SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education  and Training Emerging  Business  Applications
Trust and identity in Virtual worlds and collaborative spaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some examples of issues around trust and identity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game   Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
What is new, compared to 10 years ago? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario 1: Trusted Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario 2: Trusted Collaboration [email_address] [email_address] Request freetime ,[object Object],[object Object],[object Object],[object Object],Patrick Paul
Scenario 3: Trusted Roaming I want to see what World of Warcraft is about ,[object Object],[object Object],[object Object],I do have an avatar in Second Life
Scenario 4: Trusted Delegation Give Alice the right to see Bob’s images ,[object Object],[object Object]
Scenario 5: Trusted Aggregation Bank Health Insur. Employer Aggregator
Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],Specific Scenario 1. Trusted Content Trust in correctness and appropriateness of specific / of all objects in a collaborative space (e.g., Wikipedia, Second Life). 2. Trusted Collaboration Enable freetime-based scheduling of meetings across calendars in different enterprises, using different identity schemes. 3. Trusted Roaming Cross bridges from one virtual world to the other, carrying your identity (avatar, attributes, reputation) with you 4. Trusted Delegation Give your friend access to your digital photos without the fear that the photo server knows who your friends are, or that your friends share your photos with others. 5. Trusted Aggregation Aggregate personal information through a portal, without fear of misuse or fear of identity theft, but with the added value of non-trivial aggregation.
State of the Art
Some Remarks on Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity
Outlook
3. Future of  Virtual Reality 4. Future of Identity Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2 . Future of Identity ,[object Object],[object Object],[object Object],[object Object],1. Future of Identification ,[object Object],[object Object],[object Object],Technology Outlook BBC 2007 On average: 20 20% growth/year    IBM GIO 2006
An   eComm 2008   presentation –   http://eCommMedia.com   for more

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...gallowayandcollens
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submissioncanarickd
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Web 3.0 and What It Means to Marketing
Web 3.0 and What It Means to MarketingWeb 3.0 and What It Means to Marketing
Web 3.0 and What It Means to MarketingMagic Logix
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Noah Lang's Presentation
Noah Lang's PresentationNoah Lang's Presentation
Noah Lang's PresentationMediabistro
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2AmieBodkin
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Token or no token-2,000 word arti cle
Token or no token-2,000 word arti cleToken or no token-2,000 word arti cle
Token or no token-2,000 word arti cleHector Hoyos
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,EcommerceSumbal Noureen
 

Was ist angesagt? (20)

Social Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal LiabilitiesSocial Media Privacy Laws and Legal Liabilities
Social Media Privacy Laws and Legal Liabilities
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submission
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Web 3.0 and What It Means to Marketing
Web 3.0 and What It Means to MarketingWeb 3.0 and What It Means to Marketing
Web 3.0 and What It Means to Marketing
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Noah Lang's Presentation
Noah Lang's PresentationNoah Lang's Presentation
Noah Lang's Presentation
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2
 
Web 3 0
Web 3 0 Web 3 0
Web 3 0
 
NII Social Engineering Case Study
NII Social Engineering Case StudyNII Social Engineering Case Study
NII Social Engineering Case Study
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Token or no token-2,000 word arti cle
Token or no token-2,000 word arti cleToken or no token-2,000 word arti cle
Token or no token-2,000 word arti cle
 
website, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommercewebsite, browser,Domain name, Email, Social networks,Ecommerce
website, browser,Domain name, Email, Social networks,Ecommerce
 

Andere mochten auch

10 rosemary benefits
10 rosemary benefits10 rosemary benefits
10 rosemary benefitsovitruk
 
Social media for the pragmatic student
Social media for the pragmatic studentSocial media for the pragmatic student
Social media for the pragmatic studentLinda Jacobson
 
The Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual worldThe Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual worldAleks Krotoski
 
Global Virtual Teams Teigland
Global Virtual Teams TeiglandGlobal Virtual Teams Teigland
Global Virtual Teams TeiglandRobin Teigland
 
Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...Rohit Varma
 
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers Health Informatics New Zealand
 
Building trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management InstituteBuilding trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management InstituteKorrine Jones
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Ahmed Raza
 
Building trust in virtual teams March 2014
Building trust in virtual teams March 2014Building trust in virtual teams March 2014
Building trust in virtual teams March 2014Korrine Jones
 
Strangers as constructive trustee
Strangers as constructive trustee Strangers as constructive trustee
Strangers as constructive trustee Hafizul Mukhlis
 
How To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal SkillsHow To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal SkillsVKool Magazine - VKool.com
 
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORKBUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORKJIANGUANGLUNG DANGMEI
 

Andere mochten auch (18)

10 rosemary benefits
10 rosemary benefits10 rosemary benefits
10 rosemary benefits
 
Social media for the pragmatic student
Social media for the pragmatic studentSocial media for the pragmatic student
Social media for the pragmatic student
 
The Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual worldThe Social Life of Second Life: An analysis of the networks of a virtual world
The Social Life of Second Life: An analysis of the networks of a virtual world
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
Global Virtual Teams Teigland
Global Virtual Teams TeiglandGlobal Virtual Teams Teigland
Global Virtual Teams Teigland
 
Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...Social networking learnings & opportunities web innovation conference, bangal...
Social networking learnings & opportunities web innovation conference, bangal...
 
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
Sacred Secrets Meet Cyberspace Privacy Issues for Consumers
 
Trusting The Trust
Trusting The TrustTrusting The Trust
Trusting The Trust
 
virtual team
virtual teamvirtual team
virtual team
 
Building trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management InstituteBuilding trust in virtual teams -Change Management Institute
Building trust in virtual teams -Change Management Institute
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
 
Building trust in virtual teams March 2014
Building trust in virtual teams March 2014Building trust in virtual teams March 2014
Building trust in virtual teams March 2014
 
Strangers as constructive trustee
Strangers as constructive trustee Strangers as constructive trustee
Strangers as constructive trustee
 
The speed of trust
The speed of trustThe speed of trust
The speed of trust
 
Dynamics Of Trust
Dynamics Of  TrustDynamics Of  Trust
Dynamics Of Trust
 
The Speed Of Trust
The Speed Of TrustThe Speed Of Trust
The Speed Of Trust
 
How To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal SkillsHow To Build Trust In A Relationship – Interpersonal Skills
How To Build Trust In A Relationship – Interpersonal Skills
 
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORKBUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
BUILDING TRUST IN A VIRTUAL TEAM: A CONCEPTUAL FRAMEWORK
 

Ähnlich wie Tony Nadalin' presentation at eComm 2008

Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust onlineTina Guenther
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web WorkshopChris Messina
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking PresentationDoug Cornelius
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxstirlingvwriters
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application DevelopersWSO2
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 

Ähnlich wie Tony Nadalin' presentation at eComm 2008 (20)

Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
Openid
OpenidOpenid
Openid
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web Workshop
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
AIIM New England Social Networking Presentation
AIIM New England  Social Networking PresentationAIIM New England  Social Networking Presentation
AIIM New England Social Networking Presentation
 
Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 

Mehr von eComm2008

David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008eComm2008
 
Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008eComm2008
 
eComm 2008 Programme Guide
eComm 2008 Programme GuideeComm 2008 Programme Guide
eComm 2008 Programme GuideeComm2008
 
Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008eComm2008
 
Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008eComm2008
 
Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008eComm2008
 
Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008eComm2008
 
Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008eComm2008
 
Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008eComm2008
 
Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008eComm2008
 
Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008eComm2008
 
Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008eComm2008
 
Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008eComm2008
 
Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008eComm2008
 
Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008eComm2008
 
Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008eComm2008
 
Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008eComm2008
 
Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008eComm2008
 
Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008eComm2008
 
Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008eComm2008
 

Mehr von eComm2008 (20)

David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008David Recordon's Presentation at eComm 2008
David Recordon's Presentation at eComm 2008
 
Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008Dave Troy's Presentation at eComm 2008
Dave Troy's Presentation at eComm 2008
 
eComm 2008 Programme Guide
eComm 2008 Programme GuideeComm 2008 Programme Guide
eComm 2008 Programme Guide
 
Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008Anders Carlius's presentation at eComm 2008
Anders Carlius's presentation at eComm 2008
 
Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008Sean O\'Sullivan\'s presentation at eComm 2008
Sean O\'Sullivan\'s presentation at eComm 2008
 
Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008Norman Lewis\'s presentation at eComm 2008
Norman Lewis\'s presentation at eComm 2008
 
Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008Sheldon Renan's presentation at eComm 2008
Sheldon Renan's presentation at eComm 2008
 
Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008Brough Turner\'s presentation at eComm 2008
Brough Turner\'s presentation at eComm 2008
 
Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008Brian Capouch's presentation at eComm 2008
Brian Capouch's presentation at eComm 2008
 
Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008Fabrizio Capobianco's presentation at eComm 2008
Fabrizio Capobianco's presentation at eComm 2008
 
Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008Shirish Andhare's presentation at eComm 2008
Shirish Andhare's presentation at eComm 2008
 
Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008Gary Miner's presentation at eComm 2008
Gary Miner's presentation at eComm 2008
 
Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008Trevor Baca's presentation at eComm 2008
Trevor Baca's presentation at eComm 2008
 
Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008Jan Macek's presentation at eComm 2008
Jan Macek's presentation at eComm 2008
 
Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008Martin Geddes's presentation at eComm 2008
Martin Geddes's presentation at eComm 2008
 
Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008Michel Bauwens's presentation at eComm 2008
Michel Bauwens's presentation at eComm 2008
 
Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008Nathan Eagle's presentation at eComm 2008
Nathan Eagle's presentation at eComm 2008
 
Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008Stanley Chia's presentation at eComm 2008
Stanley Chia's presentation at eComm 2008
 
Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008Rocky Nevin's presentation at eComm 2008
Rocky Nevin's presentation at eComm 2008
 
Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008Phil Wolff's 's presentation at eComm 2008
Phil Wolff's 's presentation at eComm 2008
 

Kürzlich hochgeladen

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Tony Nadalin' presentation at eComm 2008

  • 1. Trust and Identity In Virtual Worlds and Collaborative Spaces Anthony Nadalin, Distinguished Engineer, IBM
  • 2. Early Virtual Worlds & Collaborative Spaces Business Applications Commerce Collaboration and Events Education and Training Emerging Business Applications
  • 3.
  • 4.
  • 5. Collaborative spaces and virtual communities * MMOG = Massive Multiplayer Online Game   Multi-service Platforms Social Computing 3D/Realtime Internet/MMOGs Common problem: Trust and Identity Enterprise Customers & Governments
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Scenario 5: Trusted Aggregation Bank Health Insur. Employer Aggregator
  • 13.
  • 15.
  • 16.
  • 17. Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity
  • 19.
  • 20. An eComm 2008 presentation – http://eCommMedia.com for more