Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight

Embed Size (px)

Text of Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight

Main presentation title goes here.

Identity Crisis: Global Challenges of Identity Protection in a Networked WorldAlison Knight

1

2We intentionally reveal, and unintentionally leak, our identity information in many waysFrom digital fingerprints to online personae: possibility to record and store everything (technically and economically)possibility to analyse identity datapossibility to do massive personalisation Identity value and the control conundrum

IDENTITY CHALLENGES2HOT ON YOUR DIGITAL TRAIL

3

3

4WHO AM I?

(biographical)(personae)Real World Digital World(biometrics) (cybermetrics)Who do I think I am?What is my personality?Who do others say I am?How do I act? How am I represented?

4

5Super Identity?(E)IDENTITY TO (E-)IDENTIFICATION

6HOW CAN I BE SURE YOU ARE YOU? Authentication, trust and reputation Different approaches to identification and verificationSomething you areSomething you haveSomething you know Bridging links with confidence between the real world and the cyber world

7

Super ID? THE SUPER IDENTITY PROJECT

How can we accurately identify people online and detect online identity misuse? 8

8

CRIMINALS AND THE INDIVIDUAL9

Identity theft and identity crime on the rise globallyThe extent of the online problemRisks and vulnerabilities The challenges of digital identity management

Deceive

9

COMMERCE AND THE INDIVIDUAL10Identity as online currencyTargeted advertising Data aggregationFunction creep Identity de-contextualisedBig Data

10

11PROFILING: AUTOMATED LINKS AND PREDICTIONS

STATES AND THE INDIVIDUAL

12

Identity policiesKey policy activity areas eID cardsBiometric technologiesCovert surveillance Policy decision-making: balancing tensions between public and private interests

12SOCIAL AND LEGALSocial acceptability - researching teenagers attitudes around personal data and online self portrayal

How can I protect my identity legally? Do existing models go far enough? 13

13

PROTECTING IDENTITY EXISTING LEGAL MODELS14A right to privacyA redress modelA relative rightObscures mis-identity concernsData protection A control modelFair processing principlesInformed consent concerns

14

15LEGAL RIGHTS IN OUR (DIGITAL) IDENTITY?

Copyright?Database rights?A human right to identity?Confidential information?Contract?Personality rights?IS THIS ENOUGH TO PROTECT ME?

A right to be forgotten? A right to be made anonymous?

Property ownership?A UN Charter of digital identity?

16Techno-regulationRisk and context awareData stewardshipGreater accountabilityGreater transparencyMore empowered individualsCitizen-centric identity policies InternationalismLEGAL IDENTITY PRINCIPLES1617CONCLUSIONThe identity landscape is changing:More opportunities, more risks

Converging drivers for identity policies worldwide:How best to police identity misuse and ensure fair outcomes?

Many legal models have not kept pace:We need to take a holistic perspective on modern identity identity as doing, not just being

Code and market and norms and law:We need inclusive dialogues

The future of identity: Many challenges lie ahead

INCREASINGLY NETWORKED IDENTITIES IN AN INCREASINGLY NETWORKED WORLD

17

1818

FOR MORE INFORMATION:

Steve Saxby & Alison Knight Identity Crisis: Global Challenges to Identity Protection in a Networked Age www.superidentity.org/

Thank you for listeningQuestions?