1 of 21

7th Academics and Practitioners Roundtable

The Information Architecture Conference

March 13-14, 2019

Noreen Whysel

2 of 21

What Is Trust?

3 of 21

Trust is relational

Throughout history, Trust has always been

  • Contractual
  • Relational
  • Emotional
  • Transactional
  • Easy to revoke, hard to reinstate

Rules of Interpersonal Trust Are Complex

4 of 21

Digital Trust is Transactional

In digital systems, Trust is

  • Contractual
  • Transactional
  • Instantaneous
  • Easy to revoke and to reinstate

Rules of Digital Systems Are Less Complex

5 of 21

How About Inclusion?

6 of 21

Inclusion Is Both Among and Different

7 of 21

Trust and inclusion go hand in hand

  • Without trust, a service provider will not provide service.
  • Without trust, an individual will neither ask for nor receive needed services.
  • Without services, vulnerable individuals are at risk.

What Are the Credentials Of Vulnerable Populations?

8 of 21

Who Are Vulnerable Individuals?

9 of 21

Who Are Vulnerable?

  • Children
  • Women
  • Minorities
  • LGBT+
  • Immigrants/Refugees
  • Homeless
  • Disabled
  • Mentally Ill
  • Unemployed
  • Incarcerated/Formerly incarcerated
  • Aged

We All Have Some Experience With Vulnerability

10 of 21

Contexts of Vulnerability

  • Registering for welfare benefits
  • Online dating
  • Accessing healthcare
  • Applying for a passport or driver’s license
  • Registering to vote
  • Registering for the military
  • Etc.

Context may be very different if you are a minor, an immigrant or refugee or a member of another unprotected class

11 of 21

How Do I Know Who

You Are?

12 of 21

Trusting Digital Entities

  • Attributes
  • Identifiers

All digital entities (users, service providers and relying parties) have identifiers composed of attributes

Handling of Attributes May Be Governed by Law

Example: Personally identifiable information or PII is information that, alone or in combination, can be used to trace a person’s identity. PII risk is contextual.

13 of 21

Digital ID

A digital ID is used to authenticate individuals.

The authentication process collects data and matches it against attributes connected to the ID.

This might be a name, birthdate, Social Security Number, password, biometric data or it may require a second factor authentication external to the system.

Authentication is a result of an algorithm (rules) for matching an ID to an authenticated User.

14 of 21

Three components of Digital Trust

  • Data Source: Where is the data from? Who else knows it?
  • Coding: How is it coded? Does it recognize alternative categories or attributes?
  • Device: What device is reading it?

Vulnerable Populations have Low identity assurance Often because they don’t have credentials that match coded categories or attributes

15 of 21

How Do You Know Who

They Are?

16 of 21

Who Authenticates the Service?

Identity Service Provider: Do you know what data they collect on you?

How do they protect you from:

  • Phishing: Do you know if the entity collecting your data is who they say they are?
  • Identity Theft: How easy is it to access and use your data?
  • Transfer: Is your data being sold to third parties?

Is the Identity Provider Regulated? How Is Your Data Protected?

17 of 21

Future Opportunities

18 of 21

Blockchain ID

“The humanitarian community exists in a bubble, so access to an existing community of experts and new technologies to help us better serve communities in crisis is an amazing opportunity,” said Nathan Cooper, Senior Adviser at Red Cross.

“We hit the realization that we can no longer do this with a spreadsheet and beneficiary ID cards. We need something more sustainable, something people can establish, create, hold, and access their identities. It brings dignity, choice and economic stimulus to the local markets where humanitarian aid is needed,” said Caroline Holt, head of global cash distribution, Red Cross.

19 of 21

Trustmarks and Ratings

  • Regulations: FINRA, HIPPA, COPPA, GDPR
  • National Institute for Standards and Technology 800.63
  • Consumer Reports
  • Identity Ecosystem Framework: idefregistry.org
  • RDR Corporate Accountability Index: rankingdigitalrights.org
  • Trustable Technology Mark (IoT): trustabletech.org

20 of 21

Bibliography

Identity Ecosystem Steering Group, IDESG.org

IDESG, Vulnerable Populations, https://wiki.idesg.org/wiki/index.php/Vulnerable_Populations

GSA Privacy Program, Rules and Policies Protecting PII, http://gsa.gov/reference/GSA-privacy-program/rules-and-policies-protecting-pii-privacy-act

21 of 21

THANKS!

@nwhysel