SlideShare a Scribd company logo
1 of 62
Download to read offline
Why
Do
You
Know
So
Much
About
Me?


                    Privacy
in
the
Digital
Age

Not
talking
about
surveillance

Not
talking
about
the
government


But
rather


The
voluntary
disclosure
of
personal
information
to

private
institutions

We
say
one
thing.

        I
want
my
privacy.


      We
do
something
else.

Here’s
my
data.
Take
what
you
want.

       (just
give
me
my
stuff)

43%
of
online
users
claim
that
they

are
likely
to
read
the
privacy
policy
of

a
website
before
buying
anything

What
Privacy
Statements
Say

26%
actually
consulted
the
privacy

policy


Even
more
odd,
there
was
no

difference
between
privacy

fundamentalists,
pragmatists,
or
the

unconcerned

71%
want
to
control
who
can
access

their
personal
information

75%
have
supplied
   50%
have
supplied


• First
name
        • Phone
number

• Last
name
         • Birthday

• E‐mail
            • Credit
card
information

• Street
address

“You
have
zero
privacy.
Get
over
it”


Scott
McNealy

Former
CEO
Sun
Microsystems

“If
you
have
something
you
don’t

anyone
to
know,
maybe
you

shouldn’t
be
doing
it
in
the
first

place.”


Eric
Schmidt

Former
Google
CEO

“People
have
gotten
more

comfortable
not
only
sharing

more
information,
but
more

openly
and
with
more
people.”


Mark
Zukerberg

Facebook
CEO

What
do
you
think
privacy
is?

Privacy
is….?

  Secrecy,
Concealment,
Seclusion,
Solitude,

   Confidentiality,
Anonymity

  Prejudicial
Information

  Personally
Identifiable
Information
(PII)

  Whatever
you
want
it
to
be

Privacy
is
the
claim
of
individuals,

groups,
or
institutions
to
determine

for
themselves
when,
how,
and
to

what
extent
information
about
them

is
communicated
to
others.

Viewed
in
terms
of
the
relation
of
the

individual
to
social
participation,

privacy
is
the
voluntary
and

temporary
withdrawal
of
a
person

from
a
general
society
into
a

condition
of
anonymity
or
reserve.

Privacy
is
the
ability
of
an
individual
or

group
to
seclude
themselves
or

information
about
themselves
and

thereby
reveal
themselves
selectively.

Privacy
in
Colonial
America

  Find
an
open
field
to
talk

  Sneak
off
into
the
woods

  No
privacy
indoors

  Churches
encouraged
neighbors
to
snoop
on
each
other

Privacy
in
the
1800s

  Long‐distance
communication
by
telegraph

  Letters

  Concern
about
invasive
press

  Snooping
discouraged

  Gossip,
Word
of
Mouth

Privacy
from
1900
‐
1965

  First
bugging
device

  Search
of
electronic
conversations
constitutional

  Telephone
communications
over
wires

  Cold
War
prompts
government
to
increase
surveillance

  of
civilians
without
their
knowledge

Privacy
from
1965
‐
1990

  Watergate
Scandal

  Personal
computers

  Public‐key
encryption
invented

  Internet
emerged

  Sensationalist
journalism

Privacy
from
1990
‐
2001

  No
privacy
for
public
figures

  Wireless
communication

  Cameras

  Satellites

  Confusion
over
who
owns
content
on
computer
networks

Privacy
After
September
11th


  Private
customer
information
divulged
to
federal

   authorities
hunting
for
terrorists
or
criminals

  Airport
searches

  Polls
in
the
US
indicated
that
people
think
that
the
1st

   amendment
of
the
US
Constitution
might
go
too
far

Total
Information
Awareness

  Post
9/11
project
to:

      [Create]
enormous
computer
databases
to
gather
and
store

       the
personal
information
in
the
United
States,
including

       personal
emails,
social
network
analysis,
credit
card
records,

       phone
calls,
medical
records,
and
numerous
other
sources,

       without
any
requirement
for
a
search
warrant.
Additionally,

       the
program
included
funding
for
a
biometric
surveillance

       technologies
that
could
identify
and
track
individuals
using

       surveillance
cameras
and
other
methods.

Television
&
Privacy

  1992
brought
the
launch
of
Reality
Television
where

   everyone’s
lives
became
public
consumption

  This
brought
about
shows
about
people:

      Living
together
in
homes
and
islands

      Families
struggling
with
personal
issues

      Celebrities
private
issues
made
public

      People
showing
off
their
stupidity
to
win
money
and
fame

  In
short,
Reality
TV
took
the
privacy
discussion
to
a
new

  level

Privacy
Today

  YouTube
has
ended
all
forms
of
personal
privacy

  Bloggers
have
made
their
personal
(and
their
friends/
   acquaintances)
lives
topics
of
discussion
of
the
entire

   world

  And
then
came
social
networks….

  We
are
comfortable
sharing
our
lives
and
thoughts

   instantly
with
thousands
of
people
–
close
friends
and

   strangers
alike

Ways
Technology
Threatens
Privacy

  Phishing
                    Cloud
Computing

  Malware
&
Spyware
           Electronic
Medical
Data

  Social
Networking
sites
     Public
Wi‐Fi

  Photo
&
Video
Sharing
       Retail
Loyalty
Cards

  Web
History
                 Workplace
Computers

  Targeted
Advertising
&
      Cell
Phones

  Cookies

Why
Privacy
Has
Changed?

  Curiosity

  Convenience

  The
Internet
and
Evolving
Technology

  Social
Trends

  Desire
to
relate
&
share
with
others

  Identity

  Fame

  Posterity

The
primary
business
model
of

today’s
most
successful
corporation

is
the
monetization
in
the
mass

collection,
correlation
&
analysis
of

individual
private
data

Private
Info
Monetized

    Acxiom
–
750
billion
pieces
of
information
or
1,500
facts
on
½

     billion
people

         Correlate
“consumer”
info
from
signups,
surveys,
magazine

          subscriptions

         USD
1.
38
billion
turnover
for
FY2008

  Colligent
–
Actionable
consumer
research
derived
from
social

   networks

  Rapleaf
–
450
million
social
network
profiles

         Submit
request
and
aggregated
social
network
profiles
returned

          within
a
day

    Phorm

         Uses
“behavioral
keywords”
–
keywords
derived
from
a
combination

          of
search
terms,
URLs
and
even
contextual
page
analysis
over
time
–

          to
find
the
right
users

How
It
Affects
Us?

White’s
Taxonomy
of
Online
Privacy
Invasion

                            Web


                          Request



                     Cross
Site
Tracking




                 Rich
Browser
Environments




                      Application
Data




            Aggregation,
Correlation
&
Meta‐Data

Taxonomy
–
Web
Request

    A
single
web
request

         An
image
on
a
website

  One
webpage
is
made
up
of

   multiple
requests

  What
They
Can
Find
Out

                                             Web


         Location
(Latitude,
Longitude,
   Request

          City,
Country)

         Language

         Operating
System
&
Browser

         What
site
you
came
from

         ISP

         Have
you
been
here
before?

Taxonomy
–
Cross
Site
Tracking

  Using
cookies
to
track

   across
computers
and

   affiliated
sites

  Cookie
is
stored
on
your

   computer
and
sent
with

   every
request
                Cross
Site
Tracking

  Cookies
usually
associated

   with
login
details

  What
They
Can
Find
Out

      Who
you
are

      What
sites
you
visit

      Behavioral
profiles

Taxonomy
–
Rich
Browser
Environments

  Rich
Web
2.0
Technologies

      JavaScript/AJAX

      Flash/Silverlight

  What
They
Can
Find
Out

    Browser
history
           Rich
Browser

    Clipboard
data
            Environments


    Key
presses

    Visual
stimulus

    Browser
plugins

    Desktop
display

     preferences

Taxonomy
–
Application
Data

  Rich
Information
Inputs

  Structured
&
Unstructured

   Data

         Search
requests

         E‐mails

         Calendar
items
                Application
Data

         Instant
Message

          Communications

    What
They
Can
Find
Out

         Who
you
are

         Who
your
friends
are

         What
you’re
doing
on
Sunday

         Your
Interests

Taxonomy
–
Aggregation,
Correlation
&
Meta
Data

    Combining
the
previous
levels

         Meta‐Data
–
Include

          interactions
with
applications

         Aggregation
–
combining
the

          information
from
various

          sources

         Correlation
–
normalizing
        Aggregation,


          entities
across
sources
          Correlation
&


    Provides
information
you
may
           Meta‐Data

     not
be
aware
of

    What
they
can
find
out

         Social
networks

         Behavioral
profiles

         Psychological
profiles

         Deep
databases

How
Does
Information
Get
Revealed?

By
ISPs

  ISPs
always
know
your
IP
address
and
the
IP
address
to

   which
you
are
communicating

  ISPs
are
capable
of
observing
unencrypted
data
passing

   between
you
and
the
Internet
but
not
properly‐
   encrypted
data

  They
are
usually
prevented
to
do
so
due
to
social

   pressure
and
law

By
E‐Mail

  May
be
inappropriately
spread
by
the
original
receiver

  May
be
intercepted

  May
be
legally
viewed
or
disclosed
by
service
providers

  or
authorities

By
Discussion
Groups

  There
is
no
barrier
for
unsolicited
messages
or
emails

   within
a
mailing
list
or
online
discussion
group

  Any
member
of
the
list
or
group
could
collect
and

   distribute
your
email
address
and
information
you
post

By
Internet
Browsers

  Most
web
browsers
can
save
some
forms
of
personal

   data,
such
as
browsing
history,
cookies,
web
form
entries

   and
password

  You
may
accidentally
reveal
such
information
when
using

   a
browser
on
a
public
computer
or
someone
else's

By
Search
Engines

  Search
engines
have
and
use
the
ability
to
track
each
one

  of
your
searches
by
IP
address,
search
terms
and
time
of

  day

How
Do
We
Know
‐
AOL

  Aug
7,
06
‐
AOL
apologized
for
releasing
search
log
data

   on
subscribers
that
had
been
intended
for
use
with
the

   company's
newly
launched
research
site.


  Almost
two
weeks
before
that,
AOL
had
quietly
released

   roughly
twenty
million
search
record
from
658,000
users

   on
their
new
AOL
Research
site.


  The
data
includes
a
number
assigned
to
the
anonymous

   user,
the
search
term,
the
date
and
time
of
the
search,

   and
the
website(s)
visited
as
a
result
of
the
search.

  NY
Times
was
able
to
identify
several
users
by
cross‐
   referencing
with
phonebooks/public
records

How
Do
We
Know
–
Department
of
Justice

  Jan
06,
the
US
Dept
of
Justice
issued
a
subpoena
asking

   popular
search
engines
to
provide
a
"random
sampling"

   of
1
million
IP
addresses
that
used
the
search
engine,
and

   a
random
sampling
of
1
million
search
queries
submitted

   over
a
one‐week
period.


  The
government
wanted
the
information
to
defend
a

   child
pornography
law.


  Microsoft,
Yahoo
and
AOL
complied
with
the
request,

   while
Google
fought
the
subpoena.

How
Do
We
Know
‐
Google

  Google
collects
massive
amounts
of
user
data

  Gmail
has
a
machine
reading
email
to
improve
the

   relevance
of
advertisements
displayed

  Google
Street
View
‐
public/private
property
&
people

   captured
in
images

  Search
histories
are
kept
for
two
years
and
identified
via

   a
cookie

By
Indirect
Marketing

  Web
bugs
‐
a
graphic
(in
a
website
or
a
graphic
enabled

   email)
that
can
confirm
when
the
message
or
web
page

   is
viewed
and
record
the
IP
address
of
the
viewer

  Third
party
cookies
‐
a
web
page
may
contain
images
or

   other
components
stored
on
servers
in
other
domains.

   Cookies
that
are
set
during
retrieval
of
these

   components
are
called
third‐party
cookies.

What
Are
Cookies?

  Cookies
are
data
packets
sent
by
a
server
to
a
web
client

   and
then
sent
back
unchanged
by
the
client
each
time
it

   accesses
that
server

  Cookies
are
used
for
authenticating,
session
tracking
and

   maintaining
specific
information
about
users,
such
as
site

   preferences
or
the
contents
of
their
electronic
shopping

   carts

  Cookies
are
only
data,
not
programs
or
viruses

  There
are
two
types
of
cookies
‐
persistent
and
non‐
   persistent

Why
Don’t
We
Like
Cookies?

  Cookies
can
be
hijacked
and
modified
by
attackers

  Cookies
can
be
used
to
track
browsing
behavior
so
some

  think
they
are
tagged

By
Direct
Marketing

  Direct
marketing
is
a
sales
pitch
targeted
to
a
person

   based
on
previous
consumer
choices.

  It
is
common
these
days

  Many
companies
also
sell
or
share
your
information
to

   others.
This
sharing
with
other
businesses
can
be
done

   rapidly
and
cheaply

By
Instant
Messaging

  Your
IM
conversation
can
be
saved
onto
a
computer
even

   if
only
one
person
agrees

  Workplace
IM
can
be
monitored
by
your
employer

  SPIM
‐
Spam
distributed
in
IM

By
Employers

  76%
of
employers
monitor
employees
website

   connections

  65%
use
technology
to
blocked
connections
to
banned

   websites

  55%
monitor
email

By
Cybercrime

  Spyware
takes
advantage
of
security
holes
to
attack
the

   browser
and
force
it
to
be
downloaded
and
installed
to

   gather
information
without
your
knowledge

  Phishing
occurs
when
criminals
lure
the
victim
into

   providing
financial
data
to
an
unsecure
website

  Pharming
occurs
when
criminals
plant
programs
in
the

   victim's
computer
which
redirect
the
victim
from

   legitimate
websites
to
scam
look‐alike
sites

Facebook
“Privacy”

Why Do You Know So Much About Me
Why Do You Know So Much About Me
Why Do You Know So Much About Me
Why Do You Know So Much About Me

More Related Content

What's hot

Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
eComm2008
 
Group 6 slides exploring web 2
Group 6 slides exploring web 2Group 6 slides exploring web 2
Group 6 slides exploring web 2
mimamendes
 
Group 6 slides exploring web 2
Group 6 slides exploring web 2Group 6 slides exploring web 2
Group 6 slides exploring web 2
Carla Gomes
 
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
Raj Goel
 

What's hot (19)

Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Search engine trends 2006
Search engine trends 2006Search engine trends 2006
Search engine trends 2006
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
Group 6 slides exploring web 2
Group 6 slides exploring web 2Group 6 slides exploring web 2
Group 6 slides exploring web 2
 
Group 6 slides exploring web 2
Group 6 slides exploring web 2Group 6 slides exploring web 2
Group 6 slides exploring web 2
 
Shaping our futures: the Social Semantic Web
Shaping our futures: the Social Semantic WebShaping our futures: the Social Semantic Web
Shaping our futures: the Social Semantic Web
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
 
Linking In-Game Events and Entities to Social Data on the Web
Linking In-Game Events and Entities to Social Data on the WebLinking In-Game Events and Entities to Social Data on the Web
Linking In-Game Events and Entities to Social Data on the Web
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social Networks
 
Aiim Webinar Helen Mitchell Unified Search Final 7 21 2010
Aiim Webinar Helen Mitchell  Unified Search Final 7 21 2010Aiim Webinar Helen Mitchell  Unified Search Final 7 21 2010
Aiim Webinar Helen Mitchell Unified Search Final 7 21 2010
 
Web 2.0 in Libraries: Theory and Practice
Web 2.0 in Libraries: Theory and PracticeWeb 2.0 in Libraries: Theory and Practice
Web 2.0 in Libraries: Theory and Practice
 

Similar to Why Do You Know So Much About Me

Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
mafer23
 
AISA - v6 - Damien Manuel
AISA -  v6 - Damien ManuelAISA -  v6 - Damien Manuel
AISA - v6 - Damien Manuel
Damien Manuel
 

Similar to Why Do You Know So Much About Me (20)

Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Privacy-Enhanced Personalization
Privacy-Enhanced PersonalizationPrivacy-Enhanced Personalization
Privacy-Enhanced Personalization
 
Zyra presentation
Zyra presentationZyra presentation
Zyra presentation
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Class_onlineprivacy.ppt
Class_onlineprivacy.pptClass_onlineprivacy.ppt
Class_onlineprivacy.ppt
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
Nova Spivack - Semantic Web Talk
Nova Spivack - Semantic Web TalkNova Spivack - Semantic Web Talk
Nova Spivack - Semantic Web Talk
 
Raab innovation begins with data
Raab innovation begins with dataRaab innovation begins with data
Raab innovation begins with data
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital Footprint
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
DIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptxDIWAN2 HUMSS 11 A.pptx
DIWAN2 HUMSS 11 A.pptx
 
AISA - v6 - Damien Manuel
AISA -  v6 - Damien ManuelAISA -  v6 - Damien Manuel
AISA - v6 - Damien Manuel
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Anuran, zyra m.
Anuran, zyra m.Anuran, zyra m.
Anuran, zyra m.
 

More from commandeleven

More from commandeleven (20)

Improving U.S.-Pakistan Relations: A Primer for the Trump Administration
Improving U.S.-Pakistan Relations: A Primer for the Trump AdministrationImproving U.S.-Pakistan Relations: A Primer for the Trump Administration
Improving U.S.-Pakistan Relations: A Primer for the Trump Administration
 
Succession & the Transfer of Power
Succession & the Transfer of PowerSuccession & the Transfer of Power
Succession & the Transfer of Power
 
Understanding Family Influence
Understanding Family InfluenceUnderstanding Family Influence
Understanding Family Influence
 
Succession and the Family Dynamic
Succession and the Family DynamicSuccession and the Family Dynamic
Succession and the Family Dynamic
 
Introduction to Family Businesses
Introduction to Family BusinessesIntroduction to Family Businesses
Introduction to Family Businesses
 
What is Strategy
What is StrategyWhat is Strategy
What is Strategy
 
Internet Metrics
Internet MetricsInternet Metrics
Internet Metrics
 
The Financial Metrics
The Financial MetricsThe Financial Metrics
The Financial Metrics
 
Customer Lifetime Value
Customer Lifetime ValueCustomer Lifetime Value
Customer Lifetime Value
 
Understanding & Segmenting Your Customer - Part I
Understanding & Segmenting Your Customer - Part IUnderstanding & Segmenting Your Customer - Part I
Understanding & Segmenting Your Customer - Part I
 
Agency Rules Media Kit
Agency Rules Media KitAgency Rules Media Kit
Agency Rules Media Kit
 
Customer Service & Digital Metrics
Customer Service & Digital MetricsCustomer Service & Digital Metrics
Customer Service & Digital Metrics
 
Introduction to Marketing Intelligence - Part II
Introduction to Marketing Intelligence - Part IIIntroduction to Marketing Intelligence - Part II
Introduction to Marketing Intelligence - Part II
 
War & Business Strategies
War & Business StrategiesWar & Business Strategies
War & Business Strategies
 
Understanding Family Influence
Understanding Family InfluenceUnderstanding Family Influence
Understanding Family Influence
 
Lecture 3 - Business Model
Lecture 3 - Business ModelLecture 3 - Business Model
Lecture 3 - Business Model
 
Lecture 2 - Idea Identification
Lecture 2 - Idea IdentificationLecture 2 - Idea Identification
Lecture 2 - Idea Identification
 
Lecture 1 - New Venture Creation
Lecture 1 - New Venture CreationLecture 1 - New Venture Creation
Lecture 1 - New Venture Creation
 
Lecture 4 - Business Planning
Lecture 4 - Business PlanningLecture 4 - Business Planning
Lecture 4 - Business Planning
 
Understanding & Segmenting Your Customer - Part II (MI)
Understanding & Segmenting Your Customer - Part II (MI)Understanding & Segmenting Your Customer - Part II (MI)
Understanding & Segmenting Your Customer - Part II (MI)
 

Recently uploaded

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Recently uploaded (20)

Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Why Do You Know So Much About Me