Dear IDESG, I’m sorry. I didn’t call you Nazi’s.

The complaint  by Mr. Ian Glazer was that I called my fellow IDESG colleagues Nazi’s. He was unsatisfied with my original statement about the tweet on our public management council mailing list.  Some how this led to the Ombudsman taking on the issue and after I spoke with him in Tampa it was followed by a drawn out 5 week “investigation” by the Ombudsman before he issued a recommendation.  During this time I experienced intensive trolling about the matter on twitter itself.

Here is the tweet that I authored while pondering theories of organizational dynamics in Tampa and without any intent to cause an association in the mind of a reader with IDESG, NSTIC, nor any person or persons in particular note that I did not reference anyone with a @____ or add any signifying hashtags e.g., #idesg or #nstic in this tweeted comment.

Tampa11

I own that the tweet was provocative but it was It was not my intent to cause harm to anybody or to the IDESG organization and wider identity community.

I in no way intended to imply that any member of the IDESG has any intention remotely similar to those of the NAZI party of Germany.

I in no way intended to imply that the content of the meeting of the IDESG related to the content of the meeting I referenced in the tweet.

I am very sorry if the tweet had an emotionally negative impact on people on the management council and particularly those of with Jewish Heritage.

I fully acknowledge that referencing anything relative to the Nazi era is triggering. It touches on our collective shame and surfaces vulnerability it is very hard to look at.

I also believe that we have to actually be prepared to do so. If we don’t examine the past we can’t be sure we will not repeat it. [Please click to see my my next post for this to be further expounded upon]

I’m sorry I didn’t say something along these lines sooner.

One should not feed the internet trolls and I didn’t.

I was in a process were I felt it was inappropriate to speak about this more until the Ombudsman’s process had run its course.

I think that we all need to keep in mind our roles as Directors of the IDESG when we interact with the public and with each other.

The whole process left my and my attorney puzzled. My attorney wrote a letter to the Management Council/Board of Directors with a whole bunch of questions and now that this is posted we look forward to their answers to those questions.

 

 

 

Facebook so called “real names” and Drag Queens

So, Just when we thought the Nym Wars were over at least with Google / Google+.

Here is my post about those ending including a link to an annotated version of all the posts I wrote about my personal experience of it all unfolding.

Facebook decided to pick on the Drag Queens – and a famous group of them the Sisters of Perpetual Indulgence.  Back then I called for the people with persona’s to unite and work together to resist what Google was doing. It seems like now that Facebook has taken on the Drag Queens a real version of what I called at the time the Million Persona March will happen.

One of those affected created this graphic and posted it on Facebook by Sister Sparkle Plenty:

MyNameIs

Facebook meets with LGBT Community Over Real Name Policy  on Sophos’ Naked Security blog.

EFF covers it with Facebook’s Real Name Policy Can Cause Real World Harm in LGBT Community.

Change.org has a petition going. Facebook Allow Performers to Use Their Stage Names on their Facebook Accounts.

 

 

 

 

We “won” the NymWars? did we?

Mid-July,  friend called me up out of the blue and said “we won!”

“We won what” I asked.

“Google just officially changed its policy on Real Names”

He said I had  to write a post about it. I agreed but also felt disheartened.
We won but we didn’t it took 3 years before they changed.

They also created a climate online where it was OK and legitimate for service providers to insist on real names.

For those of you not tracking the story – I along with many thousands of people had our Google+ accounts suspended – this posts is an annotated version of all of those.

This was the Google Announcement:

[Read more…]

I’ve co-founded a company! The Leola Group

Thursday evening following Internet Identity Workshop #18 in May I co-Founded and became Co-CEO of the Leola Group with my partner William Dyson.

So how did this all happen? Through a series of interesting coincidences in the 10 days (yes just 10 days) William got XDI to work for building working consumer facing applications. He showed the music meta-data application on Thursday evening and wowed many with the working name Nymble registry.  The XDI [eXtneible Resource Identifier Data Interchange] standard has been under development at OASIS for over 10 years. Getting it to actually work and having the opportunity to begin to build applications that really put people at the center of their own data lives is a big step forward both for the Leola Group and the  Personal Data community at large.

[Read more…]

Resources for HopeX Talk.

I accepted an invitation from Aestetix to present with him at HopeX (10).

It was a follow-on talk to his Hope 9 presentation that was on #nymwars.

He is on the volunteer staff of the HopeX conference and was on the press team that helped handle all the press that came for the Ellsberg – Snowden conversation that happened mid-day Saturday.  It was amazing and it went over an hour – so our talk that was already at 11pm (yes) was scheduled to start at midnight.

Here are the slides for it – I modified them enough that they make sense if you just read them.  My hope is that we explain NSTIC, how it works and the opportunity to get involved to actively shape the protocols and policies maintained.

[Read more…]

Rosie the [New Language] Developer – Where are you?

This past week we [me, Phil, Heidi + Doc] put on the Internet Identity Workshop. It was amazing.

There is a new project / company forming and they are very keen to have women programmers/developers in the first wave of hires.  They are also committed to cultural diversity.

Since they are developing in a new language – you don’t need to have experience in “it” – you just need to have talent and the ability to learn new things.

I asked them for a list of potentially helpful per-requisites:

  • Some experience with ruby on rails
  • Some experience with JSON
  • Some experience with XML
  • Some experience with HTML5
  • Some experience with semantic data modeling
  • Some understanding of the ideas related to the semantic web and giant global graphs

If you are reading the list and thinking – I don’t have “all” of those qualifications…then read this before you decide not to reach out to learn more – The Confidence Gap from this month’s Atlantic.  TL:DR “Remember that women only apply if they have 100% of the jobs qualifications, but men apply with 60%!”

Please be in touch with me if you are interested. I will connect you with them this week.

Kaliya [at] identitywoman [dot] net

 

 

 

 

BC Government Innovation in eID + Citizen Engagement.

I wrote an article for Re:ID about the BC Government’s Citizen Engagement process that they did for their eID system.

CoverHere is the PDF: reid_spring_14-BC

BC’S CITIZEN ENGAGEMENT:A MODEL FOR FUTURE PROGRAMS 

Because of my decade long advocacy for the rights and dignity of our digital selves, I have become widely known as “Identity Woman.” The Government of British Columbia invited me to participate as an industry specialist/expert in its citizen consultation regarding the province’s Services Card. I want to share the story of BC’s unique approach, as I hope that more jurisdictions and the effort I am most involved with of late, the U.S. government’s National Strategy for Trusted Identities in Cyberspace, will choose to follow it.

The Canadian Province of British Columbia engaged the public about key issues and questions the BC Services Card raised. The well-designed process included a panel of randomly selected citizens. They met face- to-face, first to learn about the program, then to deliberate key issues and finally make implementation recommendations to government.

[Read more…]

NSTIC WhipLash – Making Meaning – is a community thing.

Over a week-ago I tweeted that I had experienced NSTIC whiplash yet again and wasn’t sure how to deal with it. I have been known to speak my mind and get some folks really upset for doing so – Given that I know the social media savy NSTIC NPO reads all tweets related to their program they know I said this. They also didn’t reach out to ask what I might be experiencing whiplash about.

First of all since I am big on getting some shared understanding up front – what do I mean by “whiplash” it is that feeling like your going along … you think you know the lay of the land the car is moving along and all of a sudden out of nowhere – a new thing “appears” on the path and you have to slam on the breaks and go huh! what was that? and in the process your head whips forward and back giving you “whip-lash” from the sudden stop/double-take.

I was toddling through and found this post.  What does it Mean to Embrace the NSTIC Guiding Principles?

I’m like ok – what does it mean? and who decided? how?

I read through it and it turns out that in September the NPO just decided it would decide/define the meaning and then write it all out and then suggest in this odd way it so often does that “the committees” just go with their ideas.

“We believe that the respective committees should review these derived requirements for appropriate coverage of the identity ecosystem.   We look forward to continued progress toward the Identity Ecosystem Framework and its associated trustmark scheme.”

Why does the NPO continue to “do the work” that the multi-stakeholder institution they set up was created to do that is to actually figure out the “meaning” of the document.

[Read more…]

I’m not your NSTIC “delegate” any more … pls get involved.

I have heard over the past few years from  friends and associates in the user-centric ID / Personal Cloud/ VRM Communities or those people who care about the future of people’s identities online say to me literally – “Well its good  you are paying attention to NSTIC so I don’t have to.”

I’m writing to say the time for that choice is over. There is about 1 more year left in the process until the “outputs” become government policy under the recently released White House Cyber Security Framework (See below for the specifics).

[Read more…]

What is a Functional Model?

I have been working in the identity industry for over 10 years. It was not until the IDESG – NSTIC plenary that some folks said they were working on a functional model that I heard the term.  I as per is normal for me pipped up and asked “what is a functional model”, people looked at me, looked back at the room and just kept going, ignoring my question.  I have continued to ask it and on one has answered it.

I will state it out loud here again –

What is a Functional Model?

How to Participate in NSTIC, IDESG – A step by step guide.

The Identity Ecosystem Steering Group is a multi-stakeholder organization (See this post about how join.) Technically You can participate on lists even if you are not members but it is better that you go through the process of joining to be “officially” part of  the organization.

If you join the IDESG it is good to actively participate in at least one active committee because that is where organization work is done by committees – any person or organization from any stakeholder category can participate.

The committees have mailing lists – that you subscribe to (below click through where it says Join Mailing list and put in the e-mail address you want to use, share your name and also a password).

On the list the group chats together on the list and talk about the different work items they are focused on.  They have conference calls as well to talk together (these range from once a week to once a month).  You can also contact the chair of the committee and “officially” join but that is not required.

If you are reading this and getting involved for the first time – read through this list and pick one of the committees that sound interesting to you.  They are friendly folks and should be able to help you get up to speed – ask questions and ask for help. This whole process is meant to be open and inclusive.

[Read more…]

How to Join NSTIC, IDESG – A step by step guide.

The National Strategy for Trusted Identities in Cyberspace calls for the development of a private sector lead effort to articulate an identity ecosystem.

To be successful it needs participation from a range of groups.

An organization was formed to support this – the Identity Ecosystem Steering Group in alignment with the Obama administration’s open government efforts.

The “joining” process is not EASY but I guess that is part of its charm. It is totally “open and free” but challenging to actually do.

 

PART 1 – Getting an Account on the Website!

Step 1: Go to the website: http://www.idecosystem.org

[Read more…]

Personal Clouds, Digital Enlightenment, Identity North

Next week Thursday August 22nd is the Personal Cloud Meetup in San Francisco. It will be hosted at MSFT.  If you want to get connected to the community it is a great way to do so. Here is where you register. 

In September I’m heading to Europe for the Digital Enlightenment Forum September 18-20th. I’m excited about the program and encourage those of you in Europe who might be reading this to consider attending. We are doing a 1/2 day of Open Space (what we do at IIW) where the agenda is created live at the event.

[Read more…]

Core Concepts in Identity

One of the reasons that digital identity can be such a challenging topic to address is that we all swim in the sea of identity every day.  We don’t think about what is really going in the transactions….and many different aspects of a transaction can all seem do be one thing.  The early Identity Gang conversations focused a lot on figuring out what some core words meant and developed first shared understanding and then shared language to talk about these concepts in the community.

I’m writing this post now for a few reasons.

There is finally a conversation about taxonomy with the IDESG – (Yes! after over a year of being in existence it is finally happening (I recommended in my NSTIC NOI Response  that it be one of the first things focused on)

Secondly I have been giving a 1/2 day and 1 day seminar about identity and personal data for several years now (You can hire me!).  Recently I gave this seminar in New Zealand to top enterprise and government leaders working on identity projects 3 times in one week.  We covered:

  • The Persona and Context in Life
  • The Spectrum of Identity
  • What is Trust?
  • A Field Guide to Internet Trust
  • What is Personal Data
  • Market Models for Personal Data
  • Government Initiatives Globally in eID & Personal Data

[Read more…]

Meta-Governance

This spring I attended the Executive Education program Leadership and Public Policy in the 21st century at the Harvard Kennedy school of government with fellow Young Global Leaders (part of the World Economic Forum).  A line of future inquiry that came to me by the end of that two weeks –

How do we design, create, get functioning and evolve governance systems?

The governance of governance systems = Meta-Goverancne. 

At the Kennedy program all they could talk about was “individual leadership” (with good advice from good teams of course) at the top of  Organizations.  They all waved their hands and said “Good luck young leaders, We know its more complicated now…and the problems are bigger then just organizational size but we don’t really know how what to tell you about how to interorgainzational collaborative problem solving and innovations…so “good luck”.

It was surreal because this inter-organizational, complex space is where I spend my work life helping design and facilitate unconferneces – it is in that complex inter organizational place.

I have this clear vision about how to bring my two main career bodies of knowledge together (digital identity + digital systems & design and facilitation of unconferneces using a range of participatory methods) along with a range of other fields/disciplines that I have tracked in the last 10 years.

Value Network Mapping an Ecosystem Tool

My response, two years ago to the NSTIC (National Strategy for Trusted Identities in Cyberspace) Program Office issued Notice of Inquiry about how to govern an Identity Ecosystem included a couple of models that could be used to help a community of companies & organizations in an ecosystem co-create a shared picture. A shared co-created picture is an important community asset to develop early on because it becomes the basis for a real conversation about critical issues that need to be addressed to have a successful governance emerge.

The Privacy Committee within NSTIC has a Proactive Privacy Sub-Committee and before I went on my trip around the world (literally) a month ago.  I was on one of the calls and described Value Network Mapping and was invited to share more about the model/method and how it might be used.

Value Network Maps are a tool that can help us because both the creation of the map and its subsequent use by the companies, organizations, people and governments that are participating strengthens the network.   This is important because we are dealing with a complex problem with a complex range of players. In the map below we are in the top left quadrant – we NEED strong networks to solve the problems we are tasked with solving.  If we don’t have them we will end up with Chaos OR we will have a hierarchical solution imposed to drive things towards the complicated and simple but …given the inherent nature of the problem we will NOT fully solve the problem and fall off the “cliff” on the edge between simplicity and into chaos.

(In this diagram based on the cynefin framework developed by David Snowden architect of children’s birthday parties using complexity theory and the success of Apolo 13 )

 

So – what is a Value Network Map?

It models technical & business networks by figuring the roles in any given system and then understanding the value that flow between different roles.  Value flows include payment for the delivery of goods or services (these are tangible deliverables) but also intangible deliverables such as increased level of confidence because information was shared between parties (but was not contractually obligated and no payment was made).

Drawing from Verna’s book/site that lays out how to do it. There are four steps to a value network map.

1. Define the scope and boundaries, context, and purpose.

2. Determine the roles and participants, and who needs to be involved in the mapping.

3. Identify the transactions and deliverables, defining both tangibles and intangibles.

4. Validate it is complete by sequencing the transactions.

 

I’ve worked on several value network mapping projects.
I worked with the Journalism that Matters to document he old and new journalism ecosystem.I have lead several community Value Network Mapping efforts.

This projects highlights how the method can be used to talk about a present/past state about how things happen “now”. How do people today or 20 years ago share verified attributes with business and government entities one does business with?  If we understand the roles that exist in a paper based version/world How do those roles change in a future enable with technology and how do the value flows change and what new roles are created/needed?

A value networm map can be used to map the flow of rights and duties between different roles in an ecosystem can also be considered along with the flow of monetary and other value.

Two years ago I went with Verna Allee (the innovator of the method) to  the Cloud Identity Summit  to work on a map for my organization the Personal Data Ecosystem Consortium focused on the “present state” map to explain what currently happens when someone visits a website and clicks on an add to go buy something and then is asked to provide identity attributes.

We took this FCC submitted map that has the individual at the center and data flows to the businesses, government and organizations they do business with and is sold on to Data Brokers and then Data Users buy it to inform how they deal with the individual all without their awareness or consent.

 

PersonalData-VNA-NowMapWe added in a wrinkle to this flow and asked what happens when an individual has to prove something (an attribute) about themselves to make a purchase.

Our hope was to do this and then work on a future state map with a Personal Cloud provider playing  a key role  to enable new value flow’s that empower the  Individual with their data and enabling similar transactions.

This is best viewed in PDF so if you click on the link to the document it will download.

Creating this map was an interactive process involving involved two dozen industry professionals that we met with in small groups.  It involved using large chart paper paper and post-it notes and lines on the map.   We came into the process with some of the roles articulated, some new roles were added as we began mapping with the community.

An example to give you a sense of what it looks like when you do it in real life is this map that shows how trust frameworks & the government’s reduction of risk in the credit card system.

This was a small piece of the original map for the Personal Data Ecosystem (it did not end up getting included in the PDF version).  The roles are the orange flowers and the green arrows are tangible value flows and the blue arrows are intangible value flows.

So how could the Proactive Privacy Sub-Committee use this method?

At an IIW11 one of the practitioners of value network mapping came to share the method and we broke up into smal groups to map different little parts of an identity ecosystem. We had a template like this picking four different roles and then beginning to map.

The exercise is written about here on Verna’s website.

Scott David was a community member there and really saw how it was a tool to understand what was happening in systems AND to have a conversation about the flow of rights and responsibilities flow.

The method is best done face to face in small groups.  It helps if the groups are diverse representing a range of different perspectives.  A starting point is a use-case a story that can be mapped – what are the roles in that story and then walking through the different transactions.

So how do we “do” it. Well a starting point is for those interested in helping lead it to identify themselves in the context of the pro-active privacy committee.  We should work together  to figure out how we lead the community using this process to figure out the privacy implications and see where the money flows for different proposed solutions.

We can try to do a session at the upcoming July or October plenary.

We could also organize to do some meetings at:

  • conferences in the next few months were we can identify 5-10 interested IDESG members to participate in mapping an ecosystem chunk for an hour or two.
  • in cities around the country where we identify 5-10 folks who want to spend an hour or two mapping an ecosystem chunk.

It would be great if we decide to do this that the Secretariat lead by Kay in her role as Executive Director of the IDESG can support us in organizing this (That is why we are paying htem 2.5 million buck s to help us  do the work of  organizing in a meaningful way.

I am friends with Verna Allee and can ask her for advice on this however I think the kind of help/advice we need to really use this method and do it WELL would behove us to actually use NSTIC IDESG moneys to hire Verna to engage with us in a serious way. When I wrote my NSTIC NOI I did so thinking that their would finally be monies available to pay people to do community conference building work like this.  Perhaps it is not to late to do so.

 

 

She’s Geeky Seattle: April 26-27

She’s Geeky is coming to Seattle in April 26-27.

She’s Geeky Logo

I will be heading up to facilitate and am very excited to finally have this event coming to the North West.

She’s Geeky is a kind of magical event where women geeks of all kinds, gaming geeks, linux geeks, fandom geeks, crafting geeks, beekeeping geeks, drupal geeks, raspberry pi geeks, Arduino geeks, geeks in training, come together and hang out learning from each other.

Maybe we can even get some women from my native Vancouver to come down. :)

Online Community Unconfernece “Its BACK!”

I am really excited to be working with a super awesome crew of leaders of the Online Community Manager Tribe – or OCTribe.  We have been considering reviving the event and the pieces have finally come together to do it.

May 21st at the Computer History Museum

Registration is Open!

I really love the other co-organizers who are all rockstar community managers.

The conference was originally produced by Forum One and I contracted with them to help design and facilitate. That event itself grew out of an invitational summit they hosted annually on online communities.  I actually attended one of these in 2004 as a replacement for Owen Davis who I worked for at the time at Identity Commons (1).

My firm Unconference.net is doing the production and facilitation for the event.

I plan to bring forward topics of digital identity forward at the event and hopefully get some of the amazing expertise on identity and reputation to participate in NSTIC.

 

 

Another Bill of Rights

I did a collection called the Bill o’ Rights o Rama. 

Here is a new proposed one a Gamers Bill of Rights  based on another gamers bill of rights (this one looks beautiful)

Preamble
Gamers are customers who pay publishers, developers, and retailers in exchange for software.

They have the right to expect that the software they purchase will be functional and remain accessible to them in perpetuity.

They have the right to be treated like customers and not potential criminals.

They have the right to all methods of addressing grievances accessible by other consumer.

They have the right to the game they paid for, with no strings attached beyond the game and nothing missing from the game.

Gamers’ Bill of Rights
I. Gamers shall receive a full and complete game for their purchase, with no major omissions in its features or scope.

II. Gamers shall retain the ability to use any software they purchase in perpetuity unless the license specifically and explicitly determines a finite length of time for use.

III. Any efforts to prevent unauthorized distribution of software shall be noninvasive, nonpersistent, and limited to that specific software.

IV. No company may search the contents of a user’s local storage without specific, limited, explicit, and game-justified purpose.

V. No company shall limit the number of instances a customer may install and use software on any compatible hardware they own.

VI. Online and multiplayer features shall be optional except in genre-specific situtations where the game’s fundamental structure requires multiplayer functionality due to the necessary presence of an active opponent of similar abilities and limitations to the player.

VII. All software not requiring a subscription fee shall remain available to gamers who purchase it in perpetuity. If software has an online component and requires a server connection, a company shall provide server software to gamers at no additional cost if it ceases to support those servers.

VIII. All gamers have the right to a full refund if the software they purchased is unsatisfactory due to hardware requirements, connectivity requirements, feature set, or general quality.

IX. No paid downloadable content shall be required to experience a game’s story to completion of the narrative presented by the game itself.

X. No paid downloadable content shall affect multiplayer balance unless equivalent options are available to gamers who purchased only the game.

Interesting events in 2013

This is a calendar of events that I know in 2013 (and beyond). I think their interesting, I’m currently planning attending all the events in , I’m helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach.
Cloud Computing Workshop and Big Data Forum, Gaithersburg, Maryland, January 15 – 17, 2013
Strata Online, DataWarefare, January 22
State of the Net Conference, Washington DC, January 22 – 23, 2013

Online Community Manager Meetup link  San Francisco, January 23th 

The core of this community are some amazing people who I really love and share the professional practice of doing community management online. Randy Farmer, Gail, Susan Tenby [personal hero for testifying before congress pro-social good use of second life and pro-nym and then having that picked up by the Daily Show, ] Bill Johnston, ,

Cloud Security Alliance, Bay Area, January 24th

* Streams, Gardens, and Clouds: Visualizing Dynamic Data for Engagement, Education and the Environment: A CITRIS Data and Democracy Event to Celebrate Data Innovation Day link, Berkeley, January 24th

She’s Geeky!!!! link Bay Area – Mountain View, January 25-27

I am super excited about this year – we have the amazing Kas Nettler executive producing and

* CFP Mini Conference in DC, January 28th
Green Data Center Conference, San Diego, January 29-31
* Research Exchange talk by Tim O’Reilly at CITRUS, January 30th

Personal Cloud Evening in San Francisco, last week in San Francisco

Working with Johannes
Computers, Privacy and Data Protection, Brussels, January 23-25

FEBRUARY

Community Leadership Summit linkSan Jose, 

Van Riper

NSTIC IDESG Face to Face, Phoenix, Feb 5-7

First of all you can register here – this will be the 3rd
Lift Conference, Geneva, Feb 6-8

European Identity Workshop, LINK, Vienna, Feb 12-13

Personal Digital Archiving, Maryland, Feb 21-22nd
Wisdom 2.0, February 21-24th
Future of  Banking Summit, Paris,  Feb 26th
Strata Conference, Santa Clara, Feb 26 – 28th,

RSA Conference, San Francisco, Feb 25 – 29th

* Network & Distributed System Security Symposium,  San Diego, Feb 25-27,
Hosted by the Internet Society
 *  Public Interest Environmental Law Conference PIELC, Eugene, Feb 28 – March

MARCH

* Economist Technology Frontiers: Humans and Machines, London, March 5 – 6th
Computers Freedom and Privacy, Washington DC, March 5 – 6th
IAPP, Washington DC, March 6 – 8th
SXSW Interactive, Austin, March
GigaOm Structure, NYC, March 21-22
* UnLike us #3, link, Amsterdam, March 22-23
  1. Theory and Critique of ‘Social’
  2. Are you Distributed? The Federated Web Show
  3. Political Economy of Social Networks: Art & Practice
  4. Mobile Use of Social Media
  5. Facebook Riot: Join or Decline
Ideas Economy: Innovation 2013, Berkeley, March 28th
Redefining the Speed of Business

APRIL

Harvard Leadership Program with YGLs, link, Cambridge, April 2-12th

Cloud Connect,  Silicon Valley, April 2 -4
White Privilidge Conference, April 10-13, Seattle
Nonprofit Technology Conference, Minneapolis, April 11 – 13th
HOPES, Eugene, April 4 – 6th
TEDx Berkeley, April 20th
Future of Money and Technology, link, San Francisco, April ? 

UnMoney Convergence, link, San Francisco, April ?

* Social Venture Network Spring Conference, San Diego,  April 25-28th

MAY

Internet Identity Workshop #16, Mountain View, May 7-9

European Identity Conference, Munich, May 14-17
The product
WWW 2013, Rio de Janeiro, May 13 – 17

JUNE

YGL Summit Mayanmar, and WEF East Asia link June 2 – 7 

* TERENA, TNC2013, Maastrich, Netherlands, June 3 – 6
Ideas Economy: Information 2013,  San Francisco, June 4 – 5, 2013
Democratization of Big Data
Personal Democracy Forum, NYC,  June  6 – 7
Cloud Expo, NYC, June 10-13
As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing boom, Big Data Expo is the single most effective event for you to learn how to use you own enterprise data – processed in the cloud – most effectively to drive value for your business.A recent Gartner report predicts that the volume of enterprise data overall will increase by a phenomenal 650% over the next five years.
Smart Cities, London, June 11-12
Indie Web Camp, Portland, June 22 – 23,
Open Source Bridge, Portland , June 24-26,
Aspen Ideas Festival, Aspen, June 26 – July 2

JULY

ePIC European ePortfolio, London,July 8-10
Cloud Identity Summit, link, Napa, July 8 – 12
Hollyhock Invitational, link Cortez, July 
Open Source Convention, Portland ,July 22 – 26
BlogHer, Chicago, July 25-27

AUGUST

Blackhat, Las Vegas, July 27 – August 1
DefCon, Las Vegas, August 1 – 4
Burning Man, Nevada, August 26 – Sept 2
Art Theme:  Cargo Cult

SEPTEMBER

dConstruct, UK, Sept 5 – 7
Indie Web Camp, UK, Sept 8th
Digital Enlightenment Forum  link, ___, September
Biometrics Consortium Conference, Tampa, September 17-19th
* Web of Change, link, Texas Hill Country, Sept 18-22,
 * DataWeek, link, September 28 – Oct 3

OCTOBER

* Money 2020, Las Vegas, October 6-9
* Bioneers
* New Yorker Festival
Interent Identity Workshop #17, link, Mountain View, October

NOVEMBER

 * 88th IETF Meeting, Vancouver BC, Nov 3-8
* Identity Next, The Hague, November 19-20

DECEMBER

Chaos Computer Congress, link, Germany, ~ Dec 27-29
————–
* FOSDEM
* 89th IETF Meeting, London, March 2-7, 2014,
* WWW 2014, Seoul, April 7-11, 2014
* TERENA, TNC2014 Dublin, Ireland May 19-22, 2014
* 90th IETF Meeting, Toronto, July 20-25th 2014
* 91 IETF Meeting, Hawaii, Nov 2014
————
* 92nd IETF Meeting, Dallas, March 22-27th, 2015
* 93rd IETF Meeting, Prague, July 19-24, 2015
* 94th IETF Meeting, Japan, Nov 1-6, 2015

Mass-Educational Databases = Wrong Architecture

[This is cross posted on the PDEC blog – http://pde.cc/2013/03/edudata/]

permrecord--tablet
permrecord–tablet (Photo credit: teach42)

 

Every day it seems there is a new story about new “big data” systems are going to make things better – but then… they just made things creepier.

 

The latest news like this came from inBloom Inc. via SXSW-Edu (on Reuters). inBloom is a newly formed nonprofit to host a massive database of student records created with $100 million in funding from the Bill and Melinda Gates Foundation.  The goal seems good: track the progress of students through school and use the data to improve their outcomes.

 

The records can be comprehensive and inBloom doesn’t need students’ parents to consent to have their records in the database.

 

Federal officials say the database project complies with privacy laws. Schools do not need parental consent to share student records with any “school official” who has a “legitimate educational interest,” according to the Department of Education. The department defines “school official” to include private companies hired by the school, so long as they use the data only for the purposes spelled out in their contracts.

 

The whole idea that you must have one massive educational database of all student records is an architecture of the past.

 

The core idea is right: more data about a student’s learning experience in school is good for them and could be good for the overall school system. The challenge is how it is engineered. Are students and their parents put at the center of their own data lives? Or are they in another giant system they have little control over or say in?

 

We need to empower students with their own personal clouds. They must be able to download their own student learning records. They must be able to share them with companies and services that will work on their behalf. With personal clouds and infomediaries to help, students will find educational resources/and tools that can help them fill gaps in their learning and discover communities of interest. This infomediary market approach puts personal data to use without revealing any more data than needed and only on the student’s terms.

 

Infomediary Market Model for Personal Data

 

 

In this market model the individual collects data in their personal cloud. This could be a machine in their home or a service provider they trust (they must have the right & ability to move service providers with all their data if this is truly a personal cloud service). The individual trusts an infomediary service to look into their personal cloud but does so with a fiduciary duty to the end-user. The infomediary then works on their behalf in the market place to find relevant vendors and services.  It does not reveil specific personally identifying information to prospective service providers. It helps the individual have good choices and they decide who to transact with (thus reveling personal information).

 

The inBloom project sounds like an marketing project: companies will comb through the data base, find students to approach, and sell them with “education” products. The student data is up for grabs.

 

We need a better set of policies, technologies, and products that put parents and their kids at the center of and in control of their data. This single point of failure won’t do.

 

 

Enhanced by Zemanta