Posts

Showing posts from April, 2012

Eurobarometer: Attitudes on Data Protection and Identity

Image
monster of a report http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf EXECUTIVE SUMMARY This report presents the results of the largest survey ever conducted regarding citizen’s behaviours and attitudes concerning identity management, data protection and privacy. It represents the attitudes and behaviours of Europeans on this subject. The main findings of the survey are the following:   74% of the Europeans see disclosing personal information as an increasing part of modern life.   Information considered as personal is, above all, financial information (75%), medical information (74%), and national identity numbers or cards and passports (73%).    Social networking and sharing sites users are more likely to disclose their name (79%), photo (51%) and nationality (47%). Online shoppers’  actual online disclosure of personal information mainly involves their names (90%), home addresses (89%), and mobile numbers (46%).   The most important reason for

How much data do you need to identify someone?

Image
  The level of identification can move from the simple to the complex, but where is the proof that the more complex is needed for all services?

Speaking on Personal Data: Life Management Platforms with @docsearls @drummondreed @windley @scottldavid #eic12

Image
Looking forward to http://www.id-conf.com/eic2012  this week and discussing/ debating with Doc Searls , Berkman Center for Internet and Society at Harvard University Drummond Reed , Connect.Me Marcel van Galen , Qiy Scott David , K&L Gates LLP Prof. Dr. Kevin Cox , Edentiti Tony Fish , My Digital Footprint On the Life Management Platforms track, specifically “ Giving Individuals Control and Knowledge of their Personal Information held by Others - What are the Consequences? ”

I will be at London Telco-OTT & Future of Voice workshops April 26-27 with @disruptivedean @martingeddes

Image
London Telco-OTT & Future of Voice workshops April 26-27 The first day is Future of Voice (more details from Martin can be found here .)  Day 2 is a  workshop specifically on Telco-OTT services.   There's a lot of rhetoric about how operators should "deal with OTT", but Dean is the only person to publish and speak specifically about how operators can and should become OTT players themselves Dean’s recent report   where he examines more than 100 different telco Internet-based offers, spanning a wide variety of service segments, and have advised operators around the world on opportunities and risks.  The cost per delegate is £700 for one day, or £1000 for both days, plus 20% UK VAT. Registration http://www.amiando.com/FoV5.html   Future of Voice Day 1 (April 26th) is an evolution of our previous workshop format on the evolution of telephony, voice services, new communications business models and hot topics around personal connectivity and interaction. It spans everyt

my analysis on why Facebook spent $1bn on Instagram....

Image

Pew Internet Life project produced a report that found that people are getting more privacy-savvy on social networks.

Image
Pew Internet Life project produced a report that found that people are getting more privacy-savvy on social networks . Source: ZoneAlarm has digested this information into ….

How Do Social Login and Sharing Affect Ecommerce?

Image
Source: http://monetate.com/

if you are the product becasue someone else is paying, what do you call the others who you are buying a meal for?

Image
Looking back at my powerpoint I know that I have widely used the phrase “we are the product” for many years and like many I am not sure where it came from, where I first heard it or in what context, but it hits home about a truth; customers tends to refer to the one paying! I am never sure what we should call the others at the table when we are enjoying a meal which I am paying for, however, Jonathan Zittan posted about the quote “ When something online is free, you’re not the customer, you’re the product.” which Kevin Marks did some more digging on here and the conclusion is that its source is unclear, but the TV (advertising/ marketing) world has understood the implications of who is paying for the longest time. As technology companies and engineers discovers loyalty, intention, attention, reputation, influence, desire, behavioural economics, and indeed an industry called Marketing and Advertising and that same industry sees tech companies have the data they always wanted, we ar

Desire Engines: beyond reinforcing behaviour to create habits via @nireyal

Image
Article and Image Source : http://www.nirandfar.com/2012/03/how-to-manufacture-desire.html Desire engines, as explained by Nir Eyal  go beyond reinforcing behaviour to creating habits, spurring users to act on their own, without the need for expensive external stimuli like advertising. Think Social media, online games, and email and any habit-forming technologies. At the heart of a “desire engine” is a powerful cognitive quirk described by B.F. Skinner in the 1950s, called a variable schedule of rewards or the earlier in the Pavlov Dog experiments . Skinner observed that lab mice responded most voraciously to random rewards. The mice would press a lever and sometimes they’d get a small treat, other times a large treat, and other times nothing at all. Unlike the mice that received the same treat every time, the mice that received variable rewards seemed to press the lever compulsively. We (like it or not), like the mice in Skinner’s box, crave predictability and struggle to find

Teens, Smartphones & Texting @Amanda_ Lenhart

Image
Full report on Pew Internet by Amanda Lenhart Overview o Teens are fervent communicators. Straddling childhood and adulthood, they communicate frequently with a variety of important people in their lives: friends and peers, parents, teachers, coaches, bosses, and a myriad of other adults and institutions. This report examines the tools teens use to communicate, with a particular focus on mobile devices, and then places the use of those tools in the broader context of how teens choose to communicate with people in their lives. o The volume of texting among teens has risen from 50 texts a day in 2009 to 60 texts for the median teen text user. In addition, smartphones are gaining teenage users. Some 23% of all those ages 12-17 say they have a smartphone and ownership is highest among older teens: 31% of those ages 14-17 have a smartphone, compared with just 8% of youth ages 12-13. About the Survey o The 2011 Teens and Digital Citizenship Survey sponsored by the Pew Rese

Reflections on Fear in a Networked Society @zephoria

Before you watch the video - read this very short blog as it set the context for me, it explores new vocie and motion technologys and possible reactions.   Basic assumptions from dana boyd (for this talk) We live in a culture of fear The attention economy provide fertile ground for culture of fear Social media is amping up the attention economy Source : http://www.zephoria.org/thoughts/archives/2012/03/26/reflections-on-fear-in-a-networked-society.html Implications:  we are all different and some of us, based on our perception/ experience of fear and risk, believe that:- ·          the old times were better and change is bad   ·          the times coming will be better and lets change as quick as we can ·          accept it, stop looking for excuses and learn to cope with today.     [vimeo http://www.vimeo.com/38139635 w=400&h=300]

A-list of data scientists @GilPress

Image
Full list is here via Gil Press : - http://alist.traackr.com/datascience  

The Effects of Data Breach Litigation - paper from the US

"Empirical Analysis of Data Breach Litigation," Sasha Romanosky Carnegie Mellon University - Heinz College of Information Systems and Public Policy David A. Hoffman Temple University - James E. Beasley School of Law; Cultural Cognition Project at Yale Law School Alessandro Acquisti Carnegie Mellon University - H. John Heinz III School of Public Policy and Management Source : http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461 Abstract: In recent years, a large number of data breaches have resulted in lawsuits in which individuals seek redress for alleged harm resulting from an organization losing or compromising their personal information. Currently, however, very little is known about those lawsuits. Which types of breaches are litigated, which are not? Which lawsuits settle, or are dismissed? Using a unique database of manually-collected lawsuits from PACER, we analyze the court dockets of over 230 federal data breach lawsuits from 2000 to 2010. We use binary outcom

The Effects of Data Breach Litigation - paper from the US

SSRN-id1986461.pdf " Empirical Analysis of Data Breach Litigation," Sasha Romanosky Carnegie Mellon University - Heinz College of Information Systems and Public Policy David A. Hoffman Temple University - James E. Beasley School of Law; Cultural Cognition Project at Yale Law School  Alessandro Acquisti Carnegie Mellon University - H. John Heinz III School of Public Policy and Management Source : http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461 Abstract: In recent years, a large number of data breaches have resulted in lawsuits in which individuals seek redress for alleged harm resulting from an organization losing or compromising their personal information. Currently, however, very little is known about those lawsuits. Which types of breaches are litigated, which are not? Which lawsuits settle, or are dismissed? Using a unique database of manually-collected lawsuits from PACER, we analyze the court dockets of over 230 federal data breach lawsuits f

The Effects of Data Breach Litigation - paper from the US

SSRN-id1986461.pdf " Empirical Analysis of Data Breach Litigation," Sasha Romanosky Carnegie Mellon University - Heinz College of Information Systems and Public Policy David A. Hoffman Temple University - James E. Beasley School of Law; Cultural Cognition Project at Yale Law School  Alessandro Acquisti Carnegie Mellon University - H. John Heinz III School of Public Policy and Management Source : http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461 Abstract: In recent years, a large number of data breaches have resulted in lawsuits in which individuals seek redress for alleged harm resulting from an organization losing or compromising their personal information. Currently, however, very little is known about those lawsuits. Which types of breaches are litigated, which are not? Which lawsuits settle, or are dismissed? Using a unique database of manually-collected lawsuits from PACER, we analyze the court dockets of over 230 federal data breach lawsuits f

The Effects of Data Breach Litigation - paper from the US

SSRN-id1986461.pdf " Empirical Analysis of Data Breach Litigation," Sasha Romanosky Carnegie Mellon University - Heinz College of Information Systems and Public Policy David A. Hoffman Temple University - James E. Beasley School of Law; Cultural Cognition Project at Yale Law School  Alessandro Acquisti Carnegie Mellon University - H. John Heinz III School of Public Policy and Management Source : http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461 Abstract: In recent years, a large number of data breaches have resulted in lawsuits in which individuals seek redress for alleged harm resulting from an organization losing or compromising their personal information. Currently, however, very little is known about those lawsuits. Which types of breaches are litigated, which are not? Which lawsuits settle, or are dismissed? Using a unique database of manually-collected lawsuits from PACER, we analyze the court dockets of over 230 federal data breach lawsuits f

@byoogle raises Funding To Stop Google, Facebook & More From Tracking Your Data

Image
Source … TechCrunch : Disconnect: Ex-Googlers Raise Funding To Stop Google, Facebook & More From Tracking Your Data Google engineer Brian Kennish in October 2010, created Facebook Disconnect which I downloaded not long after, a Chrome extension that disables all traffic from third-party sites to Facebook servers but still allows you to access Facebook itself. The extension racked up 50K active users in two weeks prompting Kennish to leave his job at Google to focus full-time on helping the average web user take back control of their data. https://disconnect.me/ is now attracting over 400K weekly active users with a "Mission Statement": “Personal data should belong to people, not corporations.”  And taken on $600,000 from Highland Capital Partners with the participation of Charles River Ventures and angel investors; David Cancel, Mark Jacobstein, Ramesh Haridas, Vikas Taneja, Chris Hobbs, and Andy Toebben.

Voice and motion Control - who owns the command and can they sell your blueprint?

Image
Voice/ motion control is heating up again, Samsung’s Smart interaction, Nuance (Vlingo- assuming acquisition completes), Novauris, Microsoft, Apple and Google all have initiatives designed to bring all of the goodies enabled from the connection of the TV to the internet and a second screen; under the control of a combination of voice made announcement and movement. However original ideas such as this patent , issued to Panasonic (Matsushita) in 2006, describes a voice controlled “Home Agent Server” for taking command of household appliances. It references prior filings from Nokia, LG and ultimately AT&T, dating back to 2003.  The area is complex and thick of innovation, however with voice and motion control - who owns the command and how will it affect your privacy?  Where does the data get stored, does it (the system) learn uniqueness of expression and how will it become personalised.  Will learnt profile data, like facial recognition, become yours, that you can use or will it

Report: The Rise of Digital Influence and How to Measure It by @briansolis #altimeter

Image
The Rise of Digital Influence from Altimeter by Brian Solis The potential for influence is unknown but gut says big.  Klout, PeerIndex among many others want to measure who you know, what you say, and what you do, and attempt to score or rank your ability to influence those to whom you’re connected.   Social network users are being influence by these scores and are now starting to think how they connect and communicate to improve their stature within each network (reverse gamification). On the other side of the equation Brands are taking notice as these services also help identify individuals who are both connected and relevant to help expand reach into new media and markets. Here is another report on the same topic and worth reading as it takes all views are building insights theriseofdigitalinfluence-120320132857-phpapp02.pdf Download this file

Study on monetising privacy. An economic model for pricing personal information

Image
Source/ download : http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/monetising-privacy An economic model for pricing personal information manel.medina@enisa.europa.eu ENISA, Template 11.9999 Normal 0 false false false MicrosoftInternetExplorer4 The value of data privacy is about 65 cents, according to a study (February 2012) “ Study on Monetising Privacy: An Economic Model for Pricing Personal Information ” by researchers from DIW Berlin, the German Institute for Economic Research, and the University of Cambridge in the UK. The study was sponsored and released by ENISA, the European Network and Information Sharing Agency. The study analyzes the monetisation of privacy, or a consumer's decision of disclosure or non-disclosure of personal data in relation to a purchase transaction. The researchers investigated whether or not customers of online services would pay a mark-up to an online service provider who protected their information better?

How much is your data worth? @Backupify

Image
Backupify.com has presented this attempt at the “how much is your data worth” calculation. Their approach is dividing total company revenue by the amount of pieces of content.  Whilst we can easily take a swipe at the specific metrics, it is another way to look at these nine social media sites and what they are worth.  

guide to creating Persona

Image

visualising the "petabyte" and putting data into perspective

Image

The "sharing" Avalanche

Image

@unboundID - congratulation on $12.5 funding for building out youridentity service

Image
Source: http://www.unboundid.com/blog/2012/03/29/powering-the-identity-economy-now-with-series-b-funding/ Congratulation to UnboundID has received $12.5M in Series B funding fr om  OpenView Venture Partners .