Securing Very Important Data: Your Own The newest generation of web services is starting to collect and store far more than just the standard suite of identity data — name and address, phone, Social Security or credit-card numbers — that populates the databases of banks and credit-card processors. They increasingly store information, generated by us, that is directly linked to those virtual identities. And users are loving them. ... “We’re in a situation where business holds all the cards." ONE way to change this, he said, is to make people more like organizations. To this end, Mr. Neuenschwander and his colleagues have floated the intriguing concept of the L.L.P.: the Limited Liability Persona. This persona would be a legally recognized virtual person in which users could “invest” the financial or identity resources of their choosing.
The Limited Liability Persona Corporations were invented during the age of exploration, when the risk associated with mounting an expedition to foreign lands was so high that no single person - even a rich noble - could underwrite a venture without running the risk of total financial ruin. The fundamental ideas underlying the corporation are (1) the notion of a legal person distinct from a "natural person", (2) perpetual lifetime, and (3) limited liability. Limited liability was critical to the idea of the corporation, because it allowed investors to put a strictly limited amount of money into a risky enterprise without having to take the chance of losing everything.
Law of Relational Risk It’s a simple law, but I believe leads to important conclusions about how relations are structured: Contribution to the relationship that is not met proportionally by the other participants is a loss to the contributor.
... Culture, values, and shared beliefs improve parties’ confidence in assessing risks. This is particularly true where the culture practices reciprocity—possibly through status and reputation—in connection with stated values. The principles also suggest that single sign-on (SSO) efforts are often misguided. In the interest of promoting relational continuity, the more authenticated connections the better—particularly if the user can parlay these authentications into improved reputation. Recognition of participants based on multiple channels of connectivity would be the method for improving identity assurance rather than on a single login event.
... [ Read More (0.3k in body) ] |