Gaining Trust

A follow up to my look at digital identity yesterday Tom from HR for the leader in you wrote about gaining trust. In reading his post he talks about how hierarchies end up lying (at some point) and due to their small size teams cannot lie.

In thinking about this does that mean that this metadirectory idea will become corrupted? Or based on the openness of the solution will small communities be established (essentially identity teams) that comply with the five C’s? The 5 C’s are:-

  • Competence
  • Community
  • Commitment
  • Communication
  • Cupidity

Something to ponder on my flight to Sydney this morning.

Digital identity a perspective

George Siemens of elearnspace pointed to a couple of papers written last week by Stephen Downes on digital identity (part 1, part 2) which were very interesting. A disclaimer, not being an academic I personally find Stephen’s work difficult to read so I might have misunderstood the intent, if so let me know.

Stephen’s first paper provides the context of the problem he is trying to resolve, while part 2 provides us an answer. Part one covers Identification, Authentication, Privacy, and finally self-identification and within the paper touches on several of The Laws of Identity both from a positive and negative perspective. In fact much of his ideas and concepts directly relate to a recent White Paper released by Kim Cameron. So what are the 7 laws of identity, you can either read the white paper, or have a look at this old post.

The second part of Stephen’s paper actually provides a set of perl scripts that implement a digital identity system called “mIDm”. The system looks nice and simple, to quote Stephen:-

* A user declares the name of his or her private website – the location of an mIDm script on their own server (or a server provided by a host, such as an online community of their choosing)
* When the user attempts to access a remote website, the remote website redirects their browser to that mIDm server with an access key (sometimes called a ‘handle’, though I don’t like that name).
* The mIDm server accepts and stores the key. The idea here is that only a person with access to the mIDm server can store that particular key.
* The mIDm server redirects the user back to the remote website.
* Upon the user’s return, the remote website independently requests the key from the mIDm server.
* If the key is returned, then the server accepts that the mIDm address provided by the user is valid, and hence, may request additional information (such as, say, FOAF data) from the mIDm server.

While not a perfect solution a good starting point.

I have been reading some of the posts that have come out of Digital Identity World over the last few days and am finding some interesting (there’s that word again) comparison with Stephen’s work. Such as this post from Kim Cameron where he is quoting an idea from Scott Mace on the concept of an ID-Legal web site:-

“…what we need is a Web site that determines which Web sites and services comply with (the) 7 laws of identity. Maybe it could be modelled on this, and let the visitors vote on the compliance of each particular Web site with the 7 laws.”

Stephen’s system is working along these lines, not 100% but close enough for me. He has defined a nice solution that works on a one to one basis.

If we pick up on Eric Nolan’s post on Law 7 we start to see that what Stephen is proposing is something very much like the “Secure Token Service” or STS. But to do this we will need some standards to ensure communication across the metadirectory is seamless, maybe that is what they are talking about and I am missing the point. Stephen did not see too impressed with the whole metadirectory idea but his solution does seem to go down the path of the laws, I wonder if he intended this or it is a coincidence? What I like about Stephen’s solution is he has touched on many of the aspects that are being discussed as part of the broader debate around digital identity but in a simplified format that non-experts can related to which is always a good thing.

In leaving Stephen’s work for a minute I am all jazzed up about the deeper meaning of the 7th Law, specifically the bit about “consistent experience while enabling separation of contexts”. I have ranted over and over again about the whole user experience and it seems imbedded in these laws is that if systems complied with all 7 would begin to improve the user experience.

This poses some interesting challenges for system designers. How does one build a system that allow the portability, as discussed, but still simply enough to be used by joe average and not requiring 100 consultants for a large consulting firm to implement? At the core we need to be able to understand the identity of a person using a workplace tool so that their user experience can be personalised to their specific needs based on their role in the organisation, aka the employee portal. My definition of an “Employee Portal” is a solution that provides a secure, single point of interaction with the organisation, covering information, business processes, and people, personalised to the employee’s role, needs and responsibilities.

Personally I am not able to dig deep enough (if you are check out these links) into the complexity posed by all of this work within the digital identity space, I am more just a keen observer who really wants to simplify how we provide secure access to systems for employees to use on a day to day basis and easy enough so that all systems will implement it. Complexity in the management of identity within enterprises is one of the leading causes poor people data management begin to solve identity management and the rest becomes simplier.

A use for tags

Reading Abject Learning last night and found a real use for tag. Brian Lamb provides a great example of tags in practice from the Northern Voice conference, he quotes Alexandra Samuel, here is the bit I found fantastic.

Tags are helping people solve problems and work smarter. When 350 bloggers gathered recently for Canada’s first blogging conference, Northern Voice, organizers wanted to mirror the live meeting with a lively online presence. With a limited budget, they couldn’t afford a team of videographers or stenographers.

So they asked participants to use the tag “northernvoice” in stories they wrote during the conference and in photos they posted online. The Northern Voice website automatically scoured the Web for those tags, and pulled the stories and images on to its own pages.

Therefore I am going to try an experiment and set up a category called BlogTalkDownunder to track my posts on the up and coming conference this week. Then through Technorati these posts can be tracked. Further any pictures I post on Flickr will have the same post.

I wonder if we can get everyone at the conference to do this?

Job Blogs

Sarah Needleman’s article in the Career Journal on niche job boards and email subscription services is a very interesting (I think I use the word interesting too many times in this blog) read and shows me just how many different methods that are out there for people to find a job. How does the average job seeker navigate this maze of sites and services? Vertical Search is one answer but it will not collect the email newsletters and nor will your average job seeker know how to use it. Once again I feel like ranting about lowering the barrier to entry and ensuring that user experience is fantastic!

PayGlobal new features

From OnRec PayGlobal announces several new features at the HR Software Show in London. From reading the release it they seem interesting features but I wonder how they are really going in their home markets of New Zealand and Australia.

PayGlobal made a big impact on the local market a few years ago at Cebit being one of the first vendors to release a .Net version of their product. From the rumour mill they have had a difficult time getting customers to fully embrace the vision that they are selling, but that can be said for all HRMS vendors in the market today.

Australian Census online

An interesting story was in the Australian IT to on how the 2006Australian Census will have an option to be completed online. I am not really sure what to make of it. While I think it is a great step forward I have a healthy scepticism on the security of the system. I know that once I fill in my form the data is entered into a computer but this is different.

Couple with that it also seems I will need to get use to voting online in the up and coming 2006 Victorian elections.

Still I wonder about how the government will ensure my identity online is secure and 100% accurately authenticated. Also what would happen if a DOS affect or specifically written worm/virus was to attack the sites?