• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Identitification

Identity and personal control on horizon in web 2.0 2009 predictions

Kaliya Young · December 11, 2008 · 2 Comments

Mary Hodder is one of the 8 experts Fast Company tapped to predict evolutionary trends for web 2.o in 2009:

Mary Hodder, Founder of Dabble.com and VP of Product Development, Apisphere
“The future of social media is user’s owning their data, deciding who to send it to. Look for more companies that currently host the user’s identity to have less control over that, as things like Open ID take over and more companies try to compete by giving users more control over themselves. Look for ways users can own their own data, and companies that might offer that, sort of like a personal information bank. The changes may seem subtle but I think we’ll see companies now, like Facebook, who try to be everything to you: your bank account for info, your identity, your tools for publishing, and your bar/restaurant for socializing, having to give up some of those roles or hold them less powerfully. And I don’t think it’s natural for one company to hold all that power. It leaves you with very little control over your online self.
Of course, Facebook will fight this to the last, so they won’t be the first to give up some of this control. Others will and eventually to compete Facebook will follow. But they are the great example of the problem.
The other big change will be in companies finally building for revenue in the social and any other space online, as they build for growth in their free or social products.”

She is clearly pointing to emergence of Vendor Relationship Management tools and also the possibility of information card technologies that give users more control along with OpenID and OAuth that are linking web 2.0 services. She highlights the ‘business model’ issue that still has not been figured out for social networks or for identity technologies. We are hoping to address some of this at a special session of Internet Identity Workshop focused just on business models this winter.
It should be noted that 5/8 experts tapped were women the other 4 are Charlene Li, Rebecca Moore, Susan Mernit & Tara Hunt.

Cybersecurity report covers Identity

Kaliya Young · December 9, 2008 · Leave a Comment

Lucy Lynch posted this “The CSIS Commission on Cybersecurity for the 44th Presidency ” to the ID-Legal e-mail list.
We are actually going to discuss it on our upcoming call along with figuring out our steward to Identity Commons. Lucy and I will be spending 2 days at the end of December face to face in Eugene planning strategy/execution/deliverables around having at least event in DC this winter/spring before the next IIW.
The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, “Securing Cyberspace for the 44th Presidency.” The Commissions three major findings are:
1. Cybersecurity is now one of the major national security problems facing the United States;
2. Decisions and actions must respect American values related to privacy and civil liberties; and
3. Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.”
There is a section on: Identity Management for CyberSecurity (page 67) that folks will want to read. CSIS is a Washington think tank, so this
is only advisory, but interesting to see some old models coming around again.
“CSIS was launched at the height of the Cold War, dedicated to the simple but urgent goal of finding ways for America to survive as a nation and prosper as a people. During the following four decades, CSIS has grown to become one of the nations and the worlds preeminent public policy institutions on U.S. and international security.”

Finding Identity Projects in unexpected places

Kaliya Young · October 18, 2008 · 2 Comments

Two weekends ago I was in Austin Texas for the 4th National Coalition for Dialogue and Deliberation Conference. They hold their conference every 2 years and I have attended that last two. What was surprising this time was I actually found identity projects in the wild. I met Lou and Wayne (Lou is wearing black so he is from NY – Wayne is wearing the uniform from DC a suit ad tie.)
IMG_1373.JPG
Lou is working on CivicID (a project of Gateway to gov)- they do 3rd party constituent validation. The plan right now is to issue OpenID’s that can be used on different services. Because they get third party validation the idea is that legislators will listen to electronic communication more because they know it is from actual constituents. I asked if they would be issuing claims based information cards and he said yes they would get to that.
Wayne is working on the OPen Forum Foundation their first Project is to address communication difficulties between:
* Constituents: Are you happy with your ability to communicate with your elected officials and the people who make the decisions about your world?
* Government decision-makers and staff: Are you able to handle the inflow of emails, faxes, and phone calls from constituents and respond in the way that you would like?
* Advocacy Groups: Do you find it easy to express the voice of your members to their elected officials in a way that gets heard and is productive?
Two years ago I was at NCDD talking to the online deliberation guys explaining identity – this time there were several projects that all were aware of it at least.
Practical Evolution – this has gone through several evolutions and is being used in Australia.
Intellitics – Tim Bomans Company is working on Zilino
DeepDebate.org a project lead by Lucas Ciof is working on a system to help dive into different
Idealogue Inc. by Noam Shore is also doing online tools for civic engagement.
It was quite exciting to see all this activity Tim Erickson has a post on his blog with videos about three of them.
I had dinner both Friday and Saturday night with the tech guys 🙂 – (Yes the first night I was the only woman at dinner and the second night one of two) I am hoping several of these guys come to IIW and share what they are working on.
Today I am headed to the Open Sustainability Network Camp and tomorrow to Bioneers (a conference I have been attending since 1999). I am hoping that I will be pleasantly surprised at both to find people doing interesting identity projects in the field.
I came to this field from a civil society perspective via my work with Planetwork. This does not mean however that I am anti-business or don’t care about the needs of large enterprises in this space. In the last several years I have come to appreciate how fundamentally essential their role is in making any of the original idealistic “user-centric” vision articulated in places like the ASN Paper happen. I also don’t think that business alone can get this layer to happen and without civil society engagement or uses it will take much longer. It is most definitely a both-and situation rather then an either-or.
I have often chosen to speak to the civil society perspective when I am in the community. There are already so many people who work at large enterprises and thinking about the business models. Perhaps this was a mistake because it may not be obvious how much I care about the business side of things. I CARE about it AND it is not all that matters. I am hoping in the next while to invite more people working day to day in the nonprofit, social and environmentally responsible business sector, advocacy groups and others to become more involved in the identity community. My finding of the projects at NCDD doing identity shows there is now a wider understanding of the use for identity and people beginning to experiment with application.

Identity – poem found in film.

Kaliya Young · October 11, 2008 · Leave a Comment

I have often thought about how my work in this field has made me look at the world differently – I almost always have “identity” glasses on. I notice how people use the word. I notice when people talk about authentication and authorization, validation, verification and enrollment (often mixing all those all together or calling one something else).
Today I am watching a random Netflix movie that came (I have not been shepherding my que very well) It is called Notebook on Cities and Cloths – it is about a Japanese fashion designer. To my surprise it is opening with a poem by the film maker Wim Vinders – part way through well it turned to identity ….

“Identity”…
of a person,
a thing,
a place.
“Identity”.
The word itself gives me shivers.
It rings of calm, comfort, contentedness.
What is it, identity?
To know where you belong?
To know your self worth?
To know who you are?
How do you recognize identity?
We are creating an image of ourselves,
we are attempting to resemble this image…
Is that what we call identity?
The accord
between the image we have created
of ourselves
and … ourselves?
Just who is that, “ourselves”?
We live in the cities.
The cities live in us…
time passes.
We move from one city to another,
from one country to another.
We change languages,
we change habits,
we change opinions,
we change clothes,
we change everything.
Everything changes. And fast.
Images above all.

the recitation shifts into prose continues over the film as it begins….

On Identity and Collaboration

Kaliya Young · September 24, 2008 · Leave a Comment

The article that Martin Richards was working about OpenID at the last IIW was finally published in Infomation Week One Web, One WebID. It summarized the confusion in the market well. My dad – who knows nothing about the space summarized the article well (the capital letters are his)

From the article it looks like there is quite a way to go before there is a more secure system that is both WIDELY adopted and VERY secure to everybody’s satisfaction.

I say in the article I am ever optimistic about things becoming clear and harmonized

All of these plans will one day fit together, says Kaliya Hamlin, a freelance identity consultant who organizes the biannual [sic] Internet Identity Workshop and maintains a primary hub for the identity community. At the moment, however, at least to the layman, they form a bewildering jigsaw with lots of unconnected pieces and no unifying design.

I also know that markets and communities are not things you control. We can bring order to this space and I hope to continue to do so with my efforts in this community.
I was thinking about about the evolution of the community and the world-view/cultural differences that we have among us. I went back to surf through some of what Meg Wheatly had online to see if there was something that captured the essence of the model of organization we are working with. I thought with her experience coming from the corporate sector and doing organizational development work in large fortune 500 companies and her research into now living systems work she might have some words that articulate the essence of what we are doing with this model.
These few lines particularly jumped out at me form this interview with her:

The real eye-opener for me was to realize how control and order were two different things, and that you could have order without control… To understand order that arises, rather than order that is imposed through direction and control — that is a very significant new path.

I realized that was what we were doing with the Identity Commons organizational model – supporting the emergence of order rather then trying to control what happens. The question we are trying to solve how to have an identity layer/framework/social norms/standards for the internet and other digital systems is a HUGE and complex problem. It has not been solved by control and won’t be. However creating a space for order and clarity to emerge – for self organizing around different ideas, ways of doing things – and resourcing collaboration, cooperation and harmonization efforts WILL get us there faster then not having that space.
The process of articulating to the community – what you want to do – and how you want to do it – this creates accountability. This helps us see ourselves and what is going on in the community through the simple light weight formal processes and with these processes order emerges.
From the conversation today I articulated some further clarity. The whole point of having a loose collaborative space with a shared brand is to support stuff innovating not having the big corporations playing in the space approve every use of the Brand.
It is to support ideas bubbling and percolating and not feeling like one group or company needs to control that other group over there does or might do in the name of the organization.
In a group/organization agreeing to participate in Identity Commons, that group is making a commitment to collaborate and share information. Agreeing to participate one does not have to “AGREE” to all uses of the brand. In fact THE BRAND IS ABOUT THE COMMITMENT TO COLLABORATION and sharing along with a “meta’ out there future vision we do agree on but as we struggle to get there we KNOW we will might not agree. What we do agree on is a shared set of VALUES that are striving to be part of the technologies being built along with a recognition that as technologists that there is a scope and dimension of identity that goes well beyond “tech” because it is about people and our social nature.
Identity Commons was founded to provide this kind of support for a community of collaborating projects across a range of disciplines and not to be an industry trade association or a technical standards body.

Net Squared Talk about Identity

Kaliya Young · June 3, 2008 · 2 Comments

Last week I presented at the Net Squared Conference they have a focus on ‘remixing the web for social change’ – it was fun to be invited to speak at the event by the “Jon Steward Famous” Susan Tenby – (she was on the show for her testimony in front of congress about her role as the head of the Nonprofit Commons in Second LIfe – in her testimony she said her Avatar name Gliteractitca Cookie – and well this fun identity fact was what got her on John Stewart).


SlideShare | View | Upload your own
There was great live bloging coverage of my on the Net Squared blog posted by Brenda that you can read along with while you watch.

Identity Futures Dinner in South Bay Tonight

Kaliya Young · May 28, 2008 · Leave a Comment

Sorry for this late notice on the blog but I just figured out where we are eating.
At the Internet Identity Workshop 2 weeks ago one of the session was about the Identity Futures work that we started last fall. We went over the events that we developed – see here.
John Kelly my collaborator developing them and those exercises couldn’t make IIW and we had a corum of folks who were in centered in the South Bay so we are having a meeting this evening over indian food to talk about next steps for this work.
If you are interested in this you are most welcome to attend. We are meeting at
We are meeting at 6 PM at Heritage of India 167 S Main St, Milpitas, CA 95035
PLEASE RSVP to me kaliya (at) Mac.com

Identity Talk at Net Squared Year Three

Kaliya Young · May 27, 2008 · Leave a Comment

Here are the relevant links from my talk on Identity at Net Squared.
US, Our Organizations and The Web: Leveraging Identity Tools for Collaboration

Why is user-centric Digital Identity Important?
Augmented Social Network: Building Identity and Trust into the Next Generation Internet 2003, Ken Jordan, Jan Hauser, Steven Foster.
OpenID
OpenID
Data Linking
Standards
XRI Wikipedia at OASIS
XDI Wikipedia at OASIS
Companies
Strong Eye
Kintera & XDI
GoLightly
ooTao

i-cards
Identity Blog – Kim Cameron MSFT Identity Architect
Higgins Project at Eclipse
OSIS – Open Source Identity Systems (interop work with over 50 companies and projects)
Vendor Relationship Management
Project VRM at the Berkman Center, Harvard
Collaboration Community for the Evolving Identity and Relationship Layer
Identity Commons

EVENTS I INVITE YOU TO
Vendor Relationship Management Workshop
July 10-12, Boston
Internet Identity Workshop #7
November 10-12, Mountain View
Data Sharing Summit #3
September?

BONUS RESOURCES

Identity Community Foundational Resources
Laws of Identity
OECD Paper: At the Crossroads: Personhood and Digital Identity in the Information Society

Additional White Papers of Interest
Accountable Net: Peer Production of Internet Governance
Appropriating Technology for Social Change
Movement as Network
Network Centric Advocacy 2003
Simple Open Standards you can adopt now
OAuth
Microformats
XRDS – Simple
Open Social

Identity Commons Q1 2008 Report. DONE!

Kaliya Young · April 24, 2008 · Leave a Comment

I am excited that our second set of “official” quarterly reports as been wrangled, compelled, edited and published on the IC blog and in PDF format. If you are wondering what all is happening in the communities work on user-centric identity technology this is the one thing to read and the best part is it is updated very three months. We welcome new groups joining the community – it is a simple process.
We are a community of groups working on addressing the social, legal and technical issues that arise with the emerging, identity, data and social layer of the internet.
Highlights from Q1 2008 Reports
The 6th Internet Identity Workshopis coming up May 12-14, immediately followed by a Data Sharing Summit.
The OpenID Foundation had 5 corporate members join the board – Google, Verisign, Microsoft, Yahoo and IBM. OpenID Japan was founded and guidelines for local chapters are being developed.
OSIS Open Source Identity Systems is working towards the completion of its third major Interop event (at RSA and the European Identity Conference) with 57 projects participating.
XRI 2.0 will be going to a vote within OASIS shortly.
Higgins 1.0 was released on Feb 21st.
Project VRMis leading a 1.5 day workshop at the European Identity Conference and has an active London Chapter. Work continues on the initial text case Personal Address Management
New Groups of Note:
Enterprise Positioning is a community of people inside enterprises who need to understand and explain the application of user-centric identity in that context. page 10
IC Evangelism and Marketing began to help develop clearer messaging for Identity Commons and develop a values statement. page 8
Newbies 4 Newbies have given invaluable feedback on the language used to articulate user-centric identity, helping to improve the Internet Identity Workshop announcement significantly. If you are new to User-Centric Digtial Identity – wondering what they heck is all this stuff – what do these acronyms mean – this is the group for you. page 10
The Photo Group started with three groups on Flickr 1) Identerati Portraits, 2) The Art of Identity and 3) Member Gallery with the photos they have taken. page 11
The Quiet Groups:
IC Collaborative Tools
XDI Commons
Identity Schema
Identity Rights Agreements
Identity Futures
IdMedia Review

PDF of Report

Identity Commons Explainitory Diagram

Kaliya Young · March 31, 2008 · Leave a Comment

I worked on this diagram of Identity Commons for a few hours last night. I hope it does a good job of getting across our loose distributed yet connected nature. Please let me know if you have ideas to improve it.

Someone already mentioned that “standards” is perhaps a challenging word – maybe it should be changed to “protocols”. Lets be clear IC is NOT a standards body never intended to be – goal help connect efforts together in a loose non-controling way that facilitates collaboration.

On OpenID Progress: Part of a Bigger Challenge of Identity on the Web

Kaliya Young · March 24, 2008 · Leave a Comment

TechCrunch just did a post about OpenID asked if it was being exploited by the large internet players that are participating in the community and adopting it.

I recall the first Internet Identity Workshop when the small crowd of ‘light weight’ ‘open’ ‘distributed’ SSO efforts came together and started their conversation about how they shared goals and very similar technology ideas – it was just the little guys.
Some context for those of you who don’t know this event was and continues to be co-convened and produced by myself, Doc Searls and Phil Windley – we are having our 6th stand alone workshop May 12-14 we also have also done 4 co-produced Identity Open Space events with Digital Identity World and Liberty Alliance near events that have had. This series of events that have no pre-set agenda in the past 2.5 years have been instrumental in moving the whole range of technologies forward because it creates “opportunities for both innovators and competitors, for the big guy and the small fry to come together in a safe and balanced space.” The Data Sharing Workshop and 2nd Summit – being done in collaboration with the more recently emergent DataPortability.org are building on both
* the track record of the IIW in bringing together high level people in a range of companies trying to tackle the difficult problems that need to be solved to make the vision a reality and
* the technology (standards and code) that are being brought forward via the I
dentity Commons community.

They agreed to Yadis a common service discovery method that would help their slightly different approaches work behind the scenes and then decided that Yadis as not such a good brand name and that is should be folded in and called OpenID.
These little guys had big hopes that OpenID would get adoption by large companies. It has been truly amazing to watch over the past two years as this collaboration that was cultivated by a community conversation has continued over the course of the Internet Identity Workshops – we are having our 6th one this May.
This space has been a neutral haven for all to express their views opinions and interest in different technological approaches. The Data Sharing Workshop and Summit build on this successful tradition and stack of technologies – it is the space where those inspired by the vision of data portability can get down into the details and make it real. Back to the TechCruch post:

The problem, though, is that the Big Four Internet companies that I mentioned above have made big press announcements about their support for OpenID, but haven’t done enough to actually implement it.

I agree with this statement AND there is some deeper issues that have yet to be addressed by the protocol itself to enable large sites to ‘trust’ (in the technical sense that the protocol flow will do what is says and can not be attacked) it. OpenID can be attacked from all sides (blackHat paper PDF outlining them). Bob Blakley from the Burton Group articulates the issues well here. David Recordon responded to a long critique of Stefan’s about the protocol. I think there is the potential to solve these issues but just ‘targeting’ the big players without addressing the real technical and social issues that are inhibiting large scale adoption is not fair.
Chris Mesina puts forward an in depth post articulating a shitlist, hitlist and wishlist around OpenID along with an update.
Great list highlighting things but it does not get to the heart of what in-the-end are the issues both technological and social that could limit adoption as ‘the’ solution to all that is needed for a people empowering identity layer of the web.
I look at all the progress happening in the Identity Commons community (here is our previous quarter’s reports) and have hope that solutions will emerge to address these challenges an “identity meta system” to work
* making it safe for users by making phishing really easy to prevent (this is where the card selector tools come in – CardSpace (MSFT) and the Higgins Open Source Card Selector (IBM, Parity, Novell-Bandit Project) Pamela Project relying party code)
* supporting selective and progressive disclosure (is done in a user friendly/repeatable way with cards)
* finding equitable legal frameworks and agreements for personal information sharing (Identity Rights Agreements Group is working on this and a gathering is being organized for this summer to address their development – many hundreds of thousands of legal work is needed to make this real)
* supporting automatic syncing and updating of information (this is where XRI/XDI and the Higgins Framework comes in)
* having third parties that mediate between end-users, their information and the market. (Yet to emerge businesses with new trust and business models – Project VRM is working on some of this).
OpenID is one part of a cluster of solutions – it will not solve these problems by itself (no matter how strong ‘they community’ or ‘the grassroots pressure’ because it is not sophisticated enough a protocol to do so. Those serious about really having these challenges address are invited to participate in the community and those who want to report on progress around an identity layer of the web need to look beyond ‘just OpenID’ and explore other proposed and emerging solutions that will together create an identity layer for web.
One great place to do this is at the upcoming OSIS (Open Source Identity Systems) Interop Event happening at RSA.
If you are reading this – you are interested but it is all making your head spin we have a Newbies 4 Newbies group that you can join and get peer-to-peer support from others engaging with this material (all or parts of it) for the first time.

Internet Identity Workshop May 12-14

Kaliya Young · March 9, 2008 · 1 Comment

IIW2008 Registration banner
The Internet Identity Workshop is coming up May 12-4 … this will be 6th event. Phil has an announcement up – where you can find the gif to post on your blog 🙂
If you want to sponsor please contact Phil.
If you would like to help with the design – figuring out what happens Monday and some other time sculpting contact me – we are going to have a call this week to discuss.
I am really excited about this event for a few reasons. Things are happening – in a major way

  • Card Selector tools and technologies are being build and tested.
  • Convergence is happening (U-prove being bought by MSFT)
  • OpenID is becoming the new hot ‘buzz word’ according to my blogging friends and heard randomly in conversations in the valley by young ‘trying to start a company types’ to impress VC types.
  • The social issues are percolating in new ways and ‘demand’ for the movement of personal data is gaining real traction (dataportability.org).
  • The OECD paper was just published that I had read small parts of before many months ago.
  • The Venn of Identity Paper written by Drummond and Eve is being published by the IEEE this month.
  • the IDTrust event that recently happened – went well and included many projects that have a home at IIW – hopefully some new folks will attend from the activities.
  • New people like Ryan are finding the problem of identity and learning about what is going on – and then explaining it.
  • Working groups founded at IIW – namely Enterprise Positioning and Newbies 4 Newbies both have mailing lists (Newbies, IdPositioning) and are holding regular calls.
  • The more vendor oriented day will happen on May 15th following IIW – it will be the 2nd Data Sharing Summit co-produced by Laurie Rae and I.
  • New social features on the web create new social practices – twitter, pounce, personal action or news feeds.
  • VRM is progressing and making presentations to ‘shift’ business logic.

History of Identity blog series

Kaliya Young · March 3, 2008 · 1 Comment

Two weeks ago when I was in NYC we had an identity gathering. It was one of those ‘open space’ kind of days – who ever comes are the right people turns out it was 4 of us Me, Ryan, Tony and Ken Jordan. The person who instigated the meeting Ryan Jenssen because he reached out and asked to help Identity Commons and I said why not have a meetup when I am in NYC.
He is now writing a whole series talking about A History of Tomorrow’s Interent on his Dr Star Cat blog so far it is great.
Identity Intro Part 1,
Identity Intro Part 2, Identity provider diagram
Identity Intro Part 3, This has a diagram that articulates the companies projects, products and people.
Identity XRI/XDI Part 1,
To be continued….

Identity Gang Meeting in NYC

Kaliya Young · January 21, 2008 · Leave a Comment

I am headed to NYC to facilitate the Online Community Unconference East. While there I thought it would make sense to have a meetup about Identity Commons and all the stuff happening in the community.
Ryan Jenssen reached out to me this week about community developments and contributing. We chatted back and forth and he agreed to have the event at his offices – at Angel Soft. I think we should have drinks starting at 6:15 dinner at 7 and presentation(s) at 7:30 for 1/2 an hour then lots of mingling.
Identity Gang – Social for Identity Commons
Feb 19th at 6:15 – dinner at 7:00 $10 fee.
Please RSVP on Upcoming or e-mail me if you don’t want to do that.
Should be a great opportunity to meet other NYers involved in the community and ask all the questions you want about the community efforts, OpenID, Higgins, OSIS, Bandit, Pamela Project.

The "We" of Identity for "Our Web" (the Social Graph)

Kaliya Young · January 16, 2008 · 1 Comment

I originally wrote this for Web 2.0 Expo last year April 2007 – It was called Why Identity Matters for Web 2.0. It has not been published in HTML yet. I kept hoping to make it better to refine it more. I will do that but now is the time to put this out there in linkable form.
The “We” of Identity for “Our Web” (the Social Graph)
[Originally the Why Identity Matters for Web 2.0]
Web 2.0 is about the emergence of an alive web – made up of people connecting and sharing together in groups. It is literally pulsing with the thoughts, hopes, wishes, actions, poems, prose, photos, video’s and many cultural expressions of our lives. Our identities – who we are is socially constructed. We could start with the word ubuntu – it is not just the name of a user-friendly Linux distribution it is a zulu word that means “I am who I am because of who we are together.”
Doc Searls has put it another way – we are the authors of each other. We have had “identity” since the dawn of time – our identity is innately shaped by the culture we live in, the geography of place and the resources at hand. Through Web 2.0 tools we are just doing what has been done for millennia in communities where sharing stories shaped culture and gave us a sense of who we are – exchanging all sorts of value with each other – some of which were around material goods, and some of which were around services. And much of it was mutual authoring through the creation and sharing of culture, meaning and reputation. Who we are and who the individual was mattered enormously in the context of the “we”.
I recently heard a talk by David Weinberger where he talked about first, second and third order information storage related to books. I think this frame can be helpful for us to think about what is going on with identity for people and the web. In first order storage, books exist in one place on a book shelf. Second order storage is the card catalogue with the meta-data about the books on the book shelf. With digital media and the internet we have third order storage of books where the data (the book content) and the meta data (information about the book) are both virtual and can exist in more then one place at a time.
Although our bodies can only be in one place at a time a lot of what web 2.0 is about is the extension of ourselves into the digital realm. Some of us have personal pages on multiple social networks. We put information about ourselves online and share it in all kinds of places. We work together to filter and sort information for our communities. We play games with people from around the world. (70% of Second Life is from outside the US). We manage our Instant Messaging presence on multiple networks simultaneously! Who we are when we do all these things matters a lot because the bread crumbs we leave behind. The impressions we make on others – the way those people mark, tag or otherwise order our shared experience.
We are also seeing challenges in this new atom bit mix. In extending ourselves into the digital realm things happen to our identities that were not possible when all records about us were stored physically. This new fluidity can be a bit disconcerting and raises new privacy concerns. It is easy to ping a database and learn about all ones past transactions with a company – this could be good for self reflection and better deals but bad take it to use against us. We are sharing ourselves in new ways online –we can project pieces of ourselves through our blogs, we can show up in Flickr, and online video’s. We are all “a little famous” to others beyond what we could be in ‘just’ a physical world – where once you might have shown up in the local paper just once in your life for winning a science fair – (like I did when I was 12!) – now you show up daily to your friends but also to those who randomly discover you. The old model still has my science fair win locked up in the local paper in a microfiche in my home town library. The new model has me and anyone else distributed, searchable, browsable and discoverable across the globe.
The promise of Web 2.0 comes with the distributed web of information by and about me AND by us about us. With an identity layer there exists the potential for products and services to go beyond isolated silos to deeply link together people, events, associations, meaning and media to become more than the sum of what any application could do or be alone. Identifiers that work in the digital realm along with human friendly metaphors and user-interfaces to manage this including one’s own privacy are critical for a fully realized vision. These new identity tools to be trusted must protect privacy, reputation and be secure. These are the challenges that must be solved collaboratively by the larger web 2.0 community.
Web 2.0 is only going to work if people trust the web enough to use it. PHRAUD, Phishing, pharming and theft of identity, are destroying user trust and USER TRUST is critical for Web 2.0 to succeed. Kim Cameron, one of the leaders in the Identity community has been tracking fraud statistics and they are staggering. When the Internet was created it was a small community of scientists, hackers and academics who didn’t need an identity infrastructure, because they already had (out of band) in the context of their own smaller communities. Web 2.0 creates the opportunityfor us to ‘know’ each other again and reweave a fabric of trust on the web through communities. This is a hard problem well beyond the ability of any one person or one community to solve it. In the Identity Commons community some building blocks to solve these issues have emerged but we don’t know the answers.
The community has innovated OpenID as a way for individuals to sign-in to sites across the web that support the protocol. Looking ahead are conversations about:

  • datasharing services so that I can update my information once and it “shows up” in multiple places or not as I desire.
  • personal network portability where I can take/share/access ‘my’ network of contacts from one service to another.
  • vendor relationship management services so I can manage my relationships with companies I buy from.

All of this is still individually centric and I think the real value opportunity is in communities – communities of people who know each other, care about each other and seek to collaborate together on activities none could really do alone. How do we – show up together in many places? The power of groups to work together and move themselves around from context to context coherently is nearly impossible. The real value is in the WE made of many I’s, because people fundamentally see themselves as part(s) of social groups. For web 2.0 this means having tools that support both people AND communities. Success in an interconnected social web means platforms and companies need to begin thinking about designing for “my architecture” this is in the context of our web, so they must also begin thinking about designing for “we architecture.” I (as a user) am going to use tools that work for me using my identity to hang my relationships on – hooks to me — if you will. Because I am a social being – I relate to many groups and share many imagined communities and cultures with others. This will unleash a reflective power this gives us as individuals and collectively the ability to make better decisions and act differently. It creates a feedback loop we didn’t have before.
Community is about shared meaning, understanding and trust to take action together. When you get down to it trust is crucial for a heart in Web 2.0. This raises the question of how and why do we trust? Is it because you hand me government papers that say you are who you say you are? When do we do that in real life? Only when we are interacting with abstract entities – ‘the bank’, ‘the government’, ‘the passport control check point.’ We generally don’t use these to interact with others socially.
Trust, in part, comes from knowledge of past interactions and basis a decision to trust in the present comes from a combination of current context and past interactions. These can be interactions with

  • ourselves. I trust my friend Sally because we have been doing things together for a long time.
  • others we know who vouch for their past experience. I trust Bill who is Sally’s friend because she trusts him.
  • others we don’t know who assert successful past interactions. I don’t know Jane but she says Suzie was a good person to do business with.

Trust is not an algorithm it is a knowing set of instincts we evolved and intuition we develop to survive and thrive in social groups. Each of us individually and each of our communities (the we’s) have our own way of balancing our needs for trust as our lives and community dynamics that unfold moment to moment. We make decisions regarding trust based on a range information that we have which we mentally aggregate to form judgments as we need to.
The “how” of all this is not obvious – science is just starting to unpack the deeper roots of our minds and human social behavior around trust instincts and intuition. In our evolutionary past these were tribal groups of around 150 people that you knew for life. A question we must ask our selves is what if our natural ways of discerning about trust don’t scale to the size of our social context today whether it is cities of millions or a web of billions? Another question that arises is what happens when our assumptions for social behavior work in a shared culture be it epistemic, geographic or religious but not in another? How do we as an evolving web 2.0 culture develop enough cultural literacy, emotional maturity and helpful tools to overcome these hurdles?
We must think deeper then “5 star ratings” and gesture algorithms to look deeper human at drivers and social processes. Instead of thinking in terms of technology and platform we need to innovate solutions to these difficult problems that are user-centric. And solutions that are rooted in community contexts.
So what do we do today? Where do we start? I believe the place to begin is to start supporting OpenID to become a relying party and if possible an OpenID provider. OpenID gives users the freedom to extend themselves across the web in a way that is under THEIR control.
Next, before we can get to good answers, we need to determine good questions. I invite you to join the conversation at Identity Commons and the Internet Identity Workshop about how group identities along with individual identities should be supported in a living web, the new web for all of us – Web 2.0.
Web 2.0 provides us with a fabulous new set of engines that have made Wikipedia possible created live search and many others we learning about here. So the big question is what kind of new engines can Web 2.0 provide us to enhance IDENTITY and TRUST to form a distributed social fabric. What can YOU do with Web 2.0 to create a trustable social web? That’s my question to all of you building and participating in Web 2.0.
(if you want to comment please just e-mail me – long story my tech has not gotten OpenID working on this WordPress blog yet).

Identity and Presence: Speaking at Event Friday

Kaliya Young · January 16, 2008 · 1 Comment

I am speaking on Friday at the Value Networks Community Cluster about Identity. The theme is Presence 2.0: Rise of Living Networks.
I did not make up this Copy describing the even but here it is:

We are in the throes of a major revolution in collaboration, community, business, the environment, economics and civil society. Web 2.0 and Enterprise 2.0 are ushering in a new network era. A deep social reorientation of work and wealth creation is in play. Prosperity is achieved through deliberate pursuit of diverse relationships. It is positively critical to nourish and nurture your links and flow paths through periodic, same time, same place collaboration and periodic transorganizational collaboration. These key relationships are further developed and optimized through ecologies of living social networks. Today we have an enormous capabilities infrastructure for social network applications. Fact is, these innovations still depend, in large part, and on many levels, on well-developed personal relationships.
Enterprise 2.0 Presence and Identity: The Rise of Living Social Networks will examine rapidly expanding, hyper-connected social network services, programmable webs and socially-mediated, knowledge-based business activities. New device-based social networks, an IPv6 address space of 3.4×1038, geocoding, pervasive computing, collective intelligence networks and, above all, the importance of collaboration to everything, has fundamentally and permanently altered they way we learn, work, play and thrive. Living social networks are making an enormous impact to the environment, wealth and well-being. Specifically, living social networks are becoming critical to all business. They are the critical value paths essential to corporate performance, business excellence and civil societies. For example, live, real-time communications such as IM, VoIP and mobile are becoming far more emergent and social. Simultaneously, asynchronous social networks applications like blogs, wikis and email are becoming far more real time.

Here is who will be speaking:

  • David Coleman will cover his newest book, Collaborate 2.0.
  • Stuart Henshall will examine presence and enhanced knowledge path and flows.
  • Phil Wolff will lead a discussion on the Enterprise 2.0 social stack.
  • Kaliya Hamlin,The Identity Women, will furnish an important update on the identity.
  • Verna Allee will review recently conclude mobile worker research using VNA.
  • Ross Mayfield will further develop the vision of the social enterprise.
  • Alex Lewis will cover Microsoft’s Presence strategy in OCS 2007.
  • Don Steiny respected Stanford researcher in social network analysis.

If you want to come you can get a discount – 60% off.
Yeah don’t ask me about the price point – I already brought it up – apparently they ‘break even’. They even made me pay to talk. I like Verna a lot so I said yes.

Your identity on your Time. Your Employer cares.

Kaliya Young · December 31, 2007 · Leave a Comment

This was on Slashdot today and in the NYTimes.

In the absence of strong protections for employees, poorly chosen words or even a single photograph posted online in one’s off-hours can have career-altering consequences. Stacy Snyder, 25, who was a senior at Millersville University in Millersville, Pa., offers an instructive example. Last year, she was dismissed from the student teaching program at a nearby high school and denied her teaching credential after the school staff came across her photograph on her MySpace profile. She filed a lawsuit in April this year in federal court in Philadelphia contending that her rights to free expression under the First Amendment had been violated. No trial date has been set.

DNA – Identity and communities for the genetically 'rare'

Kaliya Young · December 29, 2007 · Leave a Comment

This came by Slashdot today from the NYTimes

Sometimes what they find is unsettling. But in the emerging communities of the genetically rare, more often it is sustaining.
For three families, the impulse to find others in the same situation was immediate.
A few months before the Lanes crossed the state to meet Taygen’s chromosomal cousin, Jennie Dopp, a mother in Utah, was scouring the Internet for families with “7q11.23,” the diagnosis that explained her son’s odd behavior and halting speech.
“I want someone to say ‘I know what you mean,’” Ms. Dopp told her husband, “and really mean it.”
Noa Ospenson’s parents flew from Boston to South Carolina for a meeting of 100 families with children who, like Noa, are also “22q13.” Hoping for more information about their daughter’s diagnosis, they emerged as lifetime members of what they call “Noa’s tribe.”
For each of them, a genetic mutation became the foundation for a new form of kinship.

What have we answered? Reflections on Identity

Kaliya Young · November 27, 2007 · Leave a Comment

We have come a long way since our first identity gang meetings. One of the things the design committee came up with was to do an inquiry into the questions we are no longer asking ourselves.
Johannes and I are working on pulling together the answers to this question. along with what are the current questions and what will be the future questions. You can answer on your own blog (link back to us or just e-mail us so we know you answered) OR you can fill out the survey. If you could do this before Friday that would be great.
Thinking back to the first Identity Gang meetings 3 years ago and the first IIW 2 years ago in Berkeley, IIW a year ago….
What are the questions we are no longer asking ourselves.
* maybe we figured out the answer,
* maybe we figured out we couldn’t answer it,
* maybe we figured out it was a question we asked to soon and will surface again.
– would anybody think this is useful?
What are the questions we are asking ourselves now?
– how do identity providers make money?

What will be be thinking about 6-18 months from now?

– how to aggregate claims from multiple identity sources?

Bob has article up on Forum One

Kaliya Young · November 23, 2007 · Leave a Comment

Bob Blakley had a great “live” interview on Forum One.
It builds on the interview that I had a few weeks ago with them. The format is quite interesting – many people ask questions by typing them and you type your answers at the time of the interview.
Bob highlighted – The most serious question we’re facing – and really it trumps all the others – is “how do identity providers make money”?
Johannes picks up on this serious problem and explains why they pulled back from their public OpenID provision.
Bob is asked what is the biggest threat to identity?

That’s a really interesting question. In the past, we had the sense that our identities arose from our status as human persons. I think the biggest threat to our identities today is that as a society we might fall into the trap of reversing this relationship, and come to believe (or at least act as if we believe) that our status as persons derives from possessing an electronic “identity” – that is, a record in a database.
If this happened we’d be in danger of becoming “unpersons” whenever someone erased our identity record in the database.

I worry about this happening. I have since first really experiencing being an entry in a database when I was a student at UC Berkeley.

Identity Direct "Personal E-mails from Santa"

Kaliya Young · November 23, 2007 · Leave a Comment

I saw this add at the bottom of I Can Has Cheezburger – (for those of you who don’t know it is the ‘home’ of the LOL (Laugh Out Loud) Cats Genera of internet humor.)
So I clicked on it and found this

Now your child can write to Santa and receive a reply! Print out this personalized letter from Santa. Imagine the excitement when they read just how much Santa knows about them.
All you need to do is fill out the details below (the more information the better the letter) and we will instantly email you a letter from Santa. All you need to do is open the attachments and print using the best quality color you have available. The graphics are great and worthy of high quality color. To get the best results, For Present, please put a sentence to proceed the question “What could it be?” For example “A bike?” or “The doll house you love?”

Looking below the only fields that are required are your e-mail address your child’s name and your child’s birthday. I suspect this is so they can ping you before your child’s next birthday and remind you to buy something.
I just look and wonder at anyone who wants to know my birthday – and giving away my child’s birthday. Who knows where the information will go.
Diving into the site I find you can get books printed with your child playing a role in the story. Just in case your kids were not narcissistic enough already.

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Interim pages omitted …
  • Go to page 8
  • Go to Next Page »

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact