online identity management workshop

7
Trusted Relationships

Upload: jisc-ssbr

Post on 18-Dec-2014

490 views

Category:

Education


1 download

DESCRIPTION

Presentation by Paul Bailey at LLLWFD ID Management assembly, Birmingham, May 2011

TRANSCRIPT

Page 1: Online identity management workshop

Trusted Relationships

Page 2: Online identity management workshop

Programme1030 Introductions , Paul Bailey, JISC-SSBR .

1045 The benefits of an Identity-Centric Internet: a new Internet of Subjects Manifesto. Serge Ravet, EIfEL .

1130 Coffee

1145 What do Users want? Views and concerns about sharing personal data. Findings of the CPD-Eng project. David Sowden.

1230 Lunch

1315 Current technical developments. Scott Wison, CETIS .

1400 Coffee

1415 Who and how am I online? Personal identity management for professional development. George Roberts, JISC SSBR

1500 Conclusions and actions: next steps. Paul Bailey, JISC-SSBR

1530 Close

Page 3: Online identity management workshop

Key Issues - LLLWFD ProgrammeIdentity management and security of information can still be a major barrier to engaging work based learners and employers but institutions are finding approaches thatcan work such as: Providing authentication of external users to allow access to university systems. Addressing institutional policies that can be a barrier to access and providing

electronic communication methods that have a sufficient level of security for the type of data being shared.

Encouraging trusted relationship management, sharing data and information between employers and institutions about learners, agreeing protocols and processes.

Recognising individual identity, separating the identity of individuals as employees or as learners, who may have several identities.

Providing learning environments that have sufficient levels of confidentiality for employees to discuss work related issues. This can apply to mentor support or delivering learning via the web or video conferencing for example.

Providing WBL and employers with secure access to portals for specific information. Recognising that the employer access may not be by one individual role.  

Page 4: Online identity management workshop

Conclusions and ActionsPresentations and artefacts from the dayOne slide from each session, flip chart and post-it notes – synthesis

from the floor.Produce a short summary paper – “Some practices and technologies

that should be adopted by institutions to address identity management issues for employer engagement.”

Page 5: Online identity management workshop

ObjectivesTo learn aboutTools/methods for IDMdisaggregationLearn about IDM issues relating to portfolio and Leap2acurrent state and emergent ideas around ID managementtypes of trusted relationships Find out How the community see issues around privacy What we understand ID technical issuesWider view of other peoples IDM issues and their

proposed solutionsViews on WBLHas this field moved on in the past 5 years

Page 6: Online identity management workshop

SIMPLE wantsStorageEasy to use/

understand/explainTransparency and

opacity (user control)Choice – not all

onlineFix it when it goes

wrongFiner grained

policies

choosing the level of what is shared

Cheap or freeControl of my data Ability to see

others (through negotiation)

Can turn it off and leave it

Anonymous transactions

Page 7: Online identity management workshop

More demanding wantsMultiple profilesMultiple levels of auth2Repercussions globalAppropriate security

levelService level

agreementsTransparency of system

managementLogging and audit,

alerting system

BiometricsErase Ids (cookies)DelegationSyndicationControl over my data InteroperabilityWho knows about meControl over my data