Archive for December, 2013

A Holiday list of VRM links

December 25, 2013

New VRM developers (in alphabetical order, two from Australia, one from New Zealand)

  • Flamingo. Descriptions:  Personalizing Customer Experience…Empowering businesses…>Flamingo knows that true customer empowerment is achieved by empowering businesses too. Thankfully technology and some clever analytics allow us to do just that….>We have a unique set of tools, created especially for business that will empower individuals across sales, marketing, service, support and business intelligence to know what experience customers and potential customers actually want. Our research tells us organisations that can do this get significant competitive advantage and bottom line growth.
  • Meeco. The Blog. Descriptions: >Your dashboard for life. >It’s time to make digital life simple. >>Be rewarded for being you… >Meeco is a new and easy way to manage your life and the data inside your personal cloud…>Meeco’s beautiful dashboard means one click to your favourite brands, bill payments, travel, banking and shopping…>Meeco gives you a private browser so you control, manage and track your own habits, providing you with rich insight… >>When you decide to share or signal what you want, you can do it anonymously or identified with the brands your trust in exchange for value, discounts or financial reward…  >Meeco will never sell your data because we know it’s yours.
  • MyWave. The Blog. Descriptions: Really putting customers at the centre of the relationship…Founded by former SAP North America President Geraldine McBride in 2013, MyWave is leading a fundamental change in the way enterprises do business with their customers – and how customers interact with enterprises…MyWave’s services and technology platform provide the means for enterprises to evolve away from the existing but outdated push‑based transaction model to a new two-way permission-based relationship based on Mutual Value…MyWave Customer Experience Consulting Services – Customer experience design experts who help businesses re-imagine their customer experiences through the lens of the customer, moving business from the old push-based transaction model to a personalized model….MyWave CMR technology platform – CMR turns CRM on its head by putting the customer in control of getting those personalized experiences anytime, anywhere, on any device. The MyWave CMR platform is constructed so that the customer owns their data. This removes privacy concerns and allows a new dynamic based on trust, advocacy and mutual value in each exchange.

Privacy

Hellbound handbasketry

VRooMy links

December 14, 2013

VRM developments

  • List of developers and related projects and people on the ProjectVRM wiki. Please make or send your updates.
  • Phil Windley: Intention Generation: Fuse and VRM. Pull-quotage:Fuse, our connected-car product is an intention generator. Here’s a few examples:
    • When Fuse sees your gas tank is nearly empty it can generate an intention to buy gas.
    • When Fuse indicates it’s time for an oil change or tire rotation, it can generate an intention to have the car serviced.
    • When the vehicle raises a diagnostic code, Fuse can generate an intention to get the car fixed.
    • When insurance is up for renewal, Fuse can generate an intention to solicit quotes for a new policy.
    • Geofences could be linked to intentions.
    • Even a crash, sensed by Fuse’s accelerometers, is an intention to seek emergency services.

    As an intention generator Fuse could be seen as a brand-new way for companies to spy on drivers. But we don’t think it has to be that way. If Fuse is going to generate intentions that can be acted on while preserving owner choice and privacy, it must also provide owners with two things:

    1. A way to see, select, and interact with vendors—both those who the owner has an existing relationship with and those who might be good candidates for future purchases.
    2. A way to use intentions and the make the choices that only the owner can make. For example, when my insurance is due, Fuse needs to ask me if I’m happy with my current insurance before going out to solicit bids.

    Both of these features are about providing owner choice and putting the owner in control. In the terminology of VRM, the thing providing these features is typically called the “4th party” and refers to the system that is acting on the customer’s behalf.

  • Customer Commons Web Pal.
  • Joshua Kopstein in The New Yorker: The mission to decentralize the Internet. Has this line: … average users can create personal clouds to store data that they can access anywhere, without relying on a distant data center owned by Dropbox or Amazon.

Privacy

Business

  • Jamie Smith: Thinking about Moments and Thinking about Context.
  • Karl Bode in Broadband ReportsAT&T Offers $70 1 Gbps in Austin — With a Big Catch. Pull-quote: “The asterisks (**) on the Premiere offer indicates that you must agree to participate in AT&T Internet Preferences behavioral tracking and ad service if you want that price point. Internet Preferences “may use your Web browsing information, like the search terms you enter and the Web pages you visit, to provide you relevant offers and ads tailored to your interests,” says AT&T. That’s a thirty dollar markup from Google Fiber pricing simply for not wanting to have your online activity watched and monetized by AT&T. While Google tracks search history, cookies and GPS location data, AT&T’s Internet Preferences appears to use deep packet inspection (a la Phorm or NebuAD) to monitor each and every packet, including how long you spend on specific websites.
  • Johannes Ernst: There are only three business models.

Big Data, meet Big Privacy

December 6, 2013

Look up “big data” (with the quotes) today on Google, and you’ll results that look like this:

Basically, a heap of hype. The only visible organic search results are a Wikipedia article and the a May 2011 report that McKinsey wrote for corporate customers. I am sure some of those same customers are among the advertisers hogging acreage in search results.

Whenever you see a money river that gets bigger and bigger while flowing in a circle, you’ve looking at a mania. That’s what we see here, and in Google Trends as well:

Big Data today is entirely an obsession of the B2B (Business to Business) world. It may fuel B2C (Business to Consumer); but the consumer does not participate except as a source of data and as a target for marketing messages guided by Big Data analytics. So, while we get to witness the Big Data mania as individuals, we don’t participate in it.

But we will.

Think about computing before it got personal around the turn of the ’80s. Before then, “personal computer” was an oxymoron. But eventually computers became something everybody had. Today our phones are computers. The same thing happened with networking. Before the Internet got huge in the mid-’90s, networking was something companies and governments did.  Today computing and networking are fully personal as well as fully corporate. And far more value is generated by people computing and networking than by companies doing it only with themselves and each other.

It’s a good bet that Big Data will follow the same path. Individuals will be able to do far more with data of all sizes than would ever be possible in the B2B world alone.

Meanwhile, the B2B appetite for “big data,” and eagerness to use it to market at us, has raised privacy as an issue. Back in the pre-Internet world, privacy wasn’t very controversial. We all knew what it was, and how to protect it most of the time. In the new digital world, we don’t, except through relatively primitive means, such as ad and tracking blocking. In The Rise of Ad Blocking, published in August 2013, PageFair found an average ad blocking rate of 22.7%. On some browsers it’s much higher:

This is the market speaking.

So is Big Privacy: Bridging Big Data and the Personal Data Ecosystem Through Privacy by Design, a paper published today by Ann Cavoukian, Ph.D. and Drummond Reed. Ann is the Information & Privacy Commissioner for Ontario, Canada, and Drummond is Co-Founder and CEO of Respect Network. Ann is also behind Privacy By Design, which “advances the view that the future of privacy cannot be assured solely by compliance with legislation and regulatory frameworks; rather, privacy assurance must become an organization’s default mode of operation.”

Both Ann and Drummond are coming from the customer side of the C2B relationship. In other words, they are coming from the need for VRM ways to solve market problems and open up new opportunities. It also goes straight after “big data”:

Recent technological and business developments have given rise to a new understanding of personal information. It is now being compared to currency and energy1—often being referred to as “the new oil.” It is an economic asset generated by the identities and behaviors of individuals and their technological surrogates. These metaphors, which express its increasing economic value to organizations, ring especially true in the case of Big Data. Indeed, Big Data derives economic value from its use of personal information to such an extent that if personal information is considered to be “the new oil,” then Big Data is the machinery that runs on it.

However, like our current dependence on fossil fuels, Big Data’s current use of personal information is unsustainable, increasingly resulting in “pollution” via privacy infringement. At the moment, individuals have little, if any, control over their information’s use and disclosure in Big Data analytics. In addition to a host of privacy concerns, this lack of informational self-determination gives rise to an uneven exchange of the economic value. While the owners of Big Data algorithms profit from their use and disclosure of personal information, the individuals the personal information relates to do not—at least not directly. If not properly addressed, the privacy and economic concerns raised by Big Data threaten to decrease individuals’ willingness to share their personal information—in effect, cutting off the flow of the “oil” on which the analytic “machinery” of Big Data runs.

The report describes the Personal Data Ecosystem (PDE) as “the emerging landscape of companies and organizations that believe individuals should be in control of their personal information and directly benefit from its use, making available a growing number of tools and technologies to enable such control,” adding (in boldface type), “So if privacy infringement is the negative externality that Big Data frequently ignores, the PDE is the emerging positive externality that can turn the combination into a positive-sum outcome where both data subjects and Big Data users benefit.
The paper defines Big Privacy this way:

Big Privacy is Privacy by Design writ large, i.e., it is the application of the 7 principles of Privacy by Design, not only to individual organizations, applications, or contexts, but to entire networks, value chains, and ecosystems, especially those that produce and use Big Data. The goal of Big Privacy is the systemic protection of personal data and radical personal control over how it is collected and used. Radical control is an embodiment of “informational self- determination”—the right enshrined in the German Constitution relating to the individual’s ability to determine the fate of one’s information.12 This means that it must be possible to assure whole populations that their privacy is being respected because the network, value chain, and/or ecosystem producing and processing Big Data has implemented Privacy by Design at a system-wide level, enabling individuals who consent to the use of their personal information to reap a proportion of the benefits. 

The paper goes on to detail seven architectural elements of Big Privacy:

  1. Personal Clouds
  2. Semantic Data Interchange
  3. Trust Frameworks
  4. Identity and Data Portability
  5. Data-By-Reference (or Subscription)
  6. Accountable Pseudonyms
  7. Contractual Data Anonymization

These in turn leverage the  “Seven Foundational Principles of Privacy by Design”:

  1. Proactive not Reactive; Preventative not Remedial
  2. Privacy as the Default Setting
  3. Privacy Embedded into Design
  4. Full Functionality – Positive-Sum, not Zero-Sum
  5. End-to-End Security – Full Lifecycle Protection
  6. Visibility and Transparency – Keep it Open
  7. Respect for User Privacy – Keep it User-Centric

ProjectVRM gets a mention. I’d also like to add a pointer to the Personal Data Ecosystem Consortium, which has done pioneering work in the PDI, and whose work pulls toward the future alongside ours here.

The paper also does the best job I’ve seen yet of explaining the Respect Trust Framework and XDI, both of which normally require a lot of mental chewing to get down. They still do; just less this time.

I’ve always thought that XDI was a brilliant and elegant solution looking for a problem. I still do. The difference now is that it’s found the right one.