SlideShare a Scribd company logo
Trust and Inclusion
7th Academics and Practitioners Roundtable
The Information Architecture Conference
March 13-14, 2019
Noreen Whysel
What Is Trust?
Trust is relational
Throughout history, Trust has always been
● Contractual
● Relational
● Emotional
● Transactional
● Easy to revoke, hard to reinstate
Rules of Interpersonal Trust Are Complex
Digital Trust is Transactional
In digital systems, Trust is
● Contractual
● Transactional
● Instantaneous
● Easy to revoke and to reinstate
Rules of Digital Systems Are Less Complex
How About Inclusion?
Inclusion Is Both Among and Different
Trust and inclusion go hand in hand
● Without trust, a service provider will not provide
service.
● Without trust, an individual will neither ask for nor
receive needed services.
● Without services, vulnerable individuals are at risk.
What Are the Credentials Of Vulnerable Populations?
Who Are Vulnerable
Individuals?
Who Are Vulnerable?
● Children
● Women
● Minorities
● LGBT+
● Immigrants/Refugees
● Homeless
● Disabled
● Mentally Ill
● Unemployed
● Incarcerated/Formerly incarcerated
● Aged
We All Have Some
Experience With
Vulnerability
Contexts of Vulnerability
● Registering for welfare benefits
● Online dating
● Accessing healthcare
● Applying for a passport or driver’s license
● Registering to vote
● Registering for the military
● Etc.
Context may be very different if you are a minor, an immigrant or refugee
or a member of another unprotected class
How Do I Know Who
You Are?
Trusting Digital Entities
● Attributes
● Identifiers
All digital entities (users, service providers and relying
parties) have identifiers composed of attributes
Handling of Attributes May Be Governed by Law
Example: Personally identifiable information or PII is
information that, alone or in combination, can be used to
trace a person’s identity. PII risk is contextual.
Digital ID
A digital ID is used to authenticate individuals.
The authentication process collects data and matches it
against attributes connected to the ID.
This might be a name, birthdate, Social Security Number,
password, biometric data or it may require a second factor
authentication external to the system.
Authentication is a result of an algorithm (rules) for
matching an ID to an authenticated User.
Three components of Digital Trust
● Data Source: Where is the data from? Who else knows it?
● Coding: How is it coded? Does it recognize alternative
categories or attributes?
● Device: What device is reading it?
Vulnerable Populations have Low identity assurance Often
because they don’t have credentials that match coded
categories or attributes
How Do You Know Who
They Are?
Who Authenticates the Service?
Identity Service Provider: Do you know what data they
collect on you?
How do they protect you from:
● Phishing: Do you know if the entity collecting your data
is who they say they are?
● Identity Theft: How easy is it to access and use your
data?
● Transfer: Is your data being sold to third parties?
Is the Identity Provider Regulated? How Is Your Data Protected?
Future Opportunities
Blockchain ID
“The humanitarian community exists in a bubble, so access to an existing
community of experts and new technologies to help us better serve communities
in crisis is an amazing opportunity,” said Nathan Cooper, Senior Adviser at
Red Cross.
“We hit the realization that we can no longer do this with a spreadsheet and
beneficiary ID cards. We need something more sustainable, something people can
establish, create, hold, and access their identities. It brings dignity,
choice and economic stimulus to the local markets where humanitarian aid is
needed,” said Caroline Holt, head of global cash distribution, Red Cross.
Trustmarks and Ratings
● Regulations: FINRA, HIPPA, COPPA, GDPR
● National Institute for Standards and Technology 800.63
● Consumer Reports
● Identity Ecosystem Framework: idefregistry.org
● RDR Corporate Accountability Index:
rankingdigitalrights.org
● Trustable Technology Mark (IoT): trustabletech.org
Bibliography
Identity Ecosystem Steering Group, IDESG.org
IDESG, Vulnerable Populations,
https://wiki.idesg.org/wiki/index.php/Vulnerable_Populations
GSA Privacy Program, Rules and Policies Protecting PII,
http://gsa.gov/reference/GSA-privacy-program/rules-and-polic
ies-protecting-pii-privacy-act
THANKS!
@nwhysel

More Related Content

Similar to Trust and inclusion

How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
Hellmuth Broda
 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdf
milewits415
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
Kavitha Gupta, CIPP-Asia
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
ssuser264cc11
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
Future Agenda
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
Future Agenda
 
GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...
CharityComms
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
Darrell O'Donnell
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
Noreen Whysel
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
Laura Bell
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Burton Lee
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
Arianto Muditomo
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
Future Agenda
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
MicheleNati
 
Cyber security
Cyber securityCyber security
Cyber security
Shagun Rathore
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
Quatrro Processing Services (QPS)
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 

Similar to Trust and inclusion (20)

How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
ID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdfID Cards and Privacy- Balancing Security and Personal Information.pdf
ID Cards and Privacy- Balancing Security and Personal Information.pdf
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...GDPR – an opportunity for engagement and growth? | The future of engagement c...
GDPR – an opportunity for engagement and growth? | The future of engagement c...
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 

More from Noreen Whysel

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Noreen Whysel
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer Development
Noreen Whysel
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
Noreen Whysel
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdf
Noreen Whysel
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdf
Noreen Whysel
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gateways
Noreen Whysel
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...
Noreen Whysel
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Noreen Whysel
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
Noreen Whysel
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018
Noreen Whysel
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon Entry
Noreen Whysel
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer Development
Noreen Whysel
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a difference
Noreen Whysel
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in Wikipedia
Noreen Whysel
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thon
Noreen Whysel
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning Gateway
Noreen Whysel
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving Performance
Noreen Whysel
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open Source
Noreen Whysel
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Noreen Whysel
 
DH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionDH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as Exhibition
Noreen Whysel
 

More from Noreen Whysel (20)

Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptxInformed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
Informed Consent-Are Your Participants-Aware-o- What-They-Share.pptx
 
User Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer DevelopmentUser Experience Research: Deriving Insights for Customer Development
User Experience Research: Deriving Insights for Customer Development
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
 
IAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdfIAC21: Shedding Light on Dark Patterns.pdf
IAC21: Shedding Light on Dark Patterns.pdf
 
Consumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdfConsumer Views on Respectful Technology.pdf
Consumer Views on Respectful Technology.pdf
 
Information architecture for science gateways
Information architecture for science gatewaysInformation architecture for science gateways
Information architecture for science gateways
 
How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...How to Create and Maintain an Effective Information Architecture and Navigati...
How to Create and Maintain an Effective Information Architecture and Navigati...
 
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
Finding Empathy for Your Future Self: UX User Researchers Meetup April 4, 2018
 
Kantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID SummitKantara Orientation for CARIN Digital ID Summit
Kantara Orientation for CARIN Digital ID Summit
 
Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018Preserving Performance at DHWEEK 2018
Preserving Performance at DHWEEK 2018
 
Journey App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon EntryJourney App: Empathy Jam 2017 Hackathon Entry
Journey App: Empathy Jam 2017 Hackathon Entry
 
SLP 2018 Customer Development
SLP 2018 Customer DevelopmentSLP 2018 Customer Development
SLP 2018 Customer Development
 
Dreams, resilience and making a difference
Dreams, resilience and making a differenceDreams, resilience and making a difference
Dreams, resilience and making a difference
 
Diversity and Inclusion in Wikipedia
Diversity and Inclusion in WikipediaDiversity and Inclusion in Wikipedia
Diversity and Inclusion in Wikipedia
 
IA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thonIA Wikipedia Edit-a-thon
IA Wikipedia Edit-a-thon
 
Creating a Collaborative Learning Gateway
Creating a Collaborative Learning GatewayCreating a Collaborative Learning Gateway
Creating a Collaborative Learning Gateway
 
Prelude 16: Preserving Performance
Prelude 16: Preserving PerformancePrelude 16: Preserving Performance
Prelude 16: Preserving Performance
 
Mentoring Women in Open Source
Mentoring Women in Open SourceMentoring Women in Open Source
Mentoring Women in Open Source
 
Pinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, AtlantaPinterest as Digital Archive, IA Summit 2016, Atlanta
Pinterest as Digital Archive, IA Summit 2016, Atlanta
 
DH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as ExhibitionDH Week Workshop: Pinterest as Exhibition
DH Week Workshop: Pinterest as Exhibition
 

Recently uploaded

Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 

Recently uploaded (20)

Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 

Trust and inclusion

  • 1. Trust and Inclusion 7th Academics and Practitioners Roundtable The Information Architecture Conference March 13-14, 2019 Noreen Whysel
  • 3. Trust is relational Throughout history, Trust has always been ● Contractual ● Relational ● Emotional ● Transactional ● Easy to revoke, hard to reinstate Rules of Interpersonal Trust Are Complex
  • 4. Digital Trust is Transactional In digital systems, Trust is ● Contractual ● Transactional ● Instantaneous ● Easy to revoke and to reinstate Rules of Digital Systems Are Less Complex
  • 6. Inclusion Is Both Among and Different
  • 7. Trust and inclusion go hand in hand ● Without trust, a service provider will not provide service. ● Without trust, an individual will neither ask for nor receive needed services. ● Without services, vulnerable individuals are at risk. What Are the Credentials Of Vulnerable Populations?
  • 9. Who Are Vulnerable? ● Children ● Women ● Minorities ● LGBT+ ● Immigrants/Refugees ● Homeless ● Disabled ● Mentally Ill ● Unemployed ● Incarcerated/Formerly incarcerated ● Aged We All Have Some Experience With Vulnerability
  • 10. Contexts of Vulnerability ● Registering for welfare benefits ● Online dating ● Accessing healthcare ● Applying for a passport or driver’s license ● Registering to vote ● Registering for the military ● Etc. Context may be very different if you are a minor, an immigrant or refugee or a member of another unprotected class
  • 11. How Do I Know Who You Are?
  • 12. Trusting Digital Entities ● Attributes ● Identifiers All digital entities (users, service providers and relying parties) have identifiers composed of attributes Handling of Attributes May Be Governed by Law Example: Personally identifiable information or PII is information that, alone or in combination, can be used to trace a person’s identity. PII risk is contextual.
  • 13. Digital ID A digital ID is used to authenticate individuals. The authentication process collects data and matches it against attributes connected to the ID. This might be a name, birthdate, Social Security Number, password, biometric data or it may require a second factor authentication external to the system. Authentication is a result of an algorithm (rules) for matching an ID to an authenticated User.
  • 14. Three components of Digital Trust ● Data Source: Where is the data from? Who else knows it? ● Coding: How is it coded? Does it recognize alternative categories or attributes? ● Device: What device is reading it? Vulnerable Populations have Low identity assurance Often because they don’t have credentials that match coded categories or attributes
  • 15. How Do You Know Who They Are?
  • 16. Who Authenticates the Service? Identity Service Provider: Do you know what data they collect on you? How do they protect you from: ● Phishing: Do you know if the entity collecting your data is who they say they are? ● Identity Theft: How easy is it to access and use your data? ● Transfer: Is your data being sold to third parties? Is the Identity Provider Regulated? How Is Your Data Protected?
  • 18. Blockchain ID “The humanitarian community exists in a bubble, so access to an existing community of experts and new technologies to help us better serve communities in crisis is an amazing opportunity,” said Nathan Cooper, Senior Adviser at Red Cross. “We hit the realization that we can no longer do this with a spreadsheet and beneficiary ID cards. We need something more sustainable, something people can establish, create, hold, and access their identities. It brings dignity, choice and economic stimulus to the local markets where humanitarian aid is needed,” said Caroline Holt, head of global cash distribution, Red Cross.
  • 19. Trustmarks and Ratings ● Regulations: FINRA, HIPPA, COPPA, GDPR ● National Institute for Standards and Technology 800.63 ● Consumer Reports ● Identity Ecosystem Framework: idefregistry.org ● RDR Corporate Accountability Index: rankingdigitalrights.org ● Trustable Technology Mark (IoT): trustabletech.org
  • 20. Bibliography Identity Ecosystem Steering Group, IDESG.org IDESG, Vulnerable Populations, https://wiki.idesg.org/wiki/index.php/Vulnerable_Populations GSA Privacy Program, Rules and Policies Protecting PII, http://gsa.gov/reference/GSA-privacy-program/rules-and-polic ies-protecting-pii-privacy-act