Identity

You are browsing the Identity tag archive.

User Driven Services: 9. Self-managed Identity

User Driven Services: 9. Self-managed Identity

9. Self-managed Identity User Driven Services let users manage their own online identity. Unless we control our identity online, we risk unnecessary exposure to identity theft and unwanted correlation of online activity. At the same time, online services increase the risk of attacks when using the same identifier for multiple functions. User Driven Services allow […]

The Identity Quartet

The Identity Quartet

A functional model for best practice Identity implementations. The Identity Quartet is a framework for online services that allows users to express their Identity on their own terms. When I use the term “Identity”, I refer to the set of identifiers used in reference to users in online services. At the December 2008 Internet Identity […]

Bandit, Higgins, Open Source, Profit and Novell

At EIC2008 last month, Dale Olds of Novell’s Bandit Project gave me a few minutes and some insight into how Novell (and others) are mixing open source with proprietary software to architect a whole new Identity paradigm online. I’ve been following the user-centric Identity movement ever since Doc Searls talked me into attending IIW2006b, an […]

Majority of Americans dislike unauthorized use of behavioral data

From Yahoo News: Majority Uncomfortable with Websites Customizing Content Based Visitors Personal Profiles   Level of Comfort Increases When Privacy Safeguards Introduced ROCHESTER, N.Y.–(BUSINESS WIRE)–A majority of U.S. adults are skeptical about the practice of websites using information about a person’s online activity to customize website content. However, after being introduced to four potential recommendations […]

Law enforcement v Minimal disclosure

The Washington Post today exposed considerable excesses by “fusion” centers organized post 9/11. Intelligence centers run by states across the country have access to personal information about millions of Americans, including unlisted cellphone numbers, insurance claims, driver’s license photographs and credit reports, according to a document obtained by The Washington Post. … Dozens of the […]

The hard stuff – VRM Use Cases

Last week was the Internet Identity Workshop in Mountain View, California, which is, without reservation, the most productive technical gathering I know of. An “unconference,” (facilitated by the incomparable Kaliya Hamlin) it dumps the talking heads for interactive discussions so that folks can get real work done. The culture and focus enable a truly impressive […]

I Support The Standard Label!A simple way for websites to describe in clear, consistent terms what they do with the data we share.
Join the announcement list for up-to-date info.