online identity management workshop
DESCRIPTION
Presentation by Paul Bailey at LLLWFD ID Management assembly, Birmingham, May 2011TRANSCRIPT
Trusted Relationships
Programme1030 Introductions , Paul Bailey, JISC-SSBR .
1045 The benefits of an Identity-Centric Internet: a new Internet of Subjects Manifesto. Serge Ravet, EIfEL .
1130 Coffee
1145 What do Users want? Views and concerns about sharing personal data. Findings of the CPD-Eng project. David Sowden.
1230 Lunch
1315 Current technical developments. Scott Wison, CETIS .
1400 Coffee
1415 Who and how am I online? Personal identity management for professional development. George Roberts, JISC SSBR
1500 Conclusions and actions: next steps. Paul Bailey, JISC-SSBR
1530 Close
Key Issues - LLLWFD ProgrammeIdentity management and security of information can still be a major barrier to engaging work based learners and employers but institutions are finding approaches thatcan work such as: Providing authentication of external users to allow access to university systems. Addressing institutional policies that can be a barrier to access and providing
electronic communication methods that have a sufficient level of security for the type of data being shared.
Encouraging trusted relationship management, sharing data and information between employers and institutions about learners, agreeing protocols and processes.
Recognising individual identity, separating the identity of individuals as employees or as learners, who may have several identities.
Providing learning environments that have sufficient levels of confidentiality for employees to discuss work related issues. This can apply to mentor support or delivering learning via the web or video conferencing for example.
Providing WBL and employers with secure access to portals for specific information. Recognising that the employer access may not be by one individual role.
Conclusions and ActionsPresentations and artefacts from the dayOne slide from each session, flip chart and post-it notes – synthesis
from the floor.Produce a short summary paper – “Some practices and technologies
that should be adopted by institutions to address identity management issues for employer engagement.”
ObjectivesTo learn aboutTools/methods for IDMdisaggregationLearn about IDM issues relating to portfolio and Leap2acurrent state and emergent ideas around ID managementtypes of trusted relationships Find out How the community see issues around privacy What we understand ID technical issuesWider view of other peoples IDM issues and their
proposed solutionsViews on WBLHas this field moved on in the past 5 years
SIMPLE wantsStorageEasy to use/
understand/explainTransparency and
opacity (user control)Choice – not all
onlineFix it when it goes
wrongFiner grained
policies
choosing the level of what is shared
Cheap or freeControl of my data Ability to see
others (through negotiation)
Can turn it off and leave it
Anonymous transactions
More demanding wantsMultiple profilesMultiple levels of auth2Repercussions globalAppropriate security
levelService level
agreementsTransparency of system
managementLogging and audit,
alerting system
BiometricsErase Ids (cookies)DelegationSyndicationControl over my data InteroperabilityWho knows about meControl over my data