+ All Categories
Home > Documents > rutgers slides04

rutgers slides04

Date post: 08-Jan-2017
Category:
Upload: andrew-h-talbot
View: 59 times
Download: 1 times
Share this document with a friend
16
Consumer Data Utilization: A Study in Contrasts Drew Talbot www.linkedin.com/in/drewtalbot
Transcript
Page 1: rutgers slides04

Consumer Data Utilization: A Study in Contrasts

Drew Talbotwww.linkedin.com/in/drewtalbot

Page 2: rutgers slides04

2

Stock values hit record highs fueled by buybacks -- economic fundamentals remain soft

Investment in growth will likely be trimmed, but pressure on data science to deliver sales and profits will grow

Data abuses abound . . . & new tech hype as well Worldwide groundswell of distrust and consumer

reaction around data abuse by corporations and governments

Counter-trends mean conflict and change are likely but synthesis is possible

Background

Page 3: rutgers slides04

Cross-Currents & Counter-Trends

1st & 3rd Party Data IntegrationKey Performance Indicators (KPI’s)

Self-Service ProfilesGovernance

Internet O’ Things & Other DisastersHacks & Breaches

3

Mon

etiza

tion

v. St

ewar

dshi

p

Com

plet

enes

s v.

Inte

grity

Secu

rity

v. Ex

tens

ibilit

y

Relia

bilit

y v.

Flex

ibilit

y

Priv

acy

v. Se

rvice

Glob

aliza

tion

v. Lo

caliz

atio

n

Oppo

rtuni

ties v

. CL

M’s

Page 4: rutgers slides04

4

DHS Bulletin warns of hack-ability of Android OS

Take this to mean – your mobile is a microphone and data siphon for anyone with a modicum of knowledge and bad intent

Page 5: rutgers slides04

Customer Data =

Revenue

Customer Data =

Risk

Customer Relationship = Profit

Monetization v. Stewardship

5

Page 6: rutgers slides04

6

• A new UN agency for data protection and data security is needed to protect the confidential and personal information of citizens around the world, the European commissioner for digital economy told delegates at the World Economic Forum

• Günther Oettinger said the recent Sony hack, which exposed swaths of confidential and personal information, had shown Europe the need to radically reshape the way data is used.

• “We are in a digital revolution, and we need a data revolution in parallel,” Oettinger said in a panel alongside Sir Tim Berners Lee, the inventor of the world wide web, and Yahoo’s boss, Marissa Mayer. He said the stream of revelations following Sony’s data breach had shown that Brussels must take a lead in restoring trust in tech companies.

• Edward Snowden’s revelations about the extent to which government agencies have been intercepting their citizens’ digital communications have pushed data security high up the agenda at Davos this year.

The Guardian 1/22/2015

Günther Oettinger

Page 7: rutgers slides04

7

Keynote Address, Brand Activation Association Conference, 11/6/2014Jessica Rich, Director, Bureau of Consumer Protection (FTC)Summary of FTC Privacy Data Guidelines for Marketers Tell the truth Keep your promises Give consumers choices about data uses Present choices in time & place consumers can

easily see and act on (not buried in a privacy policy)

Secure consumer data, especially if it’s sensitive Understand that current law makes consumers the

owners of data about them (not you) Police yourselves…or we will come after you

(expanded powers)

Who Owns The Data? . . . Consumers Themselves

Page 8: rutgers slides04

Completeness v. Integrity

8

All the data in one accessible

place

The right data with limited

availability but high quality

Right data in right place and

time with necessary

accuracy for task

Page 9: rutgers slides04

9

Security v. Extensibility

Bulletproof but hard to use or modify

Easy to use or modify

but hard to secure

Security to match governe

d purpose

– federated data

Page 10: rutgers slides04

Reliability v. Flexibility

10

Mission Critical & Always on but Poor Decision Support

Great Decision

Support and Analytics

with Unpredictable Reliability

Benefits of “Big

Data” for data

science with

Strengths of

Mainframe

Page 11: rutgers slides04

11

“You’ll see things here that look odd or even antiquated…Phones with cords…computers that hardly deserve the name. It was all designed to operate against an enemy who could infiltrate and disrupt even the most basic computer systems. Galactica is a reminder of a time when we were so frightened by our enemies that we literally looked backward for protection.”

Commander William AdamaBattlestar Galactica, 2004

‘Cylonesque’ Opportunities for Hacking & Abuse

They say millennials don’t take privacy and hacking threats

seriously – but the U S DoD sure does

Page 12: rutgers slides04

Privacy v. Service

12

Nothing there that

shouldn’t be

360o View & Multi-channel

linkage for personaliz

ed experience

Customer in

Charge of

Conversation (Not Victim of “Messagi

ng”)

Page 13: rutgers slides04

Globalization v. Localization

13

Standardized

& Centrally Controlle

d Models, Dashboards and Custome

r Data Stores

No data but what is necessary for the custome

r transaction, held in

country

Distributed Control, Federated Model with Standardiz

ed Reporting and Audit Models via

Safe Harbors

Page 14: rutgers slides04

Opportunities v. Career Limiting Moves (CLM’s)

14

Compliance and Fear

Driven

Customer

Manipulation & Greed Driven

Collaborationand

Profit Driven

Page 15: rutgers slides04

Endwww.linkedin.com/in/drewtalbot

Page 16: rutgers slides04

Count off by twos and divide into groups Group 1 will prepare (15 minutes) and present

(5 minutes) argument that using data to empower and engage consumers rather than to deceive and manipulate them is better for A. BusinessB. Society

Group 2 will prepare and present the opposing viewpoint

Discuss

16

Excercise


Recommended