1 / 5

Understanding the Value of Identity in Government Social Networking

Understanding the Value of Identity in Government Social Networking. A Framework of Identity Trust in Government Social Networking. July 31, 2014. Identity Framework Components In the Social Network. Social Network Service Provider. Social Network Participant. Unknown to the provider

anakin
Télécharger la présentation

Understanding the Value of Identity in Government Social Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking July 31, 2014

  2. Identity Framework Components In the Social Network Social Network Service Provider Social Network Participant • Unknown to the provider • Typically a non-paid service • Privacy provided through anonymity • Allows for anonymous sharing of information and collaboration • User value can be managed by the community even though they are anonymous Anonymous Market Need The social network needs awareness of the business use of the tool and expectations of the user-base. Therefore define identity requirements and provide tools to meet these requirements • Known to the provider by the identity provided • Established through registration and rule sets enforced by provider • Weak non-repudiation • Need to presume anonymity in the open social network • Effective use within an enterprise or within a community of interest • Users need to recognize the identity risk Asserted Continuum • Known to the provider – registration authority has validated assertion • Established through registration and rule sets…can be federated • Strong non-repudiation • Allows for full enforcement of rules and potential liability • Strong non-repudiation of transaction in an open or closed environment • Build upon the value of federation…reinforce value of the identity Verified Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

  3. The Role of Identity in the Social Network • Anonymous • Anonymous to both provider and to other users • Valuable in marketing and activity measures • Pseudonymous • Known to provider (multiple levels of validation), but anonymous to other users • Needed when payment is required to participate • Useful when there is a fusion of application • Need to have trust in the identity protection capabilities of the service provider • Asserted and unproven • Good where there is an existing level of trust (within an enterprise or a community of interest) • Useful in help forums…community evaluation of responses • Asserted and validated without “liability” • Need for strong repudiation • Asserted and validated with “liability” • Need for strong non-repudiation and security Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

  4. Social Networking in Government • What are we trying to achieve through social networking • Government to Citizen (G2C) Value • Fusion of social networking services and general applications • Offer applications that provide privacy and identity awareness (healthcare, benefits) • Offer social networking tools that allow anonymity (comments, surveys) • Information value is based upon correlation • Need to establish trust in the anonymity/privacy • Government to Government (G2G) and Government to Business (G2B) Value • Applies in any professional to professional exchange – context awareness • Applies to market establishment – procurement, information, and finance • Information value can be based upon provider of information • Need to establish trust in the true identity (attached to credentials) • Multiple Identities within the Social Network • Only the user can re-create anonymity with the service provider • The service provider and the user can recreate anonymity with the social network user base. • Release of private information only with verified identity and/or strong credentials (e.g. PHRs) • Impact of OpenID on the government use of social networks • Use fundamentals of identity: align identity proofing with downstream use of credentials Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

  5. Use Cases and Lessons Learned • Healthcare Use Case: Fusion of Social Networking and Applications • G2C – Patient Health Record (PHR) privacy, but tied to anonymous social networking around conditions • Education Use Case: Trust Zone • G2C – age verification for under-age and parental consent to participate and interact • Law Enforcement and Intelligence Use Case: Information Sharing • G2G – platform requires confidence in who is providing information as much as it requires confidence in who is consuming information • Banking Use Case: Trust Network • G2G and G2C – federated trust model with strong authentication to create a trading and commerce market • Gaming Use Case: Off-Platform Market • G2C – anonymous identities traded off platform to boost player standing in the environment Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

More Related