Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. Let’s illustrate how an identity system works using passports as an example.

Publication Day For Scaling Up Excellence -- and Facebook's 10th Anniversary!

Bob Sutton

Today is Facebook’s 10 th Anniversary.   Facebook is an especially instructive scaling case.  Facebook had moved to Palo Alto by 2006, located just a few blocks from the Stanford campus (where Huggy and I teach).

Trending Sources

Facebook + WhatsApp means it’s time to double down on new investments

Doc Searls

Over on the ProjectVRM blog I make a long-form case for why Facebook buying WhatsApp for $19 billion dollars in cash and stock is a Good Thing. For example… Everything we buy and own can have a cloud of its own. These will be our own secure personal spaces in the connected world. Stop right now and read Four Numbers That Explain Why Facebook Acquired WhatsApp , a post by Sequoia Capital , WhatsApp’s main VC.

Face Off for Facebook?

Martijn Linssen

why not both Home About Contact Friday, 23 April 2010 Face Off for Facebook? Theres a lot of talk about Facebook. Theres a lot of numbers about Facebook too. And especially that last medium made me wonder: where on earth are those Facebook users? Business or Pleasure? -

Notes from Mari Smith Facebook Changes Webinar: Privacy Settings and A New Metric – People Talking About

Beth Kanter

Facebook Changes: A Complete Guide – by Mari Smith. Also, a few insights about the what the changes mean for Facebook pages. However, if you use your Facebook profile to connect with professional colleagues or want to promote your organization, you might consider this option.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. They create a profile on the internet, on Facebook, on Bebo. One person put on his resume, 'one job, great boss' but on his Facebook he said 'four jobs' and was badmouthing bosses. But then he says the facebook is private. But - my comment - you're saying people should keep the info off Facebook - why? For example. You are not secure.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

For example, a wiki is a tool. These are examples of features. There is one feature they have included, which is a personal space where an individual can upload their notes, etc… There is also a “community&# tool which is supposed to work like facebook.

Losing interest in social media: there is no there there

George Siemens

After recreating my online social network ( largely based on blogs from early 2000) in Facebook, Twitter, Foursquare, and Quora, G+ was a chore. I spent a few weeks of responding to G+ friend requests, trying to engage with a few people, posting a few random links, all the while trying to upkeep (occasionally) Twitter and (almost never) Facebook. What has Twitter and Facebook done for me? Put another way, Twitter/Facebook/G+ are secondary media.

The only way publishing can escape the forest of silos

Doc Searls

Every publisher requiring a login/password, or using ‘social logins’ such as those provided by Facebook and Twitter, is living in an administrative hell that burns no less because it’s normative in the extreme. That every pub has its own login/pw, subscription system and/or social login is a perfect example of centralized systems failing to solve the problems of centralization.

AI and Public Policy

Irving Wladawsky-Berger

For example, while self-driving cars may be safer than human-driven cars, there will be serious accidents which will definitely attract considerable attention.

Digital Twin: Bringing the Physical and Digital Worlds Closer Together

Irving Wladawsky-Berger

GE is thus transforming and expanding its business models, much as consumer Internet companies, - e.g., Amazon, Facebook, Google, - have done over the past decade. A fleet of aircraft, for example, generates gigantic amounts of data over a year.

McGeveran’s Law of Friction

David Weinberger

” For example: …mainstream news websites, including the Washington Post, offer “social reading” applications (“apps”) in Facebook. After a one- time authorization, these apps send routine messages through Facebook to users’ friends identifying articles the users view. Not only does this reveal, say, that you’ve been watching Yoga for Health: Depression and Gastrointestinal Problems (to use an example from Sen.

In Honour of Ada Lovelace

Dan Pontefract

Without hesitation, and within a matter of minutes, we had secured and opened up a WordPress site attaching it to the new domain name. Well, when he was actually blogging and not centralizing his blogging world to Facebook.). A couple of examples come to mind.

What corporates can learn from the Top 10 Tools for Learning 2012

Jane Hart

Dropbox recognizesthat this file synchronization and file haring is a key functionality for business, but also realises that security is a big issue for many, so offers “bank grade security” for corporate teams.

Tools 66

Social Customer Service - proving you failed?

Martijn Linssen

A great comment by Guy Letts to my previous post on Acquisition versus Retention made me write this one - the comment is only half an hour old but blew my mind: Theres another example of how ridiculous is the pursuit of NEW rather than getting the basics right. Business or Pleasure? -

SEC opens the gates to crowdfunding and a new structure of capitalism

Ross Dawson

The article begins: Federal securities regulators are weighing demands to make it easier for fast-growing companies to use social networks such as Facebook and Twitter to raise money by tapping thousands of investors for very small amounts of shares. The Securities and Exchange Commission is looking at adapting its rules to encourage Internet-age techniques for small companies raising capital. This is significant.

How the Internet May Evolve

Stephen Downes: Half an Hour

For example, you don't see the discussions I have on my Facebook feed or on Twitter with interesting and informed participants. Sure, there are disasters like the Facebook news stream, but people are already amazed at how much Google knows about them. Some examples: Banks - today backs provide loans based on very incomplete data; It is truie that many people who today qualify for loads would not get them in the future.

Making social media happen in government: case study of NSW Department of Education

Ross Dawson

At the conference I wrote about the case study of Queensland Police , which is a great example of government bodies creating value through social media. Barriers to engagement include loss of control, staff performance, ROI, brand reputation, security, and poor understanding. Once the policy was in place and staff were being educated on the issues, the executives started feeling far more comfortable providing more access to social media, including Facebook.

Time for digital emancipation

Doc Searls

For example: That’s Thomas Jefferson ‘s rough draft of the Declaration of Independence. Some of us have pretty much abandoned e-mail altogether … for Facebook. Civilization is a draft. Provisional. Scaffolded. Under construction.

Seven Ways to Make Sure Your Blog Gets Noticed

Beth Kanter

For example, the MomsRising food blog carnival was part of a larger campaign that included coalition partners Pew, the Robert Wood Johnson Foundation and as well as other child advocates and nutritional experts. Flickr Photo by alshepmcr.

[2b2k] Science as social object

David Weinberger

An article in published in Science on Thursday, securely locked behind a paywall , paints a mixed picture of science in the age of social media. As an example they point to the fact that “science stories usually…are embedded in a host of cues about their accuracy, importance, or popularity,” from tweets to Facebook “Likes.”

Thoughts on privacy

Doc Searls

Clothing, for example, is a privacy technology. Some of us have pretty much abandoned e-mail altogether … for Facebook. Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Some examples: Privacy by Design is a policy and code development movement led by Ann Cavoukian , the Information & Privacy Commissioner of Ontario.

Book week

Doc Searls

From Selling You: Not Just on Facebook , by Haydn Shaughnessy in Forbes —. A couple of days back I tried to reflect an alternative view in for, example, how we might use LinkedIn data – it’s not only my view of course and I don’t want to claim any originality in it. As an outsider, I can see it… Like Facebook, Pinterest and Instgram have valuations that are guesses about the future of advertising.Will they be the next great places to advertise as we shift to mobile?

RFP 43

Beyond Assessment ? Recognizing Achievement in a Networked World

Stephen Downes: Half an Hour

Samuel (Noekowsky ) tried to use Greg Egan (as an example), an attempt that failed miserably. Here''s an example of what I mean by "making stuff up." An example of this is that your veins in your legs actually play a role in moving the blood back to the heart. Qualt , for example, based on courses developed by the Association of Accounting Technicians, et cetera, and brought to us by the good people like Google. Secondly, you show examples of what you do.

Getting Around Internet Censorship: VPN

Beth Kanter

The government blocks certain sites, including access to any group organizing features on social sites (shared photo pools for example), skype out, and tools like VPNs that can help you get around government censors. Eventually, I was able to install a VPN and get to the sites I wanted to use.

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

there are more than 15mM applications deployed on virtualized infrastructures - demands are not being net - nearly 2/3 or organizations fall behind schedule when deploying new IT capabilities - some things we''ve done behind the scenes has help - virtualizing, for example - but of course these things need their own support - that''s where Bluecat comes in - what is missing today?

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

For example, Gartner’s Research director Svetlana Sicular recently observed that big data has already reached the peak of the hype cycle , and is now falling into the trough of disillusionment , a necessary step before (hopefully) moving on to the slope of enlightenment.

Data 75

Jobs, work and technology

Harold Jarche

For example, CAD systems have enabled engineers to develop far more complex products than they could have done otherwise. And, systems like Watson will be extensively used to help experts deal with highly complex problems in areas like medicine, finance and national security. Facebook dominates magazine covers, stories, broadcast and our mobile devices “tweet” with content from ” twits”.

The potential massive social impact of gamification for weight loss and savings

Ross Dawson

The article goes on to give examples: In February, UnitedHealth collaborated with a local school district in the Houston area to give students the option to participate in a program that measures the potential impact of computer-based gaming, using Xbox Kinect, on physical activity and weight loss when combined with a weight management program. Last night I was fortunate to be at a dinner with innovation strategist Charles Leadbeater , hosted by Martin Stewart-Weeks of Cisco.

Nonprofit CEOs and the Network Mindset

Beth Kanter

Regardless of your budget, this session will leave you in a better position to secure leadership buy-in by getting inside the head of a seasoned nonprofit leader, as well as offer concrete insights on how an established organization is able to use technology to better meet their mission.

On manners, privacy and evolution

Doc Searls

But they were also employees of the GPO (General Post Office) with a national security obligation and had a direct reporting route into the national security apparatus, so that, if they felt that something fishy was afoot (especially in times of war), they were assumed to be both reliable and honest witnesses. I also sense a more elevated (and perhaps evolved) comprehension of privacy (as, for example, “the right to be left alone”) in Europe than in the U.S.

Seven Ways Your Organization can Put Privacy Into Practice – and Why

Beth Kanter

It’s easy to post an off-the-cuff, friendly Facebook post about a donor or volunteer, but make sure it’s kosher with them first. Security. Photo by Sean MacEntee.

International Organizations and Social Media: News, Engagement, and Social Data for Policy Change

Beth Kanter

Facebook reports that almost three quarters of its 1.2 Benchmark Studies and Examples. For example, the UN Refugee Agency, encourages all field officers to tell the stories of the refugees they are working with as this recent tweet from Syria illustrates.

The Power of Reuse: Wikipedia in Action

Stephen Downes: Half an Hour

This week for example there was the experience of going from an article being marked for deletion to the potential removal of the banner altogether. For example in my class they have peer review. They have their Facebook pages, they scrub them clean before going into med school. Dan: I think it''s people in my generation, they don''t want to give up their social security numbers, etc. Summary of a panel at the Hewlette Grantees'' Conference. Errors are again my own.

Wiki 35

The 2016 Look at the Future of Online Learning

Stephen Downes: Half an Hour

And the tablet is an invaluable work environment for people who need to be mobile (we see cases such as tablets for pilots and health care workers, for example). The tennis racket that teaches you, for example. A really good example from the Gamification Wiki is the use of frequent flyer points. Why, for example, would there be "admission to programs and courses will allow for multiple start dates?"

Beyond Free ? Open Learning in a Networked World

Stephen Downes: Half an Hour

Show us one example." Well, here''s one example: A study of 50 titles, this was from New Zealand literature prior to 1890 or something like that that have been digitized. Newman & Levy, 2104) Newspapers are a good example. I''ve seen, for example, by Harrison C.

What's Ours

Stephen Downes: Half an Hour

Spaces like Flickr and Facebook and Google+ and Tumblr belongto large corporations who offer us certain services in exchange for the right to monetize our creativity and attention. For example, the ISP on which I hosted my own server has been purchased three times since I started with them (which is how I find myself a SoftLayer customer without even trying). As it was purchasing Tumblr, Yahoo was also quietly making changes to the Flickr photo sharing service.

Social Business in the Age of the Customer

Irving Wladawsky-Berger

Starting about a decade ago with the rise of Web 2.0 , we have seen the explosive growth of social media technologies, - e.g., blogs, wikis and podcasts, - as well as platforms like Twitter, Facebook and YouTube with hundreds of millions of users. Social Media is one of the hallmarks of our digital age, enabling individuals and communities to create and share user-generated content.

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Everyone was using Facebook. Akilah workshop. View more presentations from Beth Kanter.