1 / 10

:: SecureId :: Security of Identity Through Knowledge

:: SecureId :: Security of Identity Through Knowledge. Imagine that you are in control of your digital identity. Underlying Questions. What is context in a digital realm? Why does it matter? Why is multi-faceted digital identity important? Who should control personal data? Why? How?.

erolph
Download Presentation

:: SecureId :: Security of Identity Through Knowledge

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. :: SecureId ::Security of IdentityThrough Knowledge Imagine that you are in control of your digital identity. danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  2. Underlying Questions • What is context in a digital realm? Why does it matter? • Why is multi-faceted digital identity important? • Who should control personal data? Why? How? danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  3. What is context in a digital realm? (and why does it matter?) • Context provides cues necessary for appropriate social interactions • Individuals present different facets dependent on context • Context is derived from location, people and types of interactions • Digital realm: location is irrelevant or misleading; often replaced by personas danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  4. Why is multi-faceted digital identity important? • Necessary to present oneself properly (social norms or mores) • Useful for developing contextual reputations • Crucial for marginalized individuals • Directly related to trust/deception danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  5. Who should control personal data? Why? • Individual vs. business vs. government • Privacy vs. economic gain / ease of use • Individual control of identity essential for improved online social interactions • Must be able to properly present oneself • Must understand how one is being perceived • Should be able to control representation, not just data danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  6. An Approach :: SecureId • Construct & manage digital facets • Associate particular identity information with them • Knowledge-based security to control who may access them • Provide personal visual landscape • Conveys individual digital portrait • Gives individuals a sense of what they are sharing danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  7. Profile Construction danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  8. Facet Creation danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  9. Example worlds danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

  10. More Information http://smg.media.mit.edu/projects/SecureId danah@media.mit.edu danah boyd, Nelson Lai . Sociable Media, MIT Media Lab . 20 March 2002

More Related