1 / 1

Exploring the Opportunities and Risks of Digitally Signed Qualifications

This document delves into the transformative potential of digitally signed qualifications, exploring how they can enable self-verification and the creation of recipient-specific certifications. It addresses important considerations around granularity, including the level of detail required in qualifications. However, it also raises critical concerns about privacy risks, such as hacking, social engineering, and unintended disclosures. The need for robust technical protections and sustainable business models that prioritize privacy interests is emphasized to balance benefits and risks.

jui
Télécharger la présentation

Exploring the Opportunities and Risks of Digitally Signed Qualifications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy opportunities and risks (and Qs) • Opportunities • Digitally signed qualifications could be self-verifying • What new/improved processes might this enable? • Digitally expressed qualifications could be more/less granular • What granularities do we need? (Qualification? Subjects? Module marks?) • Digital qualifications could be recipient-specific (DRM for degrees!) • Or are existing protections against “theft” effective/appropriate? • Risks • Unwanted disclosure by “hacking” of qualification store • Where is qualification best technically protected? • Unwanted disclosure by social engineering • Who knows best who the right recipients are? • Business model creating perverse incentives (e.g. Selling data) • What business model matches privacy interests?

More Related