Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3091478.3098882acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
poster

The Tragedy of the Identity Assurance Commons

Published: 25 June 2017 Publication History

Abstract

Identity assurance is the processing of personal identifying information (PII) to reach a desired confidence that an individual is who they claim to be. However, identity assurance is beyond a process; it is a commons, a natural resource accessible to all whereby individual actions can affect the group. Because each time we copy an item of PII we inadvertently expose it to misuse, which reduces the identifying utility of PII, and therefore reduces the confidence of identity assurance. Akin to the prisoner's dilemma, there is a usage dilemma in sustaining PII. A dilemma heightened by the Web as PII is being digitally exchanged, processed, and stored, with ever-increasing volume, variety and veracity.
To explore identity assurance as a commons, we develop an agent-based simulation of a simple resource strategy game. Building on work regarding the persistence of PII exploitation, our initial findings suggest that there is a potentially unsustainable dynamic in identity assurance. Therefore suggesting that in the long-term our current regulatory attempts are inapt.

References

[1]
Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, and Simon Shiu. 2007. On identity assurance in the presence of federated identity management systems. In Proceedings of the 2007 ACM workshop on Digital identity management - DIM '07. ACM Press, New York, New York, USA, 27.
[2]
Sue M. Black, Sadie Creese, Richard M. Guest, Bill Pike, Steve J. Saxby, Danaë Stanton Fraser, Sarah V. Stevenage, Monica T. Whitty, Danae Stanton Fraser, Sarah V. Stevenage, and M. T. Whittty. 2012. Superidentity: Fusion of identity across real and cyber domains. ID360: Global Identity (2012).
[3]
Garrett Hardin. 2009. The Tragedy of the Commons. Journal of Natural Resources Policy Research 1, 3 (2009), 243--253.
[4]
Charlotte Hess and Elinor Ostrom. 2003. Ideas, artifacts, and facilities: information as a common-pool resource. Law and contemporary problems 66, 1/2 (2003), 111--145.
[5]
Daniel J. Solove. 2007. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy. San Diego Law Review 44, May (2007), 1--23.
[6]
Umut Uludag, Sharath Pankanti, Salil Prabhakar, and Anil K. Jain. 2004. Biometric cryptosystems: Issues and challenges. Proc. IEEE 92, 6 (2004), 948--959.
[7]
Tony Vila, Rachel Greenstadt, and David Molnar. 2003. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. In Proceeding ICEC '03 Proceedings of the 5th International Conference on Electronic Commerce. ACM, 403--407.
[8]
Alan F. Westin. 2003. Social and political dimensions of privacy. Journal of social issues 59, 2 (2003), 431--453.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WebSci '17: Proceedings of the 2017 ACM on Web Science Conference
June 2017
438 pages
ISBN:9781450348966
DOI:10.1145/3091478
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2017

Check for updates

Author Tags

  1. commons
  2. identity assurance
  3. personal identifying information

Qualifiers

  • Poster

Funding Sources

Conference

WebSci '17
Sponsor:
WebSci '17: ACM Web Science Conference
June 25 - 28, 2017
New York, Troy, USA

Acceptance Rates

WebSci '17 Paper Acceptance Rate 30 of 85 submissions, 35%;
Overall Acceptance Rate 245 of 933 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 68
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media