UXC Dictionary: Difference between revisions
Jump to navigation
Jump to search
Mary Hodder (talk | contribs) No edit summary |
Mary Hodder (talk | contribs) (added new terms 1st draft) |
||
Line 5: | Line 5: | ||
| User || Human. This does not include machines, algorithms, or other non-human agents or actors. || Our perspective is that this definition applies this way in any context in the IDESG framework. We suggest changing the use of USER for other meanings to another word. || Example | | User || Human. This does not include machines, algorithms, or other non-human agents or actors. || Our perspective is that this definition applies this way in any context in the IDESG framework. We suggest changing the use of USER for other meanings to another word. || Example | ||
|- | |- | ||
| | | User-centric || Example || Sample usage from NSTIC: | ||
*"The realization of this vision is the user-centric “Identity Ecosystem” described in this Strategy."P8 | |||
* "Furthermore, the online environment today is not user-centric. Individuals tend to have little ability to manage their own personal information once it is released to service providers, and they often must calculate the tradeoffs among security, privacy, and gaining access to a service they desire." Page 12 | |||
* "It also reflects the user-centric nature of the Identity Ecosystem, which provides greater transparency, privacy protection, flexibility,and choice to the individual." Page 21 | |||
* "New privacy protections will shift the current model of application-specific collection of identity information to a distributed, user-centric model that supports an individual’s capability to manage an array of cyber identities and to manage and assert personal attributes without having to provide identifying data." Page 29 | |||
*"Lack of secure, convenient, user-friendly options for authentication and identification;" Page15 | |||
*"New privacy protections will shift the current model of application-specific collection of identity information to a distributed, user-centric model that supports an individual’s capability to manage an array of cyber identities and to manage and assert personal attributes without having to provide identifying data." Page 35 | |||
*Limit the retention of data to the time necessary for providing and administering the services to the individual end-user for which the data was collected, except as otherwise required by law; • Provide concise, meaningful, timely, and easy-to-understand notice to end-users on how providers collect, use, disseminate, and maintain personal information;" Page 36 | |||
|| The common semantic domain is roughly referred to here[http://as:https://en.wikipedia.org/wiki/User-centered_design as:https://en.wikipedia.org/wiki/User-centered_design] | |||
|- | |- | ||
| | | Entities || Any organization providing identity services. || Example || Example | ||
|- | |- | ||
| | | System || An entity's system a user is interacting with at a particular time. || Example || Example | ||
|- | |- | ||
| | | Anonymous || An interaction designed such that the data collected is not sufficient to infer the identity of the user involved nor is such data sufficient to permit an entity to associate multiple interactions with a user or to determine patterns of behavior with a user. || Example || Example | ||
|- | |- | ||
| | | Third Parties || Example || re: supplemental on Usable 3: research systems that display entities on a page or system. consider burden on user vs. accessibility of entities list) || Example | ||
|- | |- | ||
| | | Pseudonymous || An interaction designed such that the data collected is not sufficient to allow the entity to infer the user involved but which does permit an entity to associate multiple interactions with the user’s claimed identity. || Example || Example | ||
|- | |- | ||
| | | verified identity || Example || Example || Example | ||
|- | |- | ||
| Example || Example || Example || Example | | Example || Example || Example || Example |
Revision as of 19:31, 27 July 2015
Term | Definition | Notes | Citations |
---|---|---|---|
User | Human. This does not include machines, algorithms, or other non-human agents or actors. | Our perspective is that this definition applies this way in any context in the IDESG framework. We suggest changing the use of USER for other meanings to another word. | Example |
User-centric | Example | Sample usage from NSTIC:
|
The common semantic domain is roughly referred to hereas:https://en.wikipedia.org/wiki/User-centered_design |
Entities | Any organization providing identity services. | Example | Example |
System | An entity's system a user is interacting with at a particular time. | Example | Example |
Anonymous | An interaction designed such that the data collected is not sufficient to infer the identity of the user involved nor is such data sufficient to permit an entity to associate multiple interactions with a user or to determine patterns of behavior with a user. | Example | Example |
Third Parties | Example | re: supplemental on Usable 3: research systems that display entities on a page or system. consider burden on user vs. accessibility of entities list) | Example |
Pseudonymous | An interaction designed such that the data collected is not sufficient to allow the entity to infer the user involved but which does permit an entity to associate multiple interactions with the user’s claimed identity. | Example | Example |
verified identity | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |
Example | Example | Example | Example |