Download presentation
Presentation is loading. Please wait.
Published byHector Carson Modified over 9 years ago
1
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015
2
© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 2 Identity Framework Components In the Social Network Large-Scale, Cost-Effective, Authentication and Identity Management Solutions Social Network Participant Allows for anonymous sharing of information and collaboration User value can be managed by the community even though they are anonymous Unknown to the provider Typically a non-paid service Privacy provided through anonymity Social Network Service Provider Anonymous Asserted Market Need The social network needs awareness of the business use of the tool and expectations of the user-base. Therefore define identity requirements and provide tools to meet these requirements Verified Known to the provider by the identity provided Established through registration and rule sets enforced by provider Weak non-repudiation Strong non-repudiation of transaction in an open or closed environment Build upon the value of federation…reinforce value of the identity Need to presume anonymity in the open social network Effective use within an enterprise or within a community of interest Users need to recognize the identity risk Known to the provider – registration authority has validated assertion Established through registration and rule sets…can be federated Strong non-repudiation Allows for full enforcement of rules and potential liability Continuum
3
© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 3 The Role of Identity in the Social Network Anonymous Anonymous to both provider and to other users Valuable in marketing and activity measures Pseudonymous Known to provider (multiple levels of validation), but anonymous to other users Needed when payment is required to participate Useful when there is a fusion of application Need to have trust in the identity protection capabilities of the service provider Asserted and unproven Good where there is an existing level of trust (within an enterprise or a community of interest) Useful in help forums…community evaluation of responses Asserted and validated without “liability” Need for strong repudiation Asserted and validated with “liability” Need for strong non-repudiation and security Large-Scale, Cost-Effective, Authentication and Identity Management Solutions
4
© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 4 Social Networking in Government What are we trying to achieve through social networking Government to Citizen (G2C) Value Fusion of social networking services and general applications Offer applications that provide privacy and identity awareness (healthcare, benefits) Offer social networking tools that allow anonymity (comments, surveys) –Information value is based upon correlation Need to establish trust in the anonymity/privacy Government to Government (G2G) and Government to Business (G2B) Value Applies in any professional to professional exchange – context awareness Applies to market establishment – procurement, information, and finance –Information value can be based upon provider of information Need to establish trust in the true identity (attached to credentials) Multiple Identities within the Social Network Only the user can re-create anonymity with the service provider The service provider and the user can recreate anonymity with the social network user base. Release of private information only with verified identity and/or strong credentials (e.g. PHRs) Impact of OpenID on the government use of social networks Use fundamentals of identity: align identity proofing with downstream use of credentials Large-Scale, Cost-Effective, Authentication and Identity Management Solutions
5
© 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 5 Use Cases and Lessons Learned Healthcare Use Case: Fusion of Social Networking and Applications G2C – Patient Health Record (PHR) privacy, but tied to anonymous social networking around conditions Education Use Case: Trust Zone G2C – age verification for under-age and parental consent to participate and interact Law Enforcement and Intelligence Use Case: Information Sharing G2G – platform requires confidence in who is providing information as much as it requires confidence in who is consuming information Banking Use Case: Trust Network G2G and G2C – federated trust model with strong authentication to create a trading and commerce market Gaming Use Case: Off-Platform Market G2C – anonymous identities traded off platform to boost player standing in the environment Large-Scale, Cost-Effective, Authentication and Identity Management Solutions
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.