• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Identity Organizations

MyData 2018: Domains of Identity & Self-Sovereign Identity

Kaliya Young · August 30, 2018 ·


Here are the slides of my talks and some links to the material covered.
1. The MyData —> Identity Connection 
If you don’t have control of your identifiers you can’t control your data.
2. How did I begin in Identity?
Via the Planetwork Community and its vision of the Augmented Social Network White Paper.
3. The Domains of Identity – My Masters Report 
4. An Overview of Self-Sovereign Identity
If you are interested in our report on SSI it can be found here.  It is priced for the audience we wrote it for C-Level Executives. 
5. Conclusion —> Creating Alignment
I referenced my three phase plan for Systems Leadership & the Short, Long  Report  & resource guide that accompany them.

  1. See the Larger System
  2. Reflective and Generative Conversation
  3. Co-Create the Future

I concluded by highlighting ideas from this post by Eugene Kim
The Art of Aligning Groups 

The Domains of Identity & Self-Sovereign Identity MyData 2018 from Kaliya "Identity Woman" Young

Blockchain vs. CryptoCurrency: BridgeSF Talk

Kaliya Young · May 23, 2018 ·

I was asked to substitute in at the last minuet to talk about the difference between blockchain and cryptocurrency at the BridgeSF conference on their Enterprise Day.
Here are links to what I cover in the talk:
Do You Need a Blockchain. This slide is from DHS S&T and Anil John  who is leading research int his area for that agency.

Supply Chain

  • BeefChain.io
  • BlockPharma
  • Blockchain Transportation Alliance 

Immutable Data

  • Chainpoint by Tierion

Identity on the Blockchain 

  • Verifiable Organizations Network, Led by the British Columbia Government on GitHub. Built on the Hyperleder  Indy Code also on GitHub.
  • Verifiable Credentials Work at the W3C.
  • Decentralized Identifier Work at the W3C building on work from the Internet Identity Workshop and Rebooting the Web  of Trust.
  • The Decentralized Identity  Foundation
  • MyCUID My Credit Union Identity

Slide from Anil John DHS S&T explaining Verified Claims.

The Known Traveller : Unlocking the potential of digital identity for secure seamless travel. World Economic Forum Report.
Crossing the boarder involves many parties. The United States and Canadian Government are collaborating in exploring how to improving boarder crossing and customs clearance. 
Coordination across many parties. 

  • Amply project in South Africa in collaboration with the IXO Foundation and the Company Consent.Global
  • HIE [Health Information Exchange] of One 

Blockchain and Land Rights – work by Mike Graglia at New America Foundation

  • Paper: Blockchain and Property in 2018: At the End of the Beginning
  • Preso: Blockchain and Property in 2018: At the End of the Beginning

Joining the Community to engage further.

  • Come to the Internet Identity Workshop – next is October 23-25, 2018 in MountainView and then again in early May 2019
  • Decentralized Identity Foundation
  • Sovrin Foundation
  • Verse One 

Conclusion:

  • You can reach met Kaliya (at) identitywoman.net
  • If you want to get the Scoop on Self-Sovereign Identity you can get that here!
  • If you want to learn about the work  HumanFirst.Tech

 
Here are the Slides:

Identity issues: Identity.Foundation vs. Decentralized.id

Kaliya Young · February 17, 2018 ·

So the the Decentralized Identity Foundation has an “identity challenge” with a project pretending to be it – with a very similar domain name and trying to do a token sale.  I have a theory that almost all legitimate projects with real people and real work going on behind them also have fake projects shadowing them.  Anyways.
Here is the REAL Decentralized Identity Foundation Website: http://identity.foundation. Its got working groups and code and a blog on medium.  Its got a whole bunch of real people and projects behind it.
They are working on supporting the emergence of an open standard called DID.
Microsoft just made an announcement about their support and product integration of these emerging open standards.
 

So the FAKE site is Decentralized.id

It looks really polished and the first page says
YOUR ID: DECENTRALIZED
The DID Foundation, Decentraling your ID over the Blockchain. Sounds good right.  Protecting Your ID, Providing Trust, Crypto-Positive. It says one should Join The Foundation – if you do you get DID Tokens!
Then creating a supply 20,000,000,000 of them. They are selling them for .ooo1 USD. They accept BTC, ETH and BCH.
So I checked out their real “address” is at a hot desking space in London.

Decentralized ID is owned by Mr. Sheikh Abdullah Naveed. HE also has a hardware consultancy Torquesol UK Ltd. He has some other companies too – Tapfer Technologies Ltd  and Fry-Wi Ltd
_____
This whole situation highlights the need to have identity verification for organizations too.  The good thing is that this is something that the British Columbia Government is working on with a project called Verifiable Organizations Network 

Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea

Kaliya Young · February 3, 2018 ·

I decided to open a thread On Twitter for ID & security professionals to share why (/if) putting hashed PII on any immutable ledger(blockchain) is a bad Idea.
Not everyone agreed that it was bad if certain things were done right.
There were 15 direct responses and then a whole lot of subthreads. I have pulled out all the subthreads. All tweets are linked to. Yes…all of them. Let me know if i missed a thread and I will pull it in. Let me know if you post about this thread on your blog – I will post a link. Also I am giong ot share this with the identity gang list – you can join it here: https://lists.idcommons.net/lists/subscribe/community
Jeff Lombardo also made a summary of the conversation on his blog. https://x-iam.com/can-blockchain-solves-the-privacy-of-identity-connundrum.html
 
[Read more…] about Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea

Rethinking Personal Data: 3 WEF reports

Kaliya Young · October 19, 2016 ·

I met Marc Davis at SXSW in 2010, we instantly clicked and began working together. He was on contract to develop pre-reading material for a WEF meeting in the fall about Personal Data. I contributed significantly to the document which became the basis of the first Rethinking Personal Data project Report, Personal Data the Emergence of a New Asset Class. [click on the image to download the report].
wef1
 
I remained actively engaged in the project and two of the Appendixes in the 2nd report were authored by me.  The MindMap of Personal Data Types and the Value Network Analysis of the Exploitive Personal Data Ecosystem (Both of these are in the My Data, My Value, 6 Sense Making Diagrams) [Click on the image to download the report PDF]
wef2
 
Diagrams that appeared in the third report I helped sketch out with Bill Hoffman. Here is the Third WEF report PDF [click on the document image].
wef3
WEF Report #3 write up on my Blog.
 

WEF Report #3: Unlocking the Value of Personal Data!

Identity 101, Boot Camp for Identity North 2016

Kaliya Young · October 18, 2016 ·

This June I was invited to present the Identity 101 BootCamp ahead of the Identity North Conference in Toronto. People arrived 90 min early at 8am for this presentation.
I walk through some of the core vocabulary for identity (authentication, authorization, enrollment, verification and contextualize the different contexts (Enterprise, Government and User-Centric)  and power structures that operates within. We also include the Identity Spectrum between verified and anonymous ID there is a whole range and some combinations) The presentation ends sharing Kim Cameron’s Laws of Identity and the Properties of Identity.

Identity 101: Boot Camp for Identity North 2016 from Kaliya "Identity Woman" Young

IIW 23! Register. Its going to be great!

Kaliya Young · August 26, 2016 ·

Powered by Eventbrite

Its getting Meta – Identity for the Identity students

Kaliya Young · January 20, 2016 · Leave a Comment

Today I picked up my University of Texas at Austin ID card. Yes I’m now a Texas Longhorn. The Center for Identity here is teaming up with the Information School to offer a Masters of Science in Identity Management and Security and I’m enrolled in the first cohort of students.

It’s getting meta here with the @UTcenterforID and the new @UTasMSIMS we got out IDs today from UofT. pic.twitter.com/zXL7gxEZOc

— Kaliya-IdentityWoman (@IdentityWoman) January 21, 2016


I’m not moving to Texas though. It’s a part time program, one weekend a month and I’m going to fly here to participate in classes.
Today we had an overview of the 10 classes that make up the program, learned about some of the different research happening at the iSchool and the Center for Identity.
I wasn’t expecting this but we got a full tour of the football stadium, saw a bunch of statues of players and coaches and learned all about the team and the lore.  It reminded me of the first week I had at Cal and the feeling I had that week knowing I would be a Golden Bear for life (I was a student athlete though so there was a whole other layer to the experience).
I will be blogging about what we are up to.

IIW is early!! We are 20!! We have T-Shirts

Kaliya Young · March 4, 2015 · Leave a Comment

Internet Identity Workshop is only a month away. April 7-9, 2015
Regular tickets are only on sale until March 20th. Then prices to up again to late registration.
I’m hoping that we can have a few before we get to IIW #20!!
Yes it’s almost 10 years since we first met (10 years will be in the fall).
I’m working on a presentation about the history of the Identity Gang, Identity Commons and the whole community around IIW over the last 10 years.
Where have we come from?…leads to the question…. where are we going?  We plan to host at least one session about these questions during IIW.
It goes along with the potential anthology that I have outlined (But have a lot more work to get it completed).

Internet Identity Workshop #20 is in April !!

Kaliya Young · December 14, 2014 · Leave a Comment

IIW is turning 20 !
That is kind of amazing. So much has evolved in those 10 years.
So many challenges we started out trying to solve are still not solved.
I actually think it would be interesting as we approach this milestone to talk about what has been accomplished and what we think is yet to be accomplished.
I am working on organizing a crowd funding campaign to support completing an anthology that I have outlined and partially pulled together. I will be asking for your support soon. Here is the post on my blog about it.
In the mean time tickets for IIW are up and for sale! You can also order a special T-shirt we are designing especially for the occasion.

Online Ticketing for Internet Identity Workshop XX #20 – 2015A powered by Eventbrite

Dear IDESG, I’m sorry. I didn't call you Nazi's.

Kaliya Young · November 9, 2014 · Leave a Comment

The complaint was that I called my fellow IDESG colleagues Nazi’s. He was unsatisfied with my original statement about the tweet on our public management council mailing list. Some how this led to the Ombudsman taking on the issue and after I spoke with him in Tampa it was followed by a drawn out 5 week “investigation” by the Ombudsman before he issued a recommendation.
Then turns out after all was said and done there was never actually a formal complaint. There was the ombudsman taking action on his own. (its funny how organizations can use Ombudsman to not actually protect people with in institutions but use them as institutional forces to  push  people out who speak up and ask too many questions)
During the time I was being investigated I experienced intensive trolling about the matter on twitter itself. The trolling was done by someone obviously familiar with the situation who was upset. There were only 5 people familiar with them matter as it was ongoing through this investigation.During my own IIW conference the troll topped off the week by making implicit rape threats. This was very very disruptive and upsetting to me so much so I don’t even remember that  IIW.
Here is the tweet that I authored while pondering theories of organizational dynamics in Tampa and without any intent to cause an association in the mind of a reader with IDESG, NSTIC, nor any person or persons in particular note that I did not reference anyone with a @____ or add any signifying hashtags e.g., #idesg or #nstic in this tweeted comment. So unless you were reading everything you would never know I said it.
Tampa11
I own that the tweet was provocative but it was It was not my intent to cause harm to anybody or to the IDESG organization and wider identity community.
We can’t put documents up for community and public input and say “its 40 page document nobody has time to read” and laugh as if it is funny that the process is so bad that there is no ability for the body of the organization let alone the public to have insight. That is how not good things begin to happen no one is looking. I was trying to make a point that the meeting was being badly badly run and that poor process can lead to really bad outcomes.
I am very sorry if the tweet had an emotionally negative impact on people on the management council. I fully acknowledge that referencing anything relative to the Nazi era is triggering. It touches on our collective shame and surfaces vulnerability it is very hard to look at.
I also believe that we have to actually be prepared to do so. If we don’t examine the past we can’t be sure we will not repeat it. [Please click to see my my next post for this to be further expounded upon]
I didn’t choose to say anything along these lines because I was in the middle of a process with the Ombudsman I thought that would be honored and let to run its course.
I also didn’t feel one should feed internet trolls – one was being very aggressive and pestering me for an apology.
I think that we all need to keep in mind our roles as Directors of the IDESG when we interact with the public and with each other.
This includes hiding behind pseudonyms and aggressively trolling to get back at someone you are upset with. Which also happened – either deal with the issue in a formal process or take them out on twitter but do’t do both.
The whole process left my and my attorney puzzled. My attorney wrote a letter to the Management Council/Board of Directors with a whole bunch of questions and now that this is posted we look forward to their answers to those questions.
No one from he IDESG including the ombudsman ever responded or was concerned by the aggressive trolling and implicit rape threats on twitter by someone intimately familiar with the ongoing ombudsman process.
Abusive behavior towards women isn’t just a physical thing it is a psychological as well. I have felt unsafe in the Identity community since this incident. I am now setting it aside though and stepping forth in my full power.

BC Identity Citizen Consultation Results!!!!

Kaliya Young · August 17, 2014 · Leave a Comment

This article explains more about the different parts of the British Columbia Citizen Consultation about their “identity card’ along with how it is relevant and can inform the NSTIC effort. [Read more…] about BC Identity Citizen Consultation Results!!!!

Resources for HopeX Talk.

Kaliya Young · July 21, 2014 · 1 Comment

I accepted an invitation from Aestetix to present with him at HopeX (10).
It was a follow-on talk to his Hope 9 presentation that was on #nymwars.
He is on the volunteer staff of the HopeX conference and was on the press team that helped handle all the press that came for the Ellsberg – Snowden conversation that happened mid-day Saturday.  It was amazing and it went over an hour – so our talk that was already at 11pm (yes) was scheduled to start at midnight.
Here are the slides for it – I modified them enough that they make sense if you just read them.  My hope is that we explain NSTIC, how it works and the opportunity to get involved to actively shape the protocols and policies maintained.

[Read more…] about Resources for HopeX Talk.

NSTIC WhipLash – Making Meaning – is a community thing.

Kaliya Young · March 31, 2014 · Leave a Comment

Over a week-ago I tweeted that I had experienced NSTIC whiplash yet again and wasn’t sure how to deal with it. I have been known to speak my mind and get some folks really upset for doing so – Given that I know the social media savy NSTIC NPO reads all tweets related to their program they know I said this. They also didn’t reach out to ask what I might be experiencing whiplash about.
First of all since I am big on getting some shared understanding up front – what do I mean by “whiplash” it is that feeling like your going along … you think you know the lay of the land the car is moving along and all of a sudden out of nowhere – a new thing “appears” on the path and you have to slam on the breaks and go huh! what was that? and in the process your head whips forward and back giving you “whip-lash” from the sudden stop/double-take.
I was toddling through and found this post.  What does it Mean to Embrace the NSTIC Guiding Principles?
I’m like ok – what does it mean? and who decided? how?
I read through it and it turns out that in September the NPO just decided it would decide/define the meaning and then write it all out and then suggest in this odd way it so often does that “the committees” just go with their ideas.

“We believe that the respective committees should review these derived requirements for appropriate coverage of the identity ecosystem.   We look forward to continued progress toward the Identity Ecosystem Framework and its associated trustmark scheme.”

Why does the NPO continue to “do the work” that the multi-stakeholder institution they set up was created to do that is to actually figure out the “meaning” of the document.
[Read more…] about NSTIC WhipLash – Making Meaning – is a community thing.

I'm not your NSTIC "delegate" any more … pls get involved.

Kaliya Young · March 10, 2014 · 1 Comment

I have heard over the past few years from  friends and associates in the user-centric ID / Personal Cloud/ VRM Communities or those people who care about the future of people’s identities online say to me literally – “Well its good  you are paying attention to NSTIC so I don’t have to.”
I’m writing to say the time for that choice is over. There is about 1 more year left in the process until the “outputs” become government policy under the recently released White House Cyber Security Framework (See below for the specifics).
[Read more…] about I'm not your NSTIC "delegate" any more … pls get involved.

What is a Functional Model?

Kaliya Young · March 6, 2014 · 1 Comment

I have been working in the identity industry for over 10 years. It was not until the IDESG – NSTIC plenary that some folks said they were working on a functional model that I heard the term.  I as per is normal for me pipped up and asked “what is a functional model”, people looked at me, looked back at the room and just kept going, ignoring my question.  I have continued to ask it and on one has answered it.
I will state it out loud here again –

What is a Functional Model?

How to Participate in NSTIC, IDESG – A step by step guide.

Kaliya Young · February 26, 2014 · Leave a Comment

The Identity Ecosystem Steering Group is a multi-stakeholder organization (See this post about how join.) Technically You can participate on lists even if you are not members but it is better that you go through the process of joining to be “officially” part of  the organization.
If you join the IDESG it is good to actively participate in at least one active committee because that is where organization work is done by committees – any person or organization from any stakeholder category can participate.
The committees have mailing lists – that you subscribe to (below click through where it says Join Mailing list and put in the e-mail address you want to use, share your name and also a password).
On the list the group chats together on the list and talk about the different work items they are focused on.  They have conference calls as well to talk together (these range from once a week to once a month).  You can also contact the chair of the committee and “officially” join but that is not required.
If you are reading this and getting involved for the first time – read through this list and pick one of the committees that sound interesting to you.  They are friendly folks and should be able to help you get up to speed – ask questions and ask for help. This whole process is meant to be open and inclusive.
[Read more…] about How to Participate in NSTIC, IDESG – A step by step guide.

How to Join NSTIC, IDESG – A step by step guide.

Kaliya Young · February 20, 2014 · Leave a Comment

The National Strategy for Trusted Identities in Cyberspace calls for the development of a private sector lead effort to articulate an identity ecosystem.
To be successful it needs participation from a range of groups.
An organization was formed to support this – the Identity Ecosystem Steering Group in alignment with the Obama administration’s open government efforts.
The “joining” process is not EASY but I guess that is part of its charm. It is totally “open and free” but challenging to actually do.
 

PART 1 – Getting an Account on the Website!

Step 1: Go to the website: http://www.idecosystem.org
[Read more…] about How to Join NSTIC, IDESG – A step by step guide.

Value Network Mapping an Ecosystem Tool

Kaliya Young · July 3, 2013 · Leave a Comment

My response, two years ago to the NSTIC (National Strategy for Trusted Identities in Cyberspace) Program Office issued Notice of Inquiry about how to govern an Identity Ecosystem included a couple of models that could be used to help a community of companies & organizations in an ecosystem co-create a shared picture. A shared co-created picture is an important community asset to develop early on because it becomes the basis for a real conversation about critical issues that need to be addressed to have a successful governance emerge.
The Privacy Committee within NSTIC has a Proactive Privacy Sub-Committee and before I went on my trip around the world (literally) a month ago.  I was on one of the calls and described Value Network Mapping and was invited to share more about the model/method and how it might be used.
Value Network Maps are a tool that can help us because both the creation of the map and its subsequent use by the companies, organizations, people and governments that are participating strengthens the network.   This is important because we are dealing with a complex problem with a complex range of players. In the map below we are in the top left quadrant – we NEED strong networks to solve the problems we are tasked with solving.  If we don’t have them we will end up with Chaos OR we will have a hierarchical solution imposed to drive things towards the complicated and simple but …given the inherent nature of the problem we will NOT fully solve the problem and fall off the “cliff” on the edge between simplicity and into chaos.
(In this diagram based on the cynefin framework developed by David Snowden architect of children’s birthday parties using complexity theory and the success of Apolo 13 )

 
So – what is a Value Network Map?
It models technical & business networks by figuring the roles in any given system and then understanding the value that flow between different roles.  Value flows include payment for the delivery of goods or services (these are tangible deliverables) but also intangible deliverables such as increased level of confidence because information was shared between parties (but was not contractually obligated and no payment was made).
Drawing from Verna’s book/site that lays out how to do it. There are four steps to a value network map.
1. Define the scope and boundaries, context, and purpose.
2. Determine the roles and participants, and who needs to be involved in the mapping.
3. Identify the transactions and deliverables, defining both tangibles and intangibles.
4. Validate it is complete by sequencing the transactions.
 
I’ve worked on several value network mapping projects.
I worked with the Journalism that Matters to document he old and new journalism ecosystem.I have lead several community Value Network Mapping efforts.


This projects highlights how the method can be used to talk about a present/past state about how things happen “now”. How do people today or 20 years ago share verified attributes with business and government entities one does business with?  If we understand the roles that exist in a paper based version/world How do those roles change in a future enable with technology and how do the value flows change and what new roles are created/needed?
A value networm map can be used to map the flow of rights and duties between different roles in an ecosystem can also be considered along with the flow of monetary and other value.
Two years ago I went with Verna Allee (the innovator of the method) to  the Cloud Identity Summit  to work on a map for my organization the Personal Data Ecosystem Consortium focused on the “present state” map to explain what currently happens when someone visits a website and clicks on an add to go buy something and then is asked to provide identity attributes.
We took this FCC submitted map that has the individual at the center and data flows to the businesses, government and organizations they do business with and is sold on to Data Brokers and then Data Users buy it to inform how they deal with the individual all without their awareness or consent.

 
PersonalData-VNA-NowMapWe added in a wrinkle to this flow and asked what happens when an individual has to prove something (an attribute) about themselves to make a purchase.
Our hope was to do this and then work on a future state map with a Personal Cloud provider playing  a key role  to enable new value flow’s that empower the  Individual with their data and enabling similar transactions.
This is best viewed in PDF so if you click on the link to the document it will download.
Creating this map was an interactive process involving involved two dozen industry professionals that we met with in small groups.  It involved using large chart paper paper and post-it notes and lines on the map.   We came into the process with some of the roles articulated, some new roles were added as we began mapping with the community.
An example to give you a sense of what it looks like when you do it in real life is this map that shows how trust frameworks & the government’s reduction of risk in the credit card system.

This was a small piece of the original map for the Personal Data Ecosystem (it did not end up getting included in the PDF version).  The roles are the orange flowers and the green arrows are tangible value flows and the blue arrows are intangible value flows.
So how could the Proactive Privacy Sub-Committee use this method?
At an IIW11 one of the practitioners of value network mapping came to share the method and we broke up into smal groups to map different little parts of an identity ecosystem. We had a template like this picking four different roles and then beginning to map.

The exercise is written about here on Verna’s website.
Scott David was a community member there and really saw how it was a tool to understand what was happening in systems AND to have a conversation about the flow of rights and responsibilities flow.
The method is best done face to face in small groups.  It helps if the groups are diverse representing a range of different perspectives.  A starting point is a use-case a story that can be mapped – what are the roles in that story and then walking through the different transactions.
So how do we “do” it. Well a starting point is for those interested in helping lead it to identify themselves in the context of the pro-active privacy committee.  We should work together  to figure out how we lead the community using this process to figure out the privacy implications and see where the money flows for different proposed solutions.
We can try to do a session at the upcoming July or October plenary.
We could also organize to do some meetings at:

  • conferences in the next few months were we can identify 5-10 interested IDESG members to participate in mapping an ecosystem chunk for an hour or two.
  • in cities around the country where we identify 5-10 folks who want to spend an hour or two mapping an ecosystem chunk.

It would be great if we decide to do this that the Secretariat lead by Kay in her role as Executive Director of the IDESG can support us in organizing this (That is why we are paying htem 2.5 million buck s to help us  do the work of  organizing in a meaningful way.
I am friends with Verna Allee and can ask her for advice on this however I think the kind of help/advice we need to really use this method and do it WELL would behove us to actually use NSTIC IDESG moneys to hire Verna to engage with us in a serious way. When I wrote my NSTIC NOI I did so thinking that their would finally be monies available to pay people to do community conference building work like this.  Perhaps it is not to late to do so.
 
 

Online Community Unconfernece "Its BACK!"

Kaliya Young · March 19, 2013 · Leave a Comment

I am really excited to be working with a super awesome crew of leaders of the Online Community Manager Tribe – or OCTribe.  We have been considering reviving the event and the pieces have finally come together to do it.

May 21st at the Computer History Museum

Registration is Open!
I really love the other co-organizers who are all rockstar community managers.

  • Bill Johnston, Red Plastic Monkey
  • Susan Tenby, Blog
  • Gail Williams, Blog
  • Scott Moore, Phoom
  • Marina Ogneva, Twitter, Facebook 
  • Rachel Luxemburg, Fait Lux

The conference was originally produced by Forum One and I contracted with them to help design and facilitate. That event itself grew out of an invitational summit they hosted annually on online communities.  I actually attended one of these in 2004 as a replacement for Owen Davis who I worked for at the time at Identity Commons (1).
My firm Unconference.net is doing the production and facilitation for the event.
I plan to bring forward topics of digital identity forward at the event and hopefully get some of the amazing expertise on identity and reputation to participate in NSTIC.
 
 

WEF Report #3: Unlocking the Value of Personal Data!

Kaliya Young · March 6, 2013 · Leave a Comment

[This is cross posted on the PDEC blog – http://pde.cc/2013/03/wef-report-3/]
The World Economic Forum released its third major report about Rethinking Personal Data: Unlocking the Value of Personal Data: From Collection to Usage. PDEC has worked with the WEF’s Rethinking Personal Data project since before its first gathering in the Summer of 2010. It is really gratifying to see this third report come out and continue to move the issue forward.
The Rethinking Personal Data work is now within a larger umbrella WEF’s calling “Hyperconnectivity,” lead by Bill Hoffman, the original steward of the Rethinking Personal Data project.
Unlocking’s executive summary highlighted what PDEC member startups have been building:

New ways to engage the individual, help them understand and provide them with the tools to make real choices based on clear value exchange.

and the path forward of

Needing to demonstrate how a usage, contextual model can work in specific real world application.

The report says we must solve simplicity and elegance of design for usability so people can see the data generated by and about them.
The last part of the executive summary calls for “stakeholders to more effectively understand the dynamics of how the personal data ecosystem operates. A better coordinated way to share learning, shorten feedback loops and improve evidence-based policy-making must be established.”
The Rethinking Personal Data project convened six face-to-face events leading to the report. I participated in four of them in 2012 on behalf of PDEC: March in San Jose, June in London, September in Tianjin, and October in Brussels.

One of the meetings’ themes was the challenge to rise to the Fair Information Practice Principles. The US FTC‘s FIPPs were written in the 1970’s when citizens raised concerns to Congress about how they were ending up on catalogue mailing lists. This offline model is not an ideal basis for how to address the economic opportunities of personal data and the challenges it presents today.

The second chapter covers the context of data use, where everything surrounding data use affects people’s privacy expectations and the choices of institutions using their data. It’s great seeing this level of nuance brought to a general business audience.
This report is notable for highlighting the role of the personal data store in initatives put forward by the UK, French and US governments that mandate Data Handbacks, that data created by an individual when transacting with a government or business should be given back to the individual.

 
A few paragraphs stand out for me in looking ahead and the opportunity for PDEC companies.

Potentially, markets can encourage a “race to the top” in which user control and understanding of how data is used and leveraged become competitive differentiators. Various trust marks and independent scoring systems will help stimulate this kind of response.
Given the complexity of choices, there is also potential for the development of “agency type” services to be offered to help individuals. In such a scenario, parties would assist others (often for a commission or other fee) in a variety of complex settings. Financial advisers, real estate agents, bankers, insurance brokers and other similar “agency” roles are familiar examples of situations when one party exercises choice and control for another party via intermediary arrangements. Just as individuals have banks and financial advisers to leverage their financial assets and take care of their interests for them, the same type of “on behalf of” services are already starting to be offered with respect to data.

The last section of the report outlines thirteen different use-cases for personal data by a range of stakeholders, including two PDEC startup circle companies – Personal and Reputation.com.

Related articles
  • Data Vaults Go Mainstream at World Economic Forum (personal.com)

 

Enhanced by Zemanta
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 7
  • Go to Next Page »

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact