Saving the World with User-centric Identity.

Real Names vs Nyms at Quora & Unconferences

I am again in a #nymwar [wikipedia & Botgirl's Scoop.it] situation that I actually care about. I have been denied full participation in Quora for a long long time now because my last name was listed as IdentityWoman (ironically my answer to why having control over your identity and personal data online matters did go through but then was put into suspension when they insisted on changing my name to a WASPonym).

Now there is a thread all about an unconfernece for women of Quora and they have mentioned both Unconference.net my business and She's Geeky that I founded in the threads. I for this one important conversation bow to the "feudal lord"  of Quora as their humble "content producing servent" share my so-called real name...and help them have a good unconference and raise the issues of real name requirements within the context of real human beings who engage with the site all the time and hopefully staff as well.  Until we have the freedom to choose our names for public interactions on the web - to define our own identities based on our context and how we wish to appear where - we do not live in a free society.

 

Before they "banned" me for having the wrong color skin name. I got to write an eloquent to this question (posted below since it isn't on their site).

Why does owning one's own online identity and personal data matter?

and was voted to the top (with 5 votes) by others...but now that answer isn't there cause I didn't use my real name.

So now you can't see it...this is akin to not letting me sit somewhere in a public space because the color of my skin is the wrong one OR I happen to sit in a wheel chair to get around and there isn't room in our restaurant and they are in violation of American's with Disabilities Act.

The women of Quora are talking about organizing an unconfernece and found two of my organizations/sites and are enthusiastic about them. I am totally unable to talk to them about their ideas or my sites unless I pass their "real names" test....you know like a pole tax ... that Bob and I talked about in our Cloud Identity Summit closing Keynote about Identification and Social Justice (slides and videos will be online soon).

My answer to:

Why does owning one's own online identity and personal data matter?

We own our own bodies - we have freedom and autonomy to move around the physical world.  We have rights and freedoms; If our physical lives are terminated there are consequences.

In the digital world many people are not the primary "owner" of their own identity (in digital space the equivalent of a physical body is a persistent identifier like an e-mail address or a URL or phone number).  Most people's identity on the web is "under" terms and conditions of a private company and they can terminate people's accounts, their identities, without recourse.

Many companies with which people have their identities "under" choose to in exchange for providing identity provisioning services and things like e-mail. They also track and aggregate user's activities on their services and across the web via cookies and other beacons.  This profile of activity has real value and is being used by the companies to profile them and then sell abstract versions of the profile information on ad exchanges.

Some have said we live in an age of digital feudalism, where we are serfs on the lords' manors (the large web portals).

Having the freedom and autonomy to choose who we are online and how we express ourselves is important to ensuring a free society  with rights and liberty.

Adding some more: About one's social graph... The links in your social graph in the current architecture of the web exist within particular contexts - you have friends in Facebook or Followers on Twitter or Professional Contacts on LinkedIN. Those links, those connections in a "social graph" are ulitmately owned by the company within which you made those links. If you choose to leave any one of those networks - all your links to those people are terminated.

This is an architecture of control. You are locked into those systems if you don't want to loose the links to others in them. To own your own identity would be to have an identity that would give you the freedom to not loose the links to your contacts, they would be peer to peer autonomous of any particular service.

The next time there is a major social revolution like in Egypt governments are not going to try and turn of the internet or mobile phone system it is likely they will simply call facebook ans ask them to terminate the accounts of dissidents.

 

 


Summer -> Fall Talks/Plans

Today is my first talk for the summer. I am speaking at the Berkeley Cybersalon with a great cast of characters. Lost and Found on the Social Web.

I head to Europe on Wednesday; you can see the outline for that trip here: European Travel and Podcasts this Summer

I return on the 27th and speak the next day at the  SDForum Women's SIG on the topic of Women, Identity and Data - exploring what women want in these realms. It will be interactive.

I will be travelling to Portland for the Community Leadership Summit on July 14 and 15th along with my Unconference.net partner Bill Aal.

I head to Denver/Vail for the Cloud Identity Summit July 16-19th and will be giving the closing Keynote with Bob Blakley on Identity and Social Justice.

The WEF Young Global Leader Silicon Valley Summit 2.0: Shaping the future of entrepreneurship and innovation is July 25-27th. You can see the outline of the program here - it focuses on Google, Facebook and Zynga. I'm hoping we can also connect with some open source and open standards efforts.

August is currently open and will likely involve a trip to/through the NorthWest (Portland, Seattle, Vancouver, Salt Spring, Hollyhock)

September is "Summer Davos" in China where there may be some programmatic activity covering the Personal Data Ecosystem.

October is the National Coalition for Dialogue and Deliberation national conference in Seattle. I plan to put in a proposal/workshop covering online identity and the nuances/issues surrounding it.  For those of you who have been tracking my work, this community is the world's leading forum (+Canadian Equivalent C2D2) for truly innovative, deliberative public methods that provide the opportunity for collective wisdom to come forward.  It is these types of methods that we need to solve the "NSTIC governance" challenges relative to a complex system.  I worked with one of their leading members, Tom Atlee, founder of the Co-Intelligence Institute, on the chapter in my NSTIC response about governance.

The INTERNET IDENTITY WORKSHOP is October 23-25!

We are working with the W3C on having the Federated Social Web Summit be the day before October 22nd somewhere near IIW.

Identity.Next in The Hague is Nov 21-22; hopefully it will have an unconference within it.

I have been invited to speak in Brussels on November 29th.

 


European Travel and Podcasts this Summer

I'm heading to Europe on Wednesday.  The travel plans and events are below. One of the main reasons I am going is to connect with the people and communities in Europe working on identity and personal data.  I want to come back with about 10 podcasts recorded with key people from the community that I meet along the way - these will be edited on my return and posted on the web publicly.

I will also be inviting/encouraging participation with PDEC in the two main ways we have so far to engage.

* If you are a startup or a proejct focused on how people are in charge of their personal data you can apply to be part of the Startup Circle.

* If you are in an enterprise or just interested you can subscribe to the Journal.

Please don't be afraid to reach out and connect with me if you are in Europe or know some folks in Europe I should be sure to connect with on this trip. Kaliya@pde.cc  txt:510472-9069  Skype: Identitywoman

TRAVEL PLANS:

  • June 7th I arrive in London and have meetings/social things
  • June 11th is an Identity, Personal Data & Personal Clouds Unconference I am facilitating and Tony Fish is organizing - You're INVITED!
  • June 12th is the OIX Event
  • June 12-13th is New Digital Economics
  • June 14th is WEF Tiger Team Day
  • June 15-17 Netherlands
  • June 18-19 is the Digital Enlightenment Forum
  • June 20th I plan to travel to Paris
  • I might travel to Geneva..
  • June 25-27th in Berlin
  • June 27th I fly out of Berlin to SF.

Info Sharing Agreements! Support it! Make it Real!

Joe Andrieu and the Information Sharing Working Group has put a lot of work and effort into creating a Standard set of Information Sharing Agreements represented by a standard label. They want to invest in user -research to make it really work.

I am putting in $100 and I encourage all of you to do the same. They need to raise $12000 in the next 8 days.

See the Kickstarter Campaign here.


UnMoney Convergence Topics

Tomorrow is the UnMoney Convergence - an un-conference about all sorts of topics related to money, currency, land, value, reputation, identity.

Here are the topics that people are hoping to discuss:

  • Collaborative Consumption and Sharing
  • new currencies
  • How we can work together to make the movement for community currencies stronger and more synergistic.
  • BACE Timebank- open source currency
  • What are the best ways we can move from the current debt based, imperial economic system towards a life serving, peaceful, gift economy?
  • where are the most inspiring, promising, transition currencies being conceptualized, implemented, how can we work together to help them go viral and allow people to move their money from the old system towards creating a better alternative structure.
  • Fostering robust public debate on creating "public money" so that legitimate governments can fund activities which serve people and planet rather than threaten them.
  • Deep Wealth and new currencies as an emerging language of value. A Living Systems Model of Wealth
  • The role of co-operatives in startup investment.
  • how to enable trust agility?
  • governance, mobile payments oauth/opentransact
  • Designing Intentional Community Economic Systems
  • "Co-Creating Community Economics as a Path of the Heart"
  • Working together, can we do more than just taking care than our respective unmoney "babies/pets".
  • Going from niches to relevance.
  • Emotions in money experiments: dealing with fears
  • Crowdfinancing! technical development values based investing
  • How are other people designing an ecosystem of currencies to create engines of social action?
  • designing currencies as/like games
  • social ecosystem design and the use of currencies
  • work-share
  • micro credit;
  • time dollars
  • How to manage debt in a web based on distribution of small composable documents.
  • Ripple, Metacurrency, actual usage
  • What does unmoney tell us about changing relationships between incentives and motivation? How unmoney works as incentive and /or motivation
  • What does unmoney tell us about changing relationships between incentives and motivation?
  • How unmoney works as incentive and /or motivation
  • How do we teach about these alternative forms of currency and economics to potential early adopters?
  • Which of these different approaches are approaching reality?
  • What are the most pragmatic and useful? Who is making progress on deployment?
  • Teaching about money in a Sustainable MBA curriculum.
  • What kinds of alternative currencies are being used and thriving in local communities?
  • What are all the alternative types of currency - i.e. time banking, etc. Perspective of a young person coming of age and recognizing there are different ways to engage with money, currency and economics.
  • What is a sensible balance between social customs and accounting systems in the economics of the near future?
  • Currency backing methods
  • Mutual credit systems, small-scale democracy
  • What is the best example of alternative currency active today?
  • What is the best model that needs to be tested?
  • Where are the communities of trust willing to test a promising model?
  • Friendly Barter - A model of a cashless online payment developed with Tom Greco this last Winter.
  • How to share deeper value and wealth together and build an economy based on this sort of wealth.
  • How to share deeper value and wealth together and build an economy based on this sort of wealth.
  • Particularly interested in alternative and parallel currencies The potential for mobile phones to disrupt in the alternative currency space

UnMoney & NewWallSt

March 11th.
TEDx New Wall St.
re-imagining banking re-built for the Information Age in Silicon Valley on a New Wall Street, as described in the attached press release, and here http://.www.TEDxNewWallStreet.org

April 24th.
UnMoney Convergence
Fosters dialogue and collaboration among the range of interesting emerging ideas around money and exchange systems and to explore connections with issues of land and property tenure. In addition to topics on alternatives to the current currency systems, we invite all who are looking at new ways to look at land tenancy and stewardship, hard currency versus energy, time and food based currencies. We are looking for synergies between folks who see the need for more grounded, materially based economics and those looking at the spiritual, energetic and values based approaches.
Register here!
Website here (might be new in a few days).


Speaking at RSA on a panel about NSTIC.

Kaliya "Identity Woman" Hamlin, Executive Director of the Personal Data Ecosystem Consoritum is speaking on a panel at RSA about NSTIC.

It is moderated by Jeremy Grant the head of teh NSTIC Program Office and includes fellow panelists Michael Barrett from PayPal, Jim Dempsey from the Center for Democracy and Technology and Craig Spiezle fromt eh Online Trust Alliance.


On being an accidental NSTIC Pilot Yenta

The first person who I heard calling herself a Yenta was Deborah Elizabeth Finn who I met via my participation in the Nonprofit Technology world and the NTEN community.  She is "the Cyber Yenta" helping nonprofit folks figure out their technology needs and match making. Yenta is a Yiddish word for a woman who is doing mate matchmaking. 

This last few weeks I have felt like a "Cyber Yenta" when it comes to NSTIC (National Strategy for Trusted Identities in Cyberspace) Pilots because many folks have come to me to share their idea for a Pilot.  Given what I know from reading the NSTIC Pilot FFO and having attended 6 out of the 6 so far NSTIC face to face (I attended the last one virtually) events:

  • NPO Announcement
  • NSTIC Release
  • NSTIC Governance Workshop
  • NSTIC Privacy Workshop
  •  NSTIC uses IIW as its Technical Workshop
  • NSTIC Pilot Proposers day

They clearly want  to solve issues/challenges that are multi-party in nature where the $ will help to create incentives to do interoperability beyond what one company, organization or technology can do on its own.

Many of the people sharing bid ideas involve, unsurprisingly, their project being in the big part of a bid.  I listen/read and think... given potential purposes outlined in the NSTIC Pilot FFO (Federal Funding Opportunity) you know this one echnology/legal framework is one piece of what is a many-piece problem.  It is hard to dissuade them of that.

They really want relying parties, so if you come to the table with those, you are in a much better position.  They need legal issues solved along with technology ones.

I am not discouraging anyone from submitting a proposal for their technology/legal framework, but it would be helpful if people both thought about how they can be the center of their "own" bid ALONG with how they think what they have could fit with other organization's companies bids too. How does your piece of the puzzle fit with other puzzle pieces. What do you have to give/contribute/share with others? How could you participate in a bid even if you didn't get paid to do so?

It will be way easier for me to help network/connect across the landscape of potential bids if I know how you can play/contribute if you get a large sum of money (several hundred thousand), medium sum of money (tens of thousands), small sum of money (a few thousand), and no money/just participating (you just got new users pointed at your service that interoperates with a broader universe of relying parties, for example).

I have felt caught in the middle not wanting to lose trust by sharing things I shouldn't about people's ideas and bids, but also feeling like they need to connect and know more about others.  I am hoping that we can all put more information out there about how ideas for the ecosystem can fit together.  I also hope that people can be realistic about how they have key puzzle pieces, but not "all" the puzzle pieces.

 


Upcoming Travel and Events - March is busy!

I have made a resolution for the new year to blog more about things I am thinking about and working on along with where I will be and where I have been.

The big news from last week was the coming IPO of Facebook and the release of how the NSTIC Pilots will work [PDF]. They are going to grant 10 million dollars and the first deadline is March 7th.

So this coming month is quiet until the 3rd week. Then there is the Personal Archiving conference and an event about a new reputation system.

ID Collaboration Day is happening February 27th the Monday of RSA week. We are expecting a good group from a range of organizations. We are in the same venue as last year Blacklight Ventures at Mission and South Van Ness. IIW/Identity Commons is collaborating with Kantara Initiative and OASIS IDTrust. I suspect that NSTIC will be a major topic of conversation.

 

Ping Identity is having its major party on Monday evening at the ROE Night club upstairs lounge at 651 Howard starting at 9pm.

Strata is also this week - O'Reilly's data conference. I spoke at their online conference in the summer on personal data running a good panel with a highly relevant introduction and well faciltiated panel on personal data that I helped pull together. I submitted several different proposals touching on different aspects of data and people and the technologies developing in the ecosystem. Apparently non-qualified but then O'Reilly and company are still trying to find women speakers who are qualified for their events (they talked about it at two events I facilitated/attended in January the Community Leadership Summit West and She's Geeky in January).  I am honestly confused and didn't submit any proposals to OSCON in part for this reason.

Then it is SXSW. I am flying out on Wednesday with my long time friend Axil who is getting of an airplane form Asia that day.  I will be there until Sunday. Saturday Mike Shwartz from Gluu is hosting what look to be good community connecting events.

-------------------------------------------------------------------------------------

Personal Data Lightning Round

Date: Saturday March 10 from 1pm - 3pm

Lunch will be served at this informal lightning round. If you want to present your product, service or project in 5 minutes, stop by and drop your name in the hat. 12-15 lucky individuals, selected at random, will get the spotlight from 1:30 - 3:00. Topics must be personal data or identity related. If you go over 5 minutes you'll be pelted by the audience with foam icosahedron stress balls.

Identity Biergarten

Date: Saturday March 10 from 6:00pm - 8:00pm

German inspired malted beverages and other refreshments from local producers will be served at this informal identity and personal data networking event. Date: Saturday March 10 from 6:00pm - 8:00pm

-------------------------------------------------------------------------------------

Sunday I fly to London for the Gartner Identity and Access Management Conference where I will be keynoting Monday the 12th at the end of the day.  My talk is going to cover the Identity Spectrum and how Personal Data tools and services can reduce the toxic issues for companies storing personal data about people.

I fly to DC on the 13th and attend the 2nd day of the NIST-IDTrust conference on the 14th. Then the OASIS IDTrust Steering Committe has a face to face meeting on the 15th and I fly back to my home in the Bay Area.

On the 16th Friday I fly to Australia and land on the 18th Sunday in the morning. My cousin's (my dad's sister's kids will pick me up and I am taking the family photos I have from our shared grandparents house down with me). I am speaking at Digital Identity World Australia on the 20th and working with Steve Wilson on an IIW like conference either on the 19th or 22nd. I am flying back on the 23rd to SFO (I so wish I could stay longer).

There is "tiger team day" just before the STL-Partners New Digital Economics event that should be a good event covering the emerging ecosystem.

Between now and then we will publish two more Personal Data Frontiers (we are thinking about changing the name to Journal) and I am working on a jointly published report with STL-Partners on the Personal Data Ecosystem Landscape.

Then...its April and the Nonprofit Technology Conference   a talk for Nuestar in a speakers series they have and I will be watching the European Identity & the Cloud Conference with interest.

IIW #14 is happening May 1-3 - early bird registration is Open. 

 

 


The new Google is Creepier then ever.

The Washington Post has an article today that talks about what google is doing as of today:

Google’s no-opt-out privacy changes and the end of the anonymous Internet

Google announced Tuesday its plans to integrate data from all its services with your profile for logged-in Google+ users.

She makes this assertion in the early part of the article.

The Internet, nowadays, is overwhelmingly dominated by fora in which you hang out as your actual self. Facebook. Twitter. And now, Google.

 While I understand her assertion that the net is "dominated" by these fora. There are two assumptions one is that the people in those places are being 'Their actual selves" when the research shows that people are being thoughtful and careful about how they present in different places and what aspects of themselves they share where (see danah boyd's research about young people and networked publics).  I think in one way she is right the people like her - who went to college and have mainstream white collar jobs are on these fora with their real names but most people who actually do interesting hobbies or have religious lives that they don't share publically or across all contexts of their lives either are not sharing about these on those fora or they are keeping them contextually separate using different names and handles.
This weekend at She's Geeky I am going to ask a lot of questions of the women coming about how they do manage their identities and what they want and need out of digital systems to feel safe using them.
Tie actions online to our real identities, and suddenly online activity has real-world consequences.
This is very true and unless we build tools that give people both persona management and context management we are going to be creating a really creepy world.  See my TEDx Talk on Participatory Totalitarianism. 

The new Google+ Names process

Today people were tweeting/writing about the new google+ names policies. Well. I just went through it and it involves many screens and an appeal into the Kafkaesqe googleplex that takes up to 3 days before they approve your name request.  I think they should to this to EVERY user cause how do I know your name "is" David Smith...it just doesn't trigger their dictionaries prompting inquiry into the legitimacy of your name...Ok but I digress...lets see how this works.

First you are discouraged from changing your name and limited to the frequency you can do so. You have to click "change name" to do anything.

Read the rest of this entry »


The Carrier IQ "world" vs. a Personal Data Ecosystem future

Read Write Web's Marshak Kirkpatrick just posted a great article outlining the issues with the Carrier IQ issues that have surfaced.  It also includes an extensive quote from me about how data has value and it needs to be accessed in ways that are in alignement with people.


Recent Activity Pt 4: Europe Week 1

Week one in Europe was busy. The day I arrived Esther picked me up and we headed to Qiy's offices where i got to run into John Harrison who I last saw a year ago at IIW Europe. He is organizing a consortium to go in for FP-7 money (80 million) put out for projects around Identity in the European Union.

Wednesday was Nov 9th Identity.Next convened by Robert was great bringing people together from across Europe. 1/2 the day was a regular conference and 1/2 the day was an UnConference that I helped facilitate.  I ran a session about personal data and we had a good conversation.  I also learned about a German effort that seemed promising - Pidder - their preso in The Hague

November 10th I headed to London for New Digital Economics EMEA along with Maarten from Qiy.  It was fantastic to be on stage with 5 different start-up projects all doing Personal Data along with one big one :)

It was clear that the energy in the whole space had shifted beyond the theoretical and the response from the audience was positive.  I shared the landscape map we have been working on to explain elements of the overall ecosystem.

Digital Death Day was November 11th in Amsterdam was small but really good with myself, Stacie and Tamara organizing.  We had a small group that included a Funeral Director a whole group form Ziggur. We were sponsored by the company formerly know as DataInherit - they changed their name to SecureSafe. Given that Amsterdam is closer then California to Switzerland we were hopping they would make it given their ongoing support...alas not this year.

One of the key things to come out of the event was an effort to unite the technology companies working on solutions in this area around work to put forward the idea of a special OAuth token for their kind of services perhaps also with a "Trust Framework" that could use the OIX infrastructure.

It as also inspiring to have  two two young developers attend.

  • Leif Ekas  travelled from Norway - I had met him this summer in Boston when he was attending summer school at BU and working on his startup around aspects of digital death.
  • Sebastian Hagens - Sebastix
It made me wish Markus had made it there from Vienna.
When I was at TEDx Brussels I was approached by another young developer Tim De Conick well more accurately visionary who got some amazing code written - WriteID.
Given the energy last summer at the Federated Social Web Summit and these new efforts that could all be connected together/interoperable. I think there is critical mass for a developer / hacker week for Personal Data in Europe this Spring Summer and I am keen to help organize it.

Recent Activity Pt 2: Canada & Boston

Immediately following IIW (post here). I headed to Canada to speak at the International Women in Digital Media Summit.

The iWDMS brings together professionals from traditional and digital media communities, as well as educational/research institutions from around the world.  With high level keynotes, cross-sector dialogue, expert panelists, controversial debates and structured networking, the Summit will promote knowledge-sharing, and will explore innovation, skills gaps, policy and research in digital media--including gaming, mobile, and social media--and the impacts on and advancements by women globally. 

I gave an "Ideas and Inspiration"  talk for 20 min about the Personal Data Ecosystem called The Old Cookies are Crumbling: How Context & Persona aware personal data servcies change everything and will transform the world and was also on a panel about New Media Literacies.

There are a few things I took away from this event:

1) Countries like Canada are very small with just 30 million people and the center of commercial/intellectual life in Toronto an event like this really brings together a core group of high profile women in the media production business that represents much of the industry.

2) Both the government of Canada, provinces like Ontario and universities like Ryerson  are very serious about attracting and retaining top technology and media talent with a variety of tax and investment incentives.

3) See point (1) because of that ...one must think internationally about appeal and distribution of any media across the whole world not just one market.

4) The way they talk about diversity used lang had language I never heard before the term "designated groups" included folks with disabilities, first nations people (in the US they would be "American Indians"), women, and ethnic minorities.

5) The idea that people shouldn't be stalked around the web to "monetize" them was new and provoked some thinking amongst those who made their living developing metrics.

It was great to connect to Canada again and I hope that with the IIW coming up in Toronto in February some of the women who I met there can attend and consider how media can change with new tools for people to manage their identity and data.

I got to meet up with Aran Hamilton  (@Aranh) who coordinated efforts around the NSTIC of Canada in Toronto. We outlined the possibility of a Satellite IIW in Toronto and I learned more about what is going on there.  Basically up to point  (1) above...Canada is small.  95% of people have a bank account and of that something like 85% have accounts with one of 5 banks (Bank of Montreal, Toronto Dominion Bank/Canada Trust, CIBC, Royal Bank of Canada, Scotia Bank) and there are 3 telco's. So it seems like getting an NSTIC like system in place in Canada could involves meetings with a few dozen people.  They have the added advantage that Canadians have a higher trust in their government and institutions like banks and telco's and have fewer "privacy rights" organizations.  So our IIW should be interesting and I hope that we can get some good cross over between the January 17th event in DC and this one.

After Toronto headed to the 4th MassTLC Innovation Unconference.  It was great to be joined by Briana Cavanaugh who is working with me now at UnConference.net.  The community was thriving and it was the biggest ever unconference that I have run at 800 people and lots of sessions.  Jason Calacanis who apparently has relocated to Boston was there.  Jeff Taylor was there and had a rocking "un-official" after party that he DJ'ed.   The most notable costume was a guy in a suit with a 99% on his forehead. Yes Occupy Wall Street became a halloween costume.

 

 

 


Recent Travels Pt1: IIW

IIW is always a whirlwind and this one was no exception. The good thing was that even with it being the biggest one yet it was the most organized with the most team members.  Phil and I were the executive producers. Doc played is leadership role.  Heidi did an amazing job with production coordinating the catering, working with the museum and Kas did a fabulous job leading the notes collection effort and Emma who works of site got things up on the wiki in good order.

We had a session that highlighted all the different standards bodies standards and we are now working on getting the list annotated and plan to maintain it on the Identity Commons wiki that Jamie Clark so aptly called "the switzerland" of identity.

 

 

 

 

 

 

 

 

 

 

We have a Satellite event for sure in DC January 17th - Registration is Live.

We are working on pulling one together in Toronto Canada in

early February, and Australia in Late March.

ID Collaboration Day is February 27th in SF (we are still Venue hunting).

I am learning that some wonder why I have such strong opinions about standards...the reason being they define the landscape of possibility for any given protocol. When we talk about standards for identity we end up defining how people can express themselves in digital networks and getting it right and making the range of possibility very broad is kinda important.  If you are interested in reading more about this I recommend Protocol:  and The Exploit. This quote from Bruce Sterling relative to emerging AR [Augmented Reality] Standards.

If Code is Law then Standards are like the Senate.

 

 

 

 

 

 

 

 

 

 

 

 


Identity in the Contexts of the Future OR Participatory Totalitarianism

This is the latest from Google in their "names policy"

We understand that your identity on Google+ is important to you, and our Name Policy may not be for everyone at this time.

Kinda sounds like the owners of stores in the south who said their stores were not for everyone especially black people who didn't have skin color they liked. It is a fundamentally discriminatory policy.  If we don't have the freedom to choose our own names in digital space and the freedom to maintain different identifiers across different social spaces we will end up in a very creepy world...Here is my TEDxBrussels talk.

Read the rest of this entry »


The Nymwars and what they mean: summary of my posts to date.

Update: Google relented a bit, however I am still waiting to see if my name of choice was approved. You can read about the process I had to go through here. The New Google Names Process

-----------------

For those of you coming from the Mercury News story on the NymWars exploding...

I STILL have my Google+ profile suspended for using a  [  .  ] as my last name.  Prior to that I had "Identity Woman" as my last name and prior to that... before I ever got a G+ profile and since I started using Gmail and Google Profiles I had a   [  *   ]as my last name. [see the complete list of posts about this whole saga below]

It is my right to choose my own name online and how I express it.  Names and identities are socially constructed AND contextual... and without the freedom to choose our own names, and the freedom to have different names (and identifiers) across different contexts we will end up with a social reality that I don't want to live in: Participatory Totalitarianism.

Read the rest of this entry »


Personal - a personal data service is LIVE!

It is a big day 11-11-11 for many reasons. One is that Personal emerged out of closed beta. Yeah!   When I first met and talked with Shane Green, I was so excited because I met a kindred spirit who shared core beliefs with the community around IIW (user-centric identity, VRM etc). I knew after spending 5 hours in 2 days talking to him that with his experience, personal leadership, and the funding they had already secured  (from Steve Case and others) that they were going to make a big splash when it finally launched.

As a bonus, the whole topic of Personal Data got coverage in AdAge yesterday mentioning both Personal and Reputation.com in an article:

Why Your Personal Data Is The New Oil

I think the biggest thing Personal has going for it its focus on design and usability.  Wire protocols (the technical bits of moving data and formatting it) are easy compared to how people can easily understand, interact with and manipulate the vast range of personal data they have, that is information which is personal TO them - not their tweets and photos that they proactively share, but all the "stuff" they should have a record of somewhere. Their car serial number, passport number, codes to garage doors for baby sitters and the kids allergies that need to be shared with playdates, school and the soccer team.

They are using OAuth, a key open standard, in their connectors linking information you have at one site to your personal vault in their store.

 

It is pretty simple when you get started.

1) You can add empty gems and fill them out.

2) You can share them with others... and also revoke permissions.

Anyone who sees a gem you have given access to has to agree to your "control" of the data and that when it is revoked they don't keep a copy of it. They also can't share it with others without your permission (you would give that other party access to your gem if you wanted to share with them). 

3) You can look for gems that have already been created by others about things they own or preferences/needs they have.

4) And get the mobile app.

Now that they have launched, I am going to dive in and start playing with gems and sharing relevant ones with friends and colleagues.

Other key items to note are the coming anonymity features they are planning on rolling out.

We believe strongly in your right to remain anonymous when you choose. At present, we only support remaining anonymous when publishing community gems, but will be rolling out new anonymity features in the very near future.

 


Heading to Europe - 4 Events + 9 "free" days

I am coming to Europe in November for four events that are all Identity related... Instead of doing an IIW "in" Europe we have decided to support IIW like events :) .  I also need to find interesting things to do for 9 days in November.
Identity.Next  is in TheHague on November 9th http://www.identitynext.nl

1/2 the day is an unconference that I am helping to facilitate. If you can make it I highly recomend it - it was a great event last year and should prove to be again this year.

 

Digital Death Day is happening November 11th in Amsterdam. http://www.digitaldeathday.com

It is a super ineteresting topic - What happens to your Data After you Die?

Please spread the word about this event it is totally grassroots, and the conversations in this are are really amazing...if still not yet a mainstream part of the digital identity community.

 

I will be speaking about the Personal Data Ecosystem ( you will be happy to know there are 6 startups from Europe in the Startup Circle) at the STL Partners New Digital Economics event in London on November 10th that will be the only time I am in the UK.
I am looking for interesting things to do and people/ places to visit between November 12th and November 21st on the contenent. Drop me a line if you have ideas or invitations - kaliya@identitywoman.net.

I end my trip speaking at TEDx Brussels on November 22nd about a "day deep in the future" still trying to figure out what I will say but I am contemplating...open to community ideas actually as I am focused on getting a clear vision of the talk in the next week.


Web Wide Sentence Level Annotation -> Hypothes.is

I first met Dan Whaley last spring via an introduction from Jim Fournier co-founder of Planetwork.  I was inspired by the vision he was working on building Hypothes.is -  a way to have sentence level annotation of news and other articles on a web wide scale. Really a foundation for peer review on the web. The motivation for his work is to support greater discernment of the truth around climate change and other key issues facing our society and our planet.  (Another area I could see this being really useful right now is around accountability in the financial system and ways to make that real.)

He asked me to be a part of the project as an advisor particularly around identity issues and technology options for identity.  He is taking my advice and coming to IIW this coming week.  Its an honor to be amongst other distinguished advisors like Brewster Kahle,  John Perry Barlow,  Mark Surman and others..

He has been working on a development plan and has a solid on one in place.  He has launched a Kickstarter Campaign and  stars in the video that articulates the vision of the project.  If you are inspired by the vision I encourage you to contribute.


Open Letter to Google+ Profile Support

On Sep 19, 2011, at 11:25 AM, Google Profiles Support wrote:

Hi,

Thank you for contacting us with regard to our review of the name you are trying to use in your Google Profile. After review of your appeal, we have determined that the name you want to use violates our Community Standards.

I am curious what community developed the standards?  If there really is a community behind them, where can one engage in dialogue about them and have one's needs addressed.

Please avoid the use of any unusual characters. For example, numbers,symbols, or obscure punctuation might not be allowed.

(.)'s for last names are permitted for mononym people. I am making this choice.

If you search my name "Kaliya" in Google, I am 1/2 of the links, the other 1/2 are for the Hindu mythical figure that happens to share my name.

It is my name. I claim name sovereignty.

Most users choose to use their first and last names in the common name field in order to avoid any future name violation issues.

I am not "most users". I am unique individual with my own name.

How can a name be in violation? What is a "name violation issue" anyways? Who says?

I feel violated by this experience because I do not want to use my (soon to be ex-) husband's (who I've been separated from for 3 years) last name, Hamlin, as the headline on MY profile. I am fine listing it in the "other name" field - it is an "other name" to me.

I do not want to use my old last name, Young, last used in 2004 before my professional career began. I am also fine listing this the "other name" field as some who knew me before this date will be able to find me this way. Again, it is not appropriate for the headline on my profile.

I was fine using my professional handle/title "Identity Woman" as my last name for the headline of my profile but this was rejected by your acceptable name algorithms for having a space in it and being words not commonly in last names.

I actually do often list "Identity Woman" as my last name when I attend conferences so it is on my badge prominently  on my badge because my current last name (my ex-husband's name) isn't relevant. My Identity Woman professional handle IS relevant to the context, being at a professional conference so I choose to use it as my last name.

I decided when I began using Google+ that I would present and put forward information relevant to and related to my work persona Identity Woman and I am sticking with this persona in this context.  My Gmail address is after all identitywoman@gmail.com.

Last week I went back to what I had before we began this name silliness back and forth a symbol in my last name field on my Google profile for the last 4 years. I have gone ahead and listed other names as "Hamlin, Young, Identity Woman". You are refusing this option.  This seems like the best compromise position all around. A win-win.

So I am not really sure where to go with this. Is there a human being I can talk to? How do I actually move through this process. Continuing to interact with faceless, first name only people in e-mail and via ever changing rejection notes on my profile is not working for me.

You can review our name guidelines at http://www.google.com/support/+/bin/answer.py?answer=1228271

If you edit your name to comply with our policies in the future, please respond to this email so that we can re-review your profile.

I am not editing my profile. I want to talk with a human being to resolve this or alternatively we can a committee meeting with your team at Google.

This feels like I am being put on trial for my choice of name.

It feels dehumanizing and unjust.  I expect better from a company like Google.

Regards,

-Kaliya

Sincerely,

Bennett

The Google Profiles Support Team

ps. What is your real name? I am curious to know more about you by looking you up on the internet and then maybe will have a better idea about how to persuade you to let my name be.


Getting Started with Identity

Welcome to the Identity Woman Blog

I am an advocate for the rights and dignity of our digital selves.

Top Posts:

How to Join NSTIC, IDESG: A Step-by-step Guide

How to Participate in NSTIC: A Step-by-step Guide

Where I am in the World:

I live on the East Bay of the San Francisco Bay.

ID360  April 9-10, Austin

NSTIC Management Council Retreat  April 22-23 in DC

Internet Identity Workshop - May 6-8, Mountain View, California.

SHARE: Catalyzing the Sharing Economy - May 13-14 in San Francisco

NSTIC 9th Plenary June 17-19 in DC

Cloud Identity Summit - July 19-22 in Monterey, California

Web of Change (tentative) Hollyhock, Cortez Island, BC, Canada

World Economic Forum - YGL Summit + Annual Meeting of New Champions - Sept 7-12 in Taijin, China

Internet Identity Workshop number 19, October 4-6, Mountain View California

Latest Media:

NSTIC in Tech President: In Obama Administration’s People-Powered Digital Security Initiative, There’s Lots of Security, Fewer People 

Article on the BC eID Citizen Engagement Panel in Re:ID. PDF: reid_spring_14-BC

Fast Company Live Chat: On Taking Back Your Data

Fast Company: World Changing Ideas of 2014: You Will Take your Data Back

Posts on NSTIC:

  • Participatory Totalitarianism! - My TEDxBrussels Talk about how if we don't get this NSTIC stuff right we will end up in a really creepy world.  It references my struggles with Google+ to use the name I chose for my online self.

Posts about Identity:

  •  NymWars - My Personal Saga with Google in the [psuedo] NymWars to use the name I choose on their service - annotation of all my posts.
  • My speech at the Digital Privacy Forum in January 2011 articulating a vision that goes beyond "Do-Not-Track" vs. Business as Usual, creating a new ecosystem where people collect their own data.

Organizations and Events I share leadership in:

  • I am co-leading a new project - more details coming soon.
  • I am on the Management Council of the IDESG - the Identity Ecosystem Steering Group of NSTIC - the National Strategy for Trusted Identities in Cyberspace.
  • I co-founded, co-produce and co-facilitate the Internet Identity Workshop #18 May 6-8  in Mountain View, CA. This conference has focused on User-Centric Identity since 2005.
  • I am a steward of Identity Commons which keeps all the organizations and groups working on user-centric identity linked together.
  • I am the volunteer network director at Planetwork.net the civil society organization I have been affiliated with since 2003.
  • I founded She's Geeky a women's only unconfernece for those in Technology and STEAM fields (Science, Technology, Engineering, Art and Math)
  • I co-founded Digital Death Day and work with that community to continue to host events on the issue. You can see a video of me talking at Privacy Identity and Innovation about this. The next conference is in London on October 6th.
  • I own a business Unconference.net that designs and facilitations participant driven events for a range of clients (IIW, She's Geeky and Digital Death Day are all Unconferences).

Potential Future: Google-Zon

With the nymwars unfolding (Nym = Pseudonym , Anonymous and other varities on this theme) this video of the Google-Zon story in the year 2014 seems more prescient then ever.

Please watch the video on the Original Site the way it was done is amazing. 

EPIC in this video stands for the Electronic Personalized Information Construct

The computer writes a new story for every user (sound like the Filter Bubble?) everyone contributes and in exchange gets a cut of the revenue...

We stand for the exact oposite vision at the Personal Data Ecosystem Consortium where people have control over their own data and manage the rights to access it and shape things.


Starting on the OASIS IDtrust member steering committee

I started a new "job" last week, serving on the OASIS Identity and Trusted Infrastructure (IDtrust) Member Section, member steering committee.  I was elected to a 2 year term on this 5 member board.  This was my candidate statement and remains as my profile. On my first call as a member of the committee I was part of approving 8K of money including sponsoring the upcoming Interent Identity Workshop.

I shared with my fellow board members

in my introductory call that I was keen to link this work with other work that is related and ongoing at other standards efforts like the W3C where I have been participating in the Federated Social Web work.  There is also independent efforts like OpenID and OAuth happening within IETF.  One of our next tasks at Personal Data Ecosystem Consortium is to outline the core standards relevant to personal data.  We are not going to invent anything new - rather help what is be found and adopted and adapted.

Why Does participation in an International Standards body matter?

If “code is law,” then standards are like the Senate.  - Bruce Sterling, commenting on the April 2011 Augmented Reality Standards gathering

Read the rest of this entry »


Gender Matters in CS & Tech & The World

I don't need to say much. This graphic from the New York Times explains it simply  Computer Science and Engineering are getting worse for women and have been for 10 years. These industries are where law and medicine were in the 50's and 60's.  I share this fact with people from other industries and they look at me funny and say "really" - YES really. They have believed the myth that technology is a a meritocracy and really progressive.

Read the rest of this entry »


OpenID Connect Tech Summit - Next Week

I got this note today from the folks at OpenID. I will be attending some of the event. If you are keen on understanding the future of this technology it is worth attending. I am actually quite positive about the user-experience and research that is informing this next generation fo the OpenID protocol and hopeful it gives an alternative for the whole web to Facebook Connect.

OpenID “Connect Tech” Summit - September 12-13, 2011

The OpenID Foundation is launching its third OpenID Summit for 2011. This event is co-sponsored by Microsoft and will be held at the Microsoft Research Campus in Mountain View.  The OpenID Foundation's 2011 series of OpenID Summits focuses on use cases and topics of interest to key developers, executives and analysts in the online identity industry.

This OpenID summit gives web site developers and technologists a closer look at the OpenID Connect protocol, its use cases and adoption plans by leading companies. We will introduce "Account Chooser" its implementation and user experience and provide interop testing and feedback for next generation OpenID adoption.

Please join us on Monday, September 12, 2011 from 12:00 Noon until 5:00pm PDT and Tuesday, September 13, 2011 from 10:00am to 4:30pm PDT.

Registration is now open at the following link: REGISTER NOW!

Read the rest of this entry »


Mononym officially "not" accepted. I'm Kaliya. Google get a clue.

OK.

Let me be very frank.

Kaliya says to Google:
"Why should I have to justify my name to you?"

My name is Kaliya

Just me. That is what it was on my profile before you decided that i had to have letters in my last name.

Type me into Google nymrods, 5 of the posts on the fronte page are me...the other 5 are for a figure in Hindu mythology.

What is the top post for "me"? Its the "Identity Woman" blog, then my Fast Company blog post on  NSTIC written as Identity Woman, then my flickr photos (Kaliya), linkedIn (Kaliya), Slideshar's (Kaliya) and finally my unconference site (Kaliya).

I chose to have Identity Woman as my last name when you rejected my choice to go with the mononym "Kaliya *". That is how people know me. It is how I want to be known.

I am NOT putting my soon to be ex-husband's, have been separated amicably  for 3 years, last name as "my name" as the top of my profile on Googoe+.

[TO BE CLEAR. My ex and I are on good terms and I really didn't want to bring this up in public-public on my blog because it is not my practice to discuss personal matters on this blog and cause it is nobody's business what my marital status is.  I made the choice to share this very real personal life situation I face to make the point I am trying to make. On another note he is also very supportive of my work on these issues for freedom on the internet.]

I am totally fine listing this last name in the "other" field along with my maiden name.  I am not particularly attached to either name. I have a an idea for a future last name and I might change it in several years in the mean time I don't want to promote this "other" name that isn't "mine" as the headline of my profile. Both Young and Hamlin are part of my legal name. They are my wallet names  (as Skud has so aptly put it) and in some way they are my names but they are not "my" names.

When people who don't know me that well call me "Ms. Hamlin" I object politely and say "please just call me Kaliya - Hamlin is not "my" name".  Everyone who I have made this request have honored it. If they didn't I wouldn't be their friend for very long. As Bob Blakeley from Gartner (formerly Burton Group) explains, names are social and if you don't call people what they want to be called they won't respond.

Google, My name is Kaliya.

If you don't honor this request. I won't be your friend any more. Just like Bob explained.

 

 


G-Male is a Good Listener, Maybe too good.

Ok, now we know what is wrong :) Google is on the [autism] spectrum.

"The obstacles primarily exist in the realm of social interaction. The fundamental problem is akin to blindness, as the term social blindness suggests."

They keep doing well meaning but awkward feeling things because well they know how to technically but it isn't how human beings act or want to be treated.
Read the rest of this entry »


Join us for IIW - NSTIC, Nymwars, OpenID, Personal Data, and more.

Founded in 2005 by me, Doc Searls, and Phil Windley (Yes it is an odd but fun bunch), IIW is focused  on user-centric digital identity.   Registration is Open!

Internet Identity Workshop #13 October 18-20 in Mountain View

The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools.  This conference we are going to also focus some attention on business models that can make this ecology of web services thrive.

The NSTIC Stakeholder community has been invited.

Read the rest of this entry »


Learning to stand up for my Identity, began with O'Reilly | She bows in gratitude for the teaching.

The first time I had my "identity" erased was actually by O'Reilly. Ok, to be fair it was by his people.

I was invited to attend Foo Camp in 2006 and was then invited to speak at both Web 2.0 Expo and Emerging Telephony in 2007.  So, I was asked to fill out my speaker information and list my "company affiliation" as Identity Woman. I didn't really work for anyone (I really never have) and that was my "identity" after all.  So I think they will get it and its all good.

I am really excited I was asked to speak and really like wow! its an O'Reilly Conference and Wow! and I want to see my name in the program - for the first time ever...in a program of a major conference....I open it up and well...I'm not Identity Woman. My identity was erased because "Identity Woman" didn't meet their "style guidelines".

Read the rest of this entry »


Please vote for my SXSW panels

30% of the panels at the SXSW conference are picked by people's votes so please if you care about these topics and want to see them covered please Vote for Me!

Personal Data Triple Win: People, Business & Gov - Kaliya Hamlin solo short talk

Obama & NSTIC: All Your IDs Are Belong to U(S) - Kaliya Hamlin on panel with others

Let My Data Go! Open data portability standards - Kaliya Hamlin, Phil Wolff

Rules for Innovators of User Centric Personal Data - Mary Hodder panel organizer

Successful Unconference Patterns - Jennifer Holmes, Kaliya Hamlin

 


1 month anniversary of Goggle Gag

Its been a month now.

I have filled out the "application form" 3 times. This was my first post about it: Google+ and my "real" name: Yes, I'm Identity Woman

The most recent rejection letter when I applied to be a mononym (which I was before this all started) was from "Anonymous Nick"...

Re: [#859600835] Google Profile Name Review

Read the rest of this entry »


Is Google+ is being lynched by out-spoken users upset by real names policy?

Following my post yesterday Google+ says your name is "Toby" not "Kunta Kinte", I chronicled tweets from this morning's back and forth with  Tim O'Reilly and Kevin MarksNishant  KaushikPhil Hunt,  Steve Bogart and Suw Charman-Anderson.

I wrote the original post after watching the Bradley Horwitz (@elatable) - Tim O'Reilly (@timoreilly) interview re: Google+. I found Tim's choice of words about the tone (strident) and judgement (self-righteous) towards those standing up for their freedom to choose their own names on the new social network being rolled out by Google internet's predominant search engine disappointing.  His response to my post was to call me self-righteous and reiterate that this was just a market issue.

I myself have been the victim of a Google+ suspension since July 31st and yesterday I applied for a mononym profile (which is what it was before they insisted I fill out my last name which I chose to do so with my online handle and real life identity "Identity Woman") 

In the thread this morning Tim said that the kind of pressure being aimed at Google is way worse then anything they are doing and that in fact Google was the subject of a "lynch mob" by these same people.  Sigh, I guess Tim hasn't read much history but I have included some quotes form and links to wikipedia for additional historial context.

Update: inspired in part by this post an amazing post "about tone" as a silencing/ignoring tactics when difficult, uncomfortable challenges are raised in situations of privilege was written by Shiela Marie.  

I think there is a need for greater understanding all around and that perhaps blogging and tweeting isn't really the best way to address it.  I know that in the identity community when we first formed once we started meeting one another in person and really having deep dialogues in analogue form that deeper understanding emerged.  IIW the place we have been gathering for 6 years and talking about the identity issues of the internet and other digital systems is coming up in mid-October and all are welcome.  The agenda is created live the day of the event and all topics are welcome.

Here's the thread... (oldest tweets first)

 Note all the images of tweets in this thread are linked to the actual tweet (unless they erased the tweet).  Read the rest of this entry »


Google+ says your name is "Toby" NOT "Kunta Kinte"

This post is about what is going on at a deeper level when Google+ says your name is "Toby" NOT "Kunta Kinte". The punchline video is at the bottom feel free to scroll there and watch if you don't want to read to much.

This whole line of thought to explain to those who don't get what is going on with Google+ names policy arose yesterday after I watched the Bradley Horwitz - Tim O'Reilly interview (they start talking about the real names issue at about minute 24).

Read the rest of this entry »


Lets try going with the Mononym for Google+

Seeing that Google+ is approving mononyms for some (Original Sai, on the construction of names Additional Post) but not for others (Original Stilgherrian Post Update post ).

I decided to go in and change my profile basically back to what it was before all this started.  I put a  ( . ) dot in the last name field.  In my original version of my google proflile my last name was a * and when they said that was not acceptable I put my last name as my online handle "Identity Woman".

Read the rest of this entry »


Protocols are Political, NSTIC NOI Appendix 11

Appendix 11 of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

Excerpted from Protocol: how control exists after decentralization, by Alexander Galloway, MIT Press, 2004. Page 245-246.   (I first mentioned book on my blog in 2005)

Protocol is that machine, that massive control apparatus that guides distributed networks, creates cultural objects and engenders life forms.

This is an excerpt of about 1/2 of the authors summarizing moments selected from previous chapters:

  • Protocol is a universalism achieved through negotiation, meaning that in the future protocol can and will be different.
  • The goal of protocol is totality. It must accept everything, not matter what source, sender, or destination. It consumes diversity, aiming instead for university.
  • Internet protocols allow for inter-operation between computers.
  • Protocol is a language that regulates flow, directs netspace, codes relationships, and connects life forms. It is etiquette for autonomous agents.
  • Protocol’s virtues include robustness, contingency, inter-operability, flexibility, heterogeneity, an pantheism.
  • Protocol is a type of controlling logic that operates largely outside institutional, government and corporate power.
  • Protocol is a system of distributed management that facilitates peer-to-peer relationships between autonomous entities.
  • Protocol is synonymous with possibility.

Protocol then becomes more and more coextensive with humanity’s productive forces, and ultimately becomes the blueprint for humanity’s inner-most desires about the world and how it ought to be lived.

This makes protocol dangerous - ....A colleague Patrick Feng said recently: “Creating core protocols is something akin to constitutional law,” meaning that protocols create the core set of rules from which all other decisions descend. And like Supreme Court justices having control over the interpretation of the American Constitution, whoever has power over the creation of such protocols wields power over a very broad area indeed. In this sense protocols is dangerous.

....

It is important to remember that the technical is always political, that network architecture is politics. So protocol necessarily involves a complex interrelation of political questions, some progressive some reactionary. In many ways protocol is a dramatic move forward but in other ways it reinstates systems of social and technical control that are deserving of critical analysis.

This post is part of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

This is the section before: Who is Harmed by a “Real Names” Policy?


Who is Harmed by a “Real Names” Policy?, NSTIC NOI Appendix 10

This post is Appendix 10 of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

Who is Harmed by a "Real Names" Policy?

This is a reformatted version of http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F - please go to that wiki for the most recent version of that document.

From the Geek Feminism Wiki:

The groups of people who use pseudonyms, or want to use pseudonyms, are not a small minority....However, their needs are often ignored by the relatively privileged designers and policy-makers who want people to use their real/legal names.

For the groups listed below the costs for using a real name can be quite significant, including:

  • harassment, both online and offline
  • discrimination in employment, provision of services, etc.
  • actual physical danger of bullying, hate crime, etc.
  • arrest, imprisonment, or execution in some jurisdictions
  • economic harm such as job loss, loss of professional reputation, etc.
  • social costs of not being able to interact with friends and colleagues
  • possible (temporary) loss of access to their data if their account is suspended or terminated

Privilege is described as a set of perceived advantages enjoyed by a majority group, who are usually unaware of the privilege they possess. A privileged person is not necessarily prejudiced (sexist, racist, etc) as an individual, but may be part of a broader pattern of *-ism even though unaware of it. A good article to understand this is  "Check my what?" On privilege and what we can do about it."

http://blog.shrub.com/archives/tekanji/2006-03-08_146

This lists groups of people who are disadvantaged by any policy which bans pseudonymity and requires so-called "Real names" (more properly, legal names).

Read the rest of this entry »


Anti-pseudonym Bingo, NSTIC NOI Appendix 9

This post is Appendices 8 and 9 of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

Anti-pseudonym Bingo

Wanting to and being able to use your legal name everywhere is associated with privilege.

The geek feminism blog published Anti-pseudonym bingo where the the idea is to play it against a commenter or a comment thread who is against pseudonymity.     A full row or column wins! (The free square is a giveaway.) 

Read the rest of this entry »


Resource Guide on Public Engagement, NSTIC NOI Appendix 7

This post is Appendix 7 of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

Resource Guide on Public Engagement 
Created collaboratively by the dialogue & deliberation community.

From NCDD’s October 2010 Resource Guide on Public Engagement:

Careful Planning and Preparation
Through adequate and inclusive planning, ensure that the design, organization, and convening of the
process serve both a clearly defined purpose and the needs of the participants.

Inclusion and Demographic Diversity
Equitably incorporate diverse people, voices, ideas, and information to lay the groundwork for quality
outcomes and democratic legitimacy.

Collaboration and Shared Purpose
Support and encourage participants, government and community institutions, and others to work
together to advance the common good.

Openness and Learning
Help all involved listen to each other, explore new ideas unconstrained by predetermined outcomes,
learn and apply information in ways that generate new options, and rigorously evaluate the process.

Transparency and Trust
Be clear and open about the process, and provide a public record of the organizers, sponsors, outcomes, and range of views and ideas expressed.

Impact and Action
Ensure each participatory effort has real potential to make a difference, and that participants are
aware of that potential.

Sustained Engagement and Participatory Culture
Promote a culture of participation with programs and institutions that support ongoing quality public
engagement.
In spring 2009, the National Coalition for Dialogue & Deliberation (NCDD), the International Association of Public Participation (IAP2), and
the Co-Intelligence Institute engaged practitioners and scholars in the creation of these 7 Core Principles for Public Engagement, aimed at
creating clarity for practitioners, public managers, and community leaders about the fundamental components of quality public engagement.
Visit www.ncdd.org/pep to download the full 12-page Principles document, which details what each principle looks like in practice and what
practitioners and leaders should avoid.


Descriptions of Processes
Intergroup Dialogues are face-to-face meetings of people from at least two different social identity groups. They are designed to offer
an open and inclusive space where participants can foster a deeper understanding of diversity and justice issues through participation in
experiential activities, individual and small group reflections, and dialogues.
www.umich.edu/~igrc/ and www.depts.washington.edu/sswweb/idea/
National Issues Forums offer citizens the opportunity to join together to deliberate, to make choices with others about ways to approach
diffcult issues and to work toward creating reasoned public judgment. NIF is known for its careful issue framing and quality issue guides
which outline 3 or 4 different viewpoints.
www.nifi.org

Open Space Technology is a self-organizing practice that invites people to take responsibility for what they care about. In Open Space,
a marketplace of inquiry is created where people offer topics they are passionate about and reflect and learn from one another. It is an
innovative approach to creating whole systems change and inspiring creativity and leadership among participants.
www.openspaceworld.org

The Public Conversations Project helps people with fundamental disagreements over divisive issues develop the mutual understanding
and trust essential for strong communities and positive action. Their dialogue model is characterized by a careful preparatory phase in which
all stakeholders/sides are interviewed and prepared for the dialogue process.
www.publicconversations.org

Socrates Cafés and other forms of Socratic Dialogue encourage groups inside and outside the classroom to engage in robust philosophical
inquiry. The Cafés consist of spontaneous yet rigorous dialogue that inspires people to articulate and discover their unique philosophical
perspectives and worldview. They don’t force consensus or closure, but are open-ended and can be considered a success if there are more
questions at the end than there were at the outset.
www.philosopher.org

Study Circles enable communities to strengthen their own ability to solve problems by bringing large numbers of people together in
dialogue across divides of race, income, age, and political viewpoints. Study Circles combine dialogue, deliberation, and community
organizing techniques, enabling public talk to build understanding, explore a range of solutions, and serve as a catalyst for social, political,
and policy change.
www.everyday-democracy.org

Sustained Dialogue is a process for transforming and building the relationships that are essential to democratic political and economic
practice. SD is not a problem-solving workshop; it is a sustained interaction to transform and build relationships among members of deeply
conflicted groups so that they may effectively deal with practical problems. As a process that develops over time through a sequence of
meetings, SD seems to move through a series of recognizable phases including a deliberative “scenario-building” stage and an “acting
together” stage.
www.sustaineddialogue.org

Victim Offender Mediation is a restorative justice process that allows the victim of a crime and the person who committed that crime to talk
to each other about what happened, the effects of the crime on their lives, and their feelings about it. They may choose to create a mutually
agreeable plan to repair any damages that occurred as a result of the crime. In some practices, the victim and the offender are joined by
family and community members or others.
www.voma.org

A Wisdom Circle is a small group dialogue designed to encourage people to listen and speak from the heart in a spirit of inquiry. By opening
and closing the circle with a simple ritual of the group’s choosing, using a talking object, and welcoming silence, a safe space is created where
participants can be trusting, authentic, caring, and open to change. Also referred to as Council process and Listening Circles.
www.wisdomcircle.org

Wisdom Councils are microcosms of larger systems like cities and organizations that engage in a creative, thoughtful exploration of the
issues affecting the system. A specialized facilitation process is used called “Dynamic Facilitation” - a nonlinear approach for addressing
complex issues that allows shared insights and aligned action to emerge. The outcomes of the Wisdom Council, which are reported back to
the community, can catalyze further dialogue, self-organizing action and change throughout the larger system.
www.wisedemocracy.org

World Cafés enable groups of people to participate together in evolving rounds of dialogue with three or four others while at the same time
remaining part of a single, larger, connected conversation. Small, intimate conversations link and build on each other as people move between
groups, cross-pollinate ideas, and discover new insights into questions or issues that really matter in their life, work, or community.
www.theworldcafe.com

This post is Appendix 7 of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

This is the section before: Reboot: Deliberative Democracy

This is the section after: Anti-pseudonym bingo


Reboot: Deliberative Democracy

I was asked by Allison Fine to contribute to the Personal Democracy Forum  Rebooting America anthology.

This article looks at three leading edge deliberative methods that engage small groups of citizens representing voices of the whole.  They all were invented before personal computing and all could be augmented. You can see the methods outline in a chart in Appendix 6 and the eight steps of the processes are described in this article.

Deliberative Democracy in Theory and Practice

Kaliya Hamlin
  

"At the heart of America’s liberal democracy are competitive elections, but this design choice does not enhance collective intelligence and wisdom.”

John Ralston Saul, in “The Unconscious Civilization,” wrote “The most powerful force possessed by the individual citizen is her own government. ... Government is the only organized mechanism that makes possible that level of shared disinterest known as the public good.” During the winter of 1997, fifteen Boston citi-zens—from a homeless shelter resident to a high-tech business manager, from a retired farmer to a recent inner-city high school graduate— undertook an intensive study of telecommunications issues. Over two weekends in February and March, they discussed background readings and got introductory briefings. Then, on April 2nd and 3rd, they heard ten hours of testimony from experts, computer specialists, government officials, business executives, educators, and interest-group representatives. After interrogating the experts and deliberating late into the night (with excellent facilitation), they came up with a consensus statement recommending judicious but far-reaching policy changes which they presented at a press conference at Tufts University, covered by WCVB-TV/CNN and the Boston Globe, among other news organizations. U.S. Representative Edward J. Markey, ranking Democrat (and former Chair) of the House Telecommunications Subcommittee, said, “This is a process that I hope will be repeated in other parts of the country and on other issues.”

These ordinary citizens ended up knowing more about telecommunications than the average congressperson who votes on the issue. Dick Sclove, a lead organizer of the event, says that their behavior contradicted the assertion that government and business officials are the only ones competent and caring enough to be involved in technological decision-making. This lay panel assimilated a broad array of testimony, which they integrated with their own very diverse life experiences to reach a well-reasoned collective judgment grounded in the real needs of everyday people. This proves that democratizing U.S. science and technology decision-making is not only advisable, but also possible and practical.21

When the Framers of our Constitution met in Philadelphia in 1787, digital media, modern psychology, social psychology, and ecological and systems science did not exist. The deliberative democracy approach outlined above and expanded upon in this essay integrates the best of face-to-face social collaboration technologies with information and communication technologies for wise governance decisions. Using these kinds of processes and technologies we can actually hear what my collaborator and network colleague Tom Atlee calls the Voice of “We the People” expressing the public good.22

At the heart of America’s liberal democracy are competitive elections, but this design choice does not enhance collective intelligence and wisdom. It fragments communities and societies into reductionist, adversarial “sides” and reduces complex spectra of possibilities to oversimplified “positions” that preclude creative alternatives. The norm is that citizens abdicate decision-making to elected officials, who are in turn heavily influenced by the special interests they must serve to raise money to be re-elected. With few exceptions, existing processes of democracy

  • Do not provide much effective power to ordinary citizens
  • Promote at least as much ignorance and distraction as informed public dialogue
  • Serve special interests better than the general welfare
  • Impede breakthroughs that could creatively resolve problems and conflicts, and
  • Undermine the emergence of inclusive community wisdom

Voting developed as a process to support self-governance in American history, and at its inception in the 18th century it was new and innovative. In the town halls of New England, citizens gathered together, debated, and decided among themselves those who would hold leadership positions in the community. The method has not scaled to address the wicked problems we as a country and world face. Wicked problems are incomplete, contradictory and have changing requirements; and solutions to them are often difficult to recognize because of their complex interdependencies—solutions may reveal or create more wicked problems.23 Economic, environmental, social, and political issues are wicked problems.

In Tom Atlee’s book, The Tao of Democracy: Using Co-Intelligence to Create a World that Works for All,24 he highlights several working examples of Citizen Deliberative Councils., including Citizen Jury, Consensus Conference, and Wisdom Council.25

These efforts have common characteristics that can be replicated in other communities. They are, to some extent, official, with an explicit mandate from government agencies to address public issues or the general concerns of the community. They generate a specific product such as findings or recommendations to the larger community and elected officials. They are real councils, meaning that they are in-person, face-to-face assemblies. Council members are from a fair cross-sec-tion of society, often randomly selected peer citizens. These bodies are temporary, not meeting for more than a few weeks. Their efforts are deliberative and balanced, and often facilitated to help participants to understand diverse points of view.

These processes were created before the Web existed, and as such were labor intensive, expensive and difficult to scale.26 But now we have an emerging suite of online tools that can augment these processes and reduce their costs. The right combination of face-to-face deliberation with online tools can be as revolutionary as the self-governance process developed by the Framers in 1787.

Any neighborhood council, city council, region, state or even national lawmakers can use these processes to tap the wisdom and deci-sion-making potential of the people. Here’s how it could work:

Pick an Issue. Choose the topic from all the possible problems that could be tackled. Issues can be surfaced online using popular participation websites such as Digg that allow users to rank issues or polling via a network like Twitter.

Frame the Issue. Framing an issue for deliberation means describing the range of approaches to an issue and the arguments and evidence for and against each approach. A wiki is the kind of tool that will allow large groups of people (think Wikipedia) to work on understanding and elucidating an issue together.

Select Deliberators. This step is key to the legitimacy of citizen councils. The selection of deliberators must represent the diversity of the community and be resistant to outside pressures. This gives them a legitimacy that is similar to, but more refined than, the selection of juries, which also seeks to convene a cross-section of the community. Database tools can be used to create unbiased and inclusive selections of deliberators. These same kinds of tools can also be used to pool citizens willing to participate in deliberative councils.

Collect Information and Expertise. Gathering information from a range of experts and stakeholders about the pros and cons of different approaches is the next step. This is an important factor in both collective intelligence (which learns from and integrates diverse views) and legitimacy (the willingness of ordinary citizens and officials to respect the outcomes of the process). We can find experts via the Web, draw in their expert testimony via web video conferencing, and perhaps have online forums where their knowledge is aggregated. Massive datasets of expert information are now free and available about critical issues, such as environmental toxins and the relationship between lobbying funds and legislation in Congress. These can be compiled, presented and widely shared with visualization tools, using methods beyond prose or PowerPoint to present critical information and tell relevant stories.

Deliberation. Most citizen deliberative councils involve 12-24 deliberators meeting in concentrated dialogue over four to eight days (distributed over one to ten weeks, depending on the method), led by professional facilitators. Since this may not be feasible in all circumstances, we can use the distributed intelligence of the Web to augment the in-person deliberations. Deliberations can happen both online and face-to-face over time, thus reducing the time and cost. Different algorithmic and semantic tools can be used to help deliberators see patterns of agreement and understanding.

Decision-Making. It is important to find processes that produce a deliberative Voice of “We the People” that the vast majority of the population will recognize as legitimate. Online tools like Synanim. com build consensus and shared statements using a multi-step online process. Iteration can also happen using methods like Digg or Slash-dot-style voting and community commentary.

Dissemination and Impact. It is critically important to the ultimate success of citizen deliberative councils that their impact on public awareness, public policy, and public programs be discussed and understood. Online tools are critical to these assessments in a variety of ways. Politicians and other officials should also sign pledges in support of these efforts (this can be a campaign issue) that can be shared online. Ongoing feedback can be integrated and continually shared with the public using online phenomena like Facebook and organized networks like MoveOn.org to share results and empower “We the People” to ensure its Voice is heard.

The approaches and processes discussed in this essay are not an answer to our democratic woes and difficulties. The tools and advantages of the Internet alone aren’t enough to augment existing democratic processes and strengthen our country. This essay is intended as a call to action and research to learn how best to scale new methods of citizen consultation, leadership, and wisdom together with online tools. I invite a more thorough exploration of how these steps can create a deep well of ongoing, meaningful citizen participation in the critical decisions of our government at all levels.

About the Author
Kaliya Young Hamlin designs and facilitates gatherings of professional technical communities addressing large challenges. She is an expert in the field of user-centric digital identity, blogging at unconference.net and identitywoman.net. Born and raised in Vancouver, Canada she has lived her whole adult life in the United States and recently applied for citizenship.

21 “Ordinary Folks Make Good Policy,” Co-Intelligencer website, http://www.co-intelligence.org/S-ordinaryfolksLOKA.html, downloaded April 18, 2008.

22 How Can We Create an Authentic, Inclusive Voice of We the People from the Grassroots Up? http://thataway.org/forum/viewtopic.php?t=477 Initiated by Tom Atlee Modified by/commented on by Kaliya Hamlin

23 Wicked problems are defined here: http://en.wikipedia.org/wiki/Wicked_problem

24 Atlee, Tom, The Tao of Democracy: Using co-Intelligence to Create a World that Works for All, available here:http://www.collectivewisdominitiative.org/files_people/Atlee_Tom.htm

25 The reader can learn more about these efforts at the following websites: http://www. collectivewisdominitiative.org/files_people/Atlee_Tom.htm,http://radio.weblogs.com/0120875/ stories/2003/03/23/citizenDeliberativeCouncils.html#13,http://en.wikipedia.org/wiki/ Citizens’_jury,http://www.co-intelligence.org/P-ConsensusConference1.html, http://www.co-intelligence.org/P-wisdomcouncil.html

26 Scaling in the computing, network sense is the ability to to either handle growing amounts of work in a graceful manner, or to be readily enlarged.http://en.wikipedia.org/wiki/Scalability In practical terms a website that can handle 2000 visitors a day may not work with 10,000 or 100,000 or a million visitors day. The democratic voting process that worked well in a New England town of 1,000 people or a state of 10,000 citizens is not scaling well to a nation of three hundred million.

This post is Appendix 5 and 6 of Kaliya's NSTIC Governance NOI Response - please see this page for the overview and links to the rest of the posts. Here is a link to the PDF.

This is the section before: People Diversity

This is the section after: Resource Guide on Public Engagement