A taxonomy/model for user context with Paola Roccuzzo

A presentation at World IA Day London 2024 in March 2024 in London, UK by London World IA Day

Slide 1

Slide 1

A taxonomy/model for user context: defining user attributes to understand personalisation Paola Roccuzzo — Experience Design Director (Content Services), Foolproof London 2024

Slide 2

Slide 2

WIAD LONDON - MARCH 2024 A taxonomy/model for user context Defining user attributes to understand personalisation Paola Roccuzzo, experience design director for content services @Foolproof_UX

Slide 3

Slide 3

WIAD LONDON - MARCH 2024 draft classification A taxonomy/model for user context Defining user attributes to understand personalisation Paola Roccuzzo, experience design director for content services @Foolproof_UX

Slide 4

Slide 4

01 Some background

Slide 5

Slide 5

2019: GOV.UK future strategy - personalisation Our brief was to understand how a government account could remove friction for users interacting with GOV.UK. Things we had to grapple with: ● define the different outcomes of a personalised experience ● find successful examples to point to ● land a shared understanding of the term ‘personalisation’

Slide 6

Slide 6

The personalisation spectrum: 2019 ❌

Slide 7

Slide 7

In hindsight, despite using the concept in our prototypes, we didn’t fully understand digital identity. This is where I’m restarting from today.

Slide 8

Slide 8

02 The (draft) classification

Slide 9

Slide 9

Some caveats before diving in ● This is a work in progress, highly objectionable–objections welcome, this is a call for arms ● Some bits are esoteric–but technology is evolving fast ● It’s a partial view because 30 minutes is a short time–come find me for the rest if we don’t make it on time ● User context source: W3C Verifiable Credentials recommendations ● Personalisation outcomes inspo: Jeff Eaton

Slide 10

Slide 10

Facets for user context: user attribute type User attribute type Signal Credentials

Slide 11

Slide 11

Facets for user context: source Source Device System Holder

Slide 12

Slide 12

Facets for user context: source Source Device System Holder Definition The entity making the claim (so far, only human)

Slide 13

Slide 13

Facets for user context: privacy spectrum Privacy spectrum Non correlatable Correlatable via collusion Highly correlatable Data minimisation more privacy less privacy

Slide 14

Slide 14

Facets for user context: privacy spectrum Privacy spectrum Example “Is older than 18” Non correlatable Correlatable via collusion Highly correlatable Example Name, date of birth, postcode Example Government ID, shipping address

Slide 15

Slide 15

Facets for user context: level of identification Level of identification Example Returning user for analytics Returning device Authorised credentials Verified identity A system account with username, password and 2FA A system account connected to a valid proof of identity (ex. online banking account)

Slide 16

Slide 16

Enter the trust model ● A trust model implies a set of rules and standards to verify identity (and claims) which organisations agree to follow ● Not common (yet): few systems require identity verification ● When you use a digital identity system (like GOV.UK One Login) you’re entering a trust ecosystem ● In the future the use of digital identity might extend to systems that right now don’t require it

Slide 17

Slide 17

Facets for user context: trust model entities Trust model entities Holder Subject Issuer Verifier The entity that submits verifiable credentials The entity related to verifiable credential (can be ≠ holder, a parent or a carer) The entity that issues a verifiable credential for a holder The entity that verifies a verifiable credential for an issuer

Slide 18

Slide 18

Facets for user context: trust model concepts Trust model concepts Attribute that can be verified and exchanged in a trust ecosystem Verifiable credential Verifiable presentation Proof Data derived from one or more verifiable credentials The cryptographic encoding that allows to see whether a credential or a presentation has been tampered with

Slide 19

Slide 19

The personalisation spectrum: 2024 (WIP)

Slide 20

Slide 20

03 In practice

Slide 21

Slide 21

Identity verification system Recommendations

Slide 22

Slide 22

We’re now in a trust ecosystem Dynamic assembly based on verifiable credential + proof Dynamic assembly based on verifiable credential - no proof Verifiable credentials with proof

Slide 23

Slide 23

Verifiable credentials with proof Verifiable credentials needs proof

Slide 24

Slide 24

Issuer Holder (and subject) Verifier

Slide 25

Slide 25

Automated decision based on verifiable presentation

Slide 26

Slide 26

[The application journey continues on DWP]

Slide 27

Slide 27

Dynamic assembly based on verifiable presentation

Slide 28

Slide 28

Thanks