Copyright 2012 1 Consumer-Oriented Social Media as Market Opportunity Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science,

Slides:



Advertisements
Similar presentations
Broadcast Connect Generate to the Worldyour Communities traffic & Revenue.
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
StopPreviousNext Vicnet Internet training course Workbook 10 Websites in your language The Internet Интернет ا Το ιαδίκτυο Easy English workbook July 2010.
Copyright Privacy as a Strategic Factor in Social Media: An Analysis Based on the Concepts of Trust and Distrust Roger Clarke Xamax Consultancy,
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
Copyright A 'Fair Go' for Creatives in a Digital Environment Roger Clarke Xamax Consultancy, Canberra Chair, AEShareNet Limited & Visiting.
Distributed Systems Architectures
Chapter 7 System Models.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Task Group Chairman and Technical Contact Responsibilities ASTM International Officers Training Workshop September 2012 Scott Orthey and Steve Mawn 1.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
1 State Wildlife Action Plans Wiki: Business Transformation Tutorial Brand Niemann July 5, 2008
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
LIBRARY WEBSITE, CATALOG, DATABASES AND FREE WEB RESOURCES.
40 Tips Leveraging the New APICS.org to the Benefit of Your Organization, Members, and Customers! 1.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Lost in Translation Measuring and Managing GOOD Web Intentions Marilyn Harmacek. 1.
- A Powerful Computing Technology Department of Computer Science Wayne State University 1.
1. 2 Objectives Become familiar with the purpose and features of Epsilen Learn to navigate the Epsilen environment Develop a professional ePortfolio on.
B2B Solutions Study Summary Charts June – September 2013.
Where to find information…. What topics this presentation covers: Strategic Planning Developing a Business Plan Developing a Marketing Plan Risk Management.
Impressive Star Softwares (P) Ltd. Presents Sent Item Box-Detail of Mails from Tally ( 1.0 )
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Discovering Computers Fundamentals, 2012 Edition
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Taiwan ITQ.
LFCDS SkyMail & SkyDrive Full Student Orientation
Creating a WordPress Website Oklahoma Conference of The UMC Department of Communications 1.
Operating Systems Operating Systems - Winter 2012 Dr. Melanie Rieback Design and Implementation.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Services Course Windows Live SkyDrive Participant Guide.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
1 How Do I Order From.decimal? Rev 05/04/09 This instructional training document may be updated at anytime. Please visit and check the.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 Wiki Tutorial. 2 Outline of Wiki Tutorial 1) Welcome and Introductions 2) What is a wiki, and why is it useful for our work in moving forward the program.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 3.
The library as organizer of digital information
Analyzing Genes and Genomes
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Chapter 11 Creating Framed Layouts Principles of Web Design, 4 th Edition.
Essential Cell Biology
Energy Generation in Mitochondria and Chlorplasts
RefWorks: The Basics October 12, What is RefWorks? A personal bibliographic software manager –Manages citations –Creates bibliogaphies Accessible.
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
South Dakota Library Network MetaLib User Interface South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD © South Dakota.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
1 What is the Internet Archive We are a Digital Library Mission Statement: Universal access to human knowledge Founded in 1996 by Brewster Kahle in San.

Our Digital World Second Edition
Social Media.
Social Media Policy ADM – E 21. CHS Social Media Policy Social media = media designed to be disseminated through social interaction, created using highly.
Creating Collaborative Partnerships
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
Online Information Services and Social Media Social Networking.
LESSON 3 – ONLINE COMMUNICATION Mr Cole. ONLINE COMMUNITIES  People who are computer literate, and have the equipment, can form groups or ‘societies’
Copyright COMP 2410 – Networked Information Systems IC3 – Web 2.0 and Social Media Roger Clarke Xamax Consultancy, Canberra Visiting Professor,
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
Web 2.0.
Business in a Connected World
Presentation transcript:

Copyright Consumer-Oriented Social Media as Market Opportunity Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW, Sydney COSMO-1211 {.html,.ppt} Conference on Privacy in the Social Networked World Meiji University, Tokyo – 20 November 2012

Copyright Consumer-Oriented Social Media as Market Opportunity Agenda Social Media Features Business Model Privacy Concerns COSM Opportunities Features Business Models Exemplars

Copyright Social Media A Business-Oriented Classification Kaplan & Haenlein (2010)

Copyright A Participant-Oriented Classification of Social Media

Copyright A Participant-Oriented Classification of Social Media

Copyright A Participant-Oriented Classification of Social Media / Chat-IM / Skype Web-Pages 'Walled-garden' 'wall-postings' YouTube Wikis Dis/Approval 'Like', '+1' Second Life

Copyright Currently-Available Social Media Genres 1-with-1/Few INTERACTION Tools networked text (asynchronous) networked text chat / IM (synchronous) SMS / texting from mobile phones -attachments, any format (asynch) voice: over Internet (VoIP, Skype) (synch) tele-conferencing (VoIP, Skype) (synch) videophone (Skype Video) (synch) video-conferencing (Skype Video) (synch) 1-to-Many BROADCAST Tools bulletin boards systems (BBS) Usenet / netnews lists web-pages indexes (Lycos, Altavista, Google, Bing) blogs (WordPress, Blogspot) micro-blogs (Twitter, Tumblr) glogs – wearable wireless webcams, cyborg-logs, retro-nymed as 'graphical blogs' 'content communities', e.g. for images (deviantArt, Flickr and Picasa), for videos (YouTube), for slide-sets (Slideshare) closed / 'walled-garden' 'wall-postings' within SNS (Plaxo, MySpace, LinkedIn, Xing, Reddit, Facebook, Google+) 1-with-Many SHARING Tools Content Collaboration wikis (Wikipedia) social news sites (Slashdot, Newsvine) online office apps (Zoho, Google Docs, MS Live) Indicator-Sharing 'social bookmarking' (Delicious) dis/approvals (Digg's dig & bury, Reddit's up & down, StumbleUpon's thumbs-up & thumbs-down, Facebook's Like button, Google+'s +1 button) Multi-Player Networked Gaming text-based MUDDs social gaming sites (Friendster) Massively Multiplayer Online Games (MMOGs), esp. Role-Playing Games (MMORPGs), e.g. World of Warcraft online virtual worlds (Second Life)

Copyright Social Media A Working Definition And hence Scope Specification An application or service that is perceived by its users to support them in relation to: Interaction with other people Broadcast to other people Sharing with other people

Copyright Social Medias Business Model 'There must be a way to monetise this somehow' 'You will find something interesting here' is a self-fulfilling prophecy, because people can be enticed to contribute 'something interesting' Contributors, and the people who come after them, can be enticed to click on targeted advertisements Targeting is based on: profile-data that users supply about themselves content that they have donated their online behaviour while using the service their online behaviour more generally data that other people contribute about the user

Copyright Consumer-Oriented Social Media as Market Opportunity Agenda Social Media Features Business Model Privacy Concerns COSM Opportunities Features Business Models Exemplars

Copyright Privacy Risks in Social Media Third-Party Risk Exposure Openness that was Unanticipated Openness through Breach of Original Terms The Service-Provider's Strategic Partners 'Syndication', to any player Government Agency Demand Powers Second-Party Risk Exposure (Service- Provider) Content relating to Oneself Content relating to Others Social Networks including Oneself and Others

Copyright A Catalogue of Social Media Privacy Concerns 1Privacy-Abusive Data Collection 2Privacy-Abusive Service-Provider Rights 3Privacy-Abusive Functionality and User Interfaces 4Privacy-Abusive Data Exploitation Source: Reviews of Media Reports

Copyright A Catalogue of Social Media Privacy Concerns 1Privacy-Abusive Data Collection Demands for User Data identity data profile data contacts data, including users' address-books: their contact-points (some sensitive) comments about them (ditto) by implication, their social networks Collection of User Data about users' online behaviour when transacting with and via the particular service, over time about users' online behaviour, even when not transacting with or via the particular service from third parties, without notice to the user and/or without user consent about users' locations over time 2Privacy-Abusive Service-Provider Rights Terms of Service Features substantial self-declared, non-negotiable rights for the service-provider, including: to exploit users' data for their own purposes to disclose users' data to other organisations to retain users' data permanently, even if the person terminates their account to change Terms of Service: unilaterally without advance notice to users; and/or without any notice to users Exercise of Self-Declared Service-Provider Rights in ways harmful to users' interests in order to renege on previous undertakings Avoidance of Consumer Protection and Privacy Laws location of storage and processing in data havens location of contract-jurisdiction distant from users ignoring of regulatory and oversight agencies acceptance of nuisance-value fines and nominal undertakings

Copyright A Catalogue of Social Media Privacy Concerns 3 Privacy-Abusive Functionality and User Interfaces Privacy-Related Settings non-conservative default settings inadequate granularity complex and unhelpful user interfaces changes to the effects of settings, without advance notice, without any notice and/or without consent 'Real Names' Policies denial of multiple identities denial of anonymity denial of pseudonymity enforced publication of 'real name', associated profile data Functionality and User Interface inadequate documentation and reliance on interpolation frequent changes; and/or without advance notice to users, without any notice to users and/or without user consent User Access to Their Data lack of clarity about whether, and how, data can be accessed lack of, even denial of, the right of subject access User Deletion of Their Data lack of clarity about whether, and how, data can be deleted lack of, and even denial of, the users right to delete 4 Privacy-Abusive Data Exploitation Exposure of User Data to Third Parties wide exposure, in violation of previous Terms, of: users' profile-data (e.g. address, mobile-phone) users' postings users' advertising and purchasing behaviour users' explicit social networks users' inferred social networks, e.g. from messaging-traffic changes to the scope of exposure: without advance notice to users without any notice to users; and/or without user consent access by government agencies without demonstrated legal authority Exposure of Data about Other People upload of users' address-books, including: their contact-points comments about them by implication, their social networks exploitation of non-users' interactions with users disclosure of non-users' social networks

Copyright A Catalogue of Social Media Privacy Concerns 2Privacy-Abusive Service-Provider Rights Terms of Service Features substantial self-declared, non-negotiable rights for the service-provider, including: to exploit users' data for their own purposes to disclose users' data to other organisations to retain users' data permanently, even if the person terminates their account to change Terms of Service: unilaterally without advance notice to users; and/or without any notice to users i.e. THE ABSENCE OF CONSENT

Copyright A Catalogue of Social Media Privacy Concerns 3 Privacy-Abusive Functionality Privacy-Related Settings Non-conservative default settings Inadequate granularity Complex and unhelpful user interfaces Changes to the effects of settings, without advance notice, without any notice and/or without consent i.e. Untrustworthiness

Copyright A Catalogue of Social Media Privacy Concerns 3 Privacy-Abusive Functionality 'Real Names' Policies Denial of multiple identities Denial of anonymity Denial of pseudonymity Enforced publication of 'real name', and associated profile data i.e. Threatening to Persons-at-Risk

Copyright A Catalogue of Social Media Privacy Concerns 4 Privacy-Abusive Data Exploitation Exposure of Data about Other People Upload of users' address-books, including: their contact-points comments about them by implication, their social networks Exploitation of non-users' interactions with users Disclosure of non-users' social networks i.e. Extends to 'Innocent Victims'

Copyright Location – from Added-Extra to Intrinsic Physical Address / Geo-Location knowledge of the cell that a mobile-phone is in, is intrinsic to the services operation more precise geo-location is increasingly feasible location is becoming readily available to the device location is being acquired by service-providers Location-based services can be valuable to users A primary use is in consumer marketing For most current-round SMS, location is an extra For the coming round, Geo-Location is intrinsic Privacy sensitivity about Social Media will leap

Copyright The Primary Geolocation Technologies

Copyright Consumer-Oriented Social Media as Market Opportunity Agenda Social Media Features Business Model Privacy Concerns COSM Opportunities Features Business Models Exemplars

Copyright Consumer-Oriented Social Media Opportunities COSMO Architecture Openness Functionality Privacy-Sensitivity

Copyright COSMO Alternative Architectures Client-Server Centralised storage and control by the service-provider... with Replication Multiple copies, but centralised control... with Distribution Scattered storage, but centralised control Semi-Peer-to-Peer (P2P) Content and control scattered across many devices e.g. Full P2P All content and control on participants' own devices e.g.

Copyright COSMO Openness Interoperability Content Openness (not a 'walled garden' / 'island') Message Openness (to/from any , chat/IM) Portability Content Export-Import (profile, postings, messages)

Copyright COSMO Functionality Interaction Messaging, Tagging, Profile, Groups, Tag-Based Notifications Broadcast Content-Posting, Blogging, Micro-Blogging, Tagging, Commenting Sharing Content-Search, Re-Posting, Tagging, Commenting

Copyright COSMO Functionality See Content in any format Comment on Content Draw Content to the attention of others Post Content in any format Manage the Accessibility of your own Content Exchange messages with individuals, and Groups Create and maintain Groups / Social Networks Manage your own Membership of them Manage your own Profile and Personas

Copyright COSMO Privacy-Sensitivity Advice from Apply Consumer-Friendly Principles Information Choice Consent 'opt-in' the norm 'opt-out' requires stringent justification Fair Conditions Recourse

Copyright Privacy The interest that individuals have in sustaining a 'personal space', free from interference by other people and organisations Multiple Dimensions Privacy of Personal Data / Data Protection Privacy of Personal Communications Privacy of Personal Behaviour Privacy of the Person

Copyright COSMO Privacy-Sensitivity Address the Catalogue of Social Media Privacy Concerns 1Privacy-Abusive Data Collection 2Privacy-Abusive Service-Provider Rights 3Privacy-Abusive Functionality and User Interfaces 4Privacy-Abusive Data Exploitation

Copyright Prioritisation of Privacy-Sensitive Features Disincentives Impediments Incentives Stimulants Attractors Detractors 'turn-off' 'turn-on'

Copyright COSMO Business Models A Business Model is an Answer to the Question: Who Pays? For What? To Whom? And Why?

Copyright Internet-Era Business Models Lessons from Open Source and Content WHO PAYS? For What? To Whom? And Why? Customers: for a Good or Service for Complementary Goods or Services Providers Third Parties – esp. Advertisers A Fairy Godmother

Copyright Open Content Business Models Who Pays? A Fairy Godmother Subsidy / Patronage Funding from external sources Deprecated as a gift, unless market failure Cross-Subsidy Funding from internal sources Deprecated (but less so), because its distortive Portfolio Approach Mutual Cross-Funding from internal sources How business works – cash cows fund the rest

Copyright Internet-Era Business Models Lessons from Open Source and Content Who Pays? FOR WHAT? To Whom? And Why? Goods & Services Value-Added Goods & Services Complementary Goods & Services Data Information Expertise / Knowledge An Idea in Good Standing Timeliness Quality

Copyright Internet-Era Business Models Lessons from Open Source and Content Who Pays? For What? To Whom? AND WHY? The Negative Resource Control Switching Costs (capture, lock-in) Grief Avoidance The Positive Perceived Value (the genuine article) Cost Advantage (incl. Time) Quality Advantage (incl. accuracy, security, timeliness, completeness, complementary services)

Copyright COSMO Some Business Model Scenarios All users pay in cash rather than in data, for a service that is entirely COSM A corporation provides a gratis base-grade COSM, but offers more features in exchange for control over the data of consenting consumers A corporation funds a gratis COSM by selling customised / value-added versions and/or selling their expertise to support custom-builds A wealthy organisation funds COSM

Copyright COSMO Exemplars Freenet Diaspora GNU social Buddy Press ( an offshoot of Wordpress) Duuit

Copyright Privacy-Sensitive Social Media Research Opportunities Social Science Distinguish positive and negative Drivers from Influencers Measure the Strength of Influencers, under varying scenarios Assess trade-offs between positive and negative Influencers, under varying scenarios Prioritise possible privacy-sensitive features Design and Prototyping Specify Desirable Features Architect: for Client-Server for P2P Design and Code Open-Source Components Establish a Test-Harness and/or Demo Apps Publish Reference Code Publish Demo Apps

Copyright Consumer-Oriented Social Media as Market Opportunity Agenda Social Media Features Business Model Privacy Concerns COSM Opportunities Features Business Models Exemplars

Copyright Consumer-Oriented Social Media as Market Opportunity Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW, Sydney COSMO-1211 {.html,.ppt} Conference on Privacy in the Social Networked World Meiji University, Tokyo – 20 November 2012