SlideShare a Scribd company logo
1 of 14
Download to read offline
Digital Identity:
What's Driving the Shift and How to Navigate
An online or
networked identity adopted
or claimed in cyberspace by
an individual, organization or
electronic device.
Source: Techopedia
2
What is a digital identity?
Currently, digital identity is very fragmented.
This has created an “every man for himself” approach to
creating or confirming digital identities
3
Reasons for fragmentation:
4
•Instability of identities
•Lack of identity standards and commercial guidelines
Name Changes: Approx. 3M
changes in marital status and
50K applications for name
changes each year
Address Changes: Approx.
40M people move annually
and 40% never notify the
Post Office
SSN Error and Misuse: 20+%
of people have multiple SSNs
associated with their names
This presents a big challenge for consumers.
5
…and the problem will only continue to grow as Millennials drive greater
adoption of digital technologies, and change the face of digital identities.
23 4.0 Shopping accounts
3.2 Financial accounts
2.7 Email accounts
2.3 Entertainment accounts
2.3 Social network accounts
2.2 Communication accounts
The average number of
password protected
online accounts held by
U.S. adults, including:
The future of identity is being shaped by and for millennials.
6
Millennials (born between 1980 & mid-2000’s) represent 1/3 of the U.S. population
and are the most diverse, educated and tech savvy generation in history.
The U.S. Bureau
of Labor Statistics
estimates that
of the American
workforce will be
Millennials by 202050%
9 out of 10
own smartphones
Source: Nielsen
9 out of 10 use social networks
Source: Pew Research Center
…and 34% turn to their social
networks when making
purchase decisions
Source: Association of National Advertisers, Barkley, SMG, BCG
Over 90% have logged
into a website or
mobile app using an
existing identity from
a social network
Source: Gigya)
Millennials are very different than other customer groups.
7
81% of Millennials are less about
“friendly” service than “fast” service.
87% of Millennials are Facebook users.
29%
Online Uploads of Videos and Images
Source: Fromm & Garton, Marketing to Millennials (2013)
262%
more likely to
be influenced
by smartphone
apps.
Millennials
60%
Millennials Non-Millennials
The future of identity is being shaped by and for millennials.
8
As Millennials, smartphones and social networks collide, it’s creating an
increased demand for federated identity. Federated identity allows users to log
onto third-party websites, applications, mobile devices and gaming systems with
their existing identity.
It’s also referred to as “Bring Your Own Identity” (BYOID) or “Bring Your Own
Credential” (BYOC).
Account 1
Federated
Identity
Credential
Account 2
Account 3
Account 4
Account 5
Identity federation has many benefits.
USERS
• Better customer experience
• Less friction during
registration/onboarding
• Need to manage fewer accts
COMPANIES
• Ease of implementation
• User verification/enhanced proofing
• Access to identity attributes
• Reduced failed login attempts
• Reduced forgotten p/w requests
9
• Transferred, implied trust
• Increased user control
• Enhanced privacy
Social login is the most common form of federated identity today.
10
…but it’s not the only form of federated identity.
Facebook
Google+
Twitter
Yahoo
Other
LinkedIn
66%
20%
6%
4%
2%
2%
Source: Gigya, Q2 2015
Social login is actually low on the trust spectrum of identity
attributes and login proxies.
11
Expert/electronic ID
document authentication
Verified bank account
Dynamic knowledge
based authentication
Electronic copy of drivers license
Mobile number
Social login
Email address
LOW TRUST
Biometrics
Electronic copy of passport
HIGH TRUST
The future of identity will move beyond social logins.
12
Federation doesn’t stop with social logins. A wide variety of commercial and
government organizations can be identity providers.
Becoming an identity provider is about trust.
13
To participate in the world of federated identity, identify the companies with
whom you share common customers and can build a logical network or trust
relationship…a trust framework.
Account 1
Account 2
Account 3
Account 4
Account 5
For more information and best practices around
managing digital identities, visit our blog at
http://blogs.lexisnexis.com/identity-management/

More Related Content

What's hot

Your Digital Dossier
Your Digital DossierYour Digital Dossier
Your Digital Dossierdont96
 
The Self Directed (Corporate) Life
The Self Directed (Corporate) LifeThe Self Directed (Corporate) Life
The Self Directed (Corporate) Lifesocialmedia
 
Friendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the WorkplaceFriendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the WorkplaceJoe McCarthy
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015Nicole Black
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Online Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & SafeguardsOnline Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & SafeguardsSandra Annette Rogers
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securitySilicon Valley ProductCamp
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Introduction to Web 2.0
Introduction to Web 2.0Introduction to Web 2.0
Introduction to Web 2.0EPWN
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
 
Mi Bridges General Info.
Mi Bridges General Info.Mi Bridges General Info.
Mi Bridges General Info.cbaker369
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer CentreSimran Grover
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
 
e-Learning in Civil Engineering
e-Learning in Civil Engineeringe-Learning in Civil Engineering
e-Learning in Civil EngineeringMartin Ebner
 

What's hot (20)

Virtual communities
Virtual communitiesVirtual communities
Virtual communities
 
Your Digital Dossier
Your Digital DossierYour Digital Dossier
Your Digital Dossier
 
The Self Directed (Corporate) Life
The Self Directed (Corporate) LifeThe Self Directed (Corporate) Life
The Self Directed (Corporate) Life
 
Friendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the WorkplaceFriendsters At Work: Displaying Social Media Streams in the Workplace
Friendsters At Work: Displaying Social Media Streams in the Workplace
 
Social media marketing 2015
Social media marketing 2015Social media marketing 2015
Social media marketing 2015
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Online Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & SafeguardsOnline Personal Data Curation with Benevolent Intention & Safeguards
Online Personal Data Curation with Benevolent Intention & Safeguards
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Introduction to Web 2.0
Introduction to Web 2.0Introduction to Web 2.0
Introduction to Web 2.0
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
Mi Bridges General Info.
Mi Bridges General Info.Mi Bridges General Info.
Mi Bridges General Info.
 
Basic computer courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer CentreBasic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic computer courses in Ambla Cantt! Batra Computer Centre
 
Etech activity
Etech activityEtech activity
Etech activity
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
e-Learning in Civil Engineering
e-Learning in Civil Engineeringe-Learning in Civil Engineering
e-Learning in Civil Engineering
 
Virtual Communities at Work
Virtual Communities at WorkVirtual Communities at Work
Virtual Communities at Work
 

Similar to Digital Identities

White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101Gigya
 
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersWhite Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersGigya
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-worldMEDICI
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Stanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer EngagementStanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer EngagementMatterport
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdfIdentity Herald
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?itio Innovex Pvt Ltv
 
Citizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsCitizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsConor Bronsdon
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineHector Hoyos
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de ColombiaPablo Junco
 

Similar to Digital Identities (20)

White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101
 
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersWhite Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-world
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Stanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer EngagementStanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
Stanford GSB Portland Alumni - Leveraging Social Media for Customer Engagement
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdf
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?What's Trending in the Credit Card Payment Industry in 2024?
What's Trending in the Credit Card Payment Industry in 2024?
 
Citizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsCitizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutions
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Hablando de blockchain en la Uniandes de Colombia
Hablando de blockchain en la Uniandes  de ColombiaHablando de blockchain en la Uniandes  de Colombia
Hablando de blockchain en la Uniandes de Colombia
 

More from LexisNexis Risk Solutions

Navigating the new environment for liens and judgments
Navigating the new environment for liens and judgmentsNavigating the new environment for liens and judgments
Navigating the new environment for liens and judgmentsLexisNexis Risk Solutions
 
Navigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy RegulationsNavigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy RegulationsLexisNexis Risk Solutions
 
Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...LexisNexis Risk Solutions
 
Patient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping PointPatient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping PointLexisNexis Risk Solutions
 

More from LexisNexis Risk Solutions (6)

2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
Navigating the new environment for liens and judgments
Navigating the new environment for liens and judgmentsNavigating the new environment for liens and judgments
Navigating the new environment for liens and judgments
 
Navigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy RegulationsNavigating Provider Directory Accuracy Regulations
Navigating Provider Directory Accuracy Regulations
 
Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...Moving to Value Based Care – Leveraging advanced analytics to measure physici...
Moving to Value Based Care – Leveraging advanced analytics to measure physici...
 
2015 LexisNexis® Fraud Mitigation Study
2015 LexisNexis® Fraud Mitigation Study2015 LexisNexis® Fraud Mitigation Study
2015 LexisNexis® Fraud Mitigation Study
 
Patient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping PointPatient Engagement: Motivation as the Tipping Point
Patient Engagement: Motivation as the Tipping Point
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Digital Identities

  • 1. Digital Identity: What's Driving the Shift and How to Navigate
  • 2. An online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device. Source: Techopedia 2 What is a digital identity?
  • 3. Currently, digital identity is very fragmented. This has created an “every man for himself” approach to creating or confirming digital identities 3
  • 4. Reasons for fragmentation: 4 •Instability of identities •Lack of identity standards and commercial guidelines Name Changes: Approx. 3M changes in marital status and 50K applications for name changes each year Address Changes: Approx. 40M people move annually and 40% never notify the Post Office SSN Error and Misuse: 20+% of people have multiple SSNs associated with their names
  • 5. This presents a big challenge for consumers. 5 …and the problem will only continue to grow as Millennials drive greater adoption of digital technologies, and change the face of digital identities. 23 4.0 Shopping accounts 3.2 Financial accounts 2.7 Email accounts 2.3 Entertainment accounts 2.3 Social network accounts 2.2 Communication accounts The average number of password protected online accounts held by U.S. adults, including:
  • 6. The future of identity is being shaped by and for millennials. 6 Millennials (born between 1980 & mid-2000’s) represent 1/3 of the U.S. population and are the most diverse, educated and tech savvy generation in history. The U.S. Bureau of Labor Statistics estimates that of the American workforce will be Millennials by 202050% 9 out of 10 own smartphones Source: Nielsen 9 out of 10 use social networks Source: Pew Research Center …and 34% turn to their social networks when making purchase decisions Source: Association of National Advertisers, Barkley, SMG, BCG Over 90% have logged into a website or mobile app using an existing identity from a social network Source: Gigya)
  • 7. Millennials are very different than other customer groups. 7 81% of Millennials are less about “friendly” service than “fast” service. 87% of Millennials are Facebook users. 29% Online Uploads of Videos and Images Source: Fromm & Garton, Marketing to Millennials (2013) 262% more likely to be influenced by smartphone apps. Millennials 60% Millennials Non-Millennials
  • 8. The future of identity is being shaped by and for millennials. 8 As Millennials, smartphones and social networks collide, it’s creating an increased demand for federated identity. Federated identity allows users to log onto third-party websites, applications, mobile devices and gaming systems with their existing identity. It’s also referred to as “Bring Your Own Identity” (BYOID) or “Bring Your Own Credential” (BYOC). Account 1 Federated Identity Credential Account 2 Account 3 Account 4 Account 5
  • 9. Identity federation has many benefits. USERS • Better customer experience • Less friction during registration/onboarding • Need to manage fewer accts COMPANIES • Ease of implementation • User verification/enhanced proofing • Access to identity attributes • Reduced failed login attempts • Reduced forgotten p/w requests 9 • Transferred, implied trust • Increased user control • Enhanced privacy
  • 10. Social login is the most common form of federated identity today. 10 …but it’s not the only form of federated identity. Facebook Google+ Twitter Yahoo Other LinkedIn 66% 20% 6% 4% 2% 2% Source: Gigya, Q2 2015
  • 11. Social login is actually low on the trust spectrum of identity attributes and login proxies. 11 Expert/electronic ID document authentication Verified bank account Dynamic knowledge based authentication Electronic copy of drivers license Mobile number Social login Email address LOW TRUST Biometrics Electronic copy of passport HIGH TRUST
  • 12. The future of identity will move beyond social logins. 12 Federation doesn’t stop with social logins. A wide variety of commercial and government organizations can be identity providers.
  • 13. Becoming an identity provider is about trust. 13 To participate in the world of federated identity, identify the companies with whom you share common customers and can build a logical network or trust relationship…a trust framework. Account 1 Account 2 Account 3 Account 4 Account 5
  • 14. For more information and best practices around managing digital identities, visit our blog at http://blogs.lexisnexis.com/identity-management/