SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Malcolm Crompton Managing Director, Information Integrity Solutions
Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government  Conference 2009 Sydney 24 June 2009
Malcolm Crompton Managing Director, Information Integrity Solutions
The inherent challenge for any government:  which hat? “ Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.”  Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice,  Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
Where we’ve been ...
 
 
 
Case study: Australia’s failed Access Card ,[object Object],[object Object],[object Object],[object Object],[object Object],The old website: www.accesscard.gov.au
Sun-Herald, 14 Oct 2006
This isn’t lost on the individual ... The Great Trust deficit: “ You don’t trust me, so why should I trust you?” Broad consents Inadequate Accountability Lack of Control Unexpected uses Burden of Risk More  EOI Logging & Monitoring
[object Object],[object Object],[object Object],[object Object],Trust
Survey after survey shows the impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The trust deficit – Impact  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Trust Deficit & the great risk shift:  Cloud as next instalment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
And now Govt 2.0
Governments are also transforming ,[object Object],[object Object],[object Object],www.theconnectedrepublic.org
 
 
 
 
 
But is it safe?
Citizen response to Govt 2.0 informed by ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.Australia.gov.au www.MySpace.com   ......
The internet continues to change the rules ,[object Object],[object Object],[object Object],[object Object]
Facebook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to make it safe
“ Layered Defence” Privacy ► Accountability Trust Risk Control ► ► ► Safety Net Governance Technology Education Law We can reduce the Trust Deficit
“ Layered Defence” We can reduce the Trust Deficit Safety Net Governance Technology Education Privacy ► Accountability Trust Risk Control ► ► ► ? Law
Layered Defence tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Culture & History also important ,[object Object],[object Object],[object Object],[object Object],“ Use Cases for Identity Management in E‑Government”  Robin McKenzie, Malcolm Crompton, Colin Wallis,  IEEE Security and Privacy , vol. 6,  no. 2,  pp. 51-57,  Mar/Apr, 2008 http://doi.ieeecomputersociety.org/10.1109/MSP.2008.51
The key: three dynamically related elements Control Accountability www.TheConnectedRepublic.org Now  www.iispartners.com/Publications/index.html   Fair   risk allocation
www.trustguide.org.uk Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust
 
Swire’s recommendations ,[object Object],[object Object],[object Object],[object Object]
 
Jason Ryan’s recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Some more strategies and principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions for governments ,[object Object],[object Object],[object Object],[object Object],[object Object]
 

Weitere ähnliche Inhalte

Was ist angesagt?

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your CompanyZach Evans
 
Online Tracking
Online TrackingOnline Tracking
Online Trackingskilcu01
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1cRaj Goel
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in EducationCraig Geffre
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Ensighten
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to knowFitCEO, Inc. (FCI)
 
Virality & Network Effect
Virality & Network EffectVirality & Network Effect
Virality & Network EffectPiyush Gupta
 
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaStanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaSarah Larcker
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 

Was ist angesagt? (19)

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
 
Online Tracking
Online TrackingOnline Tracking
Online Tracking
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Virality & Network Effect
Virality & Network EffectVirality & Network Effect
Virality & Network Effect
 
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaStanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 

Andere mochten auch

0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2Frocomm Australia
 
1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copyFrocomm Australia
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Frocomm Australia
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2Frocomm Australia
 
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Australia
 

Andere mochten auch (6)

02 Peter Williams
02 Peter Williams02 Peter Williams
02 Peter Williams
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2
 
1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2
 
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
 

Ähnlich wie 03 Malcolm Crompton

WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product VisionCarina Ngai
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Shawn Tuma
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Consumer engagement principles
Consumer engagement principlesConsumer engagement principles
Consumer engagement principlesdefault default
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceShawn Tuma
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounAlleneMcclendon878
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 

Ähnlich wie 03 Malcolm Crompton (20)

WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Consumer engagement principles
Consumer engagement principlesConsumer engagement principles
Consumer engagement principles
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 

Mehr von Frocomm Australia

The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resFrocomm Australia
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Frocomm Australia
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011Frocomm Australia
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentationFrocomm Australia
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09Frocomm Australia
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu CaseFrocomm Australia
 

Mehr von Frocomm Australia (10)

The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high res
 
Welcome slide day 1
Welcome slide day 1Welcome slide day 1
Welcome slide day 1
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentation
 
Sydney conf presentation
Sydney conf presentationSydney conf presentation
Sydney conf presentation
 
Web2 0 Holding Slide
Web2 0 Holding SlideWeb2 0 Holding Slide
Web2 0 Holding Slide
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case
 
01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd
 

Kürzlich hochgeladen

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Kürzlich hochgeladen (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

03 Malcolm Crompton

  • 1. Malcolm Crompton Managing Director, Information Integrity Solutions
  • 2. Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government Conference 2009 Sydney 24 June 2009
  • 3. Malcolm Crompton Managing Director, Information Integrity Solutions
  • 4. The inherent challenge for any government: which hat? “ Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.” Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice, Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
  • 6.  
  • 7.  
  • 8.  
  • 9.
  • 11. This isn’t lost on the individual ... The Great Trust deficit: “ You don’t trust me, so why should I trust you?” Broad consents Inadequate Accountability Lack of Control Unexpected uses Burden of Risk More EOI Logging & Monitoring
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23. But is it safe?
  • 24.
  • 25.
  • 26.
  • 27. How to make it safe
  • 28. “ Layered Defence” Privacy ► Accountability Trust Risk Control ► ► ► Safety Net Governance Technology Education Law We can reduce the Trust Deficit
  • 29. “ Layered Defence” We can reduce the Trust Deficit Safety Net Governance Technology Education Privacy ► Accountability Trust Risk Control ► ► ► ? Law
  • 30.
  • 31.
  • 32. The key: three dynamically related elements Control Accountability www.TheConnectedRepublic.org Now www.iispartners.com/Publications/index.html Fair risk allocation
  • 33. www.trustguide.org.uk Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust
  • 34.  
  • 35.
  • 36.  
  • 37.
  • 38.  
  • 39.
  • 40.
  • 41.