Posts

How Do Social Login and Sharing Affect Ecommerce?

Image
Source: http://monetate.com/

if you are the product becasue someone else is paying, what do you call the others who you are buying a meal for?

Image
Looking back at my powerpoint I know that I have widely used the phrase “we are the product” for many years and like many I am not sure where it came from, where I first heard it or in what context, but it hits home about a truth; customers tends to refer to the one paying! I am never sure what we should call the others at the table when we are enjoying a meal which I am paying for, however, Jonathan Zittan posted about the quote “ When something online is free, you’re not the customer, you’re the product.” which Kevin Marks did some more digging on here and the conclusion is that its source is unclear, but the TV (advertising/ marketing) world has understood the implications of who is paying for the longest time. As technology companies and engineers discovers loyalty, intention, attention, reputation, influence, desire, behavioural economics, and indeed an industry called Marketing and Advertising and that same industry sees tech companies have the data they always wanted, we ar

Desire Engines: beyond reinforcing behaviour to create habits via @nireyal

Image
Article and Image Source : http://www.nirandfar.com/2012/03/how-to-manufacture-desire.html Desire engines, as explained by Nir Eyal  go beyond reinforcing behaviour to creating habits, spurring users to act on their own, without the need for expensive external stimuli like advertising. Think Social media, online games, and email and any habit-forming technologies. At the heart of a “desire engine” is a powerful cognitive quirk described by B.F. Skinner in the 1950s, called a variable schedule of rewards or the earlier in the Pavlov Dog experiments . Skinner observed that lab mice responded most voraciously to random rewards. The mice would press a lever and sometimes they’d get a small treat, other times a large treat, and other times nothing at all. Unlike the mice that received the same treat every time, the mice that received variable rewards seemed to press the lever compulsively. We (like it or not), like the mice in Skinner’s box, crave predictability and struggle to find

Teens, Smartphones & Texting @Amanda_ Lenhart

Image
Full report on Pew Internet by Amanda Lenhart Overview o Teens are fervent communicators. Straddling childhood and adulthood, they communicate frequently with a variety of important people in their lives: friends and peers, parents, teachers, coaches, bosses, and a myriad of other adults and institutions. This report examines the tools teens use to communicate, with a particular focus on mobile devices, and then places the use of those tools in the broader context of how teens choose to communicate with people in their lives. o The volume of texting among teens has risen from 50 texts a day in 2009 to 60 texts for the median teen text user. In addition, smartphones are gaining teenage users. Some 23% of all those ages 12-17 say they have a smartphone and ownership is highest among older teens: 31% of those ages 14-17 have a smartphone, compared with just 8% of youth ages 12-13. About the Survey o The 2011 Teens and Digital Citizenship Survey sponsored by the Pew Rese

Reflections on Fear in a Networked Society @zephoria

Before you watch the video - read this very short blog as it set the context for me, it explores new vocie and motion technologys and possible reactions.   Basic assumptions from dana boyd (for this talk) We live in a culture of fear The attention economy provide fertile ground for culture of fear Social media is amping up the attention economy Source : http://www.zephoria.org/thoughts/archives/2012/03/26/reflections-on-fear-in-a-networked-society.html Implications:  we are all different and some of us, based on our perception/ experience of fear and risk, believe that:- ·          the old times were better and change is bad   ·          the times coming will be better and lets change as quick as we can ·          accept it, stop looking for excuses and learn to cope with today.     [vimeo http://www.vimeo.com/38139635 w=400&h=300]

A-list of data scientists @GilPress

Image
Full list is here via Gil Press : - http://alist.traackr.com/datascience  

The Effects of Data Breach Litigation - paper from the US

"Empirical Analysis of Data Breach Litigation," Sasha Romanosky Carnegie Mellon University - Heinz College of Information Systems and Public Policy David A. Hoffman Temple University - James E. Beasley School of Law; Cultural Cognition Project at Yale Law School Alessandro Acquisti Carnegie Mellon University - H. John Heinz III School of Public Policy and Management Source : http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461 Abstract: In recent years, a large number of data breaches have resulted in lawsuits in which individuals seek redress for alleged harm resulting from an organization losing or compromising their personal information. Currently, however, very little is known about those lawsuits. Which types of breaches are litigated, which are not? Which lawsuits settle, or are dismissed? Using a unique database of manually-collected lawsuits from PACER, we analyze the court dockets of over 230 federal data breach lawsuits from 2000 to 2010. We use binary outcom