230 likes | 372 Views
Alice E. Marwick New York University PhD Candidate Department of Culture and Communication. Selling Your Self: Examining Values in Identity 2.0 September 30, 2006.
E N D
Alice E. MarwickNew York UniversityPhD CandidateDepartment of Culture and Communication Selling Your Self: Examining Values in Identity 2.0 September 30, 2006
Network identity refers to the global set of attributes that are contained in an individual's various accounts with different service providers. These attributes include such information as name, phone numbers, social security numbers, addresses, credit records, and payment information. For individuals, network identity is the sum of their financial, medical, and personal data—which must be carefully protected. For businesses, network identity management creates the ability to have greater knowledge of their customers and constituents, and to interact with them in ways that bring greater value to both parties. Liberty Alliance FAQ
Identity 1.0 • Multiple logins/passwords • Single-Sign on • Identity Context • MySpace • Data Collection • Search engines, data aggregators, behavioral tracking • Identity Fraud • Theft, phishing
Identity 2.0 Wikipedia “Identity 2.0, also called digital identity, is the anticipated revolution of identity verification on the internet. Identity 2.0 stems from the Web 2.0 theory of the world wide web transition. It's emphasis is a simple and open method of identity transactions similar to those in the physical world, such as driver's license.” (http://en.wikipedia.org/wiki/Identity_2.0)
Identity 2.0 • Single-sign on • Identity Providers • User control: choose which identity to present when and to who • Decentralized
Identity 2.0 • Single-sign on • Identity Providers • User control: choose which identity to present when and to who • Decentralized
Values • User Agency • Does software give users control over own information? • Multiple personas? • Software choice? • Opt-out? • Openness • Open-source / open-standard • Developer /user / citizen participation • Browser / platform independence
Values • User-Friendliness • Easy to use? • Culturally specific? • Accessibility / literacy requirements • Data Protection • Third party gathering • Theft / Fraud
OpenID Sxip (DIX), NetMesh (LID), Yadis
CardSpace (nee InfoCard) Microsoft’s Identity Metasystem
conclusions • Solution to ID 1.0 problems? • Facilitate new forms of data gathering and aggregation • Interplay between user-provided data & monetization needs continued scrutiny • Disconnect in thinking about “identity” ?
alice.marwick@nyu.edu http://www.tiara.org/blog