When Google+ launched, I went with my handle as my last name. This makes a ton of sense to me. If you asked most people what my last name is, they wouldn’t know. It isn’t “common” for me. Many people don’t even seem to know my first name. I can’t tell you how many times I have found myself talking with folks at conferences this past year and seeing ZERO lighbulbs going off when I say my name “Kaliya”, but when I say I have the handle or blog “Identity Woman” they are like “Oh wow! You’re Identity Woman… cool!” with a tone of recognition – because they know my work by that name.
One theory I have about why this works is because it is not obvious how you pronounce my name when you read it. And conversely, it isn’t obvious how you write my name when you hear it. So the handle that is a bit longer but everyone can say spell “Identity Woman” really serves me well professionally. It isn’t like some “easy to say and spell” google guy name like Chris Messina or Joseph Smarr or Eric Sachs or Andrew Nash. I don’t have the privilege of a name like that so I have this way around it.
So today…I get this
I have “violated” community standards when using a name I choose to express my identity – an identity that is known by almost all who meet me. I, until last October, had a business card for 5 years that just had Identity Woman across the top.
Display Name – To help fight spam and prevent fake profiles, use the name your friends, family, or co-workers usually call you. For example, if your full legal name is Charles Jones Jr. but you normally use Chuck Jones or Junior Jones, either of these would be acceptable. Learn more about your name and Google Profiles.
There are many definitions of trust, and all people have their own internal perspective on what THEY trust.
As I outline in this next section, there is a lot of meaning packed into the word “trust” and it varies on context and scale. Given that the word trust is found 97 times in the NSTIC document and that the NSTIC governing body is going to be in charge of administering “trust marks” to “trust frameworks” it is important to review its meaning.
I can get behind this statement: There is an emergent property called trust, and if NSTIC is successful, trust on the web would go up, worldwide.
However, the way the word “trust” is used within the NSTIC document, it often includes far to broad a swath of meaning.
When spoken of in every day conversation trust is most often social trust.
The Many Goals for the Identity Ecosystem & NSTIC Governance
The NSTIC governance NOI articulates many key activities, qualities and goals for a governance system for NSTIC. NSTIC must:
- convene a wide variety of stakeholders to facilitate consensus
- administer the process for policy and standards
- development for the Identity Ecosystem Framework in accordance with the Strategy’s Guiding Principles
- maintain the rules of participating in the Identity Ecosystem
- be private sector-led
- be persistent and sustainable
- foster the evolution of the Identity Ecosystem to match the evolution of cyberspace itself.
Achieving these goals will require high-performance collaboration amongst the steering group and all self-identified stakeholder groups. It will also require earning the legitimacy from the public at large and using methods that surface their experience of the Identity Ecosystem Framework as it evolves.
This is the “punchline section” (in my response it is after what is below…the history of collaboration in the identity community):
Proactive Development of Shared Language by NSTIC Stakeholders
In 2004-5 the Identity Gang (user-centric identity community) was 1/10 the size of the current NSTIC stakeholder community. It took us a year of active grassroots effort to develop enough common language and shared understanding to collaborate. NSTIC doesn’t have 5-10 years to coalesce a community that can collaborate to build the Identity Ecosystem Framework. To succeed, the National Program Office must use processes to bring value and insight while also developing shared language and understanding amongst stakeholders participating.
Fostering conditions for high-performance collaboration
amongst the community to emerge must be a top priority for the NPO. One way to do this is to use methods that grow shared language and understanding such as Value Network Mapping and Polarity Mapping (more on them in forthcoming posts). The NPO with just a few staff could host many small focused convenings with stakeholders locally around the country and at industry events throughout the fall. With small collaborative meetings, and proactive support of network weaving [defined by Bill Traynor summarized by Eugene on his wiki] across stakeholder groups, I believe the community of NSTIC stakeholders would be in place just like the IIW community was at the first IIW. NSTIC must support self-organizing to create a thriving ecosystem through shared language, understanding amongst NSTIC stakeholders by January.
Origins of Shared Language for Identity Collaboration
In the Beginning…
We (the Internet Identity Workshop / user-centric identity community) have been successful over the last 6 years in part because the format of many organic opportunities has shared language to emerge leading to greater and greater collaboration. The community began when some of us found each other at Digital Identity World conferences. There were only a few very user-centric focused people and we stood out amongst the enterprise oriented attendees. We liked each other and wanted to collaborate, so we started a mailing list together. Doc Searls asked a few people to be on Steve Gillmor’s Gillmor Gang December 31, 2004 and thus the “Identity Gang” was born.