Presentation is loading. Please wait.

Presentation is loading. Please wait.

Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.

Similar presentations


Presentation on theme: "Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015."— Presentation transcript:

1 Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015

2 © 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 2 Identity Framework Components In the Social Network Large-Scale, Cost-Effective, Authentication and Identity Management Solutions Social Network Participant  Allows for anonymous sharing of information and collaboration  User value can be managed by the community even though they are anonymous  Unknown to the provider  Typically a non-paid service  Privacy provided through anonymity Social Network Service Provider Anonymous Asserted Market Need The social network needs awareness of the business use of the tool and expectations of the user-base. Therefore define identity requirements and provide tools to meet these requirements Verified  Known to the provider by the identity provided  Established through registration and rule sets enforced by provider  Weak non-repudiation  Strong non-repudiation of transaction in an open or closed environment  Build upon the value of federation…reinforce value of the identity  Need to presume anonymity in the open social network  Effective use within an enterprise or within a community of interest  Users need to recognize the identity risk  Known to the provider – registration authority has validated assertion  Established through registration and rule sets…can be federated  Strong non-repudiation  Allows for full enforcement of rules and potential liability Continuum

3 © 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 3 The Role of Identity in the Social Network  Anonymous  Anonymous to both provider and to other users  Valuable in marketing and activity measures  Pseudonymous  Known to provider (multiple levels of validation), but anonymous to other users  Needed when payment is required to participate  Useful when there is a fusion of application  Need to have trust in the identity protection capabilities of the service provider  Asserted and unproven  Good where there is an existing level of trust (within an enterprise or a community of interest)  Useful in help forums…community evaluation of responses  Asserted and validated without “liability”  Need for strong repudiation  Asserted and validated with “liability”  Need for strong non-repudiation and security Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

4 © 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 4 Social Networking in Government  What are we trying to achieve through social networking  Government to Citizen (G2C) Value  Fusion of social networking services and general applications  Offer applications that provide privacy and identity awareness (healthcare, benefits)  Offer social networking tools that allow anonymity (comments, surveys) –Information value is based upon correlation  Need to establish trust in the anonymity/privacy  Government to Government (G2G) and Government to Business (G2B) Value  Applies in any professional to professional exchange – context awareness  Applies to market establishment – procurement, information, and finance –Information value can be based upon provider of information  Need to establish trust in the true identity (attached to credentials)  Multiple Identities within the Social Network  Only the user can re-create anonymity with the service provider  The service provider and the user can recreate anonymity with the social network user base.  Release of private information only with verified identity and/or strong credentials (e.g. PHRs)  Impact of OpenID on the government use of social networks  Use fundamentals of identity: align identity proofing with downstream use of credentials Large-Scale, Cost-Effective, Authentication and Identity Management Solutions

5 © 2009 Anakam ® Inc. Anakam ® Proprietary Information – Multiple Patents Pending 5 Use Cases and Lessons Learned  Healthcare Use Case: Fusion of Social Networking and Applications  G2C – Patient Health Record (PHR) privacy, but tied to anonymous social networking around conditions  Education Use Case: Trust Zone  G2C – age verification for under-age and parental consent to participate and interact  Law Enforcement and Intelligence Use Case: Information Sharing  G2G – platform requires confidence in who is providing information as much as it requires confidence in who is consuming information  Banking Use Case: Trust Network  G2G and G2C – federated trust model with strong authentication to create a trading and commerce market  Gaming Use Case: Off-Platform Market  G2C – anonymous identities traded off platform to boost player standing in the environment Large-Scale, Cost-Effective, Authentication and Identity Management Solutions


Download ppt "Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015."

Similar presentations


Ads by Google