SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Virtual Money, Internet,
Privacy, Piracy and
E-commerce
Indian Professionals Association
26th February 2006
Presented by Vijayan GANAPATHY
The Digital Economy
 Money, Privacy, Piracy, Internet, E-Commerce
 Using a credit (or debit) card, Surfing the internet,
Checking our bank account balance online,
Viewing a pirated version of a block-buster movie,
Buying the latest iPod online
 Amazon.com earned 8.42 billion in 2005, Apple
iTunes (represents 5% of the company’s revenue)
 Top sellers online include travel, books, music,
videos, electronics and toys
 Leading consumer purchases on the Internet -
gambling, games, pornography and information
leading to automobile purchases
The actors in the digital economy
 Suppliers or Service Providers
 Buyers or Customers
 Facilitators – Venture capitalists
 Mr. X – The Government and Secret
Services
Money
 The notion of money
 Virtual money
 De-nationalization of money
« Private enterprises that issued distinct
currencies would have an incentive to
maintain their currency's purchasing
power »
- Friedrich August Hayek
The convergence of resources
and ideas
 Technology backbone
 The development of the Internet
 Low-cost computing power
 End of bandwidth
 Low-cost international tele-communication
 Public key encryption
Technology meets the Economist
 Circa 1990
 No smart cards or digital funds transfer
 The economist had no idea what the internet
could do
 The people who were implementing
payment systems didn’t understand the
international monetary mechanics
 Public Policy issues involved
The money transition
The currency note
 Wrinkled, dirty, germs and drugs
 Even worse with coins – we don’t have the right
set of coins or tokens when we need them
In the digital age, all that is going to disappear…
Smart card and smart keys
 Chip with information which identifies you
 It has some protection features (PIN, biometrics)
 Value attribution (money, points, etc.)
Real-time settlements
 The currency note is a non-earning asset
 Loses one or two percent value every year
 Most of us carry some quantity of it
Why ?
 There is a time period between getting rid of one
productive asset and acquiring another productive
asset, good or service we want
Changes !
In the digital age, this time period can collapse to a
fraction of a second, and suddenly the need for
money as we thought of it begins to disappear
The risks for Mr. X
Over the Internet, from your home or from your
telephone, you will be able to take digital money
and transfer it around the world virtually at the
speed of light
You can easily encrypt any message, just with a
couple of keystrokes on your computer and no
government or anybody else will know what
you’ve done, and with a new public key
encryption, it’s almost impossible for any security
agency to break your secret code.
Privacy – Then and Now
 Phone tapping at the phone company
 Analog systems
 Armed with a court order
 Phone tapping at the phone company
 Digital systems
 Codes to the digital systems
 Law
Mr. X: Houston we have a
problem
 Mr. X wants to know what is going on
 Public key encryption empowers the sender and
the receiver of the message
 The new technologies are very liberating
 Nothing can be derived from the encrypted
message
 The need to know who encrypted what and who
decrypted what
 The continuing struggle between financial privacy
and new technologies
Central Banks – The change
 No reason to produce real money anymore
 Most of the digital money will be issued by
private institutions
 Banks are facing an uncertain future
 There is no reason why any well known
company can’t go ahead and start supplying
digital money
 Trading of digital money at par or at a
discount
Many Faces of Virtual Money
 Frequent Flyer card (miles)
 Fidelity card + credit card (points and money)
 Parking card (money and points)
 Debit & Credit cards (money and points)
 Company Restaurant card (money and points)
 Building access control cards (employee or
occupant id)
 Etc.
Digital Control & Intelligence
 ATMs, Parking meters, Vending machines with in-
built intelligence
 Replacement of electro-mechanical devices and
humans by digital devices
 Centralized control or intelligence stored in cards
 Security cameras and surveilance
 Electronic recognition and identification – facial
or fingerprint
 Theft prevention devices in shops and
supermarkets (RFID chips)
The pains of a digital life
 Loss of anonymity
 Loss of privacy
 There is a total electronic trail of everything
we do with the card or key
 Embedded RFID chips in the currency notes
track where and how the money goes
 The ability to detect where we were and
what we were doing when
The fight to control encryption
 Deny encryption except to a select few
 Keeping it at low levels
 Export controls on encryption
 The fact that a book describing encryption
can be exported but a disk or CD containing
the program cannot
The fight to control bank secrecy
 The banks are obliged to report any big
transactions to Mr. X
 The limit keeps lowering
 Know your customer programs
 The cost of fighting fraud is enormous
The fight to control taxation
 The problem is overwhelming
 Massive violation of civil liberties
 Inability to enforce the tax
 Monitoring issues related to each
transaction
 The choice of currency to pay such a tax (?)
Virtual flight of capital
 Digital money can change hands in a
fraction of a second
 The talk of tax harmonization
 Extensive information sharing among
governments
 Almost any asset can be securitized
 Financial capital will flow through any
electronic hole that is not blocked
Virtual facade of crime
 Personal & institutional financial
information are subject to leaks and misuse
 Financial privacy no longer exists
 The possibility of sensitive information
falling into the wrong hands deliberately or
inadvertently puts individuals and
institutions at risk
 Civil society is being undermined and
ultimately destroyed
Virtual value preservation
 The governments will lose their ability to tax
 This may mean a downsizing of governments
 Pension funds will be in trouble
 Governments try to deny pensions by using a filter
criteria
 Default in bonds or inflation
 Better to have assets in things that are real
 You can preserve value by choosing where you
live rather than accumulating more of digital
money and living in an expensive city
 Shift in taxation from capital to labour
Virtual company
 Tries to have minimum staff
 Sets up operations in a tax friendly state or
country
 Sells products or services that are virtual
(externalized, outsourced or catalog based)
 Has the ability to send a product over the
internet (eg. digital music, digital
documents, digital movies, digital services,
etc.)
Virtual piracy
 Digital content flows as fast as digital
money
 The ability to replicate, copy, convert to
formats that mask the origin of the original
 The ability to see virtually anybody,
anything, anywhere, anytime and to
send/receive encrypted voice and video in
real time
Virtual threats
 Viruses, trojans, worms, hackers, spyware
 Distributed denial of service attacks
 Spam mail from virtual users due to flaws
in the email systems
 Software which hijack PCs and networks
 Phishing
 Public opinion
Virtual people
 People across the world are communicating with
each other in real time using fake email addresses,
fake Ids – boy posing as a girl (vice-versa), using
a fake location, a fake name and a fake identity
 This is causing the common person to be lured
into internet scams, internet hoaxes, internet fraud,
auction scams, chain letters, Nigerian scams,
Pyramid scams, investment scams, marriage
scams, etc.
 The difficulty to trace the real person who
perpetrated a crime
Virtual credit
 The digital economy is making us think different
about the extent of credit a person has access to
 A person can own as many credit cards as he
wants, whether he has the capacity to pay all of
them or not
 We will see more credit card defaults,
bankruptcies, etc.
 We will also see people vanish without a trace and
assume altogether new identities and gain access
to fresh credit
 We may even see the same person under multiple
identities (the recent Demat scam in India)
Virtual marketing
 Get Rich Quick for Doing Nothing
 Many people have gotten all excited about
affiliate, associate, referral, or co-op
programs as they are sometimes called
 But very few of the thousands of these
being promoted have any real chance of
making any significant money for the vast
majority of people who get involved
Virtual sales
 People are selling more and more virtual
things and concepts
 Eg. Selling things for which there is no
known ownership (like land on the moon)
 Making money from virtually nothing
(people, scenarios and objects in online
games)
Virtual network
 We build our virtual network by knowing and
meeting more people online
 Things get done faster
 Enables greater access to knowledge of the
privileged few, provided we know how to navigate
through this mass of information
 There are good and bad people and information
out there
 So, we need to have the intuition to see through
this virtual facade and make intelligent choices
 Empowers us to have an edge over competitors
Virtual end of this presentation
 We see more and more virtual concepts and
ideas emerging everyday
 Whatever you do, look for ways to keep
yourself engaged in making this virtual
money securely work for you
 Finally, our value is not in the amount of
digital money we have or make, but in the
choices we make using the information
from our real and virtual networks
Virtual questions
 Virtual / Real answers

Más contenido relacionado

La actualidad más candente

Electronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational PrivacyElectronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational PrivacyDev Khare
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts Timothy Holborn
 
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Asociación de Marketing Bancario Argentino
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
What is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use casesWhat is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use casesAppinventiv
 
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesCaroline B Ncube
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 Timothy Holborn
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business CasesSlava Buga
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)eSignLive by VASCO
 

La actualidad más candente (20)

Electronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational PrivacyElectronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational Privacy
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
What is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use casesWhat is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use cases
 
E-BUSINESS
E-BUSINESSE-BUSINESS
E-BUSINESS
 
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
 
Better use of data
Better use of dataBetter use of data
Better use of data
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Alternative payments: Turning Virtual Into Reality
Alternative payments: Turning Virtual Into RealityAlternative payments: Turning Virtual Into Reality
Alternative payments: Turning Virtual Into Reality
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)
 

Similar a Virtual money, internet, privacy, piracy & e-commerce

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxprathamchhabra166
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
4IR and Digital Transformation Opportunities and Strategies to achieve goal
4IR and Digital Transformation Opportunities and Strategies to  achieve goal4IR and Digital Transformation Opportunities and Strategies to  achieve goal
4IR and Digital Transformation Opportunities and Strategies to achieve goalSyed Shoeb
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
Blockchain Use Cases In Business
Blockchain Use Cases In BusinessBlockchain Use Cases In Business
Blockchain Use Cases In BusinessJohan Zammit
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample GraduatLori Head
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Daniel Austin
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?CogitoMedia
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 

Similar a Virtual money, internet, privacy, piracy & e-commerce (20)

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
4IR and Digital Transformation Opportunities and Strategies to achieve goal
4IR and Digital Transformation Opportunities and Strategies to  achieve goal4IR and Digital Transformation Opportunities and Strategies to  achieve goal
4IR and Digital Transformation Opportunities and Strategies to achieve goal
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Blockchain Use Cases In Business
Blockchain Use Cases In BusinessBlockchain Use Cases In Business
Blockchain Use Cases In Business
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
E Com
E ComE Com
E Com
 
006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Electronic money transfer
Electronic money transferElectronic money transfer
Electronic money transfer
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Virtual money, internet, privacy, piracy & e-commerce

  • 1. Virtual Money, Internet, Privacy, Piracy and E-commerce Indian Professionals Association 26th February 2006 Presented by Vijayan GANAPATHY
  • 2. The Digital Economy  Money, Privacy, Piracy, Internet, E-Commerce  Using a credit (or debit) card, Surfing the internet, Checking our bank account balance online, Viewing a pirated version of a block-buster movie, Buying the latest iPod online  Amazon.com earned 8.42 billion in 2005, Apple iTunes (represents 5% of the company’s revenue)  Top sellers online include travel, books, music, videos, electronics and toys  Leading consumer purchases on the Internet - gambling, games, pornography and information leading to automobile purchases
  • 3. The actors in the digital economy  Suppliers or Service Providers  Buyers or Customers  Facilitators – Venture capitalists  Mr. X – The Government and Secret Services
  • 4. Money  The notion of money  Virtual money  De-nationalization of money « Private enterprises that issued distinct currencies would have an incentive to maintain their currency's purchasing power » - Friedrich August Hayek
  • 5. The convergence of resources and ideas  Technology backbone  The development of the Internet  Low-cost computing power  End of bandwidth  Low-cost international tele-communication  Public key encryption
  • 6. Technology meets the Economist  Circa 1990  No smart cards or digital funds transfer  The economist had no idea what the internet could do  The people who were implementing payment systems didn’t understand the international monetary mechanics  Public Policy issues involved
  • 7. The money transition The currency note  Wrinkled, dirty, germs and drugs  Even worse with coins – we don’t have the right set of coins or tokens when we need them In the digital age, all that is going to disappear… Smart card and smart keys  Chip with information which identifies you  It has some protection features (PIN, biometrics)  Value attribution (money, points, etc.)
  • 8. Real-time settlements  The currency note is a non-earning asset  Loses one or two percent value every year  Most of us carry some quantity of it Why ?  There is a time period between getting rid of one productive asset and acquiring another productive asset, good or service we want Changes ! In the digital age, this time period can collapse to a fraction of a second, and suddenly the need for money as we thought of it begins to disappear
  • 9. The risks for Mr. X Over the Internet, from your home or from your telephone, you will be able to take digital money and transfer it around the world virtually at the speed of light You can easily encrypt any message, just with a couple of keystrokes on your computer and no government or anybody else will know what you’ve done, and with a new public key encryption, it’s almost impossible for any security agency to break your secret code.
  • 10. Privacy – Then and Now  Phone tapping at the phone company  Analog systems  Armed with a court order  Phone tapping at the phone company  Digital systems  Codes to the digital systems  Law
  • 11. Mr. X: Houston we have a problem  Mr. X wants to know what is going on  Public key encryption empowers the sender and the receiver of the message  The new technologies are very liberating  Nothing can be derived from the encrypted message  The need to know who encrypted what and who decrypted what  The continuing struggle between financial privacy and new technologies
  • 12. Central Banks – The change  No reason to produce real money anymore  Most of the digital money will be issued by private institutions  Banks are facing an uncertain future  There is no reason why any well known company can’t go ahead and start supplying digital money  Trading of digital money at par or at a discount
  • 13. Many Faces of Virtual Money  Frequent Flyer card (miles)  Fidelity card + credit card (points and money)  Parking card (money and points)  Debit & Credit cards (money and points)  Company Restaurant card (money and points)  Building access control cards (employee or occupant id)  Etc.
  • 14. Digital Control & Intelligence  ATMs, Parking meters, Vending machines with in- built intelligence  Replacement of electro-mechanical devices and humans by digital devices  Centralized control or intelligence stored in cards  Security cameras and surveilance  Electronic recognition and identification – facial or fingerprint  Theft prevention devices in shops and supermarkets (RFID chips)
  • 15. The pains of a digital life  Loss of anonymity  Loss of privacy  There is a total electronic trail of everything we do with the card or key  Embedded RFID chips in the currency notes track where and how the money goes  The ability to detect where we were and what we were doing when
  • 16. The fight to control encryption  Deny encryption except to a select few  Keeping it at low levels  Export controls on encryption  The fact that a book describing encryption can be exported but a disk or CD containing the program cannot
  • 17. The fight to control bank secrecy  The banks are obliged to report any big transactions to Mr. X  The limit keeps lowering  Know your customer programs  The cost of fighting fraud is enormous
  • 18. The fight to control taxation  The problem is overwhelming  Massive violation of civil liberties  Inability to enforce the tax  Monitoring issues related to each transaction  The choice of currency to pay such a tax (?)
  • 19. Virtual flight of capital  Digital money can change hands in a fraction of a second  The talk of tax harmonization  Extensive information sharing among governments  Almost any asset can be securitized  Financial capital will flow through any electronic hole that is not blocked
  • 20. Virtual facade of crime  Personal & institutional financial information are subject to leaks and misuse  Financial privacy no longer exists  The possibility of sensitive information falling into the wrong hands deliberately or inadvertently puts individuals and institutions at risk  Civil society is being undermined and ultimately destroyed
  • 21. Virtual value preservation  The governments will lose their ability to tax  This may mean a downsizing of governments  Pension funds will be in trouble  Governments try to deny pensions by using a filter criteria  Default in bonds or inflation  Better to have assets in things that are real  You can preserve value by choosing where you live rather than accumulating more of digital money and living in an expensive city  Shift in taxation from capital to labour
  • 22. Virtual company  Tries to have minimum staff  Sets up operations in a tax friendly state or country  Sells products or services that are virtual (externalized, outsourced or catalog based)  Has the ability to send a product over the internet (eg. digital music, digital documents, digital movies, digital services, etc.)
  • 23. Virtual piracy  Digital content flows as fast as digital money  The ability to replicate, copy, convert to formats that mask the origin of the original  The ability to see virtually anybody, anything, anywhere, anytime and to send/receive encrypted voice and video in real time
  • 24. Virtual threats  Viruses, trojans, worms, hackers, spyware  Distributed denial of service attacks  Spam mail from virtual users due to flaws in the email systems  Software which hijack PCs and networks  Phishing  Public opinion
  • 25. Virtual people  People across the world are communicating with each other in real time using fake email addresses, fake Ids – boy posing as a girl (vice-versa), using a fake location, a fake name and a fake identity  This is causing the common person to be lured into internet scams, internet hoaxes, internet fraud, auction scams, chain letters, Nigerian scams, Pyramid scams, investment scams, marriage scams, etc.  The difficulty to trace the real person who perpetrated a crime
  • 26. Virtual credit  The digital economy is making us think different about the extent of credit a person has access to  A person can own as many credit cards as he wants, whether he has the capacity to pay all of them or not  We will see more credit card defaults, bankruptcies, etc.  We will also see people vanish without a trace and assume altogether new identities and gain access to fresh credit  We may even see the same person under multiple identities (the recent Demat scam in India)
  • 27. Virtual marketing  Get Rich Quick for Doing Nothing  Many people have gotten all excited about affiliate, associate, referral, or co-op programs as they are sometimes called  But very few of the thousands of these being promoted have any real chance of making any significant money for the vast majority of people who get involved
  • 28. Virtual sales  People are selling more and more virtual things and concepts  Eg. Selling things for which there is no known ownership (like land on the moon)  Making money from virtually nothing (people, scenarios and objects in online games)
  • 29. Virtual network  We build our virtual network by knowing and meeting more people online  Things get done faster  Enables greater access to knowledge of the privileged few, provided we know how to navigate through this mass of information  There are good and bad people and information out there  So, we need to have the intuition to see through this virtual facade and make intelligent choices  Empowers us to have an edge over competitors
  • 30. Virtual end of this presentation  We see more and more virtual concepts and ideas emerging everyday  Whatever you do, look for ways to keep yourself engaged in making this virtual money securely work for you  Finally, our value is not in the amount of digital money we have or make, but in the choices we make using the information from our real and virtual networks