Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Monetising the mobile Internet”

Similar presentations


Presentation on theme: "“Monetising the mobile Internet”"— Presentation transcript:

1 “Monetising the mobile Internet”
30 minutes and 126 slides

2 Purpose

3

4 I am not going to tell you more about

5 what you already know..

6 I am going to challenge you to

7 rethink as the direction you are

8 heading …… is wrong!

9 Stand up

10 Wanted to know what I am talking to

11 young, fresh, and available minds

12 or dull, grey, done and seen it all

13 tonyfish www linkedin skype twitter facebook
CEO and Founder

14 Sarah Blow

15 Assumptions

16 3 minutes

17 Do you believe, like me, that there

18 is now a trade for your privacy?

19 consumption of content
Symbiotic Relationships Web business depend on consumer data web services and value creation of content analysis data store digital data trade Data consumption of content business consumer

20 Do you believe, like me, that the

21 role of a consumer has changed?

22 two sided digital business
In Direct feedback norms social Actual User Data friends Actual User Data Actual User Data The User “The Business” Direct feedback

23 Do you believe, like me, that

24 Mobile is unique?

25 I believed enough to write

26 Tony Fish Oct 2009 A Two Sided Digital Business Model where
your Privacy will be someone else's business ! Tony Fish Oct 2009

27 1 2 3 4 5 6 7 8 I own my Data I Give up my Data
Pay for enhancement to service (subscription or one off) 2 Trade data for enhancement directly with service provider 3 Trade data for enhancement via a third party (indirect) such as an aggregation party 4 Pay for services directly (subscription or one off) 5 Trade data for service directly with service provider 6 Trade data for services via a third party (indirect) such as an aggregation party 7 Pay to protect your identity 8 Enable 3rd party to use and exploit your data to generate benefits in kind and / or cash for a percentage of revenue Enable 3rd party to use and exploit their data to generate benefits in kind and / or cash for a percentage of revenue

28 If you have the same beliefs

29 as me

30 this will not be another boring

31 presentation on mobile content

32 if you don’t believe then

33 don’t clap at the end

34 Longer version

35 Web 2.0 Mobile Web 2.0 RSS Affiliation Blogs tags Folksonomy
Remixability Joy of use Affiliation Blogs tags Social software Web 2.0 wikis Folksonomy Podcasting Standardisation The long tail Participation Recommendation Information Me, identity Open API IM mashup metadata Audio video content Sync Search AJAX Unified messaging Services Music Games, gambling Portability Data driven Convergence Cross media services Voice 3rd Party applications Mobile content Micro payments Multilingual Mobile Web 2.0 Awareness Content messaging Usability SMS Location Mobile Search User individuality Small Screen Device pocketability I am a tag Navigation Icon/ Bling mtags Size Weight Icon, logo, ringtones Personalisation Voice to tag Battery

36 Mobile web 2.0 mobile content I am a tag my identity AJAX/ widgets
Capturing Content at the Point of inspiration I am a tag my identity AJAX/ widgets Mobile web 2.0 Harnessing Collective Intelligence digital convergence Extending the web multilingual mobile access 7 principals of change Mobile content – capturing content at the point of inspiration, the create consume balance I am a Tag – not a number, change of my identity, who am I in a digital world Multilingual access – the global village Digital convergance and mash-ups’ Ajax – user experience to dir for Search Location – attention, Uniquely mobile mobile search Location

37 Ecosystem in balance Point of inspiration
night out friends family gathering holiday colleagues User creates content and publishes it Personal capture Personal creation Personal Tagging User Device Access Platform Enablers News e.g publishing e.g hosting, integration with WWW Sport e.g phone smartphone e.g GSM WiFi UMTS Events Events e.g search e.g payment security, DRM News Sport User Device Access Platform Enablers Professional Editing Content creation Professional capture Content created for the user to consume reality movie Adult concert cartoon music Point of entertainment

38 Consumption of digital media
Screens of life Cinema TV PC Car TV/ Airplane Mobile Phone/PDA iPod/ DAB shared Public Private personal The six screens of life Fixed Carried Carry Fundamental to all this change is how we as users are consuming on the 6 screens of life. The world of content started on a stage, but the first screen is cinema, push baby push. This is a shared/public screen. Followed by the TV, shared but private. The came the personal screen, here change occurs. The primary function is no longer video image entertainment, it takes on a wider remit. The PC, the sit forward, generator of content, consumer of data – a new balance. The car – small personal TV, but with some personal features, but not limited by power/ processor power. The mobile – carried, personal, private, create/ consume in perfect balance, Text, voice…. The ipod, information and navigation The method and mechanism by which we interact with our screen of life is changing. However he underlying content and delivery is also changing – the change from web 1.0 to web 2.0 Carry communicate Carry informational mobile content

39 Value between creation and consumption
Creation/ Publish Consumption Relevance Voting Index Tags Search ID Footprint Verification Attention Payment Location ‘Portability’ Blog Wikki Journal Book Paper TV Movie Music Screens of life Private Personal Collaboration Public Secret shared Public Private personal Fixed Carried Carry Carry communicate Carry informational Content management DRM tools Ad engines UI, navigation Service, storage, backup

40 Call LCR Find Locate Message IM Chat Mail Video call Meet Your tags connection My Number My Numbers My ID My Data Your Data Your ID new search directory directories My tags old search I am a tag my identity connection

41 Telco same idea

42 different customer…..

43

44

45 and everyone realised “customer information is value”

46 digital footprints – context
Black hole of debate Identity Privacy Proof of who I am Driving licence Bank details Credit history Social security Certification Regulated and institution controlled Emotional Preference Status Regulation Law Digital Footprint Collection, store, analysis and value created from digital data from mobile, web and TV Click data Content data my data my social network

47 identity is split, but connected
relationships physical identity digital identity privacy risk trust bonds bridges reputation

48 physical identity has certain traits
certification relationships Government & NGO person organisation physical identity digital identity privacy risk trust bonds bridges identification authentication trade reputation

49 digital identity has different traits
relationships barriers implementation physical identity digital identity privacy risk trust bonds bridges management characteristics reputation

50

51 Tony Fish July 2009 A Two Sided Digital Business Model where
your Privacy will be someone else's business ! Tony Fish July 2009

52 Observations Is there any reason why mobile should be different?
Let’s be clear, everyone wants to be able to gain knowledge about you as a consumer and then milk the trade or barter. What is the relationship between Facebook and a broadband pipe Is there a relationship between Mac OS and MySpace Does an ISP collect data about a users search or Google Using mobile payment, flirting, dating, click ads, latitude you give up your data The broadband model is simple, pay …computer/ access Applications, content and services are a mix of free and paid for Is there any reason why mobile should be different?

53 Yes…. because

54 mobile can do ‘stuff’ that you cannot

55 do on the web and via broadcast

56 value from mobile, TV and web data
Attention Browse Search Click Create Consumer MOBILE WEB Location Attention Browse Search Time Who Click Create Consume Presence Broadcast/ Listen View Preference Time Presence Point of inspiration Point of entertainment Point of need

57 the implication is that

58 in simple terms the model becomes

59 in simple terms click data store analysis value content my data
social data collection

60 stages to build my digital footprint
click data store analysis value content my data (sensory.net) ownership and movable algorithm = differentiation rights and cash social data collection digital footprint Behavioural DNA feedback loop

61 mashup value from mobile, web and broadcast
create consume MMD consume create mashup broadcast BMD WMD web create consume

62 If we now add in where the user is

63 we see the user appears twice

64 as a provider and as a consumer

65 the provider the consumer In Direct feedback Actual User Data Actual
Norms Social Actual User Data Friends Actual User Data Actual User Data The User Direct feedback collection store analysis value

66 Feedback is critical as it delivers

67 refinement, accuracy, context, colour & flavour

68 adding where the business should be situated

69 In Direct feedback Actual User Data Actual User Data Actual User Data
Norms Social Actual User Data Friends Actual User Data Actual User Data The User “The Business” Direct feedback collection store analysis value

70 What’s the issue

71 who owns the data!

72 More ‘OFF’ : Less ‘ON’ consume createion x on this screen content who
where Field service engineering on a mobile device is about collection not about input At this point you should be screaming PRIVACY, SECURITY, How this takes us to issues of privacy and trust. Lets come back to speak about the rainbow of trust. But lets look at the enterprise 2.0 in this earpiece time direction intent consume createion x

73 UnIqUeNeSs Summary of this part, when thinking about mobile, think what can I do on with the mobile platform that I cannot do with an alternative platform of mobile

74 Where is the value? consume createion x on this screen content who
Field service engineering on a mobile device is about collection not about input At this point you should be screaming PRIVACY, SECURITY, How this takes us to issues of privacy and trust. Lets come back to speak about the rainbow of trust. But lets look at the enterprise 2.0 in this earpiece time direction intent consume createion x

75 I assume you will consume on the 6 screens of life

76 6 screens of life big screens small screens
Fixed/Portable Players (fixed devices in things that move such as cars, planes, etc) Cinema (shared with other members of the public) The mobile device, an individual and personalised handheld device TV (shared privately within our homes) PC (personal or shared use) Information screens e.g. iPod, radio

77 However, when we consider the “types” of data

78 at the point of need, inspiration and entertainment

79 Fish Tail’s, a model to categorise data
Short bursts of data, with varying amount of information Continuous feed of data, may vary on amount of data available Continuous feed of data, depending on use Infrequent and small data bursts time

80 The important issue is not the type

81 but how quickly you can replicate the data

82 As if I can replicate quickly

83 I have no need to be loyal

84 data is inter-related behavioural communication social creation
routes and routines, loyalty card, professional, clubs, affiliation behavioural communication social / IM/ SMS/ voice links/ FOAF/ click/ review/ tag/ blog creation consumption type, style, tools, pattern, themes favourite, preference, style, genre, occurrence, video, music, audio, application payment credit card, debit card, cash, contactless, direct, cheque records certificates, health, exam, DOB, Council, government, passport

85 understanding the analysis issue
credit card current individual data original data new data (user) new data (social) all new user data build algorithm existing data improve algorithm behavioural model CHAOS (develop linkage) existing analysis algorithm your data intent context trigger or threshold protection reputation personalisation discovery trade/ barter Alert/ Action recommendation single usefulness norms provide good prediction socially acceptable single data set multi user input data multiple output influence rather than outcome

86 types of data input for a digital footprint

87 consumption of content
Symbiotic Relationships Web business depend on consumer data web services and value creation of content analysis data store digital data trade Data consumption of content business consumer

88 example – new way to offer mobile security
Click content my collection digital footprint moveable Take raw data to new provider store closing time analysis unique override normal behaviour behavioural DNA location route time routine value assurance restrictions graceful opening adverse behaviour confidence

89 What does this mean?

90 If Mobile Web 2.0 thinking is valid

91 Certain players are weak

92 As they cannot get critical “data”

93

94 Mobile 2.0 and Web 2.0 company’s are strong

95 As able to get ‘long’ data

96

97 industry strategic issues
profit Value game changing cost no change differentiation/ segmentation lowest cost Porter’s model access focus services VOT tribes competitor GYM club

98 structural problems net neutrality network game changing open mobile
ecosystem closed mobile ecosystem no change locked applications & content open platform closed deliver capture tethered device generic

99

100 directory market – outsiders view
profit Value game changing cost no change exploiting data charge / ads Business model data focus services directories competitor Spoke, linkedin, Plaxo, 123 People, Belocal

101 structural problems – outsiders view
value user data game changing no change cost open platform closed deliver content capture “nothing” brand value progressive

102 and the business models become …..

103 1 2 3 4 5 6 7 8 I own my Data I Give up my Data Model
Pay for enhancement to service (subscription or one off) 2 Trade data for enhancement directly with service provider 3 Trade data for enhancement via a third party (indirect) such as an aggregation party 4 Pay for services directly (subscription or one off) 5 Trade data for service directly with service provider 6 Trade data for services via a third party (indirect) such as an aggregation party 7 Pay to protect your identity 8 Enable 3rd party to use and exploit your data to generate benefits in kind and / or cash for a percentage of revenue Enable 3rd party to use and exploit their data to generate benefits in kind and / or cash for a percentage of revenue

104 and creating this world requires

105 a virtuous circle TRUST RISK PRIVACY collection store analysis value

106 bonded but not related RISK TRUST PRIVACY

107 build or erode privacy capital
Higher FUD Fear, Uncertainty and Doubt lower FUD erode build PRIVACY CAPITAL Who You Are Routes And Routines Patterns And Preferences lower propensity to engage and only gain standard services Higher propensity to engage more and get better services negative feedback positive feedback

108 Ways of looking at privacy
Consider the same chart from the perspective of people who need to know the data and how many you trust with the data public many few one my health family stuff private thoughts passport cash in account login & ID pin numbers who owns your car certificates facebook blog page location where I work status my phone number bank account car plate number number political views

109 thoughts account status number number your car phone number
public many few one thoughts account status number number your car phone number pin numbers where I work political views my health family stuff login & ID certificates blog page passport location cash in private facebook car plate who owns bank account my

110 build or erode risk capital
higher FUD lower FUD erode build Risk CAPITAL gut feel home and personal business And financial lower propensity to engage and only gain standard services Higher propensity to engage more and get better services negative feedback positive feedback

111 build or erode trust capital
higher FUD lower FUD erode build TRUST CAPITAL Reputation And Recommendation Patterns And Preferences lower propensity to engage and only gain standard services Higher propensity to engage more and get better services negative feedback positive feedback

112 bonded but not related High Value TRUST RISK Increasing open IDENTITY
Justification of benefits TRUST RISK Increasing open IDENTITY Increasing closed PRIVACY SECURITY High Control Justification of barriers

113 ‘Rainbow of Trust’ Service differentiation based on trust
Let me start with a consumer walking into carphone warehouse. The person say’s – hello Mr sales man, I am a blue person. What the sales understanding from this is that this person wants an unfettered device, it has not constraints and they will sort out all the IT problems themselves, if they down load something, they will sort it. Mr Red, he only wants to do online and mobile banking Mr purple wants the walled garden Mr beige wants voice and text There customer are differentiated based on their trust in both the device, the SP and their provider of the service. It terms of enterprise customers, they will vary by their attitude to risk. The analysis needed is not but product but by profit and profile to risk. Do you want risk adverse or balanced risk, I don’t know as I don’t know the profit by type.

114 rainbow of trust untrusting and stupid untrusting and wise
Based on a complementary market segmentation untrusting and stupid untrusting and wise accept authority one-way my-way dangerous cautious structured simple open give up data without thought passive click on anything no firewall loss of ID follow and lead early and late social leads selective privacy protected many persona thoughtful advised likes portal mass market must work marketing works banking know limits will explore follow will expand un-tethered fashion no help discovery push boundaries social lead

115

116 Question?

117 Are you brave enough to stand alone?

118 I can deal with silence - only clap if
You are my mum (who believes in everything I say) You want to talk to me at coffee break You have the same beliefs It challenged you You’re a lemon and have to follow the crowd You don’t want to look like the only person who did understand what was said PLEASE Don’t bother being polite as it will not help me or you

119 take away’s

120 don’t assume

121 trust

122 Market is completely open

123 Data is a commodity and ownership is unimportant
Data is a commodity and ownership is unimportant. Value will be retained by those who get the deep and dirty in the management of complexity for getting information in, stored and out. In the New Kingdom, Loyalty is Dead, Trust is the Challenger, the Princes’ are Brands, the Princesses are Simplicity, Attention is Queen and customer metadata is King.

124

125 Thank you


Download ppt "“Monetising the mobile Internet”"

Similar presentations


Ads by Google