Almost 2 years ago when I created and documented the Social Evolution models for Technology Adoption, I never dreamed that I would be writing an article with the above title.
Paraphrasing, the Social Evolution model states:
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; to later form a party of explorers to explore and conquer a common set of goals; and, even further on, create a clan, a band, a tribe, and a tribal society, a group of people who live and work together – a group of tribes organized around kinships.
Model 2a: Social Evolution: Creation of Nation State, and
Model 2b. Social Evolution: Defining Principles.
Model 2a appears below followed by Model 2b.
Model 2a: Social Evolution: Creation of a Nation StateModel 2b: Social Evolution: Defining Principles
What I didn’t realize is that I was also defining a framework for a new political spectrum:
True decentralization/self-sovereignty on the far left
Complete authoritarian centralization on the far right
…and hence, a new Social Evolution model.
Model 2c. Social Evolution: Self-Sovereignty Political Spectrum
Is the Social Evolution model harmful? No, not at all …as long as it remains helpful in illuminating new concepts like the Self-Sovereignty Political Spectrum.
What is your self-sovereignty political affiliation? Are you:
A decentralized/self-sovereign sheep (that needs to be protected by default), or
An authoritarian centralizationist wolf (ready to devour your sheep mates)?
…or are you a centrist?
Have a great day.
“The mind once enlightened, cannot be darkened” – Thomas Paine
Self-Sovereign Identity, as a standalone phrase or as an acronym (SSI), is a very confusing, overloaded, ambiguous term whose use should be avoided in all situations[1]. In a conversation, a blog post, an article, or a standards document, it could mean any of the uncontracted terms in the following figure.
[1] The most recent example of SSI confusion is the Principles of SSI document published by the Sovrin Foundation (https://sovrin.org/principles-of-ssi/). The document makes no attempt to define SSI nor state what SSI is intended to be an acronym for. Principles of SSI has resulted in a lot of confudsion (https://hyperonomy.com/2018/12/18/definition-confuding/) in the decentralized identifier communities as different working groups try to apply the Principles in new domains without first discerning: a) precisely which definition/application of SSI should be used and b) the types or categories of principles being represented in the document. Without first having a clear and precise definition for (a), successfully achieving (b) is almost impossible.
Figure 1. SSI: Unconscious Contractions
The term Self-Sovereign Identity (or its acronym SSI) could refer to any or all of the uncontracted terms in the above figure – unless an author has taken great care to be clear and precise with respect to every occurrence/usage of the term and/or its acronym.
What is Self-Sovereign Identity (SSI)? …really
To understand, in plain English, what a Self-Sovereign Identity (SSI) is, one must first recognize that “Self-Sovereign” is an adjective applied to the noun “Identity”. The TDW Glossary derivation of Self- Sovereign Identity is depicted in the model below.
Figure 2. TDW Glossary: Digital Identity Neighborhood
Narration
Decentralized Identity is derived from (or is a specialization of) the term Digital Identity.
Self-Sovereign Identity, in turn, is derived from (or is a specialization of) the term Decentralized Identity.
In addition, Anonymous Self-Sovereign Identity and Non-anonymous Self-Sovereign Identity are derived from (or are a specialization of) the term Self-Sovereign Identity.
Key Definitions
Digital Identity
A Digital Identity aggregates:
A Digital Identifier, and
Associated Digital Identity Data.
Decentralized Identity
A Decentralized Identity is a Digital Identity that is Verifiable.
A Decentralized Identity is often persisted in a Verifiable Data Register.
Self-Sovereign Identity
A Self-Sovereign Identity is a Digital Identity whose Digital Identity Owner has the right to exclusively and permanently exert control over the usage of one or more associated Personal Digital Identifiers and, independently, the usage of any associated Personal Identity Data associated with each Personal Digital Identifier.
Because a Self-Sovereign Identity is a specialization of Decentralized Identity, a Self-Sovereign Identity is also Verifiable.
Digital Identity Owner
A Digital Identity Owner is an entity that may be held legally accountable. Digital Identity Owners includes Persons and Organizations but does not include Things. The actual legal accountability of an Identity Owner for any particular action depends on many contextual factors including the laws of the applicable jurisdiction, etc. [Sovrin Glossary]
Anonymous Self-Sovereign Identity
An Anonymous Self-Sovereign Identity is a Self-Sovereign Identity whose Personal Digital Identifier is associated with (or governed by) an Anonymous Digital Identifier Method.
Non-anonymous Self-Sovereign Identity
A Non-anonymous Self-Sovereign Identity is a Self-Sovereign Identity whose Personal Digital Identifier is associated with (or governed by) a Non-anonymous Digital Identifier Method.
Personal Digital Identifiers
A Personal Digital Identifiers is a Digital Identifier associated with a Person as the Subject of the identifier.
Personal Digital Data
Personal Digital Data is Digital Identity Data associated with a Personal Digital Identifier; and hence, a Person as the subject of the identifier.
Anonymous Digital Identifier Method
An Anonymous Digital Identifier Method is a Digital Identifier Method designed to guarantee anonymity and privacy for the Subject of a conforming Digital Identifier.
Non-anonymous Digital Identifier Method
A Non-anonymous Digital Identifier Method is a Digital Identifier Method that does not guarantee anonymity nor privacy for the Subject of a conforming Digital Identifier.
Self-Sovereign Identity Model (SSI Model)
The next most commonly (and generically) used term is Self-Sovereign Identity Model (SSI Model).
The Self-Sovereign Identity Model (SSI Model) is an identity system architecture based on the core principle that Identity Owners have the right to permanently exert control over the usage of one or more of their Personal Digital Identifiers and, independently, the usage of any associated Personal Identity Data. [inspired by the Sovrin Glossary]
PLEASE POST A COMMENT ABOUT WHY THIS PAGE IS IMPORTANT TO YOU. This particular page is 1 of my top 5 most viewed pages (ever) and I’d like to understand why. Thank you!
Ahead of schedule, the first trusted web page was delivered today on the Trusted Digital Web – end-to-end – from a Trusted Digital Web – Data Registry service to a Trusted Digital Assistant client application – using didttp: (DID Trusted Transport Protocol).
The Trusted Digital Web Communication Protocols (include ddttp:) are described in Appendix E of the Trusted Digital Web: Whitepaper.
NOTE: The Trusted Digital Web is built on top of and relies on trusted, everyday Internet protocols, services, and specifications such as DNS (Domain Name Service). If you’re unfamiliar with DNS at a technical level, checkout DNS (Domain Name Service): A Detailed, High-level Overview.
For a deeper understanding of Universal Digital Identifiers, Universal Digital Identities, and the Trusted Digital Web, checkout the Trusted Digital Web: Whitepaper.
Universal Digital Identifiers and Universal Digital Identities have varying, discernible Trust Levels, and
Data Notarization
For a deeper understanding of Universal Digital Identifiers, Universal Digital Identities, and the Trusted Digital Web, checkout the Trusted Digital Web: Whitepaper.
Version 0.52 – minor revisions, new definitions for Workflow and Business Process
Version 0.56 – new definitions: Levels of Universal Trust, Controllers (including Self-Controller), added XML Notepad as an additional open source project
Version 0.57 – new definitions: Trust Levels, Data Registry, and Data Notary.
Version 0.58 – new definitions: DID Credential and DID Document
Version 0.60 – new Appendix E – Trusted Digital Web Communication Protocols (including the addition of didttp: (DID Trusted Transport Protocol))
Version 0.61 – clarification of didttp: (DID Trusted Transport Protocol) wire format
Version 0.62 – clarification of the didttp: Data Registry
Version 0.63 – addition of didttps: (Secure DID Trusted Transport Protocol)
Version 0.64 – clarification/correction: A (minimal) Credential has a Claim named id
Version 0.66 – minor updates and reorganization of the glossaries
[Original Title: Technology Adoption Models: A Comprehensive Guide]
This article documents more than 20 technology adoption models that the author has encountered over his 45+ year career …some models that he didn’t even realize he knew about ;-). Here they there are, in no particular order.
NOTE: Each model progresses from left-to-right along an unspecified timeline. The implication is that it is possible to superimpose two or more models on top of each other for deeper understanding and for creating more tangible, more illustrative, depictions of your corporate, product, and project strategies.
An example is: Model 10. Technology Adoption Lifecycle illuminated by the Gartner Hype Cycle.
Technology Adoption Models
NOTE: Click on any of the figures to enlarge them.
Model 1. Crossing the Chasm: Technology Adoption Lifecycle
Model 2a. Social Evolution: Creation of Nation State
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; to later form a party of explorers to explore and conquer a common set of goals; and, even further on, create a clan, a band, a tribe, and a tribal society, a group of people who live and work together – a group of tribes organized around kinships.
Model 2b. Social Evolution: Defining Principles
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; to later form a party of explorers to explore and conquer a common set of goals; and, even further on, create a clan, a band, a tribe, and a tribal society, a group of people who live and work together – a group of tribes organized around kinships.
Model 2c. Social Evolution: Self-Sovereignty Political Spectrum
Model 2d. Social Evolution: Driving Change (ADKAR)
Model 3. Phases of Foundational Technology Adoption
Model 4. Phases of Desire and Action
Model 5. Phases of Understanding
Model 6. Classic Enterprise Solution Sales and Adoption Lifecycle
Model 7. ICRVA (I CRaVe A) Process
Model 8. Three-letter Words
Model 9. Gartner Hype Cycle
Model 10. Technology Adoption Lifecycle illuminated by the Gartner Hype Cycle
Model 11. World Wide Web Consortium (W3C): Tenth Anniversary
Model 12. Systems Co-existence and Migration
Model 13. Embrace, Extend, and Extinguish
Model 14. Take-off Velocity (v2)
Model 15. From Mainframe to Blockchain
Model 16. Progressive Improvement through Continuous Transformation
Model 17. Liedtka-Ogilvie Design Thinking ModelModel 18. CB-Insights NExTT Framework
Model 19. O’Donnell Exponential Growth Model
Model 20. O’Donnell-Gartner Exponential Hype Cycle
Model 21. Technical Intensity (video)
Model 22. Technology Adoption Curve plus Social Evolution Model
Model 23: Overton Window
Model 24: Overton Window and Technology Adoption Lifecycle
Model 25: The Technology Adoption Lifecycle and ADKAR
Model 26: Overton Window: Treviño’s 6 Degrees of Acceptance vs. ADKAR