©2004-13, Timothy Grayson


©2004-13, Timothy Grayson



The pieces on this page represent the development of my thinking about an evolving commercial and social subject. It should show a measure of expertise in digital identity, and more specifically in the phenomenon of (social) trust. Find a little logic, some history, a few laughs, and alternative perspectives.

The papers

Trust Deficit (07/08) -- In the terms and context of not trusting politicians, a brief contemplation of what trust is all about and how it affects organizations. (800 words)

Digital Identity Religion and Information Dogma (02/04) -- The religions of identity are solidifying among those who follow the "Big Brother" approach, others who prefer "federation," and yet others who want to have their own solutions damn the rest. All of these choices rest on a confused state of understanding about the (personal) information underlying them. We examine them. (1,100 words)

Dancing Around Identity (09/03) -- As the protective walls of computer and data isolation have come down, location-based identification methods have become inadequate. Location-independent, strong "digital identity" is required to move ahead at the velocity to which we've become accustomed. After a brief description of subject topography, we pose questions that the remainder of the series' papers attempt to address in depth. No. 1 of the Identity Plant series. (1,400 words)

Philosophy of Identity (12/02) -- In pursuing digital identity as a solution to a technical/economic problem, we are giving too little thought to the importance of "softer" non-commercial aspects of identity. We need to address the foundations and underpinnings of social identity: its features and characteristics. This exploration is for the purpose of clarity and understanding, as obstacles and traps become apparent only in the fullest context. No. 2 of the Identity Plant series. (3,700 words)

Identity Hierarchy (07/03) -- Considering how identity is created and perpetuated in the real world reveals an implicit hierarchy in the accepted practical structure of the existing system. Ignoring that hierarchy will inhibit development of the digital identity system. If we are concerned with creating a robust solution to integrate physical and virtual social worlds we must use the technology within the constraints of the existing system to increase the overall integrity of the collective systems. No. 3 of the Identity Plant series. (3,300 words)

Toward a Digital Trust Framework (10/03) -- A key requirement for expanding online commerce is trust. In the digital world, an elaborate trustworthy structure has to evolve to compensate for an absence of trust among distant and detached participants. The primary reason for propagating trust is to reduce transaction costs The trust framework that will increase the acceptability and transactional value consists of two sets of attributes. (3,000 words)

The Post Office in the Digital Trust Framework (10/03) -- In the evolving trust framework for online (commercial) activity there are few organizations that have the assets and could project the necessary trust for evolution. The world's postal administrations are one such organization. (1,000 words)

Dante in Denver (11/02) -- In an homage to Signor Alighieri's trek through hell, I find myself pondering the state of digital identity in the wake of Digital Identity World 2002. (9,300 words)

Evolution of the Online Trustmark (09/02) -- Symbols have characteristics and are a device for making decisions without direct, verifiable proof. Some marks give us confidence. Online this is essential as it's often impossible to get personal, direct verification of trustworthiness. Explores the development and future for online trust marks. (1,900 words)

There's More to Online Trust than Security and Privacy (09/02) -- Through 2001 and 2002 many people equated trust (or its absence) in the online world with security and privacy functions. This is, as made obvious by development in understanding through 2002/03, a much too narrow view of how trust can be achieved or substituted to invigorate eBusiness and eCommerce. (2,000 words)

Putting Speed Bumps on the Criminal Path (06/02) -- Identity theft/fraud are growing problems that facilitate other more heinous and destructive crimes, now exacerbated by the Internet. Post offices have dealt with it for years. Here are some insights into Canada Post's understanding of the subject and what we're doing now and for the future. From a speech delivered at the Identity Theft/Fraud Conference, Toronto, by Canada Post's VP, eBusiness. (2,800 words)