Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.

Slides:



Advertisements
Similar presentations
Economic Tussles in Federated Identity Management Tyler Moore joint work with Susan Landau WEIS 2011.
Advertisements

Chapter 3 Health Care Information Systems: A Practical Approach for Health Care Management 2nd Edition Wager ~ Lee ~ Glaser.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Electronic Submission of Medical Documentation (esMD) for Medicare FFS Presentation to HITSC Provenance Workgroup January 16, 2015.
Confidentiality, Ethics, Privacy, and Access REPORT FROM CONFIDENTIALITY, ETHICS, PRIVACY AND ACCESS Group B.
Connecticut Ave NW, Washington, DC Direct Exchange from Provider to Patient/Consumer ….and Back! David C. Kibbe, MD MBA.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
S&I Data Provenance Initiative Presentation to the HITSC on Data Provenance September 10, 2014.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
HIE Implementation in Michigan for Improved Health As approved by the Michigan Health Information Technology Commission on March 4, 2009.
Information Sharing Puzzle: Next Steps Chris Rogers California Department of Justice April 28, 2005.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
NSTIC ID Ecosystem A Conceptual Model v03 Andrew Hughes October October IDESG Version 1.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Andrew Nash Senior Director of Identity Services Topics in Identity and Payments.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
HIT Policy Committee Nationwide Health Information Network Governance Workgroup Recommendations Accepted by the HITPC on 12/13/10 Nationwide Health Information.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
EGovernment Services in Poland Today & in The Future Dariusz Bogucki Ph.D, IDA II, National Co-ordinator National Registers Department, Ministry of Internal.
State Alliance for e-Health Conference Meeting January 26, 2007.
“ Jericho / UT Austin Pilot” Privacy with Dynamic Patient Review April 9, 2013 Presented by: David Staggs, JD, CISSP Jericho Systems Corporation.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Pharmaceutical system strengthening – Is there a need for a new paradigm? Andreas Seiter The World Bank ICIUM 2011, Antalya 1.
Planning the Future of CDC Secure Public Health Transactions and Public Health Information Network Messaging System (PHINMS) Jennifer McGehee, Tim Morris,
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
LEGAL ISSUES IN MEDICAL HOME DEVELOPMENT Presented by: Gerry Hinkley Davis Wright Tremaine LLP
Identity in the Virtual World: Creating Virtual Certainty David L. Wasley Information Resources & Communications UC Office of the President.
Government Clouds Lessons from International Experience and Implications for World Bank Projects John Wille Investment Climate Department September 2010.
ONC’s Proposed Strategy on Governance for the Nationwide Health Information Network Following Public Comments on RFI HIT Standards Committee Meeting September.
Consumer Authentication for Networked Personal Health Information Redwood Health Information Collaborative March 18, 2008 Josh Lemieux Director, Personal.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Interoperable Trust Networks Chris Rogers California Dept of Justice February 16, 2005.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IAM VISION OUR CREATIVE INSPIRATION IAM STRATEGY & ROADMAP TEAM JUNE 3, 2015.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Access Policy - Federation March 23, 2016
GEOSS Federated Single Sign-On
Update from the Faster Payments Task Force
Paperless & Cashless Poland Program overview
Federated IdM Across Heterogeneous Clouding Environment
Tokens & Proofing De-Mystified
A reference framework for consumers' digital competence
Building A Community of Trust to Transform Medicines Development
Sustainable Development Goals
Concerns of a Privacy Advocate – and How to Respond
HIMSS National Conference New Orleans Convention Center
Healthcare Privacy: The Perspective of a Privacy Advocate
Introduction of ISO/IEC Identity Proofing
Dashboard eHealth services: actual mockup
Enforcement and Policy Challenges in Health Information Privacy
Web Information Systems Engineering (WISE)
CyberSecure: Your Medical Practice
Reiniger LLC.
eHealth/mHealth Gisele Roesems
Presentation transcript:

Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015

© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 2 Identity Framework Components In the Social Network Large-Scale, Cost-Effective, Authentication and Identity Management Solutions Social Network Participant  Allows for anonymous sharing of information and collaboration  User value can be managed by the community even though they are anonymous  Unknown to the provider  Typically a non-paid service  Privacy provided through anonymity Social Network Service Provider Anonymous Asserted Market Need The social network needs awareness of the business use of the tool and expectations of the user-base. Therefore define identity requirements and provide tools to meet these requirements Verified  Known to the provider by the identity provided  Established through registration and rule sets enforced by provider  Weak non-repudiation  Strong non-repudiation of transaction in an open or closed environment  Build upon the value of federation…reinforce value of the identity  Need to presume anonymity in the open social network  Effective use within an enterprise or within a community of interest  Users need to recognize the identity risk  Known to the provider – registration authority has validated assertion  Established through registration and rule sets…can be federated  Strong non-repudiation  Allows for full enforcement of rules and potential liability Continuum

© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 3 The Role of Identity in the Social Network  Anonymous  Anonymous to both provider and to other users  Valuable in marketing and activity measures  Pseudonymous  Known to provider (multiple levels of validation), but anonymous to other users  Needed when payment is required to participate  Useful when there is a fusion of application  Need to have trust in the identity protection capabilities of the service provider  Asserted and unproven  Good where there is an existing level of trust (within an enterprise or a community of interest)  Useful in help forums…community evaluation of responses  Asserted and validated without “liability”  Need for strong repudiation  Asserted and validated with “liability”  Need for strong non-repudiation and security Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 4 Social Networking in Government  What are we trying to achieve through social networking  Government to Citizen (G2C) Value  Fusion of social networking services and general applications  Offer applications that provide privacy and identity awareness (healthcare, benefits)  Offer social networking tools that allow anonymity (comments, surveys) –Information value is based upon correlation  Need to establish trust in the anonymity/privacy  Government to Government (G2G) and Government to Business (G2B) Value  Applies in any professional to professional exchange – context awareness  Applies to market establishment – procurement, information, and finance –Information value can be based upon provider of information  Need to establish trust in the true identity (attached to credentials)  Multiple Identities within the Social Network  Only the user can re-create anonymity with the service provider  The service provider and the user can recreate anonymity with the social network user base.  Release of private information only with verified identity and/or strong credentials (e.g. PHRs)  Impact of OpenID on the government use of social networks  Use fundamentals of identity: align identity proofing with downstream use of credentials Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 5 Use Cases and Lessons Learned  Healthcare Use Case: Fusion of Social Networking and Applications  G2C – Patient Health Record (PHR) privacy, but tied to anonymous social networking around conditions  Education Use Case: Trust Zone  G2C – age verification for under-age and parental consent to participate and interact  Law Enforcement and Intelligence Use Case: Information Sharing  G2G – platform requires confidence in who is providing information as much as it requires confidence in who is consuming information  Banking Use Case: Trust Network  G2G and G2C – federated trust model with strong authentication to create a trading and commerce market  Gaming Use Case: Off-Platform Market  G2C – anonymous identities traded off platform to boost player standing in the environment Large-Scale, Cost-Effective, Authentication and Identity Management Solutions