SlideShare una empresa de Scribd logo
1 de 41
Malcolm Crompton Managing Director, Information Integrity Solutions
Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government  Conference 2009 Sydney 24 June 2009
Malcolm Crompton Managing Director, Information Integrity Solutions
The inherent challenge for any government:  which hat? “ Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.”  Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice,  Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
Where we’ve been ...
 
 
 
Case study: Australia’s failed Access Card ,[object Object],[object Object],[object Object],[object Object],[object Object],The old website: www.accesscard.gov.au
Sun-Herald, 14 Oct 2006
This isn’t lost on the individual ... The Great Trust deficit: “ You don’t trust me, so why should I trust you?” Broad consents Inadequate Accountability Lack of Control Unexpected uses Burden of Risk More  EOI Logging & Monitoring
[object Object],[object Object],[object Object],[object Object],Trust
Survey after survey shows the impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The trust deficit – Impact  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Trust Deficit & the great risk shift:  Cloud as next instalment? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
And now Govt 2.0
Governments are also transforming ,[object Object],[object Object],[object Object],www.theconnectedrepublic.org
 
 
 
 
 
But is it safe?
Citizen response to Govt 2.0 informed by ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.Australia.gov.au www.MySpace.com   ......
The internet continues to change the rules ,[object Object],[object Object],[object Object],[object Object]
Facebook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to make it safe
“ Layered Defence” Privacy ► Accountability Trust Risk Control ► ► ► Safety Net Governance Technology Education Law We can reduce the Trust Deficit
“ Layered Defence” We can reduce the Trust Deficit Safety Net Governance Technology Education Privacy ► Accountability Trust Risk Control ► ► ► ? Law
Layered Defence tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Culture & History also important ,[object Object],[object Object],[object Object],[object Object],“ Use Cases for Identity Management in E‑Government”  Robin McKenzie, Malcolm Crompton, Colin Wallis,  IEEE Security and Privacy , vol. 6,  no. 2,  pp. 51-57,  Mar/Apr, 2008 http://doi.ieeecomputersociety.org/10.1109/MSP.2008.51
The key: three dynamically related elements Control Accountability www.TheConnectedRepublic.org Now  www.iispartners.com/Publications/index.html   Fair   risk allocation
www.trustguide.org.uk Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust
 
Swire’s recommendations ,[object Object],[object Object],[object Object],[object Object]
 
Jason Ryan’s recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Some more strategies and principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions for governments ,[object Object],[object Object],[object Object],[object Object],[object Object]
 

Más contenido relacionado

La actualidad más candente

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
Carolyn Kopf
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
Zach Evans
 
Online Tracking
Online TrackingOnline Tracking
Online Tracking
skilcu01
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
Cindy Kim
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
Raj Goel
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
FitCEO, Inc. (FCI)
 

La actualidad más candente (19)

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
 
Online Tracking
Online TrackingOnline Tracking
Online Tracking
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c2016-09-05-Lessons_Learned_From_The_FTC_v1c
2016-09-05-Lessons_Learned_From_The_FTC_v1c
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy Webinar Deck - Protect Your Users' Online Privacy
Webinar Deck - Protect Your Users' Online Privacy
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Virality & Network Effect
Virality & Network EffectVirality & Network Effect
Virality & Network Effect
 
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social MediaStanford GSB_Closer Look_Why Boards Should Care About Social Media
Stanford GSB_Closer Look_Why Boards Should Care About Social Media
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 

Destacado (6)

02 Peter Williams
02 Peter Williams02 Peter Williams
02 Peter Williams
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2
 
1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2
 
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
 

Similar a 03 Malcolm Crompton

Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
AlleneMcclendon878
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
Zohra Razaq
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 

Similar a 03 Malcolm Crompton (20)

WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Consumer engagement principles
Consumer engagement principlesConsumer engagement principles
Consumer engagement principles
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 

Más de Frocomm Australia

Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
Frocomm Australia
 

Más de Frocomm Australia (10)

The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high res
 
Welcome slide day 1
Welcome slide day 1Welcome slide day 1
Welcome slide day 1
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentation
 
Sydney conf presentation
Sydney conf presentationSydney conf presentation
Sydney conf presentation
 
Web2 0 Holding Slide
Web2 0 Holding SlideWeb2 0 Holding Slide
Web2 0 Holding Slide
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case
 
01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Último (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

03 Malcolm Crompton

  • 1. Malcolm Crompton Managing Director, Information Integrity Solutions
  • 2. Malcolm Crompton Web 2.0 in Government: the key issue of privacy Web 2.0 in Government Conference 2009 Sydney 24 June 2009
  • 3. Malcolm Crompton Managing Director, Information Integrity Solutions
  • 4. The inherent challenge for any government: which hat? “ Government is not only a direct service provider, of course. It also discharges important roles including providing for national security, law enforcement and regulation about which individuals have little (legal) choice even if they might have consequences that are adverse to their individual interests.” Safe to play, a trust framework for The Connected Republic A Point of View from the Global Public Sector Practice, Internet Business Solutions Group, Cisco Systems www.iispartners.com/Publications/index.html
  • 6.  
  • 7.  
  • 8.  
  • 9.
  • 11. This isn’t lost on the individual ... The Great Trust deficit: “ You don’t trust me, so why should I trust you?” Broad consents Inadequate Accountability Lack of Control Unexpected uses Burden of Risk More EOI Logging & Monitoring
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.  
  • 19.  
  • 20.  
  • 21.  
  • 22.  
  • 23. But is it safe?
  • 24.
  • 25.
  • 26.
  • 27. How to make it safe
  • 28. “ Layered Defence” Privacy ► Accountability Trust Risk Control ► ► ► Safety Net Governance Technology Education Law We can reduce the Trust Deficit
  • 29. “ Layered Defence” We can reduce the Trust Deficit Safety Net Governance Technology Education Privacy ► Accountability Trust Risk Control ► ► ► ? Law
  • 30.
  • 31.
  • 32. The key: three dynamically related elements Control Accountability www.TheConnectedRepublic.org Now www.iispartners.com/Publications/index.html Fair risk allocation
  • 33. www.trustguide.org.uk Guidelines TG.1: Education – Enabling better informed risk decision making TG.2: Experimentation – learning through doing TG.3: Restitution Measures – provide a positive impact on personal perceived risk TG.4: Guarantees – Provide assurance and improve confidence in whether to enter into a transaction TG.5: Control – Increased transparency brings increased confidence TG.6: Openness – honesty signifies and engenders trust
  • 34.  
  • 35.
  • 36.  
  • 37.
  • 38.  
  • 39.
  • 40.
  • 41.