SlideShare una empresa de Scribd logo
1 de 49
A Two Sided Digital Business Model where  your Privacy will be someone else's business !   Tony Fish Sept 2009 http://www.mydigitalfootprint.com
identity is split, but connected digital identity physical identity bonds  bridges relationships reputation privacy  risk  trust
physical identity has certain traits digital identity physical identity bonds  bridges relationships reputation certification person organisation identification authentication Government & NGO trade privacy  risk  trust
digital identity has different traits digital identity physical identity bonds  bridges relationships reputation certification person organisation identification authentication Government & NGO trade barriers implementation management characteristics privacy  risk  trust
digital identity has different traits digital identity physical identity bonds  bridges relationships reputation barriers implementation management characteristics privacy  risk  trust
 
core themes for my digital footprint dependences data mydigitalfootprint value business models  collection store  analysis relationships security risk privacy trust law regulation identity (physical & digital) intent reputation discovery recommendation protection personalisation trade or barter context  who owns the data? two sided model rainbow of trust mobile, web,TV passive/ active need, inspiration, entertainment
value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
in simple terms store click data content my data analysis value social data capture
stages to build my digital footprint store click data content my data analysis value ownership  and  movable algorithm  =  differentiation rights  and  cash digital footprint Behavioural  DNA feedback loop (sensory.net) social data capture
traditional mobile value chain Application Content Service Provision Terminal  Equipment Middle- ware Network  operator Network Equipment User
consumer centric value Internet (IP) mobile access WiFi, WiMax, HSDPA, DVB-H,  WCDMA, Bluetooth, GSM, 3G context, payment security, identity music full web browse, search social Blog, RSS, tag Communication Voice, IM, SMS, video entertainment Video, games, mobile TV location Maps, LBS, geotag payment Consumer centric mobile value model www.opengardensblog.futuretext.com
blind men and elephant The blind men and the elephant  © Jason Hunt The blind men and the elephant.  © Paul Davenport
7 principals of web 2.0 Web 2.0 Harnessing  collective Intelligence Data is the Intel inside End of the s/w Release cycle Lightweight  Programming models S/W above a Single device Rich user  experience Web As A  Platform
unified view of web 2.0 The Intelligent web Harnessing collective Intelligence Harnessing  collective Intelligence Data is the Intel inside End of the s/w Release cycle Light wt  Programming models S/W above a Single device Rich user  experience Web As A  Platform
harnessing collective intelligence ,[object Object],c) The PC: selecting and configuring the service a) Harnessing collective intelligence
More ‘OFF’ : Less ‘ON’ on this screen in this earpiece consume createion x content where time intent direction who
identity is not a digital footprint ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],identity digital footprint Black hole  of debate
6 screens of life big screens small screens Cinema (shared with other members of the public) TV (shared privately within our homes) PC (personal or shared use)  Fixed/Portable Players (fixed devices in things that move such as cars, planes, etc)  Information screens e.g. iPod, radio The mobile device, an individual and personalised handheld device
value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
relationship between time and data 10% 20% 30% 40% 50% 60% 70% 80% 90% measure  of  time Source: AMF Ventures  www.amfventures.com TV .. in front of the PC … spent with a mobile in your pocket ,[object Object],[object Object],[object Object],from watching TV from engaging with a PC/Web generated from  a mobile device typical day  10% 20% 30% 40% 50% 60% 70% 80% 90% 0% 0% 100% 100% value generated from data analysis measure  of  value
mashup value from mobile, web and broadcast mashup create consume create create consume consume broadcast MMD WMD BMD mobile web
digital footprint and behavioural DNA digital footprint Click content my behavioural DNA INPUT ANALYSIS Algorithm OUTPUT service improvement (existing) web TV mobile m2m service discovery (new) web TV mobile m2m trade or barter collection store analysis value social
understanding the analysis issue  original  data build algorithm behavioural model current individual data all new user data improve algorithm algorithm your data trigger or threshold Alert/ Action ,[object Object],[object Object],[object Object],[object Object],existing data existing analysis recommendation ,[object Object],[object Object],[object Object],new data (user) new data (social) intent reputation discovery protection personalisation trade/ barter context CHAOS  (develop linkage)
types of data input for a digital footprint
generic data types
Fish Tail’s, a model to categorise data time Short bursts of data, with varying amount of information Continuous feed of data, may vary on amount of data available Continuous feed of data, depending on use  Infrequent and small data bursts
data is inter-related communication social behavioural payment consumption creation e-mail/ IM/ SMS/ voice links/ FOAF/ click/  review/ tag/ blog routes and routines, loyalty card,  professional, clubs, affiliation credit card, debit card, cash,  contactless, direct, cheque  favourite, preference, style, genre,  occurrence, video, music, audio,  application type, style, tools, pattern, themes  records certificates, health, exam, DOB,  Council, government, passport
two sided digital business Actual  User  Data Actual  User  Data Actual  User  Data “ The  Business”  The User Direct feedback In Direct feedback collection store analysis value friends social norms
two worlds collide context personalis- ation recommend- ation requirement/ enforcement/policy security trust login authent ication proof recognition/ desire/ peer pressure/ community attention location time search content create Identity access content consume purchase banking discovery reputation corporate Digital Footprint individual community Inputs collection outputs value who  benefits motivation database store/analysis Closed loop of feedback and improvement trade or barter billing accuracy colour intent activity AAS protection Behavioural DNA
yesterday’s fragmented network wireless voice data video application layer control layer connection layer
today’s network voice data video cellular application layer control layer all IP connection layer WLAN access and connection
correlated authentication browser packet  access authenticate reverse proxy proxy cached policy rules identity system authN  service HSS Enhanced HSS policy server HSS IDS integrations using SAML AuthN and polices (for QoS, SLA, access controls etc)
example – new way to offer mobile security store moveable digital footprint behavioural  DNA adverse  behaviour Click content my normal  behaviour graceful  opening  location route time routine restrictions  unique  override  closing  time  Take raw data  to new provider confidence assurance collection analysis value
creating the virtuous circle collection store analysis value TRUST RISK PRIVACY
build or erode privacy capital PRIVACY erode build PRIVACY  CAPITAL Who You  Are  Routes And Routines Patterns And  Preferences  Higher FUD  Fear, Uncertainty  and Doubt lower  FUD positive feedback negative  feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
build or erode risk capital Risk erode build Risk  CAPITAL gut  feel  home  and  personal business  And  financial  higher  FUD lower  FUD positive feedback negative  feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
build or erode trust capital Trust erode build TRUST  CAPITAL Reputation And  Recommendation Patterns And  Preferences  higher  FUD lower  FUD positive feedback negative  feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
bonded but not related TRUST RISK IDENTITY PRIVACY SECURITY Increasing closed Increasing open High Control High Value Justification of benefits Justification of barriers
implication (for content consumption)   … change in information and decision making cycle Message to make you aware Purchase Consume DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Preferences Business Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],collection collection collection Store Analysis Value
data classification Static Dynamic Behavioural Factual Profile Data  Credit rating Address etc Demographic data, ACORN etc Dynamic Metadata Derived Patterns Routes Routines Actual activity in comms, purchases etc – “microdata” Searches / Clicks Content creation ,[object Object],[object Object],[object Object],[object Object]
‘ Rainbow of Trust’
rainbow of trust Based on a complementary market segmentation open simple structured cautious dangerous ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],my-way one-way accept authority untrusting and wise untrusting and stupid
migration my-way one-way accept authority untrusting and wise untrusting and stupid
engaged  prepared to engage  with my digital footprint NOT prepared to engage  with my digital footprint sit back and  enjoy the benefits controlling economically  unviable
I own my data I give up my data Enable 3rd party to use and exploit  their data to generate benefits in  kind and / or cash for a percentage  of revenue business model’s Model  Enable 3 rd  party to use and exploit  your data to generate benefits in  kind and / or cash for a percentage  of revenue 8 Pay for enhancement to service (subscription or one off) 1 Trade data for enhancement directly with service provider 2 Trade data for enhancement via a third party (indirect) such  as an aggregation party 3 Pay for services directly (subscription or one off) 4 Pay to protect your identity  7 Trade data for services via a third party (indirect) such  as an aggregation party 6 Trade data for service directly with service provider 5
strategic issues competitor VOT tribes Value Porter’s model focus differentiation/ segmentation lowest  cost profit cost services access GYM club no  change game  changing
structural problems device tethered generic network platform applications & content closed open locked net neutrality deliver capture closed  mobile  ecosystem  open  mobile  ecosystem no  change game  changing
femtocell

Más contenido relacionado

La actualidad más candente

Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
kaeschliman
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
cegonsoft1999
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 

La actualidad más candente (20)

Data science
Data scienceData science
Data science
 
Big data, Big decision
Big data, Big decisionBig data, Big decision
Big data, Big decision
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
Social networking ... Boon or a Bane
Social networking ... Boon or a Bane Social networking ... Boon or a Bane
Social networking ... Boon or a Bane
 
Wearable tech ppt
Wearable tech pptWearable tech ppt
Wearable tech ppt
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
The Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondThe Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respond
 
Capstone PowerPoint Presentation: Effective Guide
Capstone PowerPoint Presentation: Effective GuideCapstone PowerPoint Presentation: Effective Guide
Capstone PowerPoint Presentation: Effective Guide
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
 
Imagine Your Life Without the Internet
Imagine Your Life Without the InternetImagine Your Life Without the Internet
Imagine Your Life Without the Internet
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 
Exposure to technology
Exposure to technologyExposure to technology
Exposure to technology
 
Green computing
Green computingGreen computing
Green computing
 

Destacado

Trace Evidence
Trace EvidenceTrace Evidence
Trace Evidence
annperry09
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
CreepSquash
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
Eric Cole
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3
Margaret Donaghue
 

Destacado (20)

Tony Fish Canto Slideshare
Tony Fish Canto   SlideshareTony Fish Canto   Slideshare
Tony Fish Canto Slideshare
 
Trace Evidence
Trace EvidenceTrace Evidence
Trace Evidence
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital Footprint
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Forensic Serology: BLOOD
Forensic Serology: BLOODForensic Serology: BLOOD
Forensic Serology: BLOOD
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Examination of blood
Examination of bloodExamination of blood
Examination of blood
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
1. trace evidence
1. trace evidence1. trace evidence
1. trace evidence
 
Forensic science dna
Forensic science dnaForensic science dna
Forensic science dna
 
Digital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipDigital Footprints, Safety & Citizenship
Digital Footprints, Safety & Citizenship
 

Similar a My Digital Footprint

Uniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeUniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLife
Tony Fish
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
Mihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
Mihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
Mihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
Mihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
Mihnea Galeteanu
 

Similar a My Digital Footprint (20)

Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
Mobile, Mobile, Data
Mobile, Mobile, DataMobile, Mobile, Data
Mobile, Mobile, Data
 
Uniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeUniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLife
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent
 
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
5733   a deep dive into IBM Watson Foundation for CSP (WFC)5733   a deep dive into IBM Watson Foundation for CSP (WFC)
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
 
TechConnectr's Big Data Connection. Digital Marketing KPIs, Targeting, Analy...
TechConnectr's Big Data Connection.  Digital Marketing KPIs, Targeting, Analy...TechConnectr's Big Data Connection.  Digital Marketing KPIs, Targeting, Analy...
TechConnectr's Big Data Connection. Digital Marketing KPIs, Targeting, Analy...
 
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Product Map
Product MapProduct Map
Product Map
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
 
Mobile for associations & nonprofits
Mobile for associations & nonprofitsMobile for associations & nonprofits
Mobile for associations & nonprofits
 
Comarch Mobile Services And Applications
Comarch Mobile Services And ApplicationsComarch Mobile Services And Applications
Comarch Mobile Services And Applications
 
iPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchiPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and research
 
The Future of Applied Marketing Research
The Future of Applied Marketing ResearchThe Future of Applied Marketing Research
The Future of Applied Marketing Research
 

Más de Tony Fish

Loyalty world
Loyalty world Loyalty world
Loyalty world
Tony Fish
 
What is a digital footprint?
What is a digital footprint?What is a digital footprint?
What is a digital footprint?
Tony Fish
 

Más de Tony Fish (19)

Uniliever
UnilieverUniliever
Uniliever
 
Big Data
Big Data Big Data
Big Data
 
Big Data.... and digital footprint
Big Data.... and digital footprintBig Data.... and digital footprint
Big Data.... and digital footprint
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12
 
Loyalty world
Loyalty world Loyalty world
Loyalty world
 
managing entrepreneurial teams
managing entrepreneurial teamsmanaging entrepreneurial teams
managing entrepreneurial teams
 
Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Managing Entrepreneurial Teams
Managing Entrepreneurial Teams
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
New rules for living in a digital age
New rules for living in a digital ageNew rules for living in a digital age
New rules for living in a digital age
 
What is a digital footprint?
What is a digital footprint?What is a digital footprint?
What is a digital footprint?
 
MWC Mobile Web 2
MWC Mobile Web 2MWC Mobile Web 2
MWC Mobile Web 2
 
Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web Apps
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobile
 
Mobile Web 2.0 11 June 2008 Osney
Mobile Web 2.0 11 June 2008 OsneyMobile Web 2.0 11 June 2008 Osney
Mobile Web 2.0 11 June 2008 Osney
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
Future of Mobile
Future of MobileFuture of Mobile
Future of Mobile
 

Último

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Último (20)

Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 

My Digital Footprint

  • 1. A Two Sided Digital Business Model where your Privacy will be someone else's business ! Tony Fish Sept 2009 http://www.mydigitalfootprint.com
  • 2. identity is split, but connected digital identity physical identity bonds bridges relationships reputation privacy risk trust
  • 3. physical identity has certain traits digital identity physical identity bonds bridges relationships reputation certification person organisation identification authentication Government & NGO trade privacy risk trust
  • 4. digital identity has different traits digital identity physical identity bonds bridges relationships reputation certification person organisation identification authentication Government & NGO trade barriers implementation management characteristics privacy risk trust
  • 5. digital identity has different traits digital identity physical identity bonds bridges relationships reputation barriers implementation management characteristics privacy risk trust
  • 6.  
  • 7. core themes for my digital footprint dependences data mydigitalfootprint value business models collection store analysis relationships security risk privacy trust law regulation identity (physical & digital) intent reputation discovery recommendation protection personalisation trade or barter context who owns the data? two sided model rainbow of trust mobile, web,TV passive/ active need, inspiration, entertainment
  • 8. value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
  • 9. in simple terms store click data content my data analysis value social data capture
  • 10. stages to build my digital footprint store click data content my data analysis value ownership and movable algorithm = differentiation rights and cash digital footprint Behavioural DNA feedback loop (sensory.net) social data capture
  • 11. traditional mobile value chain Application Content Service Provision Terminal Equipment Middle- ware Network operator Network Equipment User
  • 12. consumer centric value Internet (IP) mobile access WiFi, WiMax, HSDPA, DVB-H, WCDMA, Bluetooth, GSM, 3G context, payment security, identity music full web browse, search social Blog, RSS, tag Communication Voice, IM, SMS, video entertainment Video, games, mobile TV location Maps, LBS, geotag payment Consumer centric mobile value model www.opengardensblog.futuretext.com
  • 13. blind men and elephant The blind men and the elephant © Jason Hunt The blind men and the elephant. © Paul Davenport
  • 14. 7 principals of web 2.0 Web 2.0 Harnessing collective Intelligence Data is the Intel inside End of the s/w Release cycle Lightweight Programming models S/W above a Single device Rich user experience Web As A Platform
  • 15. unified view of web 2.0 The Intelligent web Harnessing collective Intelligence Harnessing collective Intelligence Data is the Intel inside End of the s/w Release cycle Light wt Programming models S/W above a Single device Rich user experience Web As A Platform
  • 16.
  • 17. More ‘OFF’ : Less ‘ON’ on this screen in this earpiece consume createion x content where time intent direction who
  • 18.
  • 19. 6 screens of life big screens small screens Cinema (shared with other members of the public) TV (shared privately within our homes) PC (personal or shared use) Fixed/Portable Players (fixed devices in things that move such as cars, planes, etc) Information screens e.g. iPod, radio The mobile device, an individual and personalised handheld device
  • 20. value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
  • 21.
  • 22. mashup value from mobile, web and broadcast mashup create consume create create consume consume broadcast MMD WMD BMD mobile web
  • 23. digital footprint and behavioural DNA digital footprint Click content my behavioural DNA INPUT ANALYSIS Algorithm OUTPUT service improvement (existing) web TV mobile m2m service discovery (new) web TV mobile m2m trade or barter collection store analysis value social
  • 24.
  • 25. types of data input for a digital footprint
  • 27. Fish Tail’s, a model to categorise data time Short bursts of data, with varying amount of information Continuous feed of data, may vary on amount of data available Continuous feed of data, depending on use Infrequent and small data bursts
  • 28. data is inter-related communication social behavioural payment consumption creation e-mail/ IM/ SMS/ voice links/ FOAF/ click/ review/ tag/ blog routes and routines, loyalty card, professional, clubs, affiliation credit card, debit card, cash, contactless, direct, cheque favourite, preference, style, genre, occurrence, video, music, audio, application type, style, tools, pattern, themes records certificates, health, exam, DOB, Council, government, passport
  • 29. two sided digital business Actual User Data Actual User Data Actual User Data “ The Business” The User Direct feedback In Direct feedback collection store analysis value friends social norms
  • 30. two worlds collide context personalis- ation recommend- ation requirement/ enforcement/policy security trust login authent ication proof recognition/ desire/ peer pressure/ community attention location time search content create Identity access content consume purchase banking discovery reputation corporate Digital Footprint individual community Inputs collection outputs value who benefits motivation database store/analysis Closed loop of feedback and improvement trade or barter billing accuracy colour intent activity AAS protection Behavioural DNA
  • 31. yesterday’s fragmented network wireless voice data video application layer control layer connection layer
  • 32. today’s network voice data video cellular application layer control layer all IP connection layer WLAN access and connection
  • 33. correlated authentication browser packet access authenticate reverse proxy proxy cached policy rules identity system authN service HSS Enhanced HSS policy server HSS IDS integrations using SAML AuthN and polices (for QoS, SLA, access controls etc)
  • 34. example – new way to offer mobile security store moveable digital footprint behavioural DNA adverse behaviour Click content my normal behaviour graceful opening location route time routine restrictions unique override closing time Take raw data to new provider confidence assurance collection analysis value
  • 35. creating the virtuous circle collection store analysis value TRUST RISK PRIVACY
  • 36. build or erode privacy capital PRIVACY erode build PRIVACY CAPITAL Who You Are Routes And Routines Patterns And Preferences Higher FUD Fear, Uncertainty and Doubt lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
  • 37. build or erode risk capital Risk erode build Risk CAPITAL gut feel home and personal business And financial higher FUD lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
  • 38. build or erode trust capital Trust erode build TRUST CAPITAL Reputation And Recommendation Patterns And Preferences higher FUD lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
  • 39. bonded but not related TRUST RISK IDENTITY PRIVACY SECURITY Increasing closed Increasing open High Control High Value Justification of benefits Justification of barriers
  • 40.
  • 41.
  • 42. ‘ Rainbow of Trust’
  • 43.
  • 44. migration my-way one-way accept authority untrusting and wise untrusting and stupid
  • 45. engaged prepared to engage with my digital footprint NOT prepared to engage with my digital footprint sit back and enjoy the benefits controlling economically unviable
  • 46. I own my data I give up my data Enable 3rd party to use and exploit their data to generate benefits in kind and / or cash for a percentage of revenue business model’s Model Enable 3 rd party to use and exploit your data to generate benefits in kind and / or cash for a percentage of revenue 8 Pay for enhancement to service (subscription or one off) 1 Trade data for enhancement directly with service provider 2 Trade data for enhancement via a third party (indirect) such as an aggregation party 3 Pay for services directly (subscription or one off) 4 Pay to protect your identity 7 Trade data for services via a third party (indirect) such as an aggregation party 6 Trade data for service directly with service provider 5
  • 47. strategic issues competitor VOT tribes Value Porter’s model focus differentiation/ segmentation lowest cost profit cost services access GYM club no change game changing
  • 48. structural problems device tethered generic network platform applications & content closed open locked net neutrality deliver capture closed mobile ecosystem open mobile ecosystem no change game changing

Notas del editor

  1. Field service engineering on a mobile device is about collection not about input At this point you should be screaming PRIVACY, SECURITY, How this takes us to issues of privacy and trust. Lets come back to speak about the rainbow of trust. But lets look at the enterprise 2.0
  2. Mobile is a platform and not and service. There is more value in getting data off a mobile device than to it. View this chart from the direction of the customer, the story is that the yellow side is how the generic business market operates today and has done and will continue to do so. The green side is this new world of 2.0 thinking. Participation, networking effect and web as a platform. I will conclude that mobile is a platform and that There is more value in getting data off a mobile device than to it. Lets start with who benefits in the yellow, the existing and ongoing way of doing business We took a thin scrape of this data to produce an entire advertising industry. The green side description But how does this lead me to conclude that there is more value in getting data off a mobile device than to it. Lets consider the fact that the mobile is in your pocket from the moment to wake to the time you return to sleep, during that time it knows what you are doing, where you are doing it, applicators. From the consumers perspective this device can become the method for collecting data that could be helpful for other services that I would like to consume. The automation of this collected data can become my performance CV, it could be my reward calculator, it help the serach engine know when I type paris in …. Further - is there more value in know what you are doing or who you are doing it with? Given that sales for your customers is about acquiring new customer, knowing who, as part of your social group, could provide enormous value.
  3. Service differentiation based on trust Let me start with a consumer walking into carphone warehouse. The person say’s – hello Mr sales man, I am a blue person. What the sales understanding from this is that this person wants an unfettered device, it has not constraints and they will sort out all the IT problems themselves, if they down load something, they will sort it. Mr Red, he only wants to do online and mobile banking Mr purple wants the walled garden Mr beige wants voice and text There customer are differentiated based on their trust in both the device, the SP and their provider of the service. It terms of enterprise customers, they will vary by their attitude to risk. The analysis needed is not but product but by profit and profile to risk. Do you want risk adverse or balanced risk, I don’t know as I don’t know the profit by type.