{"id":96,"date":"2005-07-13T21:46:50","date_gmt":"2005-07-13T21:46:50","guid":{"rendered":"\/?p=96"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"highlights-from-a-great-quantitative-study","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=96","title":{"rendered":"Highlights from a great quantitative study"},"content":{"rendered":"<p>In the abstract for my paper on the <a href=\"https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf\">Laws of Identity<\/a>, I wrote:<\/p>\n<p><font face=Arial size=2><\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p align=left>The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly <em>proliferating episodes of theft and deception which will cumulatively erode public trust in the Internet.<\/em><\/p>\n<\/blockquote>\n<p dir=ltr align=left>In the body of the paper I went on to say:<\/p>\n<p><font face=Arial size=2><\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p align=left>A deepening public crisis of this sort would mean the Internet would b<em>egin to lose credibility and acceptance for economic transactions when it should be gaining that acceptance.<\/em> <\/p>\n<\/blockquote>\n<p dir=ltr align=left>Then I talked about the &#8220;danger of slipping backwards&#8221;, rather than moving forward.<\/p>\n<p dir=ltr align=left>In the discussion around the Laws of Identity at the <a href=\"http:\/\/conference.digitalidworld.com\/2005\/\">Digital Identity World (DIDW) Conference<\/a>, a number of participants in the discussion worried that I was overly accenting the negative &#8211; and using uproven assumptions.  And I think they were right in calling for me to get really &#8220;crisp&#8221; about all the positives and benefits of putting in place an identity metasystem, rather than dwelling morosely on the negatives.<\/p>\n<p dir=ltr align=left>None the less, deep down, in that part of me that is pure intuition and chaos, the fantamagorical implications of &#8220;slipping backwards&#8221; continued to haunt me.  And for good reason.<\/p>\n<p dir=ltr align=left>In an article called &#8220;<strong>Internet Scams, <?xml:namespace prefix = st1 ns = \"urn:schemas-microsoft-com:office:smarttags\" \/><st1:Street w:st=\"on\"><st1:address w:st=\"on\">Breaches Drive<\/st1:address><\/st1:Street> Buyers Off the Web, Survey Finds<\/strong>&#8221; (subscription required), The Wall Street Journal&#39;s Riva Richmond reports on a major study which provides significant quantitative support for the kinds of concerns I have been expressing.<\/p>\n<p dir=ltr align=left>The study, conducted by Gartner and released on June 23rd, was based on a survey of an amazing 5000 online consumers.<\/p>\n<p dir=ltr align=left>More than <strong>42% of online shoppers report cutting back on their activity<\/strong> in light of their growing awareness of phishing, pharming and &#8220;identity catastrophes&#8221; involving &#8220;loss&#8221; and &#8220;release&#8221; (not to mention &#8220;theft&#8221;) of Identity Information.<\/p>\n<p dir=ltr align=left>And 28% of those using Internet banking are now <strong>cutting back<\/strong> as well.<\/p>\n<p dir=ltr align=left>Gartner predicts growth in eCommerce and online financial services will be one to three percentage points <strong>lower<\/strong> over the next three years than if electronic information were better safeguarded.<\/p>\n<p>The article quotes Gartner analyst Avivah Litan as saying, &#8220;These attacks and disclosures are taking a steep toll on consumer confidence.  The only place [consumers] can show their concern is in their online behavior.&#8221;  I think that is a very good way of putting it.  <\/p>\n<p>Those who still don&#39;t agree that an objective requirement of the identity metasystem is that the user have control and be asked for consent prior to disclosure should really ponder these words.  If the system doesn&#39;t <em>give<\/em> the user a sense of control, the user will <em>take control<\/em>.  When cornered and disenfranchised, <em>the way to take control is to opt out. <\/em><\/p>\n<p>Gartner estimates that consumers have lost almost a billion dollars to Internet scams during the twelve months ending in May.  <\/p>\n<p>According the story, 77% of concerned online-banking customers said they are using online banking services less frequently. More than 4% of those Internet banking customers concerned with fraud have abandoned online banking altogether.<\/p>\n<p>Amongst concerned online shoppers:<\/p>\n<ul>\n<li>More cautious about <strong><em>where<\/em><\/strong> they purchase goods on line:  73%<\/li>\n<li>More careful entering sensitive data on sites:  62%<\/li>\n<li>Buying fewer things online than before:  33%<\/li>\n<\/ul>\n<p>To mangle Steve Miller, we are &#8220;Slipping, slipping, slipping into the&#8230; <em>past&#8230;&#8221;<\/em><\/p>\n<p>I still don&#39;t think the profound dynamics in play here have been widely enough understood &#8211; though they eventually will be.  As I said in introducing the laws:<\/p>\n<p><font face=Arial size=2><\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p align=left>It is essential to look beyond the current situation, and understand that <strong>if the current dynamics continue unchecked<\/strong>, we are headed toward a deep crisis: the ad hoc nature of Internet identity <strong>cannot withstand<\/strong> the growing assault of professionalized attackers.<\/p>\n<\/blockquote>\n<p dir=ltr align=left>When I say &#8220;look beyond&#8221;, I mean <strong>way<\/strong> beyond.  Think back five years.  Look at where are are today, and ask yourself if you predicted that.  Now imagine five years into the future.  Or ten, if you dare.<\/p>\n<p dir=ltr align=left>By the way, Gartner&#39;s Avivah Litan has been doing great work in this area, we all owe her a vote of thanks.  I love quantitative studies.<\/p>\n<p dir=ltr align=left>So now, back to working on the identity metasystem, all the harder.  And talking to the many experts attending the Catalyst Conference in San Diego.  In case you are new to this conversation, <a href=\"http:\/\/www.burtongroup.com\/catalyst\/\" class=\"broken_link\">Catalyst<\/a> is the <a href=\"http:\/\/www.burtongroup.com\/\" class=\"broken_link\">Burton Group&#39;s<\/a> conference on identity and security as cross-cutting concerns driving the future of the enterprise.  My friend <a href=\"http:\/\/www.google.com\/search?num=100&amp;hl=en&amp;lr=&amp;q=larry+gauthier+LDAP&amp;btnG=Search\">Larry Gautier<\/a> of LDAP fame reminded me earlier today about the days when we were just a couple hundred people huddling together in the wilderness!  Now it is getting huge.  <\/p>\n<p dir=ltr align=left>\n<p><\/font><\/font><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the abstract for my paper on the Laws of Identity, I wrote: The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=96\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Highlights from a great quantitative study<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/96"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=96"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/96\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}