SlideShare ist ein Scribd-Unternehmen logo
1 von 49
A Two Sided Digital Business Model where  your Privacy will be someone else's business !   Tony Fish Sept 2009 http://www.mydigitalfootprint.com
identity is split, but connected digital identity physical identity bonds  bridges relationships reputation privacy  risk  trust
physical identity has certain traits digital identity physical identity bonds  bridges relationships reputation certification person organisation identification authentication Government & NGO trade privacy  risk  trust
digital identity has different traits digital identity physical identity bonds  bridges relationships reputation certification person organisation identification authentication Government & NGO trade barriers implementation management characteristics privacy  risk  trust
digital identity has different traits digital identity physical identity bonds  bridges relationships reputation barriers implementation management characteristics privacy  risk  trust
 
core themes for my digital footprint dependences data mydigitalfootprint value business models  collection store  analysis relationships security risk privacy trust law regulation identity (physical & digital) intent reputation discovery recommendation protection personalisation trade or barter context  who owns the data? two sided model rainbow of trust mobile, web,TV passive/ active need, inspiration, entertainment
value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
in simple terms store click data content my data analysis value social data capture
stages to build my digital footprint store click data content my data analysis value ownership  and  movable algorithm  =  differentiation rights  and  cash digital footprint Behavioural  DNA feedback loop (sensory.net) social data capture
traditional mobile value chain Application Content Service Provision Terminal  Equipment Middle- ware Network  operator Network Equipment User
consumer centric value Internet (IP) mobile access WiFi, WiMax, HSDPA, DVB-H,  WCDMA, Bluetooth, GSM, 3G context, payment security, identity music full web browse, search social Blog, RSS, tag Communication Voice, IM, SMS, video entertainment Video, games, mobile TV location Maps, LBS, geotag payment Consumer centric mobile value model www.opengardensblog.futuretext.com
blind men and elephant The blind men and the elephant  © Jason Hunt The blind men and the elephant.  © Paul Davenport
7 principals of web 2.0 Web 2.0 Harnessing  collective Intelligence Data is the Intel inside End of the s/w Release cycle Lightweight  Programming models S/W above a Single device Rich user  experience Web As A  Platform
unified view of web 2.0 The Intelligent web Harnessing collective Intelligence Harnessing  collective Intelligence Data is the Intel inside End of the s/w Release cycle Light wt  Programming models S/W above a Single device Rich user  experience Web As A  Platform
harnessing collective intelligence ,[object Object],c) The PC: selecting and configuring the service a) Harnessing collective intelligence
More ‘OFF’ : Less ‘ON’ on this screen in this earpiece consume createion x content where time intent direction who
identity is not a digital footprint ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],identity digital footprint Black hole  of debate
6 screens of life big screens small screens Cinema (shared with other members of the public) TV (shared privately within our homes) PC (personal or shared use)  Fixed/Portable Players (fixed devices in things that move such as cars, planes, etc)  Information screens e.g. iPod, radio The mobile device, an individual and personalised handheld device
value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
relationship between time and data 10% 20% 30% 40% 50% 60% 70% 80% 90% measure  of  time Source: AMF Ventures  www.amfventures.com TV .. in front of the PC … spent with a mobile in your pocket ,[object Object],[object Object],[object Object],from watching TV from engaging with a PC/Web generated from  a mobile device typical day  10% 20% 30% 40% 50% 60% 70% 80% 90% 0% 0% 100% 100% value generated from data analysis measure  of  value
mashup value from mobile, web and broadcast mashup create consume create create consume consume broadcast MMD WMD BMD mobile web
digital footprint and behavioural DNA digital footprint Click content my behavioural DNA INPUT ANALYSIS Algorithm OUTPUT service improvement (existing) web TV mobile m2m service discovery (new) web TV mobile m2m trade or barter collection store analysis value social
understanding the analysis issue  original  data build algorithm behavioural model current individual data all new user data improve algorithm algorithm your data trigger or threshold Alert/ Action ,[object Object],[object Object],[object Object],[object Object],existing data existing analysis recommendation ,[object Object],[object Object],[object Object],new data (user) new data (social) intent reputation discovery protection personalisation trade/ barter context CHAOS  (develop linkage)
types of data input for a digital footprint
generic data types
Fish Tail’s, a model to categorise data time Short bursts of data, with varying amount of information Continuous feed of data, may vary on amount of data available Continuous feed of data, depending on use  Infrequent and small data bursts
data is inter-related communication social behavioural payment consumption creation e-mail/ IM/ SMS/ voice links/ FOAF/ click/  review/ tag/ blog routes and routines, loyalty card,  professional, clubs, affiliation credit card, debit card, cash,  contactless, direct, cheque  favourite, preference, style, genre,  occurrence, video, music, audio,  application type, style, tools, pattern, themes  records certificates, health, exam, DOB,  Council, government, passport
two sided digital business Actual  User  Data Actual  User  Data Actual  User  Data “ The  Business”  The User Direct feedback In Direct feedback collection store analysis value friends social norms
two worlds collide context personalis- ation recommend- ation requirement/ enforcement/policy security trust login authent ication proof recognition/ desire/ peer pressure/ community attention location time search content create Identity access content consume purchase banking discovery reputation corporate Digital Footprint individual community Inputs collection outputs value who  benefits motivation database store/analysis Closed loop of feedback and improvement trade or barter billing accuracy colour intent activity AAS protection Behavioural DNA
yesterday’s fragmented network wireless voice data video application layer control layer connection layer
today’s network voice data video cellular application layer control layer all IP connection layer WLAN access and connection
correlated authentication browser packet  access authenticate reverse proxy proxy cached policy rules identity system authN  service HSS Enhanced HSS policy server HSS IDS integrations using SAML AuthN and polices (for QoS, SLA, access controls etc)
example – new way to offer mobile security store moveable digital footprint behavioural  DNA adverse  behaviour Click content my normal  behaviour graceful  opening  location route time routine restrictions  unique  override  closing  time  Take raw data  to new provider confidence assurance collection analysis value
creating the virtuous circle collection store analysis value TRUST RISK PRIVACY
build or erode privacy capital PRIVACY erode build PRIVACY  CAPITAL Who You  Are  Routes And Routines Patterns And  Preferences  Higher FUD  Fear, Uncertainty  and Doubt lower  FUD positive feedback negative  feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
build or erode risk capital Risk erode build Risk  CAPITAL gut  feel  home  and  personal business  And  financial  higher  FUD lower  FUD positive feedback negative  feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
build or erode trust capital Trust erode build TRUST  CAPITAL Reputation And  Recommendation Patterns And  Preferences  higher  FUD lower  FUD positive feedback negative  feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
bonded but not related TRUST RISK IDENTITY PRIVACY SECURITY Increasing closed Increasing open High Control High Value Justification of benefits Justification of barriers
implication (for content consumption)   … change in information and decision making cycle Message to make you aware Purchase Consume DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Preferences Business Activity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],collection collection collection Store Analysis Value
data classification Static Dynamic Behavioural Factual Profile Data  Credit rating Address etc Demographic data, ACORN etc Dynamic Metadata Derived Patterns Routes Routines Actual activity in comms, purchases etc – “microdata” Searches / Clicks Content creation ,[object Object],[object Object],[object Object],[object Object]
‘ Rainbow of Trust’
rainbow of trust Based on a complementary market segmentation open simple structured cautious dangerous ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],my-way one-way accept authority untrusting and wise untrusting and stupid
migration my-way one-way accept authority untrusting and wise untrusting and stupid
engaged  prepared to engage  with my digital footprint NOT prepared to engage  with my digital footprint sit back and  enjoy the benefits controlling economically  unviable
I own my data I give up my data Enable 3rd party to use and exploit  their data to generate benefits in  kind and / or cash for a percentage  of revenue business model’s Model  Enable 3 rd  party to use and exploit  your data to generate benefits in  kind and / or cash for a percentage  of revenue 8 Pay for enhancement to service (subscription or one off) 1 Trade data for enhancement directly with service provider 2 Trade data for enhancement via a third party (indirect) such  as an aggregation party 3 Pay for services directly (subscription or one off) 4 Pay to protect your identity  7 Trade data for services via a third party (indirect) such  as an aggregation party 6 Trade data for service directly with service provider 5
strategic issues competitor VOT tribes Value Porter’s model focus differentiation/ segmentation lowest  cost profit cost services access GYM club no  change game  changing
structural problems device tethered generic network platform applications & content closed open locked net neutrality deliver capture closed  mobile  ecosystem  open  mobile  ecosystem no  change game  changing
femtocell

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Impact of technology on humans' social interaction
Impact of technology on humans' social interactionImpact of technology on humans' social interaction
Impact of technology on humans' social interactionSiphiwe Komwa
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Impact of internet in day to day life
Impact of internet in day to day lifeImpact of internet in day to day life
Impact of internet in day to day lifeVidhyalakshmi K
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
10 Advantages and Disadvantages of Social Media for Society
10 Advantages and Disadvantages of Social Media for Society10 Advantages and Disadvantages of Social Media for Society
10 Advantages and Disadvantages of Social Media for Societyaloyce japhet
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentationA K DAS's | Law
 
Social media addiction
Social media addictionSocial media addiction
Social media addictionTaimur
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosisMelanieWente
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on YouthSubham Dwivedi
 

Was ist angesagt? (20)

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber security
Cyber securityCyber security
Cyber security
 
Impact of technology on humans' social interaction
Impact of technology on humans' social interactionImpact of technology on humans' social interaction
Impact of technology on humans' social interaction
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Impact of internet in day to day life
Impact of internet in day to day lifeImpact of internet in day to day life
Impact of internet in day to day life
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
10 Advantages and Disadvantages of Social Media for Society
10 Advantages and Disadvantages of Social Media for Society10 Advantages and Disadvantages of Social Media for Society
10 Advantages and Disadvantages of Social Media for Society
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentation
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Technology creates social isolation and neurosis
Technology creates social isolation and neurosisTechnology creates social isolation and neurosis
Technology creates social isolation and neurosis
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 

Andere mochten auch

Tony Fish Canto Slideshare
Tony Fish Canto   SlideshareTony Fish Canto   Slideshare
Tony Fish Canto SlideshareTony Fish
 
Trace Evidence
Trace EvidenceTrace Evidence
Trace Evidenceannperry09
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009Tony Fish
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprintKatrine Mosfjeld
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintJai (Phillip) Djwa
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintDean Shareski
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital FootprintsEric Cole
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?Jessica Gramp
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3Margaret Donaghue
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Denny McCorkle
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Examination of blood
Examination of bloodExamination of blood
Examination of bloodQuan Fu Gan
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpointducklvr9
 

Andere mochten auch (20)

Tony Fish Canto Slideshare
Tony Fish Canto   SlideshareTony Fish Canto   Slideshare
Tony Fish Canto Slideshare
 
Trace Evidence
Trace EvidenceTrace Evidence
Trace Evidence
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital Footprint
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Forensic Serology: BLOOD
Forensic Serology: BLOODForensic Serology: BLOOD
Forensic Serology: BLOOD
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Examination of blood
Examination of bloodExamination of blood
Examination of blood
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
1. trace evidence
1. trace evidence1. trace evidence
1. trace evidence
 
Forensic science dna
Forensic science dnaForensic science dna
Forensic science dna
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 

Ähnlich wie My Digital Footprint

Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Tony Fish
 
Mobile, Mobile, Data
Mobile, Mobile, DataMobile, Mobile, Data
Mobile, Mobile, DataTony Fish
 
Uniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeUniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeTony Fish
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile WorkshopTony Fish
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent Tony Fish
 
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
5733   a deep dive into IBM Watson Foundation for CSP (WFC)5733   a deep dive into IBM Watson Foundation for CSP (WFC)
5733 a deep dive into IBM Watson Foundation for CSP (WFC)Arvind Sathi
 
TechConnectr's Big Data Connection. Digital Marketing KPIs, Targeting, Analy...
TechConnectr's Big Data Connection.  Digital Marketing KPIs, Targeting, Analy...TechConnectr's Big Data Connection.  Digital Marketing KPIs, Targeting, Analy...
TechConnectr's Big Data Connection. Digital Marketing KPIs, Targeting, Analy...Bob Samuels
 
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14Digiday
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClairMihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClairMihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClairMihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClairMihnea Galeteanu
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClairMihnea Galeteanu
 
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.Webs.nl B2B Inbound Marketing
 
Mobile for associations & nonprofits
Mobile for associations & nonprofitsMobile for associations & nonprofits
Mobile for associations & nonprofitskflo0202
 
Comarch Mobile Services And Applications
Comarch Mobile Services And ApplicationsComarch Mobile Services And Applications
Comarch Mobile Services And ApplicationsComarch
 
iPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchiPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchchrisvanaart
 
The Future of Applied Marketing Research
The Future of Applied Marketing ResearchThe Future of Applied Marketing Research
The Future of Applied Marketing ResearchKelly Page
 

Ähnlich wie My Digital Footprint (20)

Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
Mobile, Mobile, Data
Mobile, Mobile, DataMobile, Mobile, Data
Mobile, Mobile, Data
 
Uniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeUniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLife
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent
 
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
5733   a deep dive into IBM Watson Foundation for CSP (WFC)5733   a deep dive into IBM Watson Foundation for CSP (WFC)
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
 
TechConnectr's Big Data Connection. Digital Marketing KPIs, Targeting, Analy...
TechConnectr's Big Data Connection.  Digital Marketing KPIs, Targeting, Analy...TechConnectr's Big Data Connection.  Digital Marketing KPIs, Targeting, Analy...
TechConnectr's Big Data Connection. Digital Marketing KPIs, Targeting, Analy...
 
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
WTF is a Data Strategy? - WTF Programmatic UK, 11/11/14
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Product Map
Product MapProduct Map
Product Map
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Fishbowl Model - Team enClair
Fishbowl Model - Team enClairFishbowl Model - Team enClair
Fishbowl Model - Team enClair
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
DFB2B 2016- Mogelijkheden vandaag de dag in B2B zijn ongekend.
 
Mobile for associations & nonprofits
Mobile for associations & nonprofitsMobile for associations & nonprofits
Mobile for associations & nonprofits
 
Comarch Mobile Services And Applications
Comarch Mobile Services And ApplicationsComarch Mobile Services And Applications
Comarch Mobile Services And Applications
 
iPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchiPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and research
 
The Future of Applied Marketing Research
The Future of Applied Marketing ResearchThe Future of Applied Marketing Research
The Future of Applied Marketing Research
 

Mehr von Tony Fish

Big Data.... and digital footprint
Big Data.... and digital footprintBig Data.... and digital footprint
Big Data.... and digital footprintTony Fish
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish
 
Loyalty world
Loyalty world Loyalty world
Loyalty world Tony Fish
 
managing entrepreneurial teams
managing entrepreneurial teamsmanaging entrepreneurial teams
managing entrepreneurial teamsTony Fish
 
Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Tony Fish
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?Tony Fish
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital youTony Fish
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital AgeTony Fish
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?Tony Fish
 
New rules for living in a digital age
New rules for living in a digital ageNew rules for living in a digital age
New rules for living in a digital ageTony Fish
 
What is a digital footprint?
What is a digital footprint?What is a digital footprint?
What is a digital footprint?Tony Fish
 
MWC Mobile Web 2
MWC Mobile Web 2MWC Mobile Web 2
MWC Mobile Web 2Tony Fish
 
Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web AppsTony Fish
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobileTony Fish
 
Mobile Web 2.0 11 June 2008 Osney
Mobile Web 2.0 11 June 2008 OsneyMobile Web 2.0 11 June 2008 Osney
Mobile Web 2.0 11 June 2008 OsneyTony Fish
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey ResultsTony Fish
 
Future of Mobile
Future of MobileFuture of Mobile
Future of MobileTony Fish
 

Mehr von Tony Fish (19)

Uniliever
UnilieverUniliever
Uniliever
 
Big Data
Big Data Big Data
Big Data
 
Big Data.... and digital footprint
Big Data.... and digital footprintBig Data.... and digital footprint
Big Data.... and digital footprint
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12
 
Loyalty world
Loyalty world Loyalty world
Loyalty world
 
managing entrepreneurial teams
managing entrepreneurial teamsmanaging entrepreneurial teams
managing entrepreneurial teams
 
Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Managing Entrepreneurial Teams
Managing Entrepreneurial Teams
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
New rules for living in a digital age
New rules for living in a digital ageNew rules for living in a digital age
New rules for living in a digital age
 
What is a digital footprint?
What is a digital footprint?What is a digital footprint?
What is a digital footprint?
 
MWC Mobile Web 2
MWC Mobile Web 2MWC Mobile Web 2
MWC Mobile Web 2
 
Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web Apps
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobile
 
Mobile Web 2.0 11 June 2008 Osney
Mobile Web 2.0 11 June 2008 OsneyMobile Web 2.0 11 June 2008 Osney
Mobile Web 2.0 11 June 2008 Osney
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
Future of Mobile
Future of MobileFuture of Mobile
Future of Mobile
 

Kürzlich hochgeladen

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 

Kürzlich hochgeladen (20)

Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

My Digital Footprint

  • 1. A Two Sided Digital Business Model where your Privacy will be someone else's business ! Tony Fish Sept 2009 http://www.mydigitalfootprint.com
  • 2. identity is split, but connected digital identity physical identity bonds bridges relationships reputation privacy risk trust
  • 3. physical identity has certain traits digital identity physical identity bonds bridges relationships reputation certification person organisation identification authentication Government & NGO trade privacy risk trust
  • 4. digital identity has different traits digital identity physical identity bonds bridges relationships reputation certification person organisation identification authentication Government & NGO trade barriers implementation management characteristics privacy risk trust
  • 5. digital identity has different traits digital identity physical identity bonds bridges relationships reputation barriers implementation management characteristics privacy risk trust
  • 6.  
  • 7. core themes for my digital footprint dependences data mydigitalfootprint value business models collection store analysis relationships security risk privacy trust law regulation identity (physical & digital) intent reputation discovery recommendation protection personalisation trade or barter context who owns the data? two sided model rainbow of trust mobile, web,TV passive/ active need, inspiration, entertainment
  • 8. value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
  • 9. in simple terms store click data content my data analysis value social data capture
  • 10. stages to build my digital footprint store click data content my data analysis value ownership and movable algorithm = differentiation rights and cash digital footprint Behavioural DNA feedback loop (sensory.net) social data capture
  • 11. traditional mobile value chain Application Content Service Provision Terminal Equipment Middle- ware Network operator Network Equipment User
  • 12. consumer centric value Internet (IP) mobile access WiFi, WiMax, HSDPA, DVB-H, WCDMA, Bluetooth, GSM, 3G context, payment security, identity music full web browse, search social Blog, RSS, tag Communication Voice, IM, SMS, video entertainment Video, games, mobile TV location Maps, LBS, geotag payment Consumer centric mobile value model www.opengardensblog.futuretext.com
  • 13. blind men and elephant The blind men and the elephant © Jason Hunt The blind men and the elephant. © Paul Davenport
  • 14. 7 principals of web 2.0 Web 2.0 Harnessing collective Intelligence Data is the Intel inside End of the s/w Release cycle Lightweight Programming models S/W above a Single device Rich user experience Web As A Platform
  • 15. unified view of web 2.0 The Intelligent web Harnessing collective Intelligence Harnessing collective Intelligence Data is the Intel inside End of the s/w Release cycle Light wt Programming models S/W above a Single device Rich user experience Web As A Platform
  • 16.
  • 17. More ‘OFF’ : Less ‘ON’ on this screen in this earpiece consume createion x content where time intent direction who
  • 18.
  • 19. 6 screens of life big screens small screens Cinema (shared with other members of the public) TV (shared privately within our homes) PC (personal or shared use) Fixed/Portable Players (fixed devices in things that move such as cars, planes, etc) Information screens e.g. iPod, radio The mobile device, an individual and personalised handheld device
  • 20. value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence
  • 21.
  • 22. mashup value from mobile, web and broadcast mashup create consume create create consume consume broadcast MMD WMD BMD mobile web
  • 23. digital footprint and behavioural DNA digital footprint Click content my behavioural DNA INPUT ANALYSIS Algorithm OUTPUT service improvement (existing) web TV mobile m2m service discovery (new) web TV mobile m2m trade or barter collection store analysis value social
  • 24.
  • 25. types of data input for a digital footprint
  • 27. Fish Tail’s, a model to categorise data time Short bursts of data, with varying amount of information Continuous feed of data, may vary on amount of data available Continuous feed of data, depending on use Infrequent and small data bursts
  • 28. data is inter-related communication social behavioural payment consumption creation e-mail/ IM/ SMS/ voice links/ FOAF/ click/ review/ tag/ blog routes and routines, loyalty card, professional, clubs, affiliation credit card, debit card, cash, contactless, direct, cheque favourite, preference, style, genre, occurrence, video, music, audio, application type, style, tools, pattern, themes records certificates, health, exam, DOB, Council, government, passport
  • 29. two sided digital business Actual User Data Actual User Data Actual User Data “ The Business” The User Direct feedback In Direct feedback collection store analysis value friends social norms
  • 30. two worlds collide context personalis- ation recommend- ation requirement/ enforcement/policy security trust login authent ication proof recognition/ desire/ peer pressure/ community attention location time search content create Identity access content consume purchase banking discovery reputation corporate Digital Footprint individual community Inputs collection outputs value who benefits motivation database store/analysis Closed loop of feedback and improvement trade or barter billing accuracy colour intent activity AAS protection Behavioural DNA
  • 31. yesterday’s fragmented network wireless voice data video application layer control layer connection layer
  • 32. today’s network voice data video cellular application layer control layer all IP connection layer WLAN access and connection
  • 33. correlated authentication browser packet access authenticate reverse proxy proxy cached policy rules identity system authN service HSS Enhanced HSS policy server HSS IDS integrations using SAML AuthN and polices (for QoS, SLA, access controls etc)
  • 34. example – new way to offer mobile security store moveable digital footprint behavioural DNA adverse behaviour Click content my normal behaviour graceful opening location route time routine restrictions unique override closing time Take raw data to new provider confidence assurance collection analysis value
  • 35. creating the virtuous circle collection store analysis value TRUST RISK PRIVACY
  • 36. build or erode privacy capital PRIVACY erode build PRIVACY CAPITAL Who You Are Routes And Routines Patterns And Preferences Higher FUD Fear, Uncertainty and Doubt lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
  • 37. build or erode risk capital Risk erode build Risk CAPITAL gut feel home and personal business And financial higher FUD lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
  • 38. build or erode trust capital Trust erode build TRUST CAPITAL Reputation And Recommendation Patterns And Preferences higher FUD lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
  • 39. bonded but not related TRUST RISK IDENTITY PRIVACY SECURITY Increasing closed Increasing open High Control High Value Justification of benefits Justification of barriers
  • 40.
  • 41.
  • 42. ‘ Rainbow of Trust’
  • 43.
  • 44. migration my-way one-way accept authority untrusting and wise untrusting and stupid
  • 45. engaged prepared to engage with my digital footprint NOT prepared to engage with my digital footprint sit back and enjoy the benefits controlling economically unviable
  • 46. I own my data I give up my data Enable 3rd party to use and exploit their data to generate benefits in kind and / or cash for a percentage of revenue business model’s Model Enable 3 rd party to use and exploit your data to generate benefits in kind and / or cash for a percentage of revenue 8 Pay for enhancement to service (subscription or one off) 1 Trade data for enhancement directly with service provider 2 Trade data for enhancement via a third party (indirect) such as an aggregation party 3 Pay for services directly (subscription or one off) 4 Pay to protect your identity 7 Trade data for services via a third party (indirect) such as an aggregation party 6 Trade data for service directly with service provider 5
  • 47. strategic issues competitor VOT tribes Value Porter’s model focus differentiation/ segmentation lowest cost profit cost services access GYM club no change game changing
  • 48. structural problems device tethered generic network platform applications & content closed open locked net neutrality deliver capture closed mobile ecosystem open mobile ecosystem no change game changing

Hinweis der Redaktion

  1. Field service engineering on a mobile device is about collection not about input At this point you should be screaming PRIVACY, SECURITY, How this takes us to issues of privacy and trust. Lets come back to speak about the rainbow of trust. But lets look at the enterprise 2.0
  2. Mobile is a platform and not and service. There is more value in getting data off a mobile device than to it. View this chart from the direction of the customer, the story is that the yellow side is how the generic business market operates today and has done and will continue to do so. The green side is this new world of 2.0 thinking. Participation, networking effect and web as a platform. I will conclude that mobile is a platform and that There is more value in getting data off a mobile device than to it. Lets start with who benefits in the yellow, the existing and ongoing way of doing business We took a thin scrape of this data to produce an entire advertising industry. The green side description But how does this lead me to conclude that there is more value in getting data off a mobile device than to it. Lets consider the fact that the mobile is in your pocket from the moment to wake to the time you return to sleep, during that time it knows what you are doing, where you are doing it, applicators. From the consumers perspective this device can become the method for collecting data that could be helpful for other services that I would like to consume. The automation of this collected data can become my performance CV, it could be my reward calculator, it help the serach engine know when I type paris in …. Further - is there more value in know what you are doing or who you are doing it with? Given that sales for your customers is about acquiring new customer, knowing who, as part of your social group, could provide enormous value.
  3. Service differentiation based on trust Let me start with a consumer walking into carphone warehouse. The person say’s – hello Mr sales man, I am a blue person. What the sales understanding from this is that this person wants an unfettered device, it has not constraints and they will sort out all the IT problems themselves, if they down load something, they will sort it. Mr Red, he only wants to do online and mobile banking Mr purple wants the walled garden Mr beige wants voice and text There customer are differentiated based on their trust in both the device, the SP and their provider of the service. It terms of enterprise customers, they will vary by their attitude to risk. The analysis needed is not but product but by profit and profile to risk. Do you want risk adverse or balanced risk, I don’t know as I don’t know the profit by type.