19. web services and value creation of content consumption of content data store analysis Symbiotic Relationships Web business depend on consumer data Data business consumer digital data trade
22. two sided digital business Actual User Data Actual User Data Actual User Data “ The Business” The User Direct feedback In Direct feedback friends social norms
26. A Two Sided Digital Business Model where your Privacy will be someone else's business ! Tony Fish Oct 2009
27. I own my Data I Give up my Data Enable 3rd party to use and exploit their data to generate benefits in kind and / or cash for a percentage of revenue Enable 3 rd party to use and exploit your data to generate benefits in kind and / or cash for a percentage of revenue 8 Pay for enhancement to service (subscription or one off) 1 Trade data for enhancement directly with service provider 2 Trade data for enhancement via a third party (indirect) such as an aggregation party 3 Pay for services directly (subscription or one off) 4 Pay to protect your identity 7 Trade data for services via a third party (indirect) such as an aggregation party 6 Trade data for service directly with service provider 5
35. Location User individuality Personalisation Device pocketability Small Screen Micro payments Battery Awareness Size Weight Icon/ Bling 3 rd Party applications Usability Blogs Recommendation RSS SMS Content messaging Cross media services Games, gambling Audio video content Information Icon, logo, ringtones Portability Music Data driven Standardisation AJAX Open API Convergence IM Podcasting Navigation Mobile Search Affiliation wikis Folksonomy mashup Participation Web 2.0 Mobile Web 2.0 The long tail Social software Joy of use Remixability Services tags mtags metadata Voice to tag Voice Unified messaging Sync Me, identity Mobile content I am a tag Multilingual Search
36. mobile content Harnessing Collective Intelligence Capturing Content at the Point of inspiration Extending the web Mobile web 2.0 I am a tag my identity multilingual mobile access digital convergence mobile search AJAX/ widgets Uniquely mobile Location
37. Ecosystem in balance Enablers Platform Access Device User User Device Access Platform Enablers User creates content and publishes it Content created for the user to consume Point of inspiration Sport reality family News friends holiday night out movie cartoon Adult e.g publishing e.g search e.g payment security, DRM e.g GSM WiFi UMTS e.g phone smartphone e.g hosting, integration with WWW Events Professional Editing Content creation Personal Tagging Professional capture concert music colleagues gathering Personal creation Personal capture Sport News Point of entertainment Events
38. The six screens of life Screens of life Public Private Fixed Carried Carry shared personal Carry communicate Carry informational Cinema TV PC Car TV/ Airplane Mobile Phone/PDA iPod/ DAB mobile content Consumption of digital media
39. Value between creation and consumption Creation/ Publish Private Personal Collaboration Public Secret Blog Wikki Journal Book Paper TV Movie Music Consumption Screens of life Public Private Fixed Carried Carry shared personal Carry communicate Carry informational Relevance Voting Index Tags Search ID Footprint Verification Attention Payment Location ‘ Portability’ Content management DRM tools Ad engines UI, navigation Service, storage, backup
40. My Number My Numbers directory directories My ID My Data Your ID Your Data My tags Your tags new search old search connection connection Call LCR Find Locate Message IM Chat Mail Video call Meet I am a tag my identity
56. value from mobile, TV and web data Broadcast/ Listen WEB MOBILE Attention Browse Search Click Create Consumer Location Attention Browse Search Time Who Click Create Consume Presence View Preference Time Presence Point of inspiration Point of entertainment Point of need
59. in simple terms store click data content my data analysis value social data collection
60. stages to build my digital footprint store click data content my data analysis value ownership and movable algorithm = differentiation rights and cash digital footprint Behavioural DNA feedback loop (sensory.net) social data collection
61. mashup value from mobile, web and broadcast mashup create consume create create consume consume broadcast MMD WMD BMD mobile web
65. Actual User Data Actual User Data Actual User Data The User Direct feedback In Direct feedback collection store analysis value the provider the consumer Friends Social Norms
69. Actual User Data Actual User Data Actual User Data “ The Business” The User Direct feedback In Direct feedback collection store analysis value Friends Social Norms
74. Where is the value? on this screen in this earpiece consume createion x content where time intent direction who
75. I assume you will consume on the 6 screens of life
76. 6 screens of life big screens small screens Cinema (shared with other members of the public) TV (shared privately within our homes) PC (personal or shared use) Fixed/Portable Players (fixed devices in things that move such as cars, planes, etc) Information screens e.g. iPod, radio The mobile device, an individual and personalised handheld device
78. at the point of need, inspiration and entertainment
79. Fish Tail’s, a model to categorise data time Short bursts of data, with varying amount of information Continuous feed of data, may vary on amount of data available Continuous feed of data, depending on use Infrequent and small data bursts
87. web services and value creation of content consumption of content data store analysis Symbiotic Relationships Web business depend on consumer data Data business consumer digital data trade
88. example – new way to offer mobile security store moveable digital footprint behavioural DNA adverse behaviour Click content my normal behaviour graceful opening location route time routine restrictions unique override closing time Take raw data to new provider confidence assurance collection analysis value
97. industry strategic issues competitor VOT tribes Value Porter’s model focus differentiation/ segmentation lowest cost profit cost services access GYM club no change game changing
98. structural problems device tethered generic network platform applications & content closed open locked net neutrality deliver capture closed mobile ecosystem open mobile ecosystem no change game changing
99.
100. directory market – outsiders view competitor directories Value Business model focus exploiting data charge / ads profit cost services data Spoke, linkedin, Plaxo, 123 People, Belocal no change game changing
101. structural problems – outsiders view brand value “ nothing” progressive user data platform content closed open cost value deliver capture no change game changing
103. I own my Data I Give up my Data Model Enable 3rd party to use and exploit their data to generate benefits in kind and / or cash for a percentage of revenue Enable 3 rd party to use and exploit your data to generate benefits in kind and / or cash for a percentage of revenue 8 Pay for enhancement to service (subscription or one off) 1 Trade data for enhancement directly with service provider 2 Trade data for enhancement via a third party (indirect) such as an aggregation party 3 Pay for services directly (subscription or one off) 4 Pay to protect your identity 7 Trade data for services via a third party (indirect) such as an aggregation party 6 Trade data for service directly with service provider 5
107. build or erode privacy capital PRIVACY erode build PRIVACY CAPITAL Who You Are Routes And Routines Patterns And Preferences Higher FUD Fear, Uncertainty and Doubt lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
108. my health family stuff private thoughts passport cash in account login & ID pin numbers who owns your car where I work my certificates facebook status phone number blog page location bank account number political views car plate number one few many public Consider the same chart from the perspective of people who need to know the data and how many you trust with the data Ways of looking at privacy
109. my health family stuff private thoughts passport cash in account login & ID pin numbers who owns your car where I work my certificates facebook status phone number blog page location bank account number political views car plate number one few many public
110. build or erode risk capital Risk erode build Risk CAPITAL gut feel home and personal business And financial higher FUD lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
111. build or erode trust capital Trust erode build TRUST CAPITAL Reputation And Recommendation Patterns And Preferences higher FUD lower FUD positive feedback negative feedback Higher propensity to engage more and get better services lower propensity to engage and only gain standard services
112. bonded but not related TRUST RISK IDENTITY PRIVACY SECURITY Increasing closed Increasing open High Control High Value Justification of benefits Justification of barriers
118. I can deal with silence - only clap if clap You are my mum (who believes in everything I say) You want to talk to me at coffee break You have the same beliefs It challenged you You’re a lemon and have to follow the crowd You don’t want to look like the only person who did understand what was said PLEASE Don’t bother being polite as it will not help me or you
123. Data is a commodity and ownership is unimportant. Value will be retained by those who get the deep and dirty in the management of complexity for getting information in, stored and out. In the New Kingdom, Loyalty is Dead, Trust is the Challenger, the Princes’ are Brands, the Princesses are Simplicity, Attention is Queen and customer metadata is King.
7 principals of change Mobile content – capturing content at the point of inspiration, the create consume balance I am a Tag – not a number, change of my identity, who am I in a digital world Multilingual access – the global village Digital convergance and mash-ups’ Ajax – user experience to dir for Search Location – attention,
Fundamental to all this change is how we as users are consuming on the 6 screens of life. The world of content started on a stage, but the first screen is cinema, push baby push. This is a shared/public screen. Followed by the TV, shared but private. The came the personal screen, here change occurs. The primary function is no longer video image entertainment, it takes on a wider remit. The PC, the sit forward, generator of content, consumer of data – a new balance. The car – small personal TV, but with some personal features, but not limited by power/ processor power. The mobile – carried, personal, private, create/ consume in perfect balance, Text, voice…. The ipod, information and navigation The method and mechanism by which we interact with our screen of life is changing. However he underlying content and delivery is also changing – the change from web 1.0 to web 2.0
Field service engineering on a mobile device is about collection not about input At this point you should be screaming PRIVACY, SECURITY, How this takes us to issues of privacy and trust. Lets come back to speak about the rainbow of trust. But lets look at the enterprise 2.0
Summary of this part, when thinking about mobile, think what can I do on with the mobile platform that I cannot do with an alternative platform
Field service engineering on a mobile device is about collection not about input At this point you should be screaming PRIVACY, SECURITY, How this takes us to issues of privacy and trust. Lets come back to speak about the rainbow of trust. But lets look at the enterprise 2.0
Service differentiation based on trust Let me start with a consumer walking into carphone warehouse. The person say’s – hello Mr sales man, I am a blue person. What the sales understanding from this is that this person wants an unfettered device, it has not constraints and they will sort out all the IT problems themselves, if they down load something, they will sort it. Mr Red, he only wants to do online and mobile banking Mr purple wants the walled garden Mr beige wants voice and text There customer are differentiated based on their trust in both the device, the SP and their provider of the service. It terms of enterprise customers, they will vary by their attitude to risk. The analysis needed is not but product but by profit and profile to risk. Do you want risk adverse or balanced risk, I don’t know as I don’t know the profit by type.