background preloader

Identity and Security

Facebook Twitter

Recruiters ARE Using Social Media (But Not Like You Think) By now, you know recruiters and hiring managers are checking you out on social media.

Recruiters ARE Using Social Media (But Not Like You Think)

However, most job seekers seem to think we’re only looking for keg-stand pics or some other arbitrary reason not to hire you; bad-mouthing your old boss, for example. And they would be wrong. When recruiters – some of whom have these social media reference checks down to a science – look into your social media, they are looking at much more than just your character (and some of it is just downright scary)… Culture Fit After the requisite search for the underwear-on-your-head pics, the next step for the recruiter is determining your fit within their company – and the position. Do you use a high-percentage of swear words? On the other hand, do you display a sense of humor? Are you likeable? Personal Branding Inconsistencies The next step in the social media scan: a look at your character and integrity. The warning signs during this critical stage are 99.9% self-inflicted. Are you authentic? Are you dependable? Online Reputation Management: What Every Influencer Needs to Know.

Microsoft open-sources clever U-Prove identity framework. More and more personal, private information is being used and stored online than ever before, and at the same time, attacks on that information are increasing in frequency and sophistication.

Microsoft open-sources clever U-Prove identity framework

Phishing is a growth industry—it's very profitable to trick people into handing over names, passwords, credit card numbers, and so on, so that their finances can be pillaged. Important activities like banking and filing tax returns are being performed, and these need strong proof of identity. On the other hand, there's no reason why a storefront like, say, iTunes, needs to know your identity; it only needs to know that the money being handed over is yours to hand over. With current systems, there's no good way to prove your identity to those sites that need verification, and conversely, there's also no good way to restrict what you inadvertently reveal to those sites that don't need your identity. And these are not hypothetical concerns. This ability to mine data is increasingly important. Kim Cameron’s Identity Weblog » THE LAWS OF IDENTITY. Kim CameronIdentity and Access ArchitectMicrosoft Corporation May 2005 Applies to: Security Web development Web services Summary: Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity.

Kim Cameron’s Identity Weblog » THE LAWS OF IDENTITY

Together these laws define a unifying identity metasystem that can offer the Internet the identity layer it needs. (14 printed pages) Contents Problem StatementWords That Allow DialogueThe Laws of IdentityConclusionFor More Information The Internet was built without a way to know who and what you are connecting to. This paper is about how we can prevent the loss of trust and go forward to give Internet users a deep sense of safety, privacy, and certainty about whom they are relating to in cyberspace. Problem Statement The Internet was built without a way to know who and what you are connecting to. A Patchwork of Identity “One-Offs” As use of the Web increases, so does users’ exposure to these workarounds. Criminalization of the Internet.