SlideShare a Scribd company logo
Trusted Relationships
Programme 1030  Introductions , Paul Bailey, JISC-SSBR . 1045  The benefits of an Identity-Centric Internet: a new Internet of  Subjects Manifesto.  Serge Ravet, EIfEL . 1130  Coffee 1145  What do Users want? Views and concerns about sharing personal  data. Findings of the CPD-Eng project. David Sowden. 1230  Lunch  1315  Current technical developments. Scott Wison, CETIS . 1400  Coffee 1415  Who and how am I online? Personal identity management for  professional development. George Roberts, JISC SSBR 1500  Conclusions and actions: next steps. Paul Bailey, JISC-SSBR 1530  Close
Key Issues - LLLWFD Programme Identity management and security of information can still be a major barrier  to  engaging work based learners and employers but institutions are finding approaches that can work such as:  Providing authentication of external users to allow access to university systems. Addressing institutional policies that can be a barrier to access and providing electronic communication methods that have a sufficient level of security for the type of data being shared.  Encouraging trusted relationship management, sharing data and information between employers and institutions about learners, agreeing protocols and processes. Recognising individual identity, separating the identity of individuals as employees or as learners, who may have several identities. Providing learning environments that have sufficient levels of confidentiality for employees to discuss work related issues. This can apply to mentor support or delivering learning via the web or video conferencing for example. Providing WBL and employers with secure access to portals for specific information.  Recognising that the employer access may not be by one individual role.    
Conclusions and Actions Presentations and artefacts from the day One slide from each session, flip chart and post-it notes – synthesis from the floor. Produce a short summary paper – “ Some practices and technologies that should be adopted by institutions to address identity management issues for employer engagement .”
Objectives To learn about Tools/methods for IDM disaggregation Learn about IDM issues relating to portfolio  and Leap2a current state and emergent ideas around ID management types of trusted relationships  Find out  How the community see issues around privacy  What we understand ID technical issues Wider view of other peoples IDM issues and their proposed solutions Views on WBL Has this field moved on in the past 5 years
SIMPLE wants Storage Easy to use/ understand/explain Transparency and opacity (user control) Choice – not all online Fix it when it goes wrong Finer grained policies  choosing the level of what is shared Cheap or free Control of my data  Ability to see others (through negotiation) Can turn it off and leave it Anonymous transactions
More demanding wants Multiple profiles Multiple levels of auth2 Repercussions global Appropriate security level Service level agreements Transparency of system management Logging and audit, alerting system Biometrics Erase Ids (cookies) Delegation Syndication Control over my data  Interoperability Who knows about me Control over my data

More Related Content

PDF
BYOD: Risks and Opportunities
PPT
User consent for consumer identity (@ISSE2010)
PPTX
Web Accessibility and AODA Compliance
DOCX
L Fojut
PPTX
2017 aals clinical_final
PDF
What is accessibility?
PDF
Strategic Approach to IT Accessibility
PPTX
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
BYOD: Risks and Opportunities
User consent for consumer identity (@ISSE2010)
Web Accessibility and AODA Compliance
L Fojut
2017 aals clinical_final
What is accessibility?
Strategic Approach to IT Accessibility
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I

What's hot (6)

PPT
Accessibility and PDFs
PPTX
TechAccess 2017
PPT
Web 2.0: How Should IT Services and the Library Respond?
PPT
Network Neutrality: How We Brought this on Ourselves
PDF
MicroassistAccessibilityServices-20160711-acc
PDF
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
Accessibility and PDFs
TechAccess 2017
Web 2.0: How Should IT Services and the Library Respond?
Network Neutrality: How We Brought this on Ourselves
MicroassistAccessibilityServices-20160711-acc
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
Ad

Viewers also liked (20)

PPTX
The status of android dec2010
KEY
Ba Session3
PDF
Impresii icl2012
PPTX
Social Media Misdaad ABC
 
PPTX
Social Media Het Nieuwe DNA #SMC0412
 
PPTX
How many of you know the alfabet
PPT
Measuring T&D 1
PDF
Problems2
PDF
Workshop about hedge funds industry
DOCX
Uk graphs-2011
PPT
Activity 1. Survey. Greece
PDF
B Saugust06
PPTX
C:\Fakepath\Flashback Scenes
PPT
The pride of devon
DOC
Bulgarian charts inqoire2,3,4-2011
PPT
數位學習期中企畫案_9535034黃郁倩9535042黃微琦
PPSX
Gevanim
PDF
Reference algorithm implementations in OTB: textbook cases
PPT
Survey on Solidarity OCOBRE 2010- SPAIN
The status of android dec2010
Ba Session3
Impresii icl2012
Social Media Misdaad ABC
 
Social Media Het Nieuwe DNA #SMC0412
 
How many of you know the alfabet
Measuring T&D 1
Problems2
Workshop about hedge funds industry
Uk graphs-2011
Activity 1. Survey. Greece
B Saugust06
C:\Fakepath\Flashback Scenes
The pride of devon
Bulgarian charts inqoire2,3,4-2011
數位學習期中企畫案_9535034黃郁倩9535042黃微琦
Gevanim
Reference algorithm implementations in OTB: textbook cases
Survey on Solidarity OCOBRE 2010- SPAIN
Ad

Similar to Online identity management workshop (20)

PPT
Identity Matters
PPTX
Getting your Strategy Right – in a SMAC World!
PPT
The Identity Project (Rhys Smith)
PPTX
So that's it for it services, or is it?
PPT
Scl Group Collaboration Beyond Web 20
PPT
Identity_and_Access_Management_Overview.ppt
PPT
Presentation to Irish ISSA Conference 12-May-11
PDF
IAM: Getting the basics right
DOCX
School of Computer & Information SciencesITS-631- Operat.docx
PPT
Telfer Executive MBA Alumni Association Presentation on LinkedIn
PDF
BYOD SCOPE: A Study of Corporate Policies in Pakistan
PDF
Data PODs_ Take Control of Your Decentralized Data.pdf
PPTX
IEEE PHM Cloud Computing
PPTX
Ciso round table on effective implementation of dlp & data security
DOCX
Directions Answer each question individual and respond with full .docx
PPT
iConnect: Expertise Location at Deloitte
PPTX
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
PPTX
Develop project pia+ risk identification
PPT
Bcs consumerisation
PDF
How to choose an Enterprise Social Network (ESN)
Identity Matters
Getting your Strategy Right – in a SMAC World!
The Identity Project (Rhys Smith)
So that's it for it services, or is it?
Scl Group Collaboration Beyond Web 20
Identity_and_Access_Management_Overview.ppt
Presentation to Irish ISSA Conference 12-May-11
IAM: Getting the basics right
School of Computer & Information SciencesITS-631- Operat.docx
Telfer Executive MBA Alumni Association Presentation on LinkedIn
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Data PODs_ Take Control of Your Decentralized Data.pdf
IEEE PHM Cloud Computing
Ciso round table on effective implementation of dlp & data security
Directions Answer each question individual and respond with full .docx
iConnect: Expertise Location at Deloitte
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Develop project pia+ risk identification
Bcs consumerisation
How to choose an Enterprise Social Network (ESN)

More from JISC SSBR (17)

PPT
Who and how am I online
PPTX
Lisa Gray Jisc Generic Cdd
PPTX
Wake Up On Lan Aston Jan2010
PPTX
Liw Update Jan2010
PPTX
Jane Charlton Jisc Comms Inst Innov Project C M Jan2010
PPT
Ed Share Jisc Jan2010
PPT
Keynote Steve Outram Elluminate 12 Nov
PPT
JISC Ruth Drysdale LLL&WFD 12th Nov 2009 Online Event V2
PPT
JISC SSBR Steve Warburton Create121109 Addressing Change
PPTX
Room4 TELWFD Andrew Haldane Tel Wfl Presentation
PPT
Room4 PineAPPLe Neil Witt Hd Pineapple Project Neil Eluminate Presentat...
PPTX
Room4 Co Gent Martin Jenkins Development And Implementation Of Academic...
PPT
Room2 TELSTAR (Ou) Owen Stephens Ssbr 20091112
PPTX
Room2 ELTAC Juliet Hinrichsen Eltac Issues
PPTX
Room1 TAG Lucy Warman The Alternative Guide To Uc Lan Elluminate2
PPT
Room1 ECCILES Darrell Slater Smith Ecciles Project Jisc
PPT
Room1 ASSET Anne Crook Elluminate Conference Acc Comments
Who and how am I online
Lisa Gray Jisc Generic Cdd
Wake Up On Lan Aston Jan2010
Liw Update Jan2010
Jane Charlton Jisc Comms Inst Innov Project C M Jan2010
Ed Share Jisc Jan2010
Keynote Steve Outram Elluminate 12 Nov
JISC Ruth Drysdale LLL&WFD 12th Nov 2009 Online Event V2
JISC SSBR Steve Warburton Create121109 Addressing Change
Room4 TELWFD Andrew Haldane Tel Wfl Presentation
Room4 PineAPPLe Neil Witt Hd Pineapple Project Neil Eluminate Presentat...
Room4 Co Gent Martin Jenkins Development And Implementation Of Academic...
Room2 TELSTAR (Ou) Owen Stephens Ssbr 20091112
Room2 ELTAC Juliet Hinrichsen Eltac Issues
Room1 TAG Lucy Warman The Alternative Guide To Uc Lan Elluminate2
Room1 ECCILES Darrell Slater Smith Ecciles Project Jisc
Room1 ASSET Anne Crook Elluminate Conference Acc Comments

Recently uploaded (20)

PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Introduction to Building Materials
PDF
Hazard Identification & Risk Assessment .pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
advance database management system book.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Cell Types and Its function , kingdom of life
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Introduction to Building Materials
Hazard Identification & Risk Assessment .pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Digestion and Absorption of Carbohydrates, Proteina and Fats
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
What if we spent less time fighting change, and more time building what’s rig...
advance database management system book.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Computing-Curriculum for Schools in Ghana
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Final Presentation General Medicine 03-08-2024.pptx

Online identity management workshop

  • 2. Programme 1030 Introductions , Paul Bailey, JISC-SSBR . 1045 The benefits of an Identity-Centric Internet: a new Internet of Subjects Manifesto. Serge Ravet, EIfEL . 1130 Coffee 1145 What do Users want? Views and concerns about sharing personal data. Findings of the CPD-Eng project. David Sowden. 1230 Lunch 1315 Current technical developments. Scott Wison, CETIS . 1400 Coffee 1415 Who and how am I online? Personal identity management for professional development. George Roberts, JISC SSBR 1500 Conclusions and actions: next steps. Paul Bailey, JISC-SSBR 1530 Close
  • 3. Key Issues - LLLWFD Programme Identity management and security of information can still be a major barrier to engaging work based learners and employers but institutions are finding approaches that can work such as: Providing authentication of external users to allow access to university systems. Addressing institutional policies that can be a barrier to access and providing electronic communication methods that have a sufficient level of security for the type of data being shared. Encouraging trusted relationship management, sharing data and information between employers and institutions about learners, agreeing protocols and processes. Recognising individual identity, separating the identity of individuals as employees or as learners, who may have several identities. Providing learning environments that have sufficient levels of confidentiality for employees to discuss work related issues. This can apply to mentor support or delivering learning via the web or video conferencing for example. Providing WBL and employers with secure access to portals for specific information. Recognising that the employer access may not be by one individual role.  
  • 4. Conclusions and Actions Presentations and artefacts from the day One slide from each session, flip chart and post-it notes – synthesis from the floor. Produce a short summary paper – “ Some practices and technologies that should be adopted by institutions to address identity management issues for employer engagement .”
  • 5. Objectives To learn about Tools/methods for IDM disaggregation Learn about IDM issues relating to portfolio and Leap2a current state and emergent ideas around ID management types of trusted relationships Find out How the community see issues around privacy What we understand ID technical issues Wider view of other peoples IDM issues and their proposed solutions Views on WBL Has this field moved on in the past 5 years
  • 6. SIMPLE wants Storage Easy to use/ understand/explain Transparency and opacity (user control) Choice – not all online Fix it when it goes wrong Finer grained policies choosing the level of what is shared Cheap or free Control of my data Ability to see others (through negotiation) Can turn it off and leave it Anonymous transactions
  • 7. More demanding wants Multiple profiles Multiple levels of auth2 Repercussions global Appropriate security level Service level agreements Transparency of system management Logging and audit, alerting system Biometrics Erase Ids (cookies) Delegation Syndication Control over my data Interoperability Who knows about me Control over my data