Posts

Showing posts with the label trust

The radical shift from profit motivated greed to purpose driven awareness and the impact on the 4 P's in a marketing mix!

Image
Tony Fish @My Digital Footprint When we were chatting about a collaborative digital business model, my nephew Chris challenged me with this statement “ I can't understand what the consumer gets for helping others though! ” I had just shared with him a business that raised $10m which allows people to help people for free.  I was rather hoping that his digital youthfulness was about to surprise me and provide me with a deep native understanding of being-digital and offer me some insights to the future; but his mind has already been corrupted by out of date, but classical business/ marketing, education. As we continued to debate digital first as I structured out an update to classical marketing, as is set out below. There is an awful lot written and taught about the traditional 1960’s marketing mix tool which is commonly known as the 4, 5, 6, 7 and even 8 P’s of marketing. A quick read of Wikipedia gives all the basics.  A re-write that never really caught on in the 1990s was

Why do you think deleting an account reduces your digital footprint?

Image
Somewhere out there, there is a copy of your data.  Once created and you have shared it  publicly  it will be there - somewhere outside of your control.  Just because you have removed it from your places, it doesn't mean that it has been removed from everywhere….. The only  truly  private place is what happens in your mind and never shared. Everything else is based on trust.

Book: Trust is a Choice

Image
Source: http://www.stephaniekrawinkler.com/book-trust-choice/ Amazon link and   Extract Trust is a universal but culture-bound phenomenon and a critical success factor in corporate life. The author provides a compilation of anthropological theoretical threads on trust. She conducted a long-time ethnography of a company and describes what trust is, how it is established and maintained in this particular organization, and addresses the question whether it can be regained when lost. This elaborated case proves that the anthropological methods can be helpful in researching this abstract topic. An additional chapter outlines and further discusses the used research methods. This book is for students, scholars, and for managers of companies that are interested in trust theory and research as well as business anthropology. Dr. Stephanie A. Krawinkler, is a social and cultural anthropologist, author, and lecturer at the University of Vienna. She has been conducting busin

Segmentation model based on data

Image
Source for new thinking: http://blogs.hbr.org/cs/2013/06/a_new_framework_for_customer_s.html It started with… " You know, I don't think I believe in segmentation anymore." She said it fast and softly, almost in hope that the sounds around us would make it inaudible. But we did hear it, and responded, "Well, we don't either." From observing … " we were finding an increasing disconnect between telling people about segmentation, targeting and positioning on the one hand, and about the increasing shift of control from brands to consumers, on the other " HBR presents a new kind of segmentation based the combinations of jobs that customers need to get done.  Think Ted Levitt's famous comment about selling ¼ inch holes rather than ¼ inch electric drills. They provide this outline…. Step #1: Identify the contexts in which customers are using the company's products. Step #2: Combine information about transactions and cust

Who has your Back and is protecting your data?

Image
Electronic Freedom Foundation (EFF)   has recently released   a new report   about which companies protect their users' digital data/ identities. Download the complete   Who Has Your Back? 2013   report as   a PDF from here. Executive Summary When you use the Internet, you entrust your conversations, thoughts, experiences, locations, photos, and more to companies like Google, AT&T and Facebook. But what do these companies do when the government demands your private information? Do they stand with you? Do they let you know what’s going on? In this annual report, the Electronic Frontier Foundation examined the policies of major Internet companies — including ISPs, email providers, cloud storage providers, location-based services, blogging platforms, and social networking sites — to assess whether they publicly commit to standing with users when the government seeks access to user data. The purpose of this report is to incentivize companies to be transparent about how da

Harm and how much you and your data is worth?

Image
    Overall if you read this lot – your data (digital footprint) remains as relatively worthless … whilst the inconvenience, annoyance and frustration of losing you data or identity is not added as a cost item. Real harm, as measured in financial terms is low as all wider impacts are ignored, such as time wasted on the phone, unintended consequences, the cost of rectification, unable to get pictures or content back.... etc How much are you worth to a cyber-criminal? How Much Your Stolen Data Is Worth to Scammers How Much Are You Worth To Mark Zuckerberg? The plummeting price of stolen personal data How much are you worth to Google? How Much is Your Data Worth? How much is your online data worth? How much is your data worth? Why Your Identity Is Worth $5,000  How much is your personal identity worth? Your ID Price Tag: The Cost of a Stolen Identity    

Algorithms - is anyone in control?

Image
  Image source: globalimaging.com/images/modis-atmos.jpg     I have written nearly 30 posts about Algorithms as they are the foundation of your computing interactions and you are influenced by them. The data that you leave (willingly or not), is your digital footprint and is the basis of what an algorithm knows about you and how you can be modelled to a known data set. Data about you generated by others helps refine and confirm how well I have been able to model you and your preferences. An algorithm is, according to Wikipedia, is a step-by-step procedure for calculations. Algorithms are used for  calculation ,  data processing , and  automated reasoning .   A starting point is Dan Ariely’s work, ( Truth , Predictably Irrational , Behaviour , Desire Engines ) – from this direction you will conclude that we are creatures of habit and habits can be modelled and coded into an algorithm.  Therefore you are not as irrational as you think and it is possible with a degree of probability to

The Truth About Dishonesty - distance between digital and reality

Are you more honest than a banker? Under what circumstances would you lie, or cheat, and what effect does your deception have on society at large? Dan Ariely, one of the world's leading voices on human motivation and behaviour is the latest big thinker to get the RSA Animate treatment.  Taken from a lecture given at the RSA in July 2012 . Watch the longer talk here 

Why there shouldn't be a single version of the truth...@chuckhollis

Image
Source : http://chucksblog.emc.com/chucks_blog/2012/12/why-there-shouldnt-be-a-single-version-of-the-truth.html An interesting post from a long line of good posts from Chuck – and it hits home about leadership, management, learning and creation.  However, most companies are discovering that they need both old and new methods at the same time as old supports the cow (efficiency and effectiveness drivers) and new the stars (agile, flexible, bets efforts) . The bottom line is that CEO’s need new skills in how to manage both at the same time.

Why there shouldn't be a single version of the truth...@chuckhollis

Image
Source : http://chucksblog.emc.com/chucks_blog/2012/12/why-there-shouldnt-be-a-single-version-of-the-truth.html An interesting post from a long line of good posts from Chuck – and it hits home about leadership, management, learning and creation. However, most companies are discovering that they need both old and new methods at the same time as old supports the cow (efficiency and effectiveness drivers) and new the stars (agile, flexible, bets efforts) . The bottom line is that CEO’s need new skills in how to manage both at the same time.

more data about us and what does it tell us about ourselves?

Who hasn’t sent a text message saying “I’m on my way” when it wasn’t true or fudged the truth a touch in their online dating profile? But Jeff Hancock doesn’t believe that the anonymity of the internet encourages dishonesty. In fact, he says the searchability and permanence of information online may even keep us honest. Jeff Hancock studies how we interact by email, text message and social media blips, seeking to understand how technology mediates communication.

Rachel Botsman: The currency of the new economy is trust #TED @rachelbotsman

Why watch this one – is it all about your digital footprint Rachel Botsman is the co-author, with Roo Rogers, of the book  What's Mine Is Yours: The Rise of Collaborative Consumption , and she writes, consults and speaks on the power of collaboration and sharing through network technologies, and on how it will transform business, consumerism and the way we live. Her new work focuses on trust and reputation capital. She is the founder of  The Collaborative Lab , an innovation incubator that works with startups, big businesses and local governments to deliver innovative solutions based on the ideas of Collaborative Consumption. She has consulted to Fortune 500 companies and leading nonprofit organizations around the world on brand and innovation strategy, and was a former director at the  William J. Clinton Foundation . Botsman expands on her 2012 TEDTalk in  this article for Wired UK 

Why would anyone trust a brand with their data! @clickfox

Image
Source : ClickFox Consumer Data Audit survey on consumer’s preferences around data management, and which organizations are handling this new market opportunity with the best of care. The survey suggests that consumers are willing to give up personal information to trusted brands if it will help them improve their shopping experience or get a better deal. The majority of customers (over 80 percent) expect their companies to know their previous retail experience, service and purchase history. Those who are in financial services, followed by healthcare and government, earned the most trust in dealing with consumer’s personal data. The retail industry receives poor marks for consumer trust due to wary data use among retailers. And it turns out Google, Amazon, and Apple were revealed as the most trustworthy organizations overall.  Hum.... is there a correlation between levels of regulation and trust? The data indicates that consumers’ acceptance on location-based marketing and

Can you trust anyone ?

Image
source: http://www.clickfox.com/insights/consumer-surveys/privacy-and-knowledge-gaps-survey/

re-identification: the fatal flaw that means it is not quite as it seams

Image
The Re identification.pdf Download this file Daniel Barth-Jones has a critique of re-identification studies that informs the conversation about risks: In a recent Health Affairs blog article, he provided a critical re-examination of the famous re-identification of Massachusetts Governor William Weld’s health information. This famous re-identification attack was popularized by recently appointed FTC Senior Privacy Adviser, Paul Ohm, in his 2010 paper “Broken Promises of Privacy”. Ohm’s paper provides a gripping account of Latanya Sweeney’s famous re-identification of Weld’s health insurance data using a Cambridge, MA voter list. The Weld attack has been frequently cited echoing Ohm’s claim that computer scientists can purportedly identify individuals within de-identified data with “astonishing ease.” However, the voter list supposedly used to “re-identify” Weld contained only 54,000 residents and Cambridge demographics at the time of the re-identification attempt show that

Identity Trust Matrix - put a scale on Risk. Source @pferdy

Image
Leonard Anderson blog is here http://lenand.wordpress.com/2012/06/12/7dig-identity-trust-matrix/ I like the thinking and started to consider what a practical scale of 1 to 10 would look like from a user’s perspective 1. No trust needed 2. unknown agents 3. Social trust 6 degrees 4. Social trust FOF (Friends of Friends) 5. Certification (paper documents) 6. Access privilege 7. Social Trust F&F (Friends and Family) 8. Closed friends 9. Banking Infrastructure 10. MOD, secret service

WEF report on Peronsal Data and a personal opinion

Image
Source/ Download : http://www3.weforum.org/docs/WEF_IT_RethinkingPersonalData_Report_2012.pdf Personal opinion It is a good report and worth reading, however I feel that the missing part is that of managing “expectations.”  What I mean by this is when you sit back and ask yourself how you want your data treated and marry that to how an organisation asks you to treat customer data we find there are conflicts and each person sitting round the table has a different expectation both of what they want and what they expect. I believe that personal data and what we can do with it is defined by our propensity to take or manage risk based on expectation. Our frustration is that those with lower risk have higher authority and that limits our own personal reach, scope, creativity and aspiration and our annoyance is created by those with a higher risk propensity and a-can-do attitude that want to take us beyond our own boundaries of expectation.  I would have loved for the report to address th

Does Identity define the edge of your network?

Image
Assuming that “Identity,Trust and Privacy” fade [by fade I mean hard boundary (technical, permission, certificate) and soft boundary (time, relevance, reach)], is it useful to consider that your network [by which I mean consider the network in the widest possible sense: physical, six degrees, payment, access, codes, influence, reach, recommendation, LogIn, ID, FoF] edges should be defined by a propensity to risk. The lower risk desired the closer you need to be to the source. Is our frustration that those with the lowest risk have the highest authority and that I cannot enable my risk profile across my services?

Privacy, Identity and personal data are the new politics, religion andsex of after dinner fall outs

Image
Ask a group of friends to define any of the following words:- private, privacy, trust, sharing, personal data, data, rights or context and whilst you may start the evening as friends; you may well end the evening questioning ideologies.  Privacy, Identity and personal data have become the new politics, religion and sex conversation topics that we should not discuss. But why? My personal view is that, just like politics, religion and sex, we all start from different points (knowledge and mood today), with varying expectations (outcomes) and personal experiences (crosses to bare).  This opinion piece is about the different starting points and not expectations or personal experience; as we get to read about expectations from daily FUD (Fear, Uncertainty and Doubt) articles that form fabulous NEWS headlines, and personal experiences as well, they’re personal. This opinion is not trying to convert or sway anyone from their trusted viewpoint; the purpose is to present a framework that

Trust Frameworks - what is needed is trust.

Image
If a trust framework for an digital identity systems is a “certification” program that enables a party who accepts a digital identity credential (relying party) to trust the identity, security, and privacy policies of the party who issues the credential (identity provider) and vice versa. Then the purpose of the Trust Framework is to define a simple set of principles and rules to which all members of a digital trust network agree so that they may then share identity and personal data with a high degree of confidence that it will be safe and only used as authorized. Using the Five Principles of the Respect Trust Framework from http://connect.me/c/trust member should be able to agree to uphold these 5 principles when they use services: Promise Members promise to respect the right of every other member to control their identity and personal data. Permission Members agree that all sharing of identity and personal data and sending of communications will be by permission,