Skip to content

Commit

Permalink
QA
Browse files Browse the repository at this point in the history
lowercase applied to a bunch of words where uppercase wasn't right
  • Loading branch information
koalie authored Aug 5, 2024
1 parent c33cf89 commit 5181c0f
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -615,16 +615,16 @@ <h4 class="heading settled" data-level="2.2.4" id="opportunities-and-threats"><s
<p class="note" role="note"><span class="marker">Note:</span> However, like all innovations, these technologies can have downsides. To paraphrase Paul Watzlawick, the innovation of these technologies must not become “<em>ultra-solutions</em>” where “<em>operation successful, patient dead</em><a data-link-type="biblio" href="#biblio-ultra-solutions" title="Ultra-Solutions: How to Fail Most Successfully">[ultra-solutions]</a>.
So, the challenge is enabling this technological innovation by being aware of the threats to Privacy, security, and Human Rights.</p>
<p>Therefore, it is necessary to analyze the various threats to mitigate them at their root in designing and implementing these technologies and related standards.</p>
<p>As an example, below is an initial analysis of threats to human rights (Harms) concerning government-issued digital identities using <a href="https://learn.microsoft.com/en-us/azure/architecture/guide/responsible-innovation/#harms-modeling">Microsoft’s Responsible innovation</a> toolkit:</p>
<p>As an example, below is an initial analysis of threats to human rights (harms) concerning government-issued digital identities using <a href="https://learn.microsoft.com/en-us/azure/architecture/guide/responsible-innovation/#harms-modeling">Microsoft’s responsible innovation</a> toolkit:</p>
<ul>
<li data-md>
<p><strong>Opportunity Loss</strong> (<em>Discrimination</em>): This complex issue spans multiple areas. <em>Digital divide</em>: if digital identities are required for access to public services and no alternatives are present, and if they depend on certain hardware, software, or stable connectivity, it can lead to discrimination for people who do not have availability of these resources. In addition to discrimination within the same country, there is further discrimination if there is no “cross-border” interoperability between the technologies and implementations used by different governments.</p>
<p><strong>Opportunity loss</strong> (<em>discrimination</em>): This complex issue spans multiple areas. <em>Digital divide</em>: if digital identities are required for access to public services and no alternatives are present, and if they depend on certain hardware, software, or stable connectivity, it can lead to discrimination for people who do not have availability of these resources. In addition to discrimination within the same country, there is further discrimination if there is no “cross-border” interoperability between the technologies and implementations used by different governments.</p>
<li data-md>
<p><strong>Economic loss</strong> (<em>Discrimination</em>): The availability of digital identities and related credentials, which can contain a lot of information regarding wealth status, can be used to discriminate against access to credit. This can also be generalized - as was identified during a <a href="https://github.com/w3c/breakouts-day-2024/issues/12">W3C breakout session</a> - and concerns the <a href="https://www.tandfonline.com/doi/abs/10.1080/15487733.2009.11908028">Javons paradox</a>. The more information available, the more likely it is that collection, particularly in greedy data-driven contexts, is abused.</p>
<p><strong>Economic loss</strong> (<em>discrimination</em>): The availability of digital identities and related credentials, which can contain a lot of information regarding wealth status, can be used to discriminate against access to credit. This can also be generalized - as was identified during a <a href="https://github.com/w3c/breakouts-day-2024/issues/12">W3C breakout session</a> - and concerns the <a href="https://www.tandfonline.com/doi/abs/10.1080/15487733.2009.11908028">Javons paradox</a>. The more information available, the more likely it is that collection, particularly in greedy data-driven contexts, is abused.</p>
<li data-md>
<p><strong>Dignity loss</strong> (<em>Dehumanization</em>): For example, if the vocabulary used does not correctly describe people’s characteristics, this can reduce or obscure people’s humanity and characteristics.</p>
<p><strong>Dignity loss</strong> (<em>dehumanization</em>): For example, if the vocabulary used does not correctly describe people’s characteristics, this can reduce or obscure people’s humanity and characteristics.</p>
<li data-md>
<p><strong>Privacy Loss</strong> (<em>Surveillance</em>): if this technology is not designed and implemented properly, it can lead to surveillance by state and non-state actors such as government and private technology providers. For example, centralized or federated models are more prone to these threats, while decentralized models are less so, but it depends on how they are implemented. Therefore, it is necessary to provide privacy-preserving technologies and implement them properly.</p>
<p><strong>Privacy loss</strong> (<em>surveillance</em>): if this technology is not designed and implemented properly, it can lead to surveillance by state and non-state actors such as government and private technology providers. For example, centralized or federated models are more prone to these threats, while decentralized models are less so, but it depends on how they are implemented. Therefore, it is necessary to provide privacy-preserving technologies and implement them properly.</p>
</ul>
<p class="note" role="note"><span class="marker">Note:</span> W3C is handling this issue with a <a href="#a5">Threat Model</a>.</p>
<h3 class="heading settled" data-level="2.3" id="digital-identity-management-models"><span class="secno">2.3. </span><span class="content">Digital identity management models</span><a class="self-link" href="#digital-identity-management-models"></a></h3>
Expand Down

0 comments on commit 5181c0f

Please sign in to comment.