Teens, Social Media and Privacy

Pew Internet  have released a new report  on Teens, Social Media and Privacy. Download Summary of Findings Teens share a wide range of information about themselves on social media sites; indeed the sites themselves are designed to encourage the sharing of information and the expansion of networks. However, few teens embrace a fully public approach to social media. Instead, they take an array of steps to restrict and prune their profiles, and their patterns of reputation management on social media vary greatly according to their gender and network size. These are among the key findings from a new report based on a survey of 802 teens that examines teens’ privacy management on social media sites: ·          Teens are sharing more information about themselves on social media sites than they did in the past. For the five different types of personal information that we measured in both 2006 and 2012, each is significantly more likely to be shared by teen social media use

"To be The Most Trusted Provider of Brilliant Digital Experiences" - which Brand Vision?

Here’s a presentation  from James Morgan , Telefonica UK’s head of information strategy for business intelligence. Telefonica new ‘vision’: “To be The Most Trusted Provider of Brilliant Digital Experiences”   My problem is that this is all about control aka the Apple model and not an open model – implicit is that they know better than you about what you want!

Unlocking the Value of Personal Data

Source: this is a Katie O’Brien post on UnBounded ID and she brings up the “shift from controlling data collection to focusing on data usage.” The reason for this blog is that I am an advocate of users being able to know where there data is.  I cannot subscribe to user controlled data as it is just not practicable and I cannot subscribe to personal lockers as this becomes the weakest point. However, I do subscribe to an idea that a user should know where their data is, be able to correct it if it is wrong and be able to say that some data is a primary source and other places are copies.  Control does not exist and rights may only be granted in some instances. I don’t want to store my data, I just want the link to where the data is. Obviously this becomes more difficult if an agency is intercepting my data on route and storing it off line. #NAS #PRISON The issue being that if I do have some cont

Screenagers: The Repercussions of Growing Up on Screens


How Real Revenue Is Derived from Big Data

Wikibon has  published  its Big Data Vendor Revenue and Market Forecast for 2012 thru 2017, giving insights as to how much revenue big data vendors will derive in the coming years. They have also published an infographic,

Biostamp electronic tattoo

Motorola is looking at alternatives to traditional passwords in a bid to make logging into online sites, or accessing mobile phones, more secure.  Given that it takes 24 hours to break any 8 character password. These bio stamps, developed by Massachusetts-based engineering firm MC10, contain flexible electronic circuits that are attached to the wearer's skin using a rubber stamp. The device could then be used to confirm the owner's identity and log them in to accounts automatically.  This would prevent thieves and other people from being able to access a phone, or individual apps on the device, if it is stolen or lost.  If you are not there…. However – ·          like any tech I assume it can be scanned and copied ·          how do you deal with interference, jamming? ·          how will it cope with a high power transmitter? Therefore does it actually solve a problem or not?  Not sure it does but interesting thinking that the movement of 5 mm from your wall

2013 Internet Trends Mary Meeker

KPCB Internet Trends 2013 from Kleiner Perkins Caufield & Byers