thinkingfunctionally.org Open in urlscan Pro
5.100.156.27  Public Scan

URL: https://thinkingfunctionally.org/
Submission: On May 12 via api from BE — Scanned from GB

Form analysis 2 forms found in the DOM

GET https://thinkingfunctionally.org/

<form role="search" class="searchform fusion-search-form  fusion-search-form-clean" method="get" action="https://thinkingfunctionally.org/">
  <div class="fusion-search-form-content">
    <div class="fusion-search-field search-field">
      <label><span class="screen-reader-text">Search for:</span>
        <input type="search" value="" name="s" class="s" placeholder="Search..." required="" aria-required="true" aria-label="Search...">
      </label>
    </div>
    <div class="fusion-search-button search-button">
      <input type="submit" class="fusion-search-submit searchsubmit" aria-label="Search" value="">
    </div>
  </div>
</form>

GET https://thinkingfunctionally.org/

<form role="search" class="searchform fusion-search-form  fusion-search-form-clean" method="get" action="https://thinkingfunctionally.org/">
  <div class="fusion-search-form-content">
    <div class="fusion-search-field search-field">
      <label><span class="screen-reader-text">Search for:</span>
        <input type="search" value="" name="s" class="s" placeholder="Search..." required="" aria-required="true" aria-label="Search...">
      </label>
    </div>
    <div class="fusion-search-button search-button">
      <input type="submit" class="fusion-search-submit searchsubmit" aria-label="Search" value="">
    </div>
  </div>
</form>

Text Content

Skip to content
Search for:


 * Home
 * Functional Identity
 * Functional Privacy
 * Discussion
 * 

Go to...

 * Home
 * Functional Identity
 * Functional Privacy
 * Discussion


Search for:



HomeLauren Smith2024-05-11T19:31:58+00:00


THINKING FUNCTIONALLY

HOW DOES IT WORK? HOW DO WE USE IT?

These questions form the heart of Thinking Functionally, a lightweight approach
to thinking through hard problems.

This approach came out of work in the user-centric identity community (IIW,
RWOT) where we realized different people have different ways to think about
identity. In fact, many people use the term “identity” to mean different things,
often talking past each other. https://bit.ly/FiveMentalModels

We believe that the differences in language cause apparent conflicts that can be
resolved by focusing on the functionality of the topic at hand.

FUNCTIONAL IDENTITY

For identity, we asked “How does identity work?” and “How do we use identity?”,
leading to  defining Functional Identity as: how we recognize, remember, and
respond to specific people and things, including ourselves.

FUNCTIONAL PRIVACY

For privacy, we asked “How does privacy work?” and “How do we use privacy?”,
leading to defining Functional Privacy as: alignment of expectations about how
an individual is recognized, remembered, and responded to.

JOIN THE CONVERSATION

If you share our sense that these functional approaches can help us fix some of
what’s wrong with current information systems, please join our discussion list
and help advance the work.

This website is provided by Legendary Requirements, a boutique consulting firm
focused on engineering requirements for decentralized systems.

Privacy Policy






Copyright 2024 by Legendary Requirements
FacebookXInstagramPinterest
Page load link

Go to Top