Citizen s perceptions on digital identity

Similar documents
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers

Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU

1. General questions. 2. Personal data protection rights of employees PERSONAL DATA PROTECTION FAQ

SECURITY BIOMETRICS PDF

Privacy Policy. January 2014

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification

S Z E C S K A Y Ü g y v é d i

DATA PROTECTION LAWS OF THE WORLD. India

Industry Security Notice

solutions Biometrics integration

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

DIRECT AIRSIDE TRANSIT (VAF6 DEC

Vulnerability Management Policy

May For other information please contact:

The Leading Provider of Identity Solutions and Services in the U.S.

SHORT FORM NOTICE CODE OF CONDUCT TO PROMOTE TRANSPARENCY IN MOBILE APP PRACTICES. I. Preamble: Principles Underlying the Code of Conduct

URU on-line identity verification

2. Privacy Policy Guidance Memorandum , OHS Policy Regarding Privacy Impact Assessments (December 30, 2008)

Identity Theft. A Crime of Opportunity.

Multi-factor authentication

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Trusting who you know and knowing who to trust. Creating a chain of trust using unique identity solutions

Guide to building a secure and trusted BYOID environment

Formal response to the Consultation Paper: Monitoring and Regulation of Migration

Subject Access Request Procedure (Data Protection) Doc No IMPR04 Rev 2 27/07/ Scope. 2.0 Responsibilities and Definitions

Identity Theft. What it is and How to Protect Yourself

Code of Ethics for Pharmacists and Pharmacy Technicians

Data Protection Policy

Security Audit VIS Central System. Summary Report

Fieldwork: November December 2010 Publication: June

Transforming the Customer Experience When Fraud Attacks

Tier 4: Application Guide

Issues Relating to Using Fingerprint/ Hand Geometry Devices to Check on Work Attendance

Report of a PRIVACY IMPACT ASSESSMENT. conducted by the UK Border Agency. in relation to the HIGH VALUE DATA SHARING PROTOCOL

DHS / UKvisas Project

Discover Germany s Electronic Passport

Operational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA

Identity Verification Program Guide

Introduction to The Privacy Act

Privacy(and(Data( Protection( (Part(II(

Security Awareness Quiz Questions

Title: From Participatory Culture to Prosumer Capitalism: Imaginaries of Transparency in the Age of Corporate Surveillance

Examples of Large Scale Biometrics Systems:

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Identity Cards. The Next Steps

Overview TECHIS Carry out security testing activities

Public Consultation on the Smart Borders Package

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Driving License. National Insurance Number

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

We Must Comply with International Requirements! Introducing Biometric ID Cards in France

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

Fit For Use to a Fault

US-VISIT Program, Increment 1 Privacy Impact Assessment

Use and Change of Names

Cyber Security Strategy

Privacy Policy and Notice of Information Practices

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Application of Biometric Technology Solutions to Enhance Security

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

TLS is the organisation that you pay in return for credit on your OV-chipkaart.

YOU SHOULD COMPLETE THIS FORM IF YOU WISH TO COME TO THE UK TO WORK OR YOU ARE APPLYING UNDER UK ANCESTRY. 1.4 Sex Put a cross (x) in the relevant box

Policy for Social Media Usage in Catawba County

Protection of Freedoms Bill

Identity Theft Victim Checklist

Combating Identify Theft: A Theoretical Framework

APPMACHINE MOBILE PRIVACY STATEMENT. Version, May 29, 2015

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Part 1 About your Self-Assessment Appendix Read Guidance notes, Part 1

What the Future of Online Banking Authentication Could Be

Clinical Solutions. 2 Hour CEU

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute

How long do you want your visa to be valid for? Put a cross (x) in the relevant box 6 months 1 year 2 years 5 years 10 years

CASH ISA SAVINGS CONDITIONS. For use from 2nd September 2016.

STRONGER ONLINE SECURITY

IDENTITY THEFT and YOU

plantemoran.com What School Personnel Administrators Need to know

Cyber Security Recommendations October 29, 2002

Malware & Botnets. Botnets

ITAR Compliance Best Practices Guide

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

Keren Elazari Hackers: The Internet s Immune System

Teacher Guide You re legal, what now? (Grade 12)

Audio: This overview module contains an introduction, five lessons, and a conclusion.

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

Declaration of Internet Rights Preamble

INTERNET, AND COMPUTER USE POLICY.

Information Security Policy

TransUnion Direct: Download Digital Certificate Internet Explorer

2014 Core Training 1

Veda: Fraud Focus Group Forum

Third Party Agent Registration and PCI DSS Compliance Validation Guide

How-To Guide: Cyber Security. Content Provided by

Transcription:

Citizen s perceptions on digital identity Dr Elpida Prasopoulou & University of Essex

Citizens perspectives on digital identity Why do we refuse ID-cards...but love our customer loyalty programs? Why are we concerned about electronic patient files..but share many personal details on Facebook? Which taboos and desires will inform our responses to future technologies of identification and authentication? 20/03/2014 Tomorrow s Transaction Forum 2014 2

What is digital identity? Digital identity is the sum of all digitally available information about an individual How people feel about their personal information Technologies for identification/authentication Desires and taboos that will inform people s responses to identification technologies 20/03/2014 Tomorrow s Transaction Forum 2014 3

Sourced from government, security, industry, health, pop culture, science fiction, art and design, high tech and gadgets Year 1: Scenarios of identity management Putting individuals in different contexts with different IMTs at the centre. 20/03/2014 Tomorrow s Transaction Forum 2014 4

Year 2: Public (dis)engagement UK Four large-scale empirical studies running consecutively General public but also targeted population segments General public Q-study Survey Cultural Probes Elites Focus Groups Vulnerable groups 20/03/2014 Tomorrow s Transaction Forum 2014 5

Q-study: Citizens perspectives on biometrics What uses of biometrics are acceptable to identify yourself in everyday life? Explore how society understands biometrics Public understanding of biometric technologies Reconstruction of main discourses Examine how specific biometrics technologies are seen in the context of everyday life 20/03/2014 Tomorrow s Transaction Forum 2014 6

Research design Two on-line studies: Students (lay experts): 2 x 30 respondents, potential for comparative studies across countries in future steps Experts in biometrics: 30 experts on biometrics drawn from the biometrics industry, think tanks, civil society organisation, privacy advocates and governmental bodies Respondents were asked to sort a set of 50 statements according to whether they agreed or disagreed with them Justify their choices for +5/-5 statements 20/03/2014 Tomorrow s Transaction Forum 2014 7

Statements - Core themes Statements where sources from government reports, civil society reports, academic articles, specialized press identity, empowerment, surveillance, accountability security 20/03/2014 Tomorrow s Transaction Forum 2014 8

Findings: Four main factors/viewpoints Factor A Privacy vigilants Factor B Conservative techies Factor C Safety champions Factor D Casual adopters All of the respondents clearly agreed with one of the statements: In the wrong hands, biometrics have the potential to violate privacy Four different viewpoints clustered around this main statement 20/03/2014 Tomorrow s Transaction Forum 2014 9

Privacy vigilants I have the right to be forgotten, to be free and unfollowed Concerned about the development and spread of new biometric technologies Representative statements: With each new development in biometric technologies, users are getting less control over their data, in terms of knowing when, where, and why it is used The idea that there may be new biometric technologies that can identify me without me ever knowing, makes me uncomfortable They are rather sceptical towards the technological capability of biometrics 20/03/2014 Tomorrow s Transaction Forum 2014 10

See biometrics as a powerful instrument in the hands of governments and corporations They cluster around issues of accountability and empowerment: 1. Data linkage 2. User control over data (when, where and by whom it is used) 3. Use of biometric data without explicit consent 4. Effects of these technologies on existing everyday practices They are favourable to practices of contestation (i.e. sousveillance) 20/03/2014 Tomorrow s Transaction Forum 2014 11

Conservative techies First technology, then security must be perfected when this is done, then I would feel that the benefits would make it worth having a biometric ID Cautious users: positive to government uses of biometrics although concerned about privacy and the possibility for data leakage (i.e. medical information) But, happy for biometric technologies to be used provided data is well protected 27/06/2013 Biometrics Institute Showcase 12

They see biometrics as an alternative to multiple passwords Tech savvy: they favour uses of biometrics in personal devices (e.g. Smartphones) Mobile phone owners should be prepared to download gait recognition software on their phones to prevent others accessing their information in the event of theft or loss Positive to the use of biometrics for personnel management Hand geometry or fingerprinting for capturing labour data Concerned about souveillance : e.g. the use of smartphones to record police action 27/06/2013 Biometrics Institute Showcase 13

Safety champions Biometrics is a guarantee of security for all the global community This groups shares similar concerns with Factor A They are preoccupied by the possibility of data linkage and the use of their biometric data for unrelated purposes However, they are quite favourable for the use of biometrics for border control and security purposes (digital passports, the use of biometrics for immigration processing) 20/03/2014 Tomorrow s Transaction Forum 2014 14

Factor C also is against surveillance and advocates an active form of citizenship to counter such phenomena However, it differentiates between types of biometrics Iris scanning is more acceptable than fingerprint recognition, since it does not have criminal associations It is also favourable to biometrics for domestic uses Interestingly enough it is the only group that is not negative to the use of biometrics in on-line social networks 27/06/2013 Biometrics Institute Showcase 15

Casual Adopters Biometric is based on technology continuously verified and is the result of the best scientific research Factor D has an instrumental view of biometrics Adherents to this viewpoint see biometrics as technical solution to a variety of problems ranging from multiple passwords to fraud and immigration control It should be noted that casual adopters expressed also trust in existing technological solutions for biometrics They also see some types of biometrics especially face recognition as a gadget 20/03/2014 Tomorrow s Transaction Forum 2014 16

Identity and biometrics All four viewpoints are anchored around specific understandings of the relationship between identity and personal data Factor Privacy vigilants Conservative techies Safety champions Casual adopters Views on identity Digital identity becomes a constrain to personal freedom Technological solutions rigidify social interactions Biometrics need to be resisted Body as natural password Biometrics for convenience/protection of personal devices as along as data is protected and not used for unrelated purposes Identity is related primarily with formal, institutional purposes (e.g. border control) Biometrics acceptable in this context. Also acceptable for safety reasons (seemingly this use is unrelated to personal data) Not well formed conception of digital identity Biometrics are seen just another identification technologies. No real concerns expressed 27/06/2013 Biometrics Institute Showcase 17

Privacy Factor Privacy vigilants Conservative techies Safety champions Casual adopters Views on privacy Their view of privacy is the traditional, legal one which views privacy as an individual right but also a societal good that needs to be protected Privacy equals protection of personal data contained in personal devices such as smartphones Sensitive to the idea of biometrics disclosing medical information Privacy is not hampered as long as biometric data collected in different contexts is not aggregated (contextual integrity) Privacy as we know it a thing of the past They think the technological infrastructures in place are secure enough for such personal and unique data. ow it a thing of the past 27/06/2013 Biometrics Institute Showcase 18

Summary Different understandings on the role of digital identity in everyday life leads to different responses to the use of biometrics in various contexts Each viewpoint has a unique understanding of privacy which also influences their acceptance of biometrics and the contexts of use Views on empowerment, accountability and surveillance are in direct relationship with these core themes (e.g. identity, privacy) 27/06/2013 Biometrics Institute Showcase 19

For more information on the IMPRINTS project www.imprintsfutures.org Facebook: Imprintsfutures Twitter: @Imprintsfutures Emails: elpidap@essex.ac.uk