Digital Footprint: a Two-Sided Digital Business Model Where Your Privacy Is Someone Else's Business! by Tony Fish

Total Page:16

File Type:pdf, Size:1020Kb

Digital Footprint: a Two-Sided Digital Business Model Where Your Privacy Is Someone Else's Business! by Tony Fish My Digital Footprint: a two-sided digital business model where your privacy is someone else's business! By Tony Fish September 13 th 2009 - FINAL 1 Issue date September 2009 Copyright and Trademarks MY DIGITAL FOOTPRINT by Tony Fish is licensed under a Creative Commons Attribution-No Derivative Works 2.0 UK: England & Wales License . To view a copy of this licence, visit http://creativecommons.org/licenses/by-nd/2.0/uk/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California 94105, USA. © Copyright 2009 AMF Ventures Limited. All rights reserved. No part of this publication may be reproduced, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the correct attribution according to the Creative Commons License above. The license means you are free to copy, distribute, display, and perform the work as long as you give the correct attribution to MY DIGITAL FOOTPRINT and Tony Fish. You may not alter, transform, or build upon this work. Permissions beyond the scope of this license are available at www.mydigitalfootprint.com Published by: Futuretext, 36 St George Street. Mayfair, London, W1S 2FW. http://www.futuretext.com/ Although great care has been taken to ensure the accuracy and completeness of the information contained in this book, neither Futuretext Limited nor its author, contributors, employees or advisors are able to accept any legal liability for any consequential loss or damage, however caused, arising as a result of any actions taken on the basis of the information contained in this book. Certain statements in this book are forward-looking. Although AMF Ventures, the author and Futuretext believes that the expectations reflected in these forward- looking statements are reasonable, it can give no assurance that these expectations will prove to be correct. AMF Ventures, the author and Futuretext undertakes no obligation or liability due to any action arising from these statements. All third party brands and trademarks belong to their respective owners. 2 For Nicky, Ellie and Millie, my girls who always bring me mugs of tea and plenty of sunshine 3 Table of Contents Forward............................................................................................................................................. 1 Opening remarks – the author’s motivation and bias ........................................................................ 2 To those who have helped refine the story ....................................................................................3 The big picture .................................................................................................................................. 4 What are the links between identity and my digital footprint ?.............................................................. 13 Digital footprints .............................................................................................................................. 16 From digital footprints to MY DIGITAL FOOTPRINT ...................................................................................17 Inputs into MY DIGITAL FOOTPRINT ........................................................................................................20 Outputs – value created from digital footprints.............................................................................21 The paradox of privacy ................................................................................................................22 Who is harnessing your collective intelligence?....................................................................................... 23 Privacy – is your privacy someone else’s business? ............................................................................... 25 Perceptions of privacy............................................................................................................................. 30 Web 2.0 and Mobile Web 2.0.......................................................................................................... 31 Web 2.0 – the creation web .........................................................................................................33 The seven principles of Web 2.0 ............................................................................................................. 34 Principle one: web as a platform ............................................................................................................. 35 Principle two: harnessing collective intelligence ...................................................................................... 36 Principle three: data is the next ‘Intel inside’............................................................................................ 37 Principle four: end of the software release cycle...................................................................................... 38 Principle five: lightweight programming models....................................................................................... 38 Principle six: software above the level of a single device......................................................................... 39 Principle seven: a rich user experience................................................................................................... 39 Web 2.0 – a unified view based on harnessing collective intelligence.........................................39 The web as a platform .................................................................................................................41 Harnessing collective intelligence............................................................................................................ 41 Data is the next ‘Intel inside’.................................................................................................................... 42 End of the software release cycle............................................................................................................ 42 Lightweight programming models............................................................................................................ 42 Software above the level of a single device............................................................................................. 42 Rich user experiences............................................................................................................................. 42 Web 2.0 – summary................................................................................................................................ 43 Mobile Web 2.0............................................................................................................................43 Extending the web to restricted devices .................................................................................................. 44 Mobile Web 2.0 – value lies in getting data out from a device ................................................................. 45 my digital footprint ........................................................................................................................... 48 The Nobel Prize winner with a poor reputation ............................................................................48 Identity and digital footprints ........................................................................................................49 The six screens of life ..................................................................................................................50 The click streams of life ...............................................................................................................52 Converged click streams, Wikipedia button on my TV remote.....................................................54 After you have trodden this path come the analysts and the anthropologists ..............................55 Fish tails, a model to categorise data ..........................................................................................63 My digital footprint and the two-sided business model ......................................................................... 66 Identity – a telecoms perspective.................................................................................................69 Digital footprint: inputs and outputs..............................................................................................73 4 Inputs into MY DIGITAL FOOTPRINT ........................................................................................................73 Outputs – value created from digital footprints.............................................................................74 The enrichment feedback loop.....................................................................................................76 Contextual adaptation ............................................................................................................................. 77 Meaning ............................................................................................................................................. 77 Impact of the feedback loop ............................................................................................................... 77 Reputation .............................................................................................................................................. 78 Meaning ............................................................................................................................................
Recommended publications
  • How the Social Data Revolution Changes (Almost) Everything Speech Given at the World Innovation Forum in New York on June 8, 2010
    Andreas Weigend: How the Social Data Revolution Changes (Almost) Everything Speech given at the World Innovation Forum in New York on June 8, 2010. How the Social Data Revolution Changes (Almost) Everything June 8, 2010 Andreas S. Weigend, Ph.D. info: weigend.com twitter: @aweigend email: [email protected] Audio of the talk, slides and transcript are at weigend.com/blog/archives/210 Alright we have a lot to cover and I want to start with who of you has checked in here with Foursquare, Godwalla, etc.? So in the next 15 minutes I will change the way you think about data. I will think about data; how they're created, and think about how data is the digital air we breathe. How will this data which we create be shared? Everybody is a publisher. Every company is a publisher, and it's about building an ecosystem and participating, for all of you as individuals, and as companies in these ecosystems. Lastly, what is the intended use, and maybe what is the unintended use of those data? The first part of my talk, I want to talk to you about language change, behavior change, and the language – how we move from collecting, soliciting, mining, and segmenting data and people; from sniffing the digital exhaust if you will, to sharing, to distributing, to interpreting data, and by doing so, to actually empowering employees as well as outside people, helping our customers to help us. Let's take a step back in history. Think about some of the technologies that enabled innovation.
    [Show full text]
  • Tracking My Digital Footprint a Guide to Digital Footprint Discovery and Management
    Tracking my Digital Footprint A guide to digital footprint discovery and management © CROWN COPYRIGHT 2015 | TRACKING MY DIGITAL FOOTPRINT: A GUIDE TO DIGITAL FOOTPRINT DISCOVERY AND MANAGEMENT © Crown Copyright 2015 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation or favour by CPNI. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage (whether direct, indirect or consequential, and including but not limited to, loss of profits or anticipated profits, loss of data, business or goodwill) incurred by any person and howsoever caused arising from or connected with any error or omission in this document or from any person acting, omitting to act or refraining from acting upon, or otherwise using the information contained in this document or its references. You should make your own judgment as regards use of this document and seek independent professional advice on your particular circumstances. 1 © CROWN COPYRIGHT 2015 | TRACKING MY DIGITAL FOOTPRINT: A GUIDE TO DIGITAL FOOTPRINT DISCOVERY AND MANAGEMENT “Every day most of us contribute to an evolving public presentation of who we are that anyone can see and that we cannot erase. We might think we are at home on our laptops, cell phones or iPads communicating with just a few people on
    [Show full text]
  • What's Your Digital Footprint?
    What’s your digital footprint? Teacher’s guide and handouts Introduction: This lesson plan introduces students to the concepts of privacy and professionalism online. Students will search for their “digital footprint,” or publicly available information tied to them on the web, on popular social media sites like Facebook, Instagram, Twitter and LinkedIn. Students discuss what it means to be professional and then change their privacy settings on their social networks to reflect their wishes. Learning Objectives: ● Students are aware of what information about themselves is publicly available ● Students can name at least two ways to protect their personal information and identity on social networks ● Students know how to alter security settings on common social networks, including Facebook, Twitter and Instagram ● Students can describe characteristics that differ between a “professional” and “unprofessional” digital footprint for an entry level internship Estimated Duration: 30-60 minutes (depends on length of discussion) Ages: 13+ (may need to be adjusted for younger students) -- see important notes section below Materials: ● Pencil or pen ● Worksheet (provided) ● Computers, tablets or smart phones ● Internet access to social media sites ● Ground Rules set by the class Important Notes: ● Social media searches may bring up compromising information or images on some of your students that they may not wish to share with others. ● Anticipate that some students may find information they find upsetting when searching themselves, such as cyberbullying. ● Consider allowing students to opt out, or modifying the in-class activity to focus on a profile you have already vetted, such as yourself, a fake profile, a celebrity or colleague. Scenario: Tell the student he/she is about to apply for a position as a social media intern at a local radio station.
    [Show full text]
  • Your Digital Footprint
    Intel® Learn Easy Steps Activity Card Digital Footprint Your Digital Footprint Are you wondering what happens to the information you share online? Are you worried about posting details about yourself on the Internet? Would you like to know how to better share your personal information? Making sure you understand how your data is stored, shared, and found online is an important part of protecting yourself online. Your digital footprint, or the trail of data left behind by users on digital devices, and how it is maintained is an important aspect of your online safety. This trail of data not only builds an online reputation, but will follow you into the future and even into your offline life. How to Understand Your Digital Footprint A. While browsing the web (Passive User Footprint) Cookies and Browsing History 1. Browsing History: You can clear your browser’s History or manage settings to customize when or how long your browser retains your History. 2. Cookies: Cookies are small files, consisting of letters and numbers, placed on your computer, tablet, phone, or similar device, when you use that device to visit a web site. Cookies are widely used by web site owners to make their web sites operate, work more efficiently, and provide analytic information (Intel). You can turn Cookies off in your browser’s Preferences. B. While adding content to the web (Active User Footprint) 1. Community Member: As members of any community, we should be conscious of how we present ourselves in public arenas, including the Internet. Even though it is possible to delete content from online profiles, or cancel an account altogether, the data was shared and could be saved by other users or by the entity or service being accessed.
    [Show full text]
  • Online Reputation Checklist Your Digital Footprint Is the Mark That You Leave Behind When Using the Internet and Can Shape Your Online Reputation
    Online Reputation Checklist Your digital footprint is the mark that you leave behind when using the internet and can shape your online reputation. Your digital footprints can be positive or negative and shape how people see you now or in the future. Use our simple checklist to help manage and maintain your online reputation. Search yourself online: do you know what is online about you? Do a simple web search of your name and see what you can fi nd. If you fi nd something you aren’t happy with, take the necessary steps to get that content removed. Remember, if your Facebook or Twitter pages appear you can change this by adjusting your privacy settings. Check privacy settings: make sure you know what information you are sharing on the websites you use, in particular on social networking sites. Most social networking sites have privacy settings to help you manage the content you share and who you share it with; you can decide if you want your posts to be shared with your online friends and followers only or with the public. Keep in mind that your friend’s content and their settings can also affect your digital footprint. Think before you post: before you post that funny picture of your friend, or make that joke about someone on Twitter, ask yourself do you want everyone to see it; friends, family, grandparents, future employers? Would you be happy for others to post that type of content about you? You should be proud of everything you post online, remember once it is online it could potentially be there forever! Deactivate and delete: when you stop using a social networking profi le or website, it’s a good idea to deactivate or delete your account.
    [Show full text]
  • Digital Footprints: Your Unique Identity Juanita Blue ● Joan Condell ● Tom Lunney
    Digital Footprints: Your Unique Identity Juanita Blue ● Joan Condell ● Tom Lunney Digital Footprints: Your Unique Identity Juanita Blue Joan Condell Tom Lunney University of Ulster University of Ulster University of Ulster Derry, Northern Ireland, UK Derry, Northern Ireland, UK Derry, Northern Ireland, UK [email protected] [email protected] [email protected] In the digital age where Human Computer Interaction is creating large and entirely unique digital footprints, online accounts and activities can prove to be a valuable source of information that may contribute to verification that an asserted identity is genuine. Online social contextual data – or ‘Digital identities’ -- pertaining to real people are built over time and bolstered by associated accounts, relationships and attributes. This data is difficult to fake and therefore may have the capacity to provide proof of a ‘real’ identity. This paper outlines the design and initial development of a solution that utilizes data sourced from an individual’s digital footprint to assess the likelihood that it pertains to a ‘real’ identity. This is achieved through application of machine learning and Bayesian probabilistic modelling techniques. Identity; Authentication; Digital Footprint, Privacy; Security 1. INTRODUCTION As individuals spend increasing amounts of time 2010). In a cyber context, this social identity is interacting online, the line between their physical lives demonstrated via an individual’s digital footprint. and their digital lives is becoming increasingly blurred. Therefore, it may be surmised that the same Digital footprints map and record the activities that behaviours possess the potential to aid authentication substantiate each individual’s online life.
    [Show full text]
  • Lesson 1.3: Digital Footprint and Reputation
    7/2/2020 CodeHS Course: CSTA Course 3A | Module: Digital Citizenship and Cyber Hygiene Lesson 1.3: Digital Footprint and Reputation https://codehs.com/course/6103/lesson/1.3 In this lesson, students understand how they can control and protect their footprint. As students use the Internet, they are building their digital Description footprint. This includes social media posts, emails, picture and video uploads amongst other online activities. Students will be able to: Understand how their online activity contributes to a permanent and Objective public digital footprint Articulate their own social media guidelines to protect their digital footprint 1.3.1 Video: Digital Footprint and Reputation 1.3.2 Quiz: Digital Footprint and Reputation 1.3.3 Free Response: Building a Positive Digital Footprint Activities 1.3.4 Connection: Right to be Forgotten? 1.3.5 Free Response: Right to be Forgotten 1.3.6 Free Response: What is your Digital Footprint? Prior Knowledge No prior knowledge needed. Review the slides and activities for the lesson before the start of class. There is a handout that accompanies this lesson. It can be used as an in-class activity or a homework assignment. Determine how and if this handout will be used and make the appropriate number of Planning Notes printouts prior to the class period. In this lesson, several popular social media platforms are mentioned. If students are using other social media platforms not discussed, work with students to figure out how to control privacy on these accounts. Standards Addressed Teaching and Learning Strategies Lesson Opener: https://codehs.com/library/6103/printable_lesson_plan/1.3 1/3 7/2/2020 CodeHS Have your students create an identity word cloud.
    [Show full text]
  • View Ourselves, Interact with Each Other, and Make Decisions
    ANDREAS WEIGEND Chief Scientist at Amazon (2002 - 2004) Andreas Weigend is a leading behavioral marketing expert. His career as a scientist, data strategist and quantitative methods innovator has enabled him to bridge the gap between industry and academia. As the Chief Scientist of Amazon.com, he developed data mining techniques including session-based marketing, and designed applications ranging from heuristic cross-selling to customer network and lifecycle analysis. Weigend currently teaches the graduate course Data Mining and Electronic Commerce at Stanford University. "My expertise is in social and mobile technologies and in consumer behavior: I study people and the data they create. In today's increasingly digitized world, consumers are sharing data in unprecedented ways. This Social Data Revolution represents a deep shift in how people make purchasing decisions." "I advise companies that want to embrace this new reality of social data. Together, we design interactive platforms and real-time systems, empowering them and their customers to make better choices. Previously, as the Chief Scientist of Amazon.com, I helped to build the customer-centric, measurement-focused culture that has become central to Amazon's success." "I lecture at Stanford University on social data and e-commerce, and direct the Social Data Lab. I also share my insights on the untapped power of data at company events and top conferences around the globe. I received my Ph.D in Physics from Stanford University." "My goal is to guide my clients through the evolving landscape of consumer behavior and data to identify new business opportunities. The results of my work changes the way business leaders perceive the value of data and the future of relationships." "Through workshops and corporate seminars I help my clients define user-centric metrics of engagement, and invent incentives that inspire users to create and share.
    [Show full text]
  • Time-Varying Networks Approach to Social Dynamics: from Individual to Collective Behavior
    UNIVERSITAT POLITÈCNICA DE CATALUNYA PHDTHESIS Time-varying networks approach to social dynamics: From individual to collective behavior Candidate Supervisor Michele Starnini Prof. Romualdo Pastor-Satorras October 2014 Abstract In this thesis we contribute to the understanding of the pivotal role of the temporal dimension in networked social systems, previously neglected and now uncovered by the data revolution recently blossomed in this field. To this aim, we first introduce the time-varying networks formalism and an- alyze some empirical data of social dynamics, extensively used in the rest of the thesis. We discuss the structural and temporal properties of the human contact networks, such as heterogeneity and burstiness of social interactions, and we present a simple model, rooted on social attractiveness, able to reproduce them. We then explore the behavior of dynamical processes running on top of temporal networks, constituted by empirical face-to-face interactions, address- ing in detail the fundamental cases of random walks and epidemic spreading. We also develop an analytic approach able to compute the structural and percolation properties of activity driven model, aimed to describe a wide class of so- cial interactions, driven by the activity of the individuals in- volved. Our contribution in the rapidly evolving framework of social time-varying networks opens interesting perspec- tives for future work, such as the study of the impact of the temporal dimension on multi-layered systems. iv Contents Invitation 1 1 From empirical data to time-varying networks 3 1.1 Time-varying networks formalism ............... 6 1.1.1 Basics on temporal networks .............. 8 1.1.2 Time-respecting paths .................
    [Show full text]
  • Our Digital Footprint: Protecting the Next Generation of Field Personnel
    Karen Ann Tremper | 187 Our Digital Footprint: Protecting the Next Generation of Field Personnel Karen Ann Tremper DOI: 10.7252/Paper. 000055 About the Author Karen Ann Tremper is a Professor and Director of Global Life at Life Pacifc College. Served with Wyclife Bible Translators and YWAM and is an ordained minister in the Foursquare Church. 188 | Our Digital Footprint: Abstract We live in a global community that continues to become exceedingly smaller. As universities and colleges face the challenges of preparing students to “go to the ends of the earth” it has become evident that providing outstanding curriculum is not the only aspect of preparation they must consider. Te specifc language used to promote their programs must be adjusted since their audience has expanded well beyond their perspective or current students. Internet access has allowed the global community to visit universities and their program oferings online. As degree programs seek to neutralize their language a further element that must be addressed is the extracurricular programs that supplement student learning. Te issue more precisely is the digital footprint that is left by the university and students themselves through social media, not limited to the university’s website. Tis digital footprint, if not properly neutralized, can have ramifcations in the future for a student whose heart is for the mission feld. Tis paper seeks to address the need to consider changes in the language used to describe extracurricular programs as well as the use of social media and its potentially damaging digital footprint on the future of the next generation of feld personnel.
    [Show full text]
  • Predicting Political Orientation of News Articles Based on User Behavior Analysis in Social Network
    IEICE TRANS. INF. & SYST., VOL.E97–D, NO.4 APRIL 2014 685 PAPER Special Section on Data Engineering and Information Management Predicting Political Orientation of News Articles Based on User Behavior Analysis in Social Network Jun-Gil KIM†, Nonmember and Kyung-Soon LEE†a), Member SUMMARY News articles usually represent a biased viewpoint on con- ion can be seen as sympathy for the opinion of the orig- tentious issues, potentially causing social problems. To mitigate this media inal tweet. bias, we propose a novel framework for predicting orientation of a news • Highly active users have rich relationships to other article by analyzing social user behaviors in Twitter. Highly active users tend to have consistent behavior patterns in social network by retweeting users by retweeting behavior to express their sympa- behavior among users with the same viewpoints for contentious issues. The thy. bias ratio of highly active users is measured to predict orientation of users. • Users’ sentiments in tweets depends on their political Then political orientation of a news article is predicted based on the bias orientation and the viewpoint of the news article ratio of users, mutual retweeting and opinion analysis of tweet documents. The analysis of user behavior shows that users with the value of 1 in bias Based on the observation, our assumptions are as fol- ratio are 88.82%. It indicates that most of users have distinctive orientation. Our prediction method based on orientation of users achieved 88.6% per- lows: (1) Highly active users may have consistent behavior formance in accuracy. Experimental results show significant improvements patterns in social network.
    [Show full text]
  • Network Science Pdf Free Download
    NETWORK SCIENCE PDF, EPUB, EBOOK Albert-Laszlo Barabasi,Márton Pósfai | 474 pages | 19 Dec 2016 | CAMBRIDGE UNIVERSITY PRESS | 9781107076266 | English | Cambridge, United Kingdom Network Science PDF Book His finding? Understanding the structure and behavior of these networks will help us do some amazing things, from designing the optimal organization of a firm to stopping a disease outbreak before it spreads catastrophically. The committee addressed this situation by conducting two inquiries. The components of modern communication and information networks are the result of technologies based on fundamental knowledge emanating from physics, chemistry, and materials science. Typically, engineered networks designed with one set of social behaviors in mind are, over time, exploited by disruptive elements e. Networks are classified in four different categories:. Working to discover and inspire fundamentally new ways to measure, model, predict and visualize meaningful interactions and interconnectivity of social, physical and technological systems. A revolutionary new theory showing how we can predict human behavior. Collective intelligence Collective action Self-organized criticality Herd mentality Phase transition Agent-based modelling Synchronization Ant colony optimization Particle swarm optimization Swarm behaviour. The lede currently tells us that network science is the study of networks, but it doesn't say what a network is. Squartini, D. Evolution and adaptation. The SIR model is currently the Kermack McKendrick model, which basically
    [Show full text]