Bots in the Classroom & Home - Security, Identity, Consent and Privacy
Copyright 123RF

Bots in the Classroom & Home - Security, Identity, Consent and Privacy

December 27 update - I strongly suggest readers skim How Do I Trust Entities??? Different Levels of Identity & Credential Assurance - A Thought Paper


June 13, 2023 update - I strongly suggest readers skim these recent articles:

Bots, both physical and virtual are now appearing in both the home and schools to assist kids in learning. I used the above pic for a reason. It shows a humanoid bot, working with both students and a teacher. People looking at it immediately use their old frames of reference to judge the scene, thinking the bot can see, hear, think and move. What they're missing is the data and identity issues. That's what this post will discuss.

Nanotechnology & Sensors

Nanotechnology means the world of "things" is shrinking to very, very small physical devices. It results, overtime, for a wide variety of different types of behavioral/biometric sensors becoming miniaturized. It means the bot in the pic above, can potentially be determining, each second, the student's skin temp, eye blinks, eye movements, mannerisms, physical body movements, emotions, how they interact with others, etc. The same type of sensors can be built into the room as well, in the not so distant future, clothes, glasses, et al people are wearing.

All of this "data", which is highly personable, can then feed what I've been calling a digital learning twin (DLT). The DLT can continuously update the student's individualized education plan (IEP) measuring it against assessments.

Skim this new learning architecture:

Security

Yet what about the security and privacy concerning mass aggregation of very sensitive data, streaming into the DLT and out to different learning systems, bots and teachers? I'm VERY concerned about creating systems that could be maliciously used against a person. Which is why in the post linked above, I discuss how Toufi Saliba from TODA, advised me to build in security right from the get go.

Yet, it's easier said than done. Why? All the different sensors have different types of hardware and software security. Depending on which country is manufacturing these, they hypothetically could have back-doors built into them, allowing illegal access.

Then there's the data transmission from the device endpoints to the DLT system endpoints, from there into the DLT system, and then back out in feeds to learning bots and teachers.

Finally, I keep this diagram always in my mind. Why? It means tomorrow's technology is going to be very different than today. It means today's best end to end security system might quickly become tomorrow's turd. Thus, any learning framework must be constantly monitored for new threats and quickly adjusted. This is something that most systems today aren't good at.

Readers should skim these articles to see the rapidly growing privacy threat in the classroom from IoT devices et al:

The Same Applies to the Home

As learning bots begin to appear in the home, the same problems above apply to your child and others who are learning along with it. So, while you as a parent might be "sold" on the learning benefits, e.g. STEM (science technology engineering and math), assisting learning challenged students, etc., the fine print about security might not be well explained, and/or thought out.

Consent and Privacy

While a learning bot/sensor system might come with a high degree of security, it's only as good as the legal consent used. For example, in this post, I state how Jane Doe's parents provide their consent to a school district, to use Jane Doe's data, understanding all data used for Jane Doe will be expunged from their systems when she graduates. Thus, they're providing informed consent.

Now consider the home. People are motivated by price and they like "free" or inexpensive things. That's why this survey found for ages 18 to 34, the rate of acceptance of terms and conditions, without reading them, reaches 97 percent. Thus, highly sensitive data about your child, could potentially flow, each second, from the bot learning system into private commercial databases.

Why should you care? The data can be accessed, down the road, by entities like life/health insurance companies, potential employers, without your permission, to judge your health and predict your behaviors. YIKES!

Identities

Consider the bot in the pic above. It's likely not acting on its own. It will probably be connected to AI deep/machine learning type programs, that's interconnected with other bots in the school, and perhaps around the planet.

If a bot is working with Jane Doe, either physically and/or virtually, how does Jane Doe know its bot 12345 versus bot abcde? If the bots are working increasingly together in singularity, how are each bots legally identified, and how is the data sharing legally monitored? Since virtual bots can be created in one jurisdiction and instantly operate in others, how will they be legally identified?

Skim this architecture for AI systems and bots legal identification:

Most people, school districts, governments et al around the planet, aren't yet even thinking about this. Yet they should.

Professional Identification

As the world madly digitizes, it means human and bot teachers might be located at other places on the planet than the one the student is in. How can a parent, school district or province/state be sure the entity has the correct professional certification, and it's up to date?

In this post, I talk about teaching identities. We need a global system able to meet the needs of today. Not one using old paper based certification, trapped within a jurisdiction or country.

Skim this new architecture for rethinking human legal identities;

Jane Takes an Exam

Jane Doe is going to take a major exam. In today's world, it's becoming more common to steal a person's identity or impersonate them to write an exam. Here's how I see, in the not so distant future, Jane Doe proving her identity before she sits for an exam...

She presents her legal self-sovereign identity (LSSI), either physically or digitally. It contains a hash of her birth entry into a TODA like system, as well as an attestation by the CRVS (civil registration vital statistics ) system. She might have to provide a 4 digit pin. The system then checks the hash to confirm it's her. It also contains a face image of her that must match to the person entering the exam. If the situation was really high risk, the authorities could securely obtain her fingerprints/iris scan, and then compare this to the CRVS.

Skim this article on how schools and workplace assessments will change in the not so distant future:

Summary

As bots and sensors invade the home and school for learning, it requires a rethink of identity, security, privacy and consent. Without this, a young child or student, might have their data improperly used, which can affect them for the rest of their lives.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT



要查看或添加评论,请登录

Guy Huntington的更多文章

社区洞察

其他会员也浏览了