• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Privacy

IAPP Event: An Intro for Data Privacy Pros to Self-Sovereign Identity

Ali · January 12, 2023 ·

An event hosted by the International Association of Privacy Professionals (IAPP) asked me to give a talk on the subject of self-sovereign identity and provide a foundational overview for privacy professionals.

The following are some of the primary issues discussed throughout the event:

  • Exactly what it means to have a self-sovereign identity.
  • The direction in which the space is moving.
  • What privacy professionals need to know.

The Panel was put together by Katharina Koerner, the Principal Technology Researcher at IAPP. Myself, Dominique Beron CEO of walt.id and Kristina Yashuda, who does Identity Standards at MSFT.

Kailya, Kristina, Dominique, Katharine

Self-sovereign identity (SSI) is essentially a fresh take on digital identity solutions. Its goal is to empower users with additional options in managing their online identities and in deciding how much of their private data to make public.

In this manner, the self-sovereign identity technology provides assistance for the data reduction and purpose restriction tenets of privacy.

Simply click this link to see the whole video.

We must understand the past to not repeat it

Kaliya Young · November 9, 2014 · 1 Comment

Please see the prior post and the post before about how we got to discussing this.
We can not forget that the Holocaust was enabled by the IBM corporation and its Hollerith machine.  How did this happen? What were these systems? How did they work? and particularly how did the private sector corporation IBM end up working a democratically elected government to do very horrible things to vast portions of its citizenry? These are questions we can not ignore.
In 2006 Stefan Brands gave a talk that made a huge impression on me he warned us and audience of very well meaning technologists that we had to be very careful because we could incrementally create a system that could lead to enabling a police state. It was shocking at the time but after a while the point he was making sunk in and stuck with me. He shared this quote (this slide is from a presentation he gave around the same time)
Stefan
It is the likability that is the challenge.
We have to have the right and freedom NOT to be required to use our “real name” and birthdate for everything.
This is the defacto linkable identifier that the government is trying to push out over everything so they can link everything they do together.
Stephan proposes another Fair Information Principle.
Stefan6
I will share more of Stephan’s slides because I think they are prescient for today.
Stephan’s slides talk about User-Centrism technology and ideas in digital identity – ideas that have virtually no space or “air time” in the NSTIC discussions because everything has been broken down (and I believe intentionally so) into “security” “standards” “privacy” “trust frameworks” silos that divide up the topic/subject in ways that inhibit really tackling user-centrism or how to build a working system that lives up to the IDEALS that were outlined in the NSTIC document.
I have tried and tried and tried again to speak up in the year and a half before the IDESG and the 2 years since its existence to make space for considering how we actually live up to ideals in the document.  Instead we are stuck in a looping process of non-consensus process (if we had consensus I wouldn’t be UN-consensusing on the issues I continue to raise).  The IDESG are not taking user-centrism seriously, we are not looking at how people are really going to have their rights protected – how people will use and experience these large enterprise federations.
Yes everyone that is what we are really talking about…Trust Framework is just a code word for Enterprise Federation.
I went to the TSCP conference a big defence/aerospace federation (who was given NSTIC grants to work on Trust Framework Development Guidance) where this lovely lady Iana from Deloitte who worked on the early versions of NSTIC and potential governance outlines for IDESG – she said very very clearly “Trust Frameworks ARE Enterprise Federations” and it was like – ahhh a breath of fresh clear honest air – talking about what we are really talking about.
So back to the Stephan Brands re-fresher slides on user-centric ID so we don’t forget what it is.
 
Stefan5
 

Stefan2
 
 
 
 
 
 
Stefan3
 
Stefan2
 
Look at these, take them seriously.
 

Facebook so called "real names" and Drag Queens

Kaliya Young · September 25, 2014 · Leave a Comment

So, Just when we thought the Nym Wars were over at least with Google / Google+.
Here is my post about those ending including a link to an annotated version of all the posts I wrote about my personal experience of it all unfolding.
Facebook decided to pick on the Drag Queens – and a famous group of them the Sisters of Perpetual Indulgence.  Back then I called for the people with persona’s to unite and work together to resist what Google was doing. It seems like now that Facebook has taken on the Drag Queens a real version of what I called at the time the Million Persona March will happen.
One of those affected created this graphic and posted it on Facebook by Sister Sparkle Plenty:
MyNameIs
Facebook meets with LGBT Community Over Real Name Policy  on Sophos’ Naked Security blog.
EFF covers it with Facebook’s Real Name Policy Can Cause Real World Harm in LGBT Community.
Change.org has a petition going. Facebook Allow Performers to Use Their Stage Names on their Facebook Accounts.
 
 
 
 

Value Network Mapping an Ecosystem Tool

Kaliya Young · July 3, 2013 · Leave a Comment

My response, two years ago to the NSTIC (National Strategy for Trusted Identities in Cyberspace) Program Office issued Notice of Inquiry about how to govern an Identity Ecosystem included a couple of models that could be used to help a community of companies & organizations in an ecosystem co-create a shared picture. A shared co-created picture is an important community asset to develop early on because it becomes the basis for a real conversation about critical issues that need to be addressed to have a successful governance emerge.
The Privacy Committee within NSTIC has a Proactive Privacy Sub-Committee and before I went on my trip around the world (literally) a month ago.  I was on one of the calls and described Value Network Mapping and was invited to share more about the model/method and how it might be used.
Value Network Maps are a tool that can help us because both the creation of the map and its subsequent use by the companies, organizations, people and governments that are participating strengthens the network.   This is important because we are dealing with a complex problem with a complex range of players. In the map below we are in the top left quadrant – we NEED strong networks to solve the problems we are tasked with solving.  If we don’t have them we will end up with Chaos OR we will have a hierarchical solution imposed to drive things towards the complicated and simple but …given the inherent nature of the problem we will NOT fully solve the problem and fall off the “cliff” on the edge between simplicity and into chaos.
(In this diagram based on the cynefin framework developed by David Snowden architect of children’s birthday parties using complexity theory and the success of Apolo 13 )

 
So – what is a Value Network Map?
It models technical & business networks by figuring the roles in any given system and then understanding the value that flow between different roles.  Value flows include payment for the delivery of goods or services (these are tangible deliverables) but also intangible deliverables such as increased level of confidence because information was shared between parties (but was not contractually obligated and no payment was made).
Drawing from Verna’s book/site that lays out how to do it. There are four steps to a value network map.
1. Define the scope and boundaries, context, and purpose.
2. Determine the roles and participants, and who needs to be involved in the mapping.
3. Identify the transactions and deliverables, defining both tangibles and intangibles.
4. Validate it is complete by sequencing the transactions.
 
I’ve worked on several value network mapping projects.
I worked with the Journalism that Matters to document he old and new journalism ecosystem.I have lead several community Value Network Mapping efforts.


This projects highlights how the method can be used to talk about a present/past state about how things happen “now”. How do people today or 20 years ago share verified attributes with business and government entities one does business with?  If we understand the roles that exist in a paper based version/world How do those roles change in a future enable with technology and how do the value flows change and what new roles are created/needed?
A value networm map can be used to map the flow of rights and duties between different roles in an ecosystem can also be considered along with the flow of monetary and other value.
Two years ago I went with Verna Allee (the innovator of the method) to  the Cloud Identity Summit  to work on a map for my organization the Personal Data Ecosystem Consortium focused on the “present state” map to explain what currently happens when someone visits a website and clicks on an add to go buy something and then is asked to provide identity attributes.
We took this FCC submitted map that has the individual at the center and data flows to the businesses, government and organizations they do business with and is sold on to Data Brokers and then Data Users buy it to inform how they deal with the individual all without their awareness or consent.

 
PersonalData-VNA-NowMapWe added in a wrinkle to this flow and asked what happens when an individual has to prove something (an attribute) about themselves to make a purchase.
Our hope was to do this and then work on a future state map with a Personal Cloud provider playing  a key role  to enable new value flow’s that empower the  Individual with their data and enabling similar transactions.
This is best viewed in PDF so if you click on the link to the document it will download.
Creating this map was an interactive process involving involved two dozen industry professionals that we met with in small groups.  It involved using large chart paper paper and post-it notes and lines on the map.   We came into the process with some of the roles articulated, some new roles were added as we began mapping with the community.
An example to give you a sense of what it looks like when you do it in real life is this map that shows how trust frameworks & the government’s reduction of risk in the credit card system.

This was a small piece of the original map for the Personal Data Ecosystem (it did not end up getting included in the PDF version).  The roles are the orange flowers and the green arrows are tangible value flows and the blue arrows are intangible value flows.
So how could the Proactive Privacy Sub-Committee use this method?
At an IIW11 one of the practitioners of value network mapping came to share the method and we broke up into smal groups to map different little parts of an identity ecosystem. We had a template like this picking four different roles and then beginning to map.

The exercise is written about here on Verna’s website.
Scott David was a community member there and really saw how it was a tool to understand what was happening in systems AND to have a conversation about the flow of rights and responsibilities flow.
The method is best done face to face in small groups.  It helps if the groups are diverse representing a range of different perspectives.  A starting point is a use-case a story that can be mapped – what are the roles in that story and then walking through the different transactions.
So how do we “do” it. Well a starting point is for those interested in helping lead it to identify themselves in the context of the pro-active privacy committee.  We should work together  to figure out how we lead the community using this process to figure out the privacy implications and see where the money flows for different proposed solutions.
We can try to do a session at the upcoming July or October plenary.
We could also organize to do some meetings at:

  • conferences in the next few months were we can identify 5-10 interested IDESG members to participate in mapping an ecosystem chunk for an hour or two.
  • in cities around the country where we identify 5-10 folks who want to spend an hour or two mapping an ecosystem chunk.

It would be great if we decide to do this that the Secretariat lead by Kay in her role as Executive Director of the IDESG can support us in organizing this (That is why we are paying htem 2.5 million buck s to help us  do the work of  organizing in a meaningful way.
I am friends with Verna Allee and can ask her for advice on this however I think the kind of help/advice we need to really use this method and do it WELL would behove us to actually use NSTIC IDESG moneys to hire Verna to engage with us in a serious way. When I wrote my NSTIC NOI I did so thinking that their would finally be monies available to pay people to do community conference building work like this.  Perhaps it is not to late to do so.
 
 

G-Male is a Good Listener, Maybe too good.

Kaliya Young · September 1, 2011 · 2 Comments


Ok, now we know what is wrong 🙂 Google is on the [autism] spectrum.

“The obstacles primarily exist in the realm of social interaction. The fundamental problem is akin to blindness, as the term social blindness suggests.”

They keep doing well meaning but awkward feeling things because well they know how to technically but it isn’t how human beings act or want to be treated.
[Read more…] about G-Male is a Good Listener, Maybe too good.

Is Google+ is being lynched by out-spoken users upset by real names policy?

Kaliya Young · August 28, 2011 · 5 Comments

Following my post yesterday Google+ says your name is “Toby” not “Kunta Kinte”, I chronicled tweets from this morning’s back and forth with  Tim O’Reilly and Kevin Marks, Nishant  Kaushik, Phil Hunt,  Steve Bogart and Suw Charman-Anderson.
I wrote the original post after watching the Bradley Horwitz (@elatable) – Tim O’Reilly (@timoreilly) interview re: Google+. I found Tim’s choice of words about the tone (strident) and judgement (self-righteous) towards those standing up for their freedom to choose their own names on the new social network being rolled out by Google internet’s predominant search engine disappointing.  His response to my post was to call me self-righteous and reiterate that this was just a market issue.
I myself have been the victim of a Google+ suspension since July 31st and yesterday I applied for a mononym profile (which is what it was before they insisted I fill out my last name which I chose to do so with my online handle and real life identity “Identity Woman”) 
In the thread this morning Tim said that the kind of pressure being aimed at Google is way worse then anything they are doing and that in fact Google was the subject of a “lynch mob” by these same people.  Sigh, I guess Tim hasn’t read much history but I have included some quotes form and links to wikipedia for additional historial context.
Update: inspired in part by this post an amazing post “about tone” as a silencing/ignoring tactics when difficult, uncomfortable challenges are raised in situations of privilege was written by Shiela Marie.  
I think there is a need for greater understanding all around and that perhaps blogging and tweeting isn’t really the best way to address it.  I know that in the identity community when we first formed once we started meeting one another in person and really having deep dialogues in analogue form that deeper understanding emerged.  IIW the place we have been gathering for 6 years and talking about the identity issues of the internet and other digital systems is coming up in mid-October and all are welcome.  The agenda is created live the day of the event and all topics are welcome.
Here’s the thread… (oldest tweets first)
 Note all the images of tweets in this thread are linked to the actual tweet (unless they erased the tweet).  [Read more…] about Is Google+ is being lynched by out-spoken users upset by real names policy?

Google+ says your name is "Toby" NOT "Kunta Kinte"

Kaliya Young · August 27, 2011 · 21 Comments

This post is about what is going on at a deeper level when Google+ says your name is “Toby” NOT “Kunta Kinte”. The punchline video is at the bottom feel free to scroll there and watch if you don’t want to read to much.

This whole line of thought to explain to those who don’t get what is going on with Google+ names policy arose yesterday after I watched the Bradley Horwitz – Tim O’Reilly interview (they start talking about the real names issue at about minute 24).

[Read more…] about Google+ says your name is "Toby" NOT "Kunta Kinte"

Lets try going with the Mononym for Google+

Kaliya Young · August 27, 2011 · 6 Comments

Seeing that Google+ is approving mononyms for some (Original Sai, on the construction of names Additional Post) but not for others (Original Stilgherrian Post Update post ).
I decided to go in and change my profile basically back to what it was before all this started.  I put a  ( . ) dot in the last name field.  In my original version of my google proflile my last name was a * and when they said that was not acceptable I put my last name as my online handle “Identity Woman”.
[Read more…] about Lets try going with the Mononym for Google+

Nymwars: IRL on Google's Lawns.

Kaliya Young · August 5, 2011 · 3 Comments

We need to bring this struggle to Google IRL (In Real Life – physical, real world, meet space). Here is my thinking on why and my ideas about how.

WHY:  Even women with privileged access to Google insiders and who have real name handle combinations are not getting reinstated.

[Read more…] about Nymwars: IRL on Google's Lawns.

"Million" Persona March on Google

Kaliya Young · August 1, 2011 · 7 Comments

Just reading more posts people are pointing at and surfacing re: google+ and erasure. I was “erased” today (from being able to use Google+ not my gmail account) but this isn’t about me, its about the Persona’s.
You know IRL (in real life) when people kill you they suffer legal consequence, here with real persona it’s open season.  Its not right.  (Just read Raef’s Declaration of the Rights of Avatars – among the many bills of rights re: online identity and privacy I have collected).
So lets organize a March on Google for the rights of people with Persona’s.

The Trouble with Trust, & the case for Accountability Frameworks for NSTIC

Kaliya Young · July 31, 2011 · 3 Comments

There are many definitions of trust, and all people have their own internal perspective on what THEY trust.
As I outline in this next section, there is a lot of meaning packed into the word “trust” and it varies on context and scale. Given that the word trust is found 97 times in the NSTIC document and that the NSTIC governing body is going to be in charge of administering “trust marks” to “trust frameworks” it is important to review its meaning.
I can get behind this statement: There is an emergent property called trust, and if NSTIC is successful, trust on the web would go up, worldwide.
However, the way the word “trust” is used within the NSTIC document, it often includes far to broad a swath of meaning.
When spoken of in every day conversation trust is most often social trust.
[Read more…] about The Trouble with Trust, & the case for Accountability Frameworks for NSTIC

Alignment of Stakeholders around the many NSTIC Goals

Kaliya Young · July 31, 2011 · 1 Comment

 

The Many Goals for the Identity Ecosystem & NSTIC Governance

The NSTIC governance NOI articulates many key activities, qualities and goals for a governance system for NSTIC. NSTIC must:

  • convene a wide variety of stakeholders to facilitate consensus
  • administer the process for policy and standards
  • development for the Identity Ecosystem Framework in accordance with the Strategy’s Guiding Principles
  • maintain the rules of participating in the Identity Ecosystem
  • be private sector-led
  • be persistent and sustainable
  • foster the evolution of the Identity Ecosystem to match the evolution of cyberspace itself.

Achieving these goals will require high-performance collaboration amongst the steering group and all self-identified stakeholder groups. It will also require earning the legitimacy from the public at large and using methods that surface their experience of the Identity Ecosystem Framework as it evolves.
[Read more…] about Alignment of Stakeholders around the many NSTIC Goals

Survey Says: People care about securing personal data.

Kaliya Young · July 13, 2011 · Leave a Comment

This info graphic is from a Uynisys Survey 70% of people cared most about securing their personal data.

This diagram is from the Unisys Security Index Survey.

No Plancast you can't have all my Dataz

Kaliya Young · February 23, 2011 · 1 Comment

You know I like social media tools and enjoy using them to share information.
I am also very conscious of the implications of doing so and how public things are when I do. I manage my public persona – the parts of myself that I share publicly on the web associated with my professional work and personal passion – User-Centric Digital Identity.
Today I saw a friend share via Facebook that they were attending a cool panel at SXSW – Demystifying Online Privacy and Empowering the Digital Self
I went over to Plancast where it was listed and also signaled that I would be attending THEN it asked me if I would like to share via Facebook. “sure” I think that makes sense – I learned about it there why not, it is part of my professional public life online.
So then the Terms of Use show up…and you know they are just too extensive. Why to post that I AM going to one event must I give all this information away. It is also a go-no-go proposition. I can’t “Uncheck” things I don’t want to let plancast do. THIS IS really broken. It needs to be fixed. I need to be able to use applications AND have control over how much they can do with my data and how much freedom they have to post.
I ONLY want to give them permission to post this one item…maybe in time I might trust them enough to have full access but that will come in time as I grow to know their service and trust their business practices.
Plancast is requesting permission to do the following:
Access my basic information
Includes name, profile picture, gender, networks, user ID, list of friends, and any other information I’ve shared with everyone.
Send me email
Plancast may email me directly at kaliya@mac.com ·
Post to my Wall
Plancast may post status messages, notes, photos, and videos to my Wall

Access my data any time

 

Plancast may access my data when I’m not using the application
Access my profile information
About Me, Events, Current City and Website

Privacy Identity and Innovation – pii & Women

Kaliya Young · August 1, 2010 · Leave a Comment

The Privacy Identity and Innovation is coming up August 17-19th in Seattle, Washington.
This conference is the brain child of Natalie Fonseca who has run the Tech Policy Summit for several years.
I am speaking at the event on a panel about personal data stores (a new project I will write more about here soon).  I am really proud to be amongst many other women industry leaders speaking. I know Natalie took proactive approach to recruiting women to speak and voila – their are women speakers at this technology conference.
Denise Tayloe, CEO of Privo
Marie Alexander, CEO of Quova
Linda Criddle, CEO of Reputation Share
Fran Maier, President of TRUSTe
Anne Toth, Chief Privacy Officer for Yahoo
Michelle Dennedy, VP at Oracle
Judith Spencer of GSA
Christine Lemke, CTO of Sense Networks
Betsy Masiello of Google
Heather West of Center for Democracy and Technology
Eve Maler of PayPal
Susan Lyon of Perkins Coie
Deborah Estrin of UCLA
It should be a great event – the guys on the program are equally cool.

When to share your real name? Blizzard and their Real ID plans.

Kaliya Young · July 8, 2010 · 1 Comment

I was recently CCed in a tweet referencing this article “Why Real ID is a Really Bad Idea“about World of Warcraft implementing their version of a “Real ID” in a way that violated the trust of its users.
The woman writing the article is very clear on the identity “creep” that happened and got to the point of requiring users to use the Real ID account within the system to post on forums and EVEYWHERE they interacted on company websites.
She articulates clearly why this creates an unhealthy climate and a chilled atmosphere for many users.
[Read more…] about When to share your real name? Blizzard and their Real ID plans.

The Age of Privacy is Over????

Kaliya Young · January 11, 2010 · 2 Comments

ReadWriteWeb has coverage of Zuckerberg’s talk with Arrington at the Crunchies. According to him, the age of Privacy is Over. This is the quote that is just STUNNING:

..we decided that these would be the social norms now and we just went for it.

When I first heard it in the interview in the video I did a major double take – “we decided” ?? seriously? The we in that sentence is Facebook and clearly with Zuckerburg is at the helm – He could have said “I decided” and he as the CEO of a social network has the power to “decide” the fate of the privately shared amongst friends in the context of this particular social network for millions of people (see my post about the privacy move violating the contract with users). It makes you wonder if this one platform has too much power and in this example makes the case for a distributed social network where people have their own autonomy to share their information on their own terms and not trust that the company running a platform will not expose their information.
It is clear that Zuckerberg and his team don’t get social norms and how they work – people create social norms with their usage and practices in social space (both online and off).
It is “possible” to change what is available publicly and there for making it normal by flipping a switch and making things that were private public for millions of people, but it is unethical and undermines the trust people have in the network.
I will agree there is an emerging norm that young men working building tools in Silicon Valley have a social norm of “being public about everything”, but they are not everyone. I am looking forward to seeing social tools developed by women and actual community organizers rather then just techno geeks.
I will have more to say on this later this week – I was quite busy Saturday – I ran the Community Leadership Summit, yesterday I flew to DC and today I am running the Open Government Directive Workshop. While I am here I hope to meet with folks about Identity in DC over the next 2 days.

Suicide Options for Facebook, LinkedIn and Twitter

Kaliya Young · January 1, 2010 · Leave a Comment

I have another post up on ReadWriteWeb that went up just after Christmas covering people who are choosing to leave Facebook or considering doing so along with the tools to help them.
Fed Up with Facebook Privacy Issues? Here is how to End it All.
It highlights two different Web 2.0 suicide machines; one is an art project called Seppukoo.com .
The service creates a virtual memorial for you and posts you on a suicide wall & they give you points for how many friends you had and how many of them choose to follow you to the “after life”. The leader board is here.  You can see the RIP page for one of the creators of the service – Gionatan Quintini here.
It received a cease and desist from Facebook and responded.
The response is not covered in the article (it wasn’t out when I wrote it). It has some great quotes that sound like language coming from the user-centric identity community.

5. My clients have the right to receive information, ideas, and photographs from those people whom are the legitimate proprietors of this data and can decide to share this data or to store it, with the prior consent of its respective owners. All of this is freedom of expression and the manifestation of thought and free circulation of ideas that is accepted and guaranteed in Europe and in the U.S.A.

6. Facebook cannot order the erasure of data that does not belong to it, acting against the free will of the owners of such data. This is not protection of privacy, but rather a violation of the free will of citizens that can decide freely and for themselves how to arrange their personal sphere.

We shall see how Facebook responds to this.

Web 2.0 Suicide Machine is more comprehensive – covering LinkedIn & Twitter as well.
Here is the previous Read Write Web post on the changes in what is and is not public.

Facebook Privacy Changes leave us "Socially Nude"

Kaliya Young · December 15, 2009 · 7 Comments

Read Write Web published a guest post by me about how the changes at facebook last week leave us Socially Nude.

Facebook’s Privacy Move Violates Contract With Users

Your name, profile picture, gender, current city, networks, Friends List, and all the pages you subscribe to are now publicly available information on Facebook. This means everyone on the web can see it; it is searchable.

This represents just the latest instance of Facebook violating the contract it holds with its users. This is no small matter, either. Lots of people will have very real and valid objections to this arbitrary change to what’s public and what’s private on Facebook.

….an articulation of the nature of the social contract sites with social features have with users….

I wonder how many more times they will get strip us down, leaving our familiar social clothes and underware on the floor, and leaving us socially nude.

I think it is unethical and I agree with the concern that Jason Calacanis raises about how this will affect other Internet companies. “Facebook’s reckless behavior is… simultaneously making users distrust the Internet and bringing the attention of regulators.” This change will affect all of us working on building the new techno-social architecture of our society via the web.

Thomas Friedman on the lesson from Van Jones – "Watch out for the participatory panopticon"

Kaliya Young · September 6, 2009 · 3 Comments

Thomas Friedman of the NYTimes on Meet the Press today talking about several recent incidents including what happened to Van Jones.

When everyone has a cell phone, everyone is a photographer, when everyone has access to YouTube, everyone is a filmmaker, and when everyone is a blogger everyone is a newspaper.
When everyone is a photographer, a newspaper and a filmaker everyone else is a public figure. Tell your kids ok,  be careful every move they make is now a digital footprint. You are on candid camera and unfortunately the real message to young people from all these incidents… (he says holding his hands closely together) is really keep yourself tight – don’t say anything controversial, don’t think anything controversial, don’t put anything in print – you know what ever you do just kind of smooth out all the edges (he says moving his hands in a streamlining motion down) and maybe you too – you know when you get nominated to be ambassador to Burkina Faso will be able to get through the hearing.

What does this capacity to document “everything” digitally mean to free thinking, and free speech? It seems that is having a quelling effect.
I have written about the participatory panopticon several times, a term coined by Jamais Cascio.
* Participatory Panopticon strikes Michael Phelps
* We Live in Public – a movie
* “sousveillance” coming to NYC and Big Brother coming to NYC
* Participatory Panopticon tracking the CIA’s Torture Taxi
* Condi Caught by Emerging Participatory Panopticon
* Accelerating Change Highlights: 1 (Jon Udell)
The first time I spent a whole day with technologists working on the identity layer of the web in 2003 I asked publicly at the end of the day – how do we forgive in these new kinds of tools in place? How do we allow for people to change over time if “everything” is documented?
I hope we can have a dialogue about these kinds of issues via the blogosphere and also face to face at the 9th Internet Identity Workshop coming up in November.

Legal Haze for Social networks. Identity and Freedom of Expression.

Kaliya Young · July 9, 2009 · 2 Comments

200907091809.jpg

The picture pretty much sums the conundrum up.

Is it ok for individuals to promote pot on these social networking services?

Should social networks allow marijuana dispensaries to have organizational presences?

(from an e-mail from Fast Company promoting this article)

The question is, whose laws do social networks have to follow? The Web may seem borderless, but as companies like Google and Yahoo have found in China and, more recently, Twitter and Facebook found in Iran, virtual boundaries do exist. So what’s a company like Facebook or Twitter to do? It will be interesting to see how Silicon Valley finesses this one, particularly because the companies are based in California where the dispensaries are considered legitimate enterprises (at least in the eyes of the law).

I poked around on twitter and found a whole Marijuana movement
along with the Stoner Nation Facebook page and Stoner Nation Twitter and on Blogger and their own site.
Interestingly I searched in Facebook to find the stoner nation page and it was not listed when typed as two words but was when I typed it the way their name is listed as one word – StonerNation .
It is not a surprise to see seems there are many fans of Stoner Nation who are using Facebook accounts without their real names. Like Oregon Slacker , Stoner Stuff, and Drink Moxie.
I think this liminal space between the legal and illegal (at least this is factually the case in california) is quiet interesting. The freedom to express oneself and organize around change is something that is important to maintain on the web – clearly these three people have chosen to weave a line – expressing their opinion and support and involvement around marijuana online and not releasing their “real names” on facebook or twitter where they are expressing support and involvement in movement organizing but making the choice that saying who they are may negatively affect them in their ‘daily life’ – whether it be a small town where they live that would be unaccepting or a profession they hold that would not be understanding. I think these rights and issues go beyond “just” drug use but also extend to sexual and other minorities. The marijuana community is activating right now because there is a ballot initiative here in 2010 to legalize pot and tax it (potentially generating 1.2 billion dollars in revenue annually for the state).
I think a question we all have in building the evolving open and social web is how do we support citizens having the freedom to express themselves online and in social contexts. What are the particulars of online identity that enable this as a possibility and don’t rule the fundamental right of freedom of expression out? I am specifically thinking about the equivalent to anonymously joining a social movement march in the physical world.

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact