rutgers slides04

Post on 08-Jan-2017

60 views 1 download

Transcript of rutgers slides04

Consumer Data Utilization: A Study in Contrasts

Drew Talbotwww.linkedin.com/in/drewtalbot

2

Stock values hit record highs fueled by buybacks -- economic fundamentals remain soft

Investment in growth will likely be trimmed, but pressure on data science to deliver sales and profits will grow

Data abuses abound . . . & new tech hype as well Worldwide groundswell of distrust and consumer

reaction around data abuse by corporations and governments

Counter-trends mean conflict and change are likely but synthesis is possible

Background

Cross-Currents & Counter-Trends

1st & 3rd Party Data IntegrationKey Performance Indicators (KPI’s)

Self-Service ProfilesGovernance

Internet O’ Things & Other DisastersHacks & Breaches

3

Mon

etiza

tion

v. St

ewar

dshi

p

Com

plet

enes

s v.

Inte

grity

Secu

rity

v. Ex

tens

ibilit

y

Relia

bilit

y v.

Flex

ibilit

y

Priv

acy

v. Se

rvice

Glob

aliza

tion

v. Lo

caliz

atio

n

Oppo

rtuni

ties v

. CL

M’s

4

DHS Bulletin warns of hack-ability of Android OS

Take this to mean – your mobile is a microphone and data siphon for anyone with a modicum of knowledge and bad intent

Customer Data =

Revenue

Customer Data =

Risk

Customer Relationship = Profit

Monetization v. Stewardship

5

6

• A new UN agency for data protection and data security is needed to protect the confidential and personal information of citizens around the world, the European commissioner for digital economy told delegates at the World Economic Forum

• Günther Oettinger said the recent Sony hack, which exposed swaths of confidential and personal information, had shown Europe the need to radically reshape the way data is used.

• “We are in a digital revolution, and we need a data revolution in parallel,” Oettinger said in a panel alongside Sir Tim Berners Lee, the inventor of the world wide web, and Yahoo’s boss, Marissa Mayer. He said the stream of revelations following Sony’s data breach had shown that Brussels must take a lead in restoring trust in tech companies.

• Edward Snowden’s revelations about the extent to which government agencies have been intercepting their citizens’ digital communications have pushed data security high up the agenda at Davos this year.

The Guardian 1/22/2015

Günther Oettinger

7

Keynote Address, Brand Activation Association Conference, 11/6/2014Jessica Rich, Director, Bureau of Consumer Protection (FTC)Summary of FTC Privacy Data Guidelines for Marketers Tell the truth Keep your promises Give consumers choices about data uses Present choices in time & place consumers can

easily see and act on (not buried in a privacy policy)

Secure consumer data, especially if it’s sensitive Understand that current law makes consumers the

owners of data about them (not you) Police yourselves…or we will come after you

(expanded powers)

Who Owns The Data? . . . Consumers Themselves

Completeness v. Integrity

8

All the data in one accessible

place

The right data with limited

availability but high quality

Right data in right place and

time with necessary

accuracy for task

9

Security v. Extensibility

Bulletproof but hard to use or modify

Easy to use or modify

but hard to secure

Security to match governe

d purpose

– federated data

Reliability v. Flexibility

10

Mission Critical & Always on but Poor Decision Support

Great Decision

Support and Analytics

with Unpredictable Reliability

Benefits of “Big

Data” for data

science with

Strengths of

Mainframe

11

“You’ll see things here that look odd or even antiquated…Phones with cords…computers that hardly deserve the name. It was all designed to operate against an enemy who could infiltrate and disrupt even the most basic computer systems. Galactica is a reminder of a time when we were so frightened by our enemies that we literally looked backward for protection.”

Commander William AdamaBattlestar Galactica, 2004

‘Cylonesque’ Opportunities for Hacking & Abuse

They say millennials don’t take privacy and hacking threats

seriously – but the U S DoD sure does

Privacy v. Service

12

Nothing there that

shouldn’t be

360o View & Multi-channel

linkage for personaliz

ed experience

Customer in

Charge of

Conversation (Not Victim of “Messagi

ng”)

Globalization v. Localization

13

Standardized

& Centrally Controlle

d Models, Dashboards and Custome

r Data Stores

No data but what is necessary for the custome

r transaction, held in

country

Distributed Control, Federated Model with Standardiz

ed Reporting and Audit Models via

Safe Harbors

Opportunities v. Career Limiting Moves (CLM’s)

14

Compliance and Fear

Driven

Customer

Manipulation & Greed Driven

Collaborationand

Profit Driven

Endwww.linkedin.com/in/drewtalbot

Count off by twos and divide into groups Group 1 will prepare (15 minutes) and present

(5 minutes) argument that using data to empower and engage consumers rather than to deceive and manipulate them is better for A. BusinessB. Society

Group 2 will prepare and present the opposing viewpoint

Discuss

16

Excercise