Posts

Scotland unveils privacy principles - from Kable

Image
Scotland unveils privacy principles The Scottish Government has published new guidance on achieving privacy-friendly public services http://www.kable.co.uk/scotland-unveils-privacy-principles-24dec10 The five principles should encourage good practice and ensure personal data is always handled with respect, said the Scottish Government. They have been devised by an expert group - including the Assistant Information Commissioner for Scotland and Registrar General - and subject to full public consultation. They involve: -           proving identity or entitlement - people should not be asked to prove who they are unless it is necessary. Public bodies should ask for as little information as possible, identifying themselves and offering alternative ways to provide identity and/or entitlement for a service; -           governance and accountability - public service organisations should adopt privacy and security policies and procedures; -           risk management - organisations s

Creating the virtuous circle

Image
Extract from “My Digital Footprint”, this is from the Chapter 6  “A two sided business model"   Be under no illusion that this (creating a virtuous circle) is either simple or easy. Mark Zuckerberg, the founder of Facebook, said when commenting on Beacon: “We’ve made a lot of mistakes building this feature, but we’ve made even more with how we’ve handled them. We simply did a bad job with this release, and I apologise for it.” This was in response to the 70,000 users on Facebook responding to Facebook’s new Ad and Beacon features in December 2007. The Facebook Ad followed a well-trodden path of purchase goods, PIN codes, getting free extras online. Fun and not a big fuss, Beacon, however, was different. Beacon would look at what you do and as such has deep roots in behavioural marketing based on targeting (open loop); however, it took your data and told your friends what you had done, really without any due care or thought. If you looked at someone’s profile, it told y

Digital footprint: inputs and outputs

Image
Normal 0 false false false MicrosoftInternetExplorer4 Extract from “My Digital Footprint”, this is from the Chapter 6, "A two sided business model"   Having studied the left-hand side of Figure 28, let’s now consider the digital footprint (right-hand side) of that diagram. We study digital footprints from two perspectives: the feedback loop and mobile. We do this by studying the inputs and outputs of MY DIGITAL FOOTPRINT . We have introduced the concept of inputs and outputs for MY DIGITAL FOOTPRINT   and we recap them here: the inputs to MY DIGITAL FOOTPRINT   are the data elements and the outputs are the value derived from the process which is in turn enhanced by the feedback loop. It is worth noting that attention (input) and reputation (output) are often called the ‘currencies of the web’. Economic value is created from these two from the ability to trade and barter (output). Given that time is scarce, attention is scarce.   Inputs into MY DIGITAL FOO

Extract from “My Digital Footprint”, this is from the Chapter 5 “Web 2.0 and Mobile Web 2.0”

Image
Mobile Web 2.0 – value lies in getting data out from a device   We have discussed Mobile Web 2.0 and Web 2.0 extensively above. We have seen that Web 2.0 could be viewed as harnessing collective intelligence and, by extension, Mobile Web 2.0 could be viewed as harnessing collective intelligence from mobile devices. This is depicted in Figure 15. Figure 15 Moving focus to getting more data off a device than on to it The ability to get data out of or off a mobile device lends itself to the unique advantage a mobile device has. We explore this idea in greater detail in subsequent chapters. Considering this concept, that there is more value in getting data off a mobile, let’s consider that sensors (acceleration, temperature, noise level) can easily be placed in or attached to mobiles. Further, a user can send information from their device, by voice, IM (Instant Message) or text, to a centralised service point. Both sensors and people can provide vital data during a disaster-relief operatio

Extract from “My Digital Footprint”, this is from the Chapter 5 “Web 2.0 and Mobile Web 2.0”

Image
Mobile Web 2.0 – value lies in getting data out from a device   We have discussed Mobile Web 2.0 and Web 2.0 extensively above. We have seen that Web 2.0 could be viewed as harnessing collective intelligence and, by extension, Mobile Web 2.0 could be viewed as harnessing collective intelligence from mobile devices. This is depicted in Figure 15. Figure 15 Moving focus to getting more data off a device than on to it The ability to get data out of or off a mobile device lends itself to the unique advantage a mobile device has. We explore this idea in greater detail in subsequent chapters. Considering this concept, that there is more value in getting data off a mobile, let’s consider that sensors (acceleration, temperature, noise level) can easily be placed in or attached to mobiles. Further, a user can send information from their device, by voice, IM (Instant Message) or text, to a centralised service point. Both sensors and people can provide vital data during a disaster-relief operatio

Extract from “My Digital Footprint”, this is from the Chapter 5 “Web 2.0 and Mobile Web 2.0”

Image
Mobile Web 2.0 – value lies in getting data out from a device   We have discussed Mobile Web 2.0 and Web 2.0 extensively above. We have seen that Web 2.0 could be viewed as harnessing collective intelligence and, by extension, Mobile Web 2.0 could be viewed as harnessing collective intelligence from mobile devices. This is depicted in Figure 15. Figure 15 Moving focus to getting more data off a device than on to it The ability to get data out of or off a mobile device lends itself to the unique advantage a mobile device has. We explore this idea in greater detail in subsequent chapters. Considering this concept, that there is more value in getting data off a mobile, let’s consider that sensors (acceleration, temperature, noise level) can easily be placed in or attached to mobiles. Further, a user can send information from their device, by voice, IM (Instant Message) or text, to a centralised service point. Both sensors and people can provide vital data during a disaster-relief operatio

Extract from “My Digital Footprint”, this is from the Chapter 5 “Web 2.0 and Mobile Web 2.0”

Image
Mobile Web 2.0 – value lies in getting data out from a device   We have discussed Mobile Web 2.0 and Web 2.0 extensively above. We have seen that Web 2.0 could be viewed as harnessing collective intelligence and, by extension, Mobile Web 2.0 could be viewed as harnessing collective intelligence from mobile devices. This is depicted in Figure 15. Figure 15 Moving focus to getting more data off a device than on to it The ability to get data out of or off a mobile device lends itself to the unique advantage a mobile device has. We explore this idea in greater detail in subsequent chapters. Considering this concept, that there is more value in getting data off a mobile, let’s consider that sensors (acceleration, temperature, noise level) can easily be placed in or attached to mobiles. Further, a user can send information from their device, by voice, IM (Instant Message) or text, to a centralised service point. Both sensors and people can provide vital data during a disaster-relief operatio