Wonk Warning (again) Fast typing ahead. it ain’t 100% accurate, it ain’t pretty. But it’s live.
This was a great panel, really well facilitated by Christian Crumlish, author The Power of the Many. He’s working on a new book, and claims “my scam was to put this panel together, take notes on what they say, and sneak it into my book” Man, that is SO going to be a book if he does so. His online idetnities are. Xian, mediajunkie
Workshop Intro: No privacy? Spy on yourself and commodify your attention stream! Countless representations of ourselves flood the net with information daily. What
is happening to our models of attention? trust? reputation? Rate my new
fighting style unstoppable and I’ll trade you this artifact I forged inWorld of Warcraft… Expect a lively debate from noted experts on attention and identity and skeptics who think most of the sentences above are content-free.
Every Breath You Take: Identity, Attention, Presence and Reputation
Date: Sunday, March 11
Time: 10:00AM—11:00AM
Location: Ballroom F
No privacy? Spy on yourself and commodify your attention stream! Countless
representations of ourselves flood the net with information daily. What
is happening to our models of attention? trust? reputation? Rate my new
fighting style unstoppable and I’ll trade you this artifact I forged in
World of Warcraft… Expect a lively debate from noted experts on
attention and identity and skeptics who think most of the sentences
above are content-free.
Speaker(s):
- Christian Crumlish, Pattern Detective, Yahoo!
- Kaliya Hamlin, Super Hero, Identity Woman
- Mary Hodder, CEO, Dabble
- George Kelly, Contra Costa Newspapers
- Ted Nadeau, Founder, Dot Line Inc
Strange instances of identity, spying on yourself, multiple identity, stored searches, the hassles of actually trying to change your name officially.
Kaliya Hamlin “Identity Woman” (Open ID? She asks how many people have heard of it, but doesn´t explain it.) Namespaces out of control.. Often heavy net users have 100+ Online identities: skype, yahoo, flickr, phone number, twitter, etc etc etc etc. But instead of our identity being owned by individual content sites, we should own our identity. Six Apart agreed to try to crack this. Behind Identity 2.0 is an XML file that tells you what services are available. You put a login box on the website, adjust user tables, set identifiers for people.
About a dozen people put up their hands when they are asked if they have an Open ID signin on their sense.
WordPress: you login, it’s a relying party, it queries your i-broker who says that you? you tell the i-broker yep its me either by being logged in or giving the BROKER your password, and the broker than validates your identity on the relying party. you don´t give the relying party a password. So you only need to remember one for dozens of services.
Ted Nadeau speaking on Reputation. I don’t give a damn about my bad reputation. We need to manage our reputatation in a new way. The small town that we used to live in is now on internet scale. So your identity is exposed to the whole earth. More and more people start knowing more and more about you. Your non-monetary assets include influence, intention, attention, reputation, your strength intelligence wisdom constitution etc. They´re exposed and measureable to all.
Some parts of my identity are asserted by me. Some by others. Sometimes a group expresses my identity, and sometimes I agree, sometimes I don’t. Reputation is connected to your identity: identity is who you truly are, reputation is perceptions, some of which are accurate, some not. But ultimately, you are the owner of your identity, other people own your reputation.
173,000,000 pages on Google “Reputation” but only a handful on del.icio.us. There are measurement systems EigenTrust: scale of 1 to 5. Corry Doctorow’s Whuffie which you get. iKarma. Opinity: Create a powerful portable identity. none compelling. Reputation 1.0 isn´t even here yet. Conceptual models, academic studies, but nobody is coding it yet.
What is it? Reputation is the general opinion (jdgement) of and by the public or a group or a person toward an entity. It is an ubiquitous, spontaneous and highly efficient mechanism of Social Control.
Examples: Hagrid has a reputation as a mean drunk.
AT&T had a reputation for innovation.
Fox News has a reputation for being biased.
bit reputation: Apple, Exxon
World Wrestling Federation: the guy who always cheats.
Polytheistic Gods: You know how Zeus will behave when Hera picks up a mortal.
The Unites States, politicians, the internet. etc.
EBay reputation: everybody is above average, lots of backscratching, not very discering, but it works for generic transactions. Somebody with no reputation is untrustworthy.
Pre-internet reputation management systems: scarlet letter, Grade A meat, UL approved.
What would the perfect reputation be like? you should own your own copy of your data sources and key spaces. Symettric others owh theirs. Ahread and agreed by a third party.
Must resolve conflicts.
Has to have multiple views.
Problems: reputation theft, Reputation damage, loss. Repuataion stuck: your family always knows who you are, but you can move to a new city and try a new id with your bowling league. Ideal system has to allow that continutity AND flexibility.
Identity first, Reputation later.
Call to action next steps. your repuation what is it, where is it? Let´s start a company. Talk to Xian at his blog!
Mary Hodder did a great scary but cooly presented piece on Attention Data and how valuable that is to Google, to Corporations, to Governments, and how dangerous it will be if we simply allow that data to be had and seen without vigilance, for Democracy is at risk. But I had a technical breakdown and couldn´t get the word for word.
George Kelly, journalist:
Kevan.org: interactive Johari Window making personality traits a subject of dialogue between yourself and an audience.Wow. check this site out. 29 of George’s friend rate what are the hidden things about him and disagree with his self assessment in places.
technorati tags:sxsw, sxswi, sxswi07, sxswi2007
Blogged with Flock
Hi Kaliya, yes, sorry, one of the hazards of live blogging the stream. You did indeed go on to explain it (and completely sell me on the concept!) and it may have been my failure to pay attention to the fact that your presentation was about to explain what it was: my frustration was not knowing immediately what you were talking about, and I thought you had moved on. It’s a great concept and I hope it succeeds.
Hi there,
I am not sure why you think I did not describe OpenID.
OpenID is web wide distributed single sign-on. It works the way I described it in the panel with me the user going to a website (like your blog here) and instead of getting another user-name and password I just enter my identifier (a URL or XRI) it redirects me to my i-broker.…my i-broker authenticates me (asks me for a password) and then redirects me back to the site I was signing into (and says yes this person authenticated to that identifier). The photo above is this flow of user-interaction.
Let me know if you have any questions.
Regards,
=kaliya
This is cool, I just read “Privacy Lost” by David H. Holtzman, it’s on this same sort of stuff, he advocates a pseudonymous model of life on the internet, I wonder how Identity will change over the next 50 years.