Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Conference on Accelerating Global Commerce Through Technology and Policy Elliot E. Maxwell September 20, 2002 The E-Commerce Policy Landscape.
FIA Prague Preparation February 6, Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.
Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Signature (unit, name, etc.) Introduction to biometrics from a legal perspective Yue Liu Mar NRCCL, UIO.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
National Smartcard Project Work Package 8 – Security Issues Report.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.
Anonymity, Security, Privacy and Civil Liberties
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
Guidelines to Effective Networking In the Middle East & North Africa.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
SuperIdentity: Fusion of cues across online and offline contexts Sarah Stevenage (University of Southampton)
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
The Challenges of Online Identity Assurance in a Judicial Setting Alison Knight, Supervisors: Prof. Steve Saxby (Law) & Dr. Mark Weal (ECS) Law ILAWS dog.
Police 3.6 Politics and Government. DNA Data Collection.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Operator Perspective: Dealing with Issues & Relationships in a changing eco-system Edin Bektesevic Senior Technology Strategist Vodafone.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Internet Research Law and Ethics. Consider the Law Legal and ethical issues help us broaden considerably our study of Internet research. Even relatively.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Consumers’ Association Engaging with Online Consumers Allan Williams Senior Communications Policy Advisor
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Big Data Analytics: An Ethical Question Leah Korganowski COMP 607 – Fall 2015.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Unlinking Private Data
Privacy and Public Policy Implications of IoT
Privacy on the Internet
Information Security, Theory and Practice.
Athina Antoniou and Lilian Mitrou
A BIG DATA WORLD Smaller and smaller and smarter devices
Privacy and Information
Ethical questions on the use of big data in official statistics
Preparing for the GDPR - What do we need to do if we process children’s personal data? Data Protection Practitioners’ Conference 2018 #DPPC2018.
Information technologies/NBIC and Big data
18734: Foundations of Privacy
Reiniger LLC.
IT and Society Week 2: Privacy.
Presentation transcript:

Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight

2 We intentionally reveal, and unintentionally leak, our identity information in many ways From ‘digital fingerprints’ to ‘online personae’: –possibility to record and store everything (technically and economically) –possibility to analyse identity data –possibility to do massive personalisation Identity value and the ‘control’ conundrum IDENTITY CHALLENGES

‘HOT ON YOUR DIGITAL TRAIL’ 3

4 WHO AM I? (biographical)(personae) Real World Digital World (biometrics) (cybermetrics) Who do I think I am? What is my personality? Who do others say I am? How do I act? How am I represented?

5 Super Identity? (E)IDENTITY TO (E-)IDENTIFICATION

6 HOW CAN I BE SURE YOU ARE YOU? Authentication, trust and reputation Different approaches to identification and verification –Something you are –Something you have –Something you know Bridging links with confidence between the real world and the cyber world

7 Super ID?

THE ‘SUPER IDENTITY’ PROJECT How can we accurately identify people online and detect online identity misuse? 8

CRIMINALS AND THE INDIVIDUAL 9 Identity theft and identity crime on the rise globally The extent of the online problem Risks and vulnerabilities The challenges of digital identity management Deceive

COMMERCE AND THE INDIVIDUAL 10 Identity as online currency Targeted advertising Data aggregation Function creep Identity ‘de-contextualised’ ‘Big Data’

11 PROFILING: AUTOMATED LINKS AND PREDICTIONS

STATES AND THE INDIVIDUAL 12 Identity policies Key policy activity areas eID cards Biometric technologies Covert surveillance Policy decision-making: balancing tensions between public and private interests

SOCIAL AND LEGAL Social acceptability - researching teenagers’ attitudes around personal data and online self portrayal How can I protect my identity legally? Do existing models go far enough? 13

PROTECTING IDENTITY – EXISTING LEGAL MODELS 14 A right to privacy A ‘redress’ model A relative right Obscures ‘mis’-identity concerns Data protection A ‘control’ model Fair processing principles ‘Informed consent’ concerns

15 LEGAL RIGHTS IN OUR (DIGITAL) IDENTITY? Copyright? Database rights? A human right to identity? Confidential information? Contract? Personality rights? IS THIS ENOUGH TO PROTECT ‘ME’? A right to be forgotten? A right to be made anonymous? Property ownership? A UN Charter of digital identity?

16 1.Techno-regulation 2.Risk and context aware 3.Data stewardship 4.Greater accountability 5.Greater transparency 6.More empowered individuals 7.Citizen-centric identity policies 8.Internationalism LEGAL IDENTITY PRINCIPLES

17 CONCLUSION The identity landscape is changing: More opportunities, more risks Converging drivers for identity policies worldwide: How best to police identity misuse and ensure fair outcomes? Many legal models have not kept pace: We need to take a holistic perspective on modern identity – identity as “doing”, not just being Code and market and norms and law: We need inclusive dialogues The future of identity: Many challenges lie ahead… INCREASINGLY NETWORKED IDENTITIES IN AN INCREASINGLY NETWORKED WORLD

18 FOR MORE INFORMATION: Steve Saxby & Alison Knight “Identity Crisis: Global Challenges to Identity Protection in a Networked Age” ‎ Thank you for listening Questions?