background preloader

Identity issues

Facebook Twitter

How Facebook and Google are taking over your online identity - Quartz. When Facebook executives meet potential advertisers, their biggest selling point is that the company knows whom it’s advertising to.

How Facebook and Google are taking over your online identity - Quartz

In contrast to the wilds of the web, the proposition goes, Facebook users sign in to the service and make themselves known. Match their data with third parties—data brokers who provide loyalty card spending, for instance—and you have a fairly good idea of whether your ad has been effective. If user x saw ad y and made a purchase, there’s the return on investment. (Facebook stresses that these data are anonymised and the data are analysed only in aggregate.) Most Facebook users are aware of this—or at least the bit about the service being tied to advertising. The notion that the world outside its homepage remains anonymous is increasingly untrue. The web’s rent-a-cops—or emperors. Quelle vie en ligne après votre mort ? Le | • Mis à jour le | Par Alexandre Léchenet Si vous deviez mourir demain, qu’aimeriez-vous qu’il advienne de vos données personnelles ?

Quelle vie en ligne après votre mort ?

La question peut sembler bête, mais après quelques minutes de questionnement, on se rend compte qu’elle mérite amplement la réflexion. FIC 2013 : Fleur Pellerin veut relancer IDéNum. C'est le grand retour d'un projet lancé en 2010 par Nathalie Kosciusko-Morizet, alors secrétaire d'Etat en charge de l'Economie numérique : IDéNum.

FIC 2013 : Fleur Pellerin veut relancer IDéNum

A l'occasion du Forum international de la cybersécurité, qui se tient à Lille jusqu'à ce soir, la ministre déléguée à l'Economie numérique, Fleur Pellerin, a repris le projet à son compte. "A ce jour, il n'existe pas en France de projet national d'identité numérique," estime la ministre. Un retard qui force les utilisateurs à laisser la gestion de leur identité en ligne entre les mains d'opérateurs privés. Fleur Pellerin soulève des problèmes de sécurité, mais aussi le risque d'une "forme de privatisation de l'identité. " Projet relancé. Suggestions de présentation. Timo Toots Bonjour Timo, pouvez-vous vous présenter et nous parler de Memopol II, l’installation que vous présentez actuellement à la Gaîté Lyrique ?

Suggestions de présentation

Je m’appelle Timo Toots et je suis un artiste estonien. Après avoir fait des études en sciences informatiques – que j’ai détestées, soit dit en passant – je suis rentré dans une école d’art. Je suis un grand passionné de photographie et je profite désormais de mes connaissances en informatique pour les appliquer à ma pratique artistique, mêlant les compétences et les inspirations. L’impacte des réseaux sociaux sur notre cerveau.

C’est la 3ème infographie sur le thème de l’impacte de l’informatique sur nos capacités cognitives.

L’impacte des réseaux sociaux sur notre cerveau

Je vous invite ainsi à relire au passage ces 2 articles pour vous rafraichir la mémoire : L’infographie du jour, reprend de manière synthétique (mais un peu capilotractée je pense) les effets des réseaux sociaux et de Facebook en particulier sur notre cerveau… Ainsi, les différents évènements, interactions ou notifications qui se produisent sur ces réseaux (tels que des abonnement à nos comptes, des demandes d’amis, des échanges, des RT,…) provoqueraient (je parle toujours au conditionnel) une décharge de dopamine dans une zone particulière du cerveau appelée circuit de la récompense.

Ne plus être un simple numéro (de portable) «Je ne suis pas un numéro, je suis un homme libre !»

Ne plus être un simple numéro (de portable)

Hurlait le prisonnier de la série d'espionnage The Prisoner, série emblématique des 60s. Pouvez-vous en dire autant ? Your Memorable Mobile Phone Number. MIT's Sherry Turkle on Technology and Real-World Communication. Digital communication is so pervasive that most of us don't even bother to question its role in society.

MIT's Sherry Turkle on Technology and Real-World Communication

That's not the case with Sherry Turkle, who has tracked the way we interact with computers and artificial intelligence since the 1970s. Founder and director of the MIT Initiative on Technology and Self, Turkle has written a new book, Alone Together: Why We Expect More from Technology and Less from Each Other, that asks a simple question: Do digital methods of communication connect us the way interaction in the real world does? In late December, Turkle sat with TIME to discuss robot puppies, teen texting and what "full attention" means in an age of smart phones.

Sherry Turkle: Connected, but alone? Sherry Turkle's Alone Together: Will the digital revolution really change us? They gave her The Device when she was only 2 years old.

Sherry Turkle's Alone Together: Will the digital revolution really change us?

It sent signals along the optic nerve that swiftly transported her brain to an alternate universe—a captivating other world. By the time she was 7 she would smuggle it into school and engage it secretly under her desk. By 15 the visions of The Device—a girl entering a ballroom, a man dying on the battlefield—seemed more real than her actual adolescent life. She would sit with it, motionless, oblivious to everything around her, for hours on end. Its addictive grip was so great that she often stayed up half the night, unable to put it down. When she grew up, The Device dominated her house: no room was free from it, no activity, not even eating or defecating, was carried on without its aid.

A tale of the dystopian technological future? The story illustrates why it's so hard to know how new technologies will affect us. But other changes that seemed equally profound at the time have turned out, in retrospect, to be minor. ST_Always On.pdf (Objet application/pdf) Untitled. Identity theft. Home: Future of IDentity in the Information Society. Standards of LIFE - xid. Digital Identity, Privacy, and the Internet's Missing Identity Layer. Kim Cameron Identity and Access Architect Microsoft Corporation May 2005 Applies to: Security Web development Web services Summary: Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity.

Digital Identity, Privacy, and the Internet's Missing Identity Layer

Digital identity - Phillip J. Windley. Random Thoughts on Digital Identity - Glossary. My Digital Footprint A two-sided digital business model where your privacy will be someone else's business! (9780955606984): Tony Fish. Identity API for the Internet Identity Layer. Patrick Harding has a great post today on "A Model for an Internet Identity Layer".

Identity API for the Internet Identity Layer

He breaks down the Identity Layer into three sub-layers. It addition he points out that... In addition, we have found that applications developers are spending far too much time concerning themselves with the lower levels of the identity layer. App developers need to be able to leverage a standard identity API interface that interacts with the claims sub-layer. The developer should receive all the information it needs via this API directly from the claims sub-layer. Interestingly enough, Phil Hunt talks specifically about this issue his post yesterday. You see, the idea isn't just to support identity privacy and governance, but to create an application identity API (aka Attribute Services API) that allows applications to become decoupled these issues of having to support all the protocols and technologies out there.

Stratégie « Identity Cosmos. Digital Identity, Privacy, and the Internet's Missing Identity Layer. Today I am posting a new paper called, Proposal for a Common Identity Framework: A User-Centric Identity Metasystem. Good news: it doesn’t propose a new protocol! Instead, it attempts to crisply articulate the requirements in creating a privacy-protecting identity layer for the Internet, and sets out a formal model for such a layer, defined through the set of services the layer must provide. The paper is the outcome of a year-long collaboration between Dr. Kai Rannenberg, Dr. Reinhard Posch and myself. Each of us brought our different cultures, concerns, backgrounds and experiences to the project and we occasionally struggled to understand how our different slices of reality fit together. Identités numériques - Enjeux des identités numériques. Self Knowledge Through Numbers.

Personal Identity Management. Consumers are leaving an exponentially growing digital footprint across channels and media, and they are awakening to the fact that marketers use this data for financial gain. This, combined with growing concerns about data security, means that individuals increasingly want to know when data about them is being collected, what is being stored and by whom, and how that data is being used. As a result, a nascent industry is forming, with the promise of giving consumers control over their own data. We call this phenomenon personal identity management (PIDM).

L'identité à l'ère numérique. Ping Talk Blog: Why SCIM over SPML? Why not? Dave Kearns, our good friend from Network World, recently shared his concerns on the new SCIM (Simple Cloud Identity Management) specification and contrasted it with the "legacy" SPML specification. While Dave is obviously entitled to his opinion, I felt it was important that I respond to some of his comments in the article. As background, Ping Identity has never actually been opposed to the SPML specification. We implemented an internal "Federated Provisioning" SPML module back in 2007 that was used to provision to SaaS applications.

Unfortunately, after doing some market analysis across our customers and SaaS vendors there was not enough interest to leverage SPML (or any standard) to solve what we now call the "cloud provisioning" problem. Marc L*** Intimité+Extimité sur les réseaux sociaux. Identité numérique.