes, the case for more secure
systems of Digital ID and authentication is an easy
one to make1
.
The case for Digital ID
9. 9
TheFutureofDigitalIdentityAnInitialPerspective
The expansion of digital service provision
The number of services that are now accessed and
delivered digitally is growing. As governments in
particular, move increasingly toward online service
delivery and access, so too do the number of
‘official’ identification and authentication procedures
associated with them. In fact, governments around
the world have been leading the way in terms of
creating and implementing Digital ID systems.
National ID systems vary in form and scope of
course, but in many cases they are paving the way
for broader Digital ID systems and, perhaps more
importantly, building and embedding a set of citizen/
consumer behaviours around the use of stronger
Digital ID. They have also, sadly, highlighted some
of the risks associated with poor implementation,
and the temptation for bad actors provided by
the treasure trove of data that Digital ID systems
contain. The large-scale breach of the Indian Aadhar
national ID system2
is a case in point.
Alongside the expansion of services to the digital
world, there is also an expansion of access, for users,
to different service providers. Where once services
requiring strong identity verification might have
required a face-to-face transaction, people now have
the opportunity to access services across national
borders, geographical expanses and through an array
of different channels. Digital IDs have the potential
to make such transactions much simpler and more
secure, especially where they are recognised across
different jurisdictions, digital or otherwise.
Transaction cost reduction
Simply put, the costs involved in trying to deliver
services that require some form of identification, in a
world without Digital ID, seem to be an unnecessary
burden. Further, they are increasingly an active barrier
to innovation. Consider the UK’s drive for ‘open
banking’ for example. This initiative has the potential
to transform the relationship between individuals and
their money, and their financial service providers. But
the possibilities offered in terms of speed of access,
portability of financial histories etc. are all constrained
by the need for secure identity and authentication
procedures, which, in a world without a fully realised
Digital ID system, still rely on cumbersome protocols,
face-to-face visits, and so on.3
Combining identification attributes
Traditional forms of ID, such as a passports or
driving licenses, often contain very specific pieces of
information (names, dates of birth, addresses etc.).
Digital IDs need not be so restricted. A single Digital
ID, for example, could contain all of the attributes
that are currently distributed across different
documents. The rights to drive certain vehicles
currently contained in a driving license could sit
alongside passport identification attributes, our
health and education records, even a student ID,
allowing a single digital identity to be used in a wide
range of different contexts.
Interoperability
Interoperability in relation to Digital ID is difficult
to define accurately, and difficult to conceive in
practise. The easiest way of thinking about it
perhaps, is to consider how an individual, with a
Digital ID, would experience a truly interoperable
Digital ID system. In such a system, a user would be
able to present their Digital ID or specific attributes
from within a Digital ID, in the way they want to,
affirm their ownership of that ID, and move their ID
attributes between Digital ID providers, whenever,
and in any context, in which they needed to do
prove their identity or a specific attribute within their
identity. At the moment, we are long way from this
world. Current digital identities, such as social media
profiles, do not offer anything like the degree of trust
required for say, financial transactions. Conversely,
financial service providers do not store enough
identity attributes for use in all contexts that demand
ID. And finally, identity attributes in general, which
may be stored in multiple different places (digitally or
otherwise) are not stored according to widely used
standards and formats that would otherwise allow
for use across a wide-range of contexts.
The closest thing we have to an
interoperable system of identification
and authentication today, is that which
underpins financial transactions and
payments across the globe.
10. 10
TheFutureofDigitalIdentityAnInitialPerspective
As argued in the World Economic Forum’s landmark
paper “A Blueprint for Digital Identity”4
, the closest
thing we have to an interoperable system of
identification and authentication today, is that which
underpins financial transactions and payments
across the globe. As such, it may be that this
infrastructure provides us with the ‘blueprint’ for
building a truly interoperable Digital ID system5
.
Digital inclusion
The UN estimates that more than 1 billion people
around the world lack identification documents,
either due to forced migration, restrictive legal
environments or simply due to a lack of proper
access to bureaucratic structures, or a fixed
address6
. Lack of identification documents can
lead to exclusions from, or restricted access to,
all manner of critical services, from banking and
housing, to work and even a mobile phone. Digital
ID systems could go some way towards addressing
this, since Digital IDs can theoretically be issued to,
and used by, anyone with even intermittent access
to a mobile phone or the internet. Furthermore,
with the expansion of digital identification attributes,
digital identities can be created in the absence of
certain attributes (postal address, for example) that
are often required for the issuance of a document-
based ID.
Peronsalised services
Services are becoming increasingly personalised
and tailored to individual citizens, service-users and
consumers based on the increasingly sophisticated
collection and analysis of personal data. Digital
ID could play a significant role in this developing
feature of a digital world. In the first instance, Digital
ID could greatly enhance the accuracy with which
service providers can determine who they are
providing services to. But beyond this, Digital IDs
could provide a means for individuals to securely
store vast amounts of personal data of many
different kinds, and selectively share it with (or
temporarily grant access to) service providers, in
exchange for personalised services. This would not
only give individuals greater control over the use of
their personal data, but would incentivise service-
providers to be transparent when it comes to the
collection, analysis and use of personal data.
Privacy
A case is often made that digital ID can enhance
privacy in a data-driven world, by giving citizens
and consumers the ability to have more fine-grained
control over the types of data and information
they share, in different contexts and with different
institutions and service providers. This is certainly
possible, but the claim needs some unpacking,
as the promise of greater privacy depends entirely
on the ways in which digital identity systems are
implemented and controlled.
The UN estimates that more than
1 billion people around the world lack
identification documents,
11. 11
TheFutureofDigitalIdentityAnInitialPerspective
It is beyond the scope of this paper to outline all of
the technical complexities around different ways of
implementing a Digital ID service and/or system.
However, some broad-brush comments on the
implications of different implementation decisions
are necessary.
Security and privacy
The processes by which digital identities are
presented and authenticated digitally will need
to have a high level of security to ensure both
that personal data is kept private, and also that
authentication does in fact foster trust among all
parties in a transaction, that all parties are who
they say they are and have the attributes they say
they have.
Encryption is a given, but there is more than
one way to implement encrypted exchanges of
information, and key decisions will need to be
made over what is (and is not) kept ‘secret’, the
precise moments within a process that encryption
and decryption occur, and the physical locations
in which encryption and decryption are handled.
Different protocols have different implications in
terms of convenience and usability, but also in
terms of both security and privacy. Poorly handled
implementations could lead to catastrophic data
breaches and, potentially, a loss of faith in a provider
of Digital ID services, or perhaps even in the whole
principle of Digital ID. The same may also be true,
for example, of implementations that use a veneer of
security to hide invasions of privacy7
.
Of course, Digital IDs actually have the potential to
provide more security during digital transactions
than their paper-based counterparts. Digital
identities can include identity attributes that
are much harder to mimic or steal (such as AI-
determined behavioural bio-metrics) which can
be used in highly secure authentication protocols
or leveraged in real time to determine suspicious
attempts to use a Digital ID. Furthermore,
transactions involving digital identities can be highly
specific, potentially limiting the data that is at risk of
being exposed. The commonly cited example here
is the use of a Digital ID to prove that a person is
above the legal age required to buy alcohol. During
this kind of transaction, the only data that might
need to be transferred from one party to another,
is a simple affirmation of a specific attribute (i.e.
‘current age is greater than X years’). By way of
contrast, the presentation of a physical form of
identification, such as a driving license, is likely to
expose a far greater amount of personal data, not
least, a precise date of birth8
.
This last point is often used as a start-point for an
argument that using Digital IDs may afford users a
greater degree of privacy in an increasingly data-
saturated world. If users have fine grained control
over the kinds of data attributes that are held within
a digital identity and there is transparency over
precisely the kinds of data that are being shared,
during which transactions, and for what purposes,
the argument goes, then we get greater privacy.
Couple this with new technologies such as zero
knowledge proofs (ZKPs) in which, theoretically,
authentication of certain attributes can happen
without the sharing of any data at all, and we have
the hallmarks of a system that would radically alter
the privacy landscape as it appears today.
Implementation matters
12. 12
TheFutureofDigitalIdentityAnInitialPerspective
There are perhaps two counter arguments:
First, is the question of ‘from whom are we keeping
our data private?’. In the scenario imagined above
- in which a person needs to prove they are over
the legal age required to buy alcohol - it seems
perfectly plausible to see how a Digital ID system
can limit the data that the retailer receives. But what
about the data footprint of the transaction itself?
The fact that the user has used their digital identity
to buy alcohol. Whether this kind of data is kept
private, and from whom, will depend on the digital
identity eco-system and implementation. We could
imagine, for example, that in a highly centralised
digital identity system, there is in fact the potential
for identity ‘keepers’ to gather vast amounts of data
about their users as they deploy their Digital IDs in
myriad social, political and economic contexts. It is
also hard to imagine, at the time of writing, that a
digital identity system rolled out in China, in which
the Chinese government had a key role to play,
would afford its citizens greater privacy.
Second, many of the promises made around Digital
ID are made on the back of data collection, rather
than data minimisation. Personalised services, new
methods of bio-metric authentication, cross-border
interoperability etc. all involve significant amounts of
data capture and storage.
Multiple partners and stakeholders
Any digital identity eco-system is going to require a
number of different stakeholders and partners. Aside
from the users/holders of Digital IDs, we will need:
institutions that can initially collect and verify the
attributes that are going into the ID; institutions and
organisations that can manage the authentication
process across a wide range of contexts; and,
of course, institutions and organisations that will
accept and trust Digital IDs to do the job of ensuring
that entities are who they say they are and have the
attributes they claim to have.
Trust – on a number of levels - is the key factor
here for all parties. There is the question of who
we, as users, trust to collect and verify our identity
attributes, who we trust with the task of keeping
those attributes safe during different types of
interactions and transactions, and who we trust in
terms giving access to our identity attributes. For
organisational or institutional parties in the system
the same questions will apply. For example, which
bodies will be trusted to accurately collect and verify
identity attributes of their users or customers?
Centralised or distributed?
The question of whether a centralised system
for the management of digital identities, or a
de-centralised system, based for instance on
blockchain technologies, is the more preferable,
is still open to debate. A blockchain-enabled or
otherwise distributed implementation might remove
the need for users to place their trust in a single
specific institution, but may also be a barrier to
seeding and developing the wide-spread uptake
and interoperability critical to the development
of a fully functioning digital identity eco-system.
Conversely, more centralised Digital ID systems will
aid the development of an interoperable and widely
accepted eco-system, but require us to ask the
question of which (few) institutions we trust to hold
the keys to our identity; a question which is unlikely
to yield a single or unchanging answer, particularly
when we consider the question in a global context.
There is also a question for the future, around
to what extent users might be able to store and
maintain their own Digital ID on their own devices.
Distributed implementation might
remove the need for users to place
their trust in a single specific institution,
but may also be a barrier to seeding
and developing the wide-spread
uptake and interoperability.
13. 13
TheFutureofDigitalIdentityAnInitialPerspective
Different identities in different contexts
Just as we use different forms of traditional ID to
access different kinds of services, it is possible
to imagine a world in which we come to have
multiple different digital identities too. During the
very first rounds of Future Agenda Open Foresight
discussions in 2010, this insight was writ large with
the use of the phrase ‘Cocktail Identities’.
In a non-digital world, a library card seems
more than enough to ensure we have access to
borrowing books and we might baulk at having
to produce a passport; but we might equally be
unimpressed by a bank that only required us to
produce a library card to prove our identity during
a financial transaction. In a digital space the same
might also be true. A social media identity might be
sufficient to provide access to a community web-
forum, but insufficient to enable us to buy airline
tickets. In this way, it is possible to imagine a world
in which citizens and users have multiple different
Digital IDs that are deliberately separated, rather
than combined, for use in different contexts.
In this scenario, we may well see a proliferation of
Digital ID providers offering different, context-based,
Digital-ID-as-a-service propositions. To some extent
we are already seeing this, with tech providers
(Facebook and Google most prominently) offering
authentication services that can work in a number
of different contexts. What is still missing however,
is the interoperability that could provide users with
the choice of using different Digital IDs for a single
moment of authentication and identification. As an
example, many digital service providers currently
offer users the ability to use a ‘Facebook login’ or
a ‘Google login’, an ‘OpenID’ login or to create a
‘unique login’, but in order to provide these options,
users must be presented with four separate login
forms.
14. 14
TheFutureofDigitalIdentityAnInitialPerspective
Regulation
In keeping with many of the other aspects of
the digital revolution, Digital ID is likely to land
and expand very quickly, with both benefits and
consequences arriving in the wake. Regulators will
almost certainly, and yet again, be faced with the
task of ‘building the aeroplane whilst flying it’. On
the one hand, regulatory approval or mandates
for certain institutions to accept Digital ID could
play the critical role in the development of a Digital
ID system. On the other, regulators will have to
respond to the challenges such mandates create.
These could include:
• Addressing the unique tendency for digital
systems to tend towards monopolies - especially
in a field in which there are a limited number of
players that can deal with the sheer scale of the
task - and therefore the potential emergence of a
Digital ID oligopoly.
• The need to create or address a framework of
rights and responsibilities around Digital ID,
possibly as part of a broader consideration of
digital rights.
• Addressing the question of who pays for the
maintenance of a properly regulated Digital ID
infrastructure.
• Dealing with the regulatory consequences of
emergent Digital ID business models (e.g. stronger
digital privacy laws, rights of redress etc.).
• The need to address political (state) and individual
concerns around data sovereignty and whether
and how valuable data should be kept within
borders in an interoperable Digital ID eco-system.
• The need to establish and maintain common
standards for the purposes of secure and
convenient interoperability.
Adoption
What are the key factors that will drive user and
consumer adoption of a Digital ID system? Will it be
the identification of certain unique use cases that are
so compelling to consumers that adoption is all but
inevitable (e.g. zero-wait time at border crossings,
instant access to government services, etc)? Or
will adoption require regulatory or legal incentive?
Interestingly, private sector organisations often
imagine adoption of new technologies and services
initially taking place at the ‘top of the market’. In the
case of Digital ID, the earliest adopters may well be
nearer the bottom of the pyramid, those who need
to become familiar with Digital ID in order to access
basic needs through government services.
Digital literacy and identity education
Digital literacy is an issue whose prominence is
growing thanks to increasingly stark digital divides
and the lack of transparency that marks the pace
of change in a digital world. A wholesale move
toward Digital ID could be one of the more profound
moments in the shift to a digital life, and may require
it’s own programme of education to teach people
how to maintain their Digital ID, keep it safe from
attack and ensure that it works for them.
What might matter even more
In the case of Digital ID, the earliest
adopters may well be nearer the
bottom of the pyramid, those who
need to become familiar with Digital ID
in order to access basic needs through
government services.
Regulators will almost certainly, and
yet again, be faced with the task of
‘building the aeroplane whilst flying it.’
15. 15
TheFutureofDigitalIdentityAnInitialPerspective
It is safe to assume that our collective futures will
involve digital identity. The exact form and function
of the digital identities we make use of may vary
from institution to institution, individual to individual
and organisation to organisation, but the case for
digital identity is surely too strong now to ignore. As
ever more of the transactions and exchanges that
comprise human social life migrate to connected
digital worlds and spaces, more fragments of our
selves must surely follow suit.
In this paper we have highlighted a number of
the drivers that are likely to take us to a world in
which digital identity is commonplace, and have
introduced a number of different concepts and
facets of digital identity that provide the basis for
thinking about the future of Digital ID, and a future
world in which Digital ID plays a key part. As a
provocation then, it might be worth thinking through
some of the potential future pathways and shifts
that could come about.
You are what you eat
One of the potential upsides of digital identity is
enhanced security through the development of
new kinds of identity marker. The mainstreaming
of the uses of bio-metrics such as voice and facial
recognition, fingerprints and iris scanners are the
first step along this road, but with the growing
capabilities of AI-driven pattern recognition,
and a steadily rising stream of personal data
in which to recognise patterns, new forms of
behavioural fingerprinting are likely to emerge.
These might simply be more kinds of physical bio-
metric fingerprints, such as the unique pattern of
pressures we apply to a keyboard as we type, or
the idiosyncratic ways in which we tap on a mobile
phone screen or move a cursor around, but there
is also the possibility that we present other kinds of
unique fingerprints in behaviours that look more like
cultural or social behaviours; our ‘routines’, if you
like. These might include things like the times we get
up each morning, who we speak to and when, or
the kinds of food we chose to eat at different times
of different days. We are still in the early days of
learning about what makes us unique.
The use of these kinds of identity attributes may be
very useful in terms of detecting fraud, especially
where AI can be used to detect subtle changes
in behavioural patterns. But their emergence will
need to be managed carefully. Human history is
littered with examples of the use of identity markers
such as ethnicity, religion, or gender, to structure
systematic programmes of exclusion, violence and
discrimination. With the emergence of new kinds
of identity attributes, we are likely to see new kinds
of bias and discrimination based on previously
unimaginable points of differentiation.
“I can tell from your voice harmonics, Dave, that
you’re badly upset. Why don’t you take a stress pill
and get some rest?”
Hal 9000, “2001: A Space Odyssey”, Arthur C.
Clarke, 1968
Fake ID
It would be naïve to imagine that any digital identity
system will be immune to abuse. Fake ID, long the
goal of every would-be alcohol-drinking teenager
along with other bad actors seeking access to
services they would not normally be allowed to
access, is bound to play a part in any system of
digital identification. Fake ID could manifest in two
ways: 1) Entirely fake digital identities that bear no
relation to any real entity, and 2) Authentic digital
identities augmented with fake attributes. As with
all digital manifestations of physical world problems,
the particular problem with fake digital ID, is scale.
Where once a fake passport would only really be
used in a single context at any given moment, fake
digital IDs have the potential to be used in hundreds
of different contexts at the same time, scaling up the
consequences in kind.
Future directions
Fake digital IDs have the potential
to be used in hundreds of different
contexts at the same time, scaling up
the consequences in kind.
16. 16
TheFutureofDigitalIdentityAnInitialPerspective
Null attributes
We currently live in a world of data breaches. At
the time of writing, Facebook is reporting a breach
in its digital identity and authentication system
potentially affecting 90 million users, but whenever
this paper was produced, it is likely that there would
have been news of a recent data breach of similar
scale to point to. Many of these breaches involve
sensitive personal information of the kind that we
would otherwise assume to be critical components
of any digital identity and authentication system.
Some data breaches leave us with more serious
consequences than others when thinking about the
future of Digital ID, and three in particular leap out in
this regard: the Equifax data-breach that contained
detailed financial histories and credit scores9
, the
US government’s Office of Personnel Management
(OPM) data breach which contained detailed
employment histories, social security numbers and
even fingerprint scans10
, and the ComElec breach
of voter registrations in the Philippines. In each of
these cases, highly sensitive information of exactly
the kind upon which digital identity systems might
be built was stolen and leaked. In the case of OPM,
this even involved bio-metric data. This raises a
possible future scenario in which certain identity
attributes we currently understand to be essential,
could become unusable or ‘null’ with regard to a
digital identity eco-system.
Re-evaluation of cyber-risk
Breaches to digital identity systems have the
potential to be far more catastrophic than any
previously seen data breaches. This may cause
organisations to re-evaluate the idea of ‘acceptable
risk’ with regard to cyber-security.
Stateless netizens
As digital identities evolve, collecting different kinds
of attributes and providing access to services in
a globally networked system of service provision,
it is possible that certain people could begin to
see their digital identity as more important than
their citizenship of states. We are likely to see new
networks of individuals bound together by shared
identity attributes (some of which may be entirely
new) coalescing into new kinds of polity and
mutual organisation. Early manifestations of this
phenomenon are likely to emerge from among the
millions of migrants and refugees being displaced,
and effectively rendered stateless, around the world.
The battle for ownership
Around the world, state actors, private actors and
individuals all have an interest in having a controlling
hand in a digital identity eco-system. We can
expect to see a battle for ‘ownership’ of the identity
space in which competing interests are driven
to the forefront of identity debates e.g. data for
social good, data-driven innovation and economic
opportunity, rights to privacy, national security, social
order and control etc. Powerful voices are already
beginning to emerge in this space (such as the
Electronic Frontier Foundation), alongside newer
players such as Hu-manity11
, and many others.
New digital worlds
It is relatively easy to imagine how we will make
use of digital identities in the connected world of
today, with an internet largely defined by online
accounts and online retailers. It is harder to imagine
how digital identities will be made use of in the new
digital spaces provided by technologies such as
virtual reality and augmented realities. For example,
augmentations to digital identities might involve
3-dimensional avatars that represent different
aspects of our digital identity.
Breaches to digital identity systems
have the potential to be far more
catastrophic than any previously seen.
17. 17
TheFutureofDigitalIdentityAnInitialPerspective
Assertion of new digital rights
As digital identities collect and accumulate
attributes, we will need to think hard about the
right to be forgotten, the right to change and
the right to delete. It is not hard to imagine, for
example, somebody wanting to have their gender
re-assigned, and that might be a relatively trivial
thing to change within a digital identity. But what
if that person also wanted any previous record of
their originally-assigned gender removed from their
identity?
Data-less business models
Innovations in AI and new ways of allowing access
to data without actually sharing data, may lead to
the development of new kinds of business model
in which service providers are able to leverage
the data contained in digital identities to provide
sophisticated and personalised services, without
actually collecting and storing it themselves. This
‘data-less’ business model will likely be used
as a positive, privacy-preserving, proposition to
consumers.
A bi-furcated digital realm (or ‘many internets’)
It is highly likely that many of the questions and
possibilities we raise in this paper will not lead to a
single outcome, or single global solution. Instead
we may see the internet split into different realms.
They might be defined by, for example: an open-
internet in which standards reach across the globe,
public services, mainstream services and open
civic digital spaces are protected and verified by
widespread use of Digital ID; a dark internet in
which Anonymous IDs, distributed data storage
and encrypted connections and transactions are
the norm; island internets, with localised Digital
ID systems, defined by a lack of interoperability
with other connected systems, but which provide
connectivity internally.
Super-surveillance
It is a near certainty that in certain states, and
certain market-economies, the potential for Digital
IDs to give highly accurate and relatively clean
surveillance data, will lead to mass surveillance by
those who see an advantage in doing so. China’s
much talked-about ‘Social Credit Score’ is surely
the first example of one potential outcome of
super-surveillance that could result from certain
implementations of Digital ID i.e. social control12
,
other potentially dystopian outcomes might include
‘Digital ID slavery’ in which our Digital ID and that
data it contains is used to deliver services to us,
which in turn reinforce the data within our Digital
ID, in a feedback loop that would be very difficult to
break free from.
New Digital ID markets
Digital ID has the potential to play a critical role in
social and economic life. A whole new range of
economic opportunities could emerge around it.
This might include:
• Bio-metric attribute specialists
• ID-AI (the development of AI-driven ID
services such as pattern-recognition, intelligent
interoperability are likely to proliferate)
• Digital ID managers (builders, cleaners, enhancers etc.)
• Digital ID insurance providers
• And many more…
Privacy reclaimed
Many potential future pathways for Digital ID seem
dystopian, but Digital ID also has the potential
to reinsert control, at least in certain contexts,
of the data we all generate. New encryption and
authentication protocols, alongside local-AI and
data management technologies may allow us
to simultaneously unlock the power of our data
and keep it private, leading to a world in which
the promotion of the private individual re-asserts
itself as an attractive economic and social option
for consumers, citizens, and profit-driven service
providers alike.
18. 18
TheFutureofDigitalIdentityAnInitialPerspective
Given the emergence of and expected pace of
change surrounding digital identity, organisations,
governments and their advisors are readying
themselves. While some of the key shifts ahead are
likely to have short-term impact, others may have a
longer gestation. There are a number of emerging
questions for many participants to consider. These
include:
1. What are the key factors that will drive user and
consumer adoption of a Digital ID system? Over
what time frame? What key triggers must occur
to ensure successful, significant adoption?
2. How should we establish and maintain common
standards for the purposes of secure and
convenient interoperability of digital identity?
3. How best to address political (state) and
individual concerns around data sovereignty and
whether and how valuable data should be kept
within borders in an interoperable digital identity
eco-system?
4. What ethical considerations, must we consider
now, as opposed to after the ‘horse has bolted’
with regards to digital identity systems?
5. Which bodies will be trusted to accurately
collect and verify identity attributes of their users
or customers?
6. Who will pay and how?
7. How will we ensure that privacy is appropriately
maintained?
8. How can we adequately ensure that we don’t
create increased opportunity for still greater and
more damaging data breaches?
9. How can regulators usefully keep ahead of the
coming digital wave to support innovation and
protect the market?
10.How, when and who creates a framework of
rights and responsibilities around Digital Identity,
possibly as part of a broader consideration of
digital rights?
11.What is required to help people understand how
to maintain their digital identity, keep it safe from
attack and ensure that it works for them?
12.Are we doing enough to ensure that data seen
as unique today (e.g. fingerprints), remains
as such going forward and does not become
compromised through rogue actors?
Emerging questions
20. 20
TheFutureofDigitalIdentityAnInitialPerspective
This ‘initial perspective’ is intended to provide a
provocation for discussion. We hope that it provides
a point of departure for a meaningful conversation
between different stakeholders about the future of
digital identity, how it might develop and its role and
value in society.
We would welcome your feedback and contribution
to help build a richer view.
In addition, we are also undertaking a set of 5 expert
workshops across 4 continents in Q4 2018 (London,
Singapore, Sydney, San Francisco and Brussels).
If you would be interested in joining please do get in
touch via james.alexander@futureagenda.org
Next - Building a broader
perspective
22. 22
TheFutureofDigitalIdentityAnInitialPerspective
Contact details
To discuss this project further please get in touch
Dr Tim Jones
Programme Director
Future Agenda
tim.jones@futureagenda.org
www.futureagenda.org
+44 780 1755 054
@futureagenda
References
1
For a more detailed study of the mechanisms and consequences of cyber-crime see “Into the web of profit” (McGuire,
2018) https://www.scribd.com/document/377159562/Into-the-Web-of-Profit-Bromium-Final-Report
2
This article provides a thorough account of the implementation of the Aadhar national ID system and its weaknesses
https://www.eff.org/deeplinks/2018/02/can-indias-aadhaar-biometric-identity-program-be-fixed
3
For more detail see https://assets.publishing.service.gov.uk/media/57ac9667e5274a0f6c00007a/retail-banking-market-
investigation-full-final-report.pdf
4
http://www3.weforum.org/docs/WEF_A_Blueprint_for_Digital_Identity.pdf
5
For a more detailed discussion of the concept of interoperability in relation to Digital ID, see https://cyber.harvard.edu/
interop/pdfs/interop-digital-id.pdf
6
http://www.undp.org/content/undp/en/home/blog/2017/6/1/Moving-towards-digital-technology-for-legal-identity.html
7
An example of this might be the recent revelation that Facebook has been using data provided by users for the express
purpose of enhancing security, to deliver targeted advertising. https://gizmodo.com/facebook-is-giving-advertisers-
access-to-your-shadow-co-1828476051
8
For far more detail, see http://www.dgwbirch.com/words/books/identity-is-the-new-money.html
9
https://krebsonsecurity.com/2017/09/breach-at-equifax-may-impact-143m-americans/
10
https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/
https://www.theguardian.com/technology/2016/apr/11/philippine-electoral-records-breached-government-hack
11
https://hu-manity.co/who-we-are/
12
https://en.wikipedia.org/wiki/Social_Credit_System It is worth remembering that much about the social credit system is
shrouded in secrecy, and therefore guesses about how it will work and what it will mean remain just that for the time being.