Download presentation
Presentation is loading. Please wait.
1
Alice E. Marwick New York University PhD Candidate Department of Culture and Communication Selling Your Self: Examining Values in Identity 2.0 September 30, 2006
3
Network identity refers to the global set of attributes that are contained in an individual's various accounts with different service providers. These attributes include such information as name, phone numbers, social security numbers, addresses, credit records, and payment information. For individuals, network identity is the sum of their financial, medical, and personal data—which must be carefully protected. For businesses, network identity management creates the ability to have greater knowledge of their customers and constituents, and to interact with them in ways that bring greater value to both parties. Liberty Alliance FAQ
6
Identity 1.0 Multiple logins/passwords –Single-Sign on Identity Context –MySpace Data Collection –Search engines, data aggregators, behavioral tracking Identity Fraud –Theft, phishing
7
Identity 2.0 Wikipedia “Identity 2.0, also called digital identity, is the anticipated revolution of identity verification on the internet. Identity 2.0 stems from the Web 2.0 theory of the world wide web transition. It's emphasis is a simple and open method of identity transactions similar to those in the physical world, such as driver's license.” (http://en.wikipedia.org/wiki/Identity_2.0)http://en.wikipedia.org/wiki/Identity_2.0
8
Identity 2.0 Single-sign on Identity Providers User control: choose which identity to present when and to who Decentralized
11
Identity 2.0 Single-sign on Identity Providers User control: choose which identity to present when and to who Decentralized
12
Values User Agency –Does software give users control over own information? –Multiple personas? –Software choice? –Opt-out? Openness –Open-source / open-standard –Developer /user / citizen participation –Browser / platform independence
13
Values User-Friendliness –Easy to use? –Culturally specific? –Accessibility / literacy requirements Data Protection –Third party gathering –Theft / Fraud
14
OpenID Sxip (DIX), NetMesh (LID), Yadis
16
Alicetiara.livejournal.com
19
CardSpace (nee InfoCard) Microsoft’s Identity Metasystem
22
conclusions Solution to ID 1.0 problems? Facilitate new forms of data gathering and aggregation Interplay between user-provided data & monetization needs continued scrutiny Disconnect in thinking about “identity” ?
23
alice.marwick@nyu.edu http://www.tiara.org/blog
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.