Information Technology Reference
In-Depth Information
5.3.2 Accumulating the Reputation of a Persona
A persona can also be an means for accumulating one's reputations. Notice that,
because everyone who owns a persona may destroy and re-create it freely, the
negative reputation of the persona will not work well. However, there is an
incentive to keep a persona that has a positive reputation that can accumulate
ratings. A company in the social Web services is one persona. The persona of a
company can also obtain trust by accumulating positive a reputation.
The important thing to create consistency for a persona is that the value of the
reputation which has been accumulated by that persona reaches a level that is too
high to throw away. Long term time lines of a persona over the social web become
evidence for proving that the persona has exited in an active state (Fig. 5.1 ).
5.3.3 Persona and Cross-Web Authentication and Authorization
A trustable IT enabled service should be equipped with the functionality (1) to
confirm persons who interacts in the real world (2) to confirm the consistency of
persons who have been interacted with and (3) to confirm the privileges of the persons
who interact with them. User-centric authentications and authorizations such as
OpenID or OAuth are made use of through cross-website safe mash-up for personal
data exchange. Additionally, OpenID connect has also been specified for integrated
cross-web site authentication and authorization (Passant et al. 2009 ). We can under-
stand a persona as a symbol for (1), (2) and (3) when all the functionality of user-
centric cross web-site authentication and authorization mechanisms works (Sakimura
et al. 2011 ).
5.3.4 Open Persona
The essence of privacy and copyright is the right to control information which is
owned by a person. To guarantee certain rights to control copyrighted literature and
private information of individuals is important. However, too strong rights about
those cause serious problems rather than convenience. The works of open source
software have succeeded by deliberately weakening the rights of the owner and
liberalizing access to the works. In the same way, we suppose that a person
classifies and separates personal information and organizes them with personas.
Also, we assume that some of the personas intentionally weaken the rights of
privacy and whose information is accessed freely. We call this “open persona.”
Search WWH ::




Custom Search