• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Domains of Identity

Podcast: Inclusionism with Kaliya Young, Author of Domains of Identity

Kaliya Young · September 13, 2020 ·

I spoke with James Felton Keith, author and podcast host of Inclusionism, about my book, Domains of Identity. How do we manage our digital identity? What are the 13 domains of identity?

Listen to Podcast: Inclusionism with Kaliya Young, author of Domains of Identity.

My Talk at New America on Self-Sovereign Identity & the Domains of Identity

Kaliya Young · November 9, 2018 ·

The Future of Property Rights a program at New America just published a new report The Nail Finds a Hammer: Self-Sovereign Identity, Design Principles and Property Rights in the Developing World. I commented extensively on the paper before publication and they included the Domains of Identity within the report. It turns out that many of the Domains of Identity include registries. This whole perspective that registries as the root of many of our systems is very eye opening. Just like when one finds identity one sees it everywhere, it turns our registries are everywhere too.
Mike invited some key contributors to the paper to talk at New America. I presented about both Self-Sovereign Identity AND the domains of Identity … enjoy!!!
https://www.youtube.com/watch?v=U8bZ4GYFwKY

Domains of Identity

Kaliya Young · June 25, 2018 ·

You can download: a summary of the Domains of Identity Here

You can buy the book: published  by Anthem Press. 

On Amazon, On BN, At Powell’s 

The Domains of Identity
by Kaliya “Identity Woman” Young, MSIMS
Abstract:  The Domains of Identity outlines sixteen key categories of transactions  which cause personally identifiable information to be stored in databases. The purpose of this research is to address challenges of Identity Management that involve interactions of almost all people in almost all institutional/organizational contexts. Enumerating the sixteen domains and describing the characteristics of each domain is intended to clarify which problems arise and how they can be solved within each domain. Discussions of identity management are often confusing because they mix issues from multiple domains, or because they try unsuccessfully to apply solutions from one domain to problems in another. Part of the objective of this article is to eliminate this confusion and enable clearer conversations about identity management problems and solutions.
About this Paper: The first version was submitted to the University of Texas at Austin to fulfill the report requirement for the Master of Science in Identity Management and Security.  The Co-Supervisors were Dr. Dawna Ballard and Dr. Bob Blakley.
From the Introduction: There are a few very obvious and much-discussed archetypical identity management scenarios:

  • employee to employer
  • citizen to government
  • consumer to merchant

Each one of these has very different power relationships and characteristics. Through conversations arising out of the UT Austin Masters of Science in Identity Management program, it became clear that these three simple scenarios were not comprehensive enough to hold the whole range of activities that lead to individual’s Personally Identifiable Information (PII) being collected, ending up in databases, and being used and misused. I worked to define a simple comprehensives set of domains, each with different processes and contexts, where individual’s data (PII) ends up in databases. The result is the sixteen domains of identity. Once the domains had been defined, I dove into all the academic research relative to identity management, finding more than 900 articles in the UT Library, and then sifted through them to identify papers that specifically explained and defined the domains. For my masters report, I wrote out detailed descriptions of each domain based on the literature. This article defines the domains and presents a symbol for each the relationship to other domains along with the roles and sources of PII.
The big challenge with the fields of identity management and privacy is that both involve issues across the lifespan of all people and across virtually all institutional/organizational contexts they encounter. Everyone in our society participates in some type of “identity management” on almost a daily basis. It is so common that we do not really think about it. As a result, the discourse about identity often conflates radically different issues.
The black market in which personal data is bought and sold is very different from the contemporary data broker industry, but it is not uncommon for people with fears about personal data use to lump these two contexts together – forgetting that one is a legal business market and the other is a result of criminal activity. For example, an enterprise with weak one factor authentication that is attacked in a spear phishing attack to gain access to the employee directories, exfiltrate information, and sell it on the black market. This type of attack is quite different than the type of data breach Target experienced where the criminals accessed customer credit card information via the controls in the HVAC system and put it on the black market. This research outlines sixteen domains that can hold a comprehensive set of use cases across all the domains that identity management happens in. I define identity domains as the contexts where databases of personally identifying information about people are created or used. These domains are not new. All of them existed 100 years ago. However, computer technologies have changed how they operate.
Enumerating the sixteen domains and describing the characteristics of each domain is intended to enable clear thinking about which problems arise in each domain, and how problems can be solved within each domain. Discussions of identity management are often confusing because they mix issues from multiple domains, or try unsuccessfully to apply solutions from one domain to problems in another domain. One of the objectives of this paper is to eliminate this confusion and enable clearer conversation about identity management problems and solutions that will enhance security and increase privacy.

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact