The Intention Economy: The Internet As The World Wide City
You know who you are. So does the IRS, the DMV, and every Website you’ve ever made up a login and a password for — so it could “know” you. But none of those entities really knows you. What they know is what the techies call a namespace. What they have isn’t your identity, but an identifier. » Sovereign-source vs. administrative identity ProjectVRM
by Doc Searls | 9:46 AM April 12, 2012 The expression “supply and demand” was first coined as “demand and supply,” by James Denham-Steuart in An Inquiry into the Principles of Political Oeconomy, written in 1767. Turning Consumers into Customers - Doc Searls
I’m launching a new business today – it’s called CareZone. I’ve spent roughly 25 years listening and responding to the technology needs of large institutions. It’s a great business. But having seen the benefits technology delivered to enterprises, I’ve always found the most interesting innovations clustered around how those institutions responded to individuals. Technology has given voice to billions of people, and turned the market on its head: institutions accustomed to telling customers and citizens the rules of the road are now faced with individuals who can and do make their own decisions. The Thinking Behind CareZone | What I Couldn't Say…
Mr. Schrems was intrigued and somewhat rattled. He wasn’t worried about anything in particular. Rather, he felt a vague disquiet about what Facebook could do with all that information about him in the future. Why was it there at all, he wondered, when he had deleted it? “It’s like a camera hanging over your bed while you’re having sex. Europe Moves to Protect Online Privacy
I’m listening and watching with fascination to Keith Scovell ‘s Shopper Power videos . In these Keith describes progress being made in a VRM direction by retailers and their upstream suppliers, detailing efforts made by Starbucks , Hallmark, CVS, Tesco/Homeplus, Frito-Lay , Reese’s and other companies — all recognizing that customers’ range of control over interactions in retail environments is increasing dramatically, and will increase a great deal more. I haven’t watched all of Keith’s videos yet, but I’m taking notes as I do, and I recommend that others do the same, if they’re interested in how increasingly empowered and independent customers relate to vendors — especially at the retail level in the brick & mortar world. » Toward a new symbiosis between Demand and Supply ProjectVRM
Shopper Power Video Version 2.0 Scovell on Vimeo
(25) Shared Personal Data: Revolutionizing Customer Relationship
The proposed data protection regulation from the , a copy of which was obtained by The New York Times, could have significant consequences for all Internet companies that trade in personal data, whether it is pictures that people post on social networks or what they buy on retail sites or look for on a search engine. The regulation would compel Web sites to tell consumers why their data is being collected and retain it for only as long as necessary. If data is stolen, sites would have to notify regulators within 24 hours. Europe Weighs a Tough Law on Online Privacy and User Data
This past Christmas season Amazon stole business from brick-and-mortar retailers with its free Price Check app for iPhone and Android. With Price Check, your phone could scan the barcode on any product in any retail store, or simply take a picture of it, and then compare its price with Amazon’s. And, pouring salt on wounds already being nursed by retailers everywhere, Amazon also announced that if you were in a store, used Price Check, and then bought the item from Amazon, you’d get an extra discount--mobile magic for the coupon-clipping set. The Only Lasting Competitive Advantage Is Extreme Trust
“We are not seats or eyeballs or end users or consumers. We are human beings—and our reach exceeds our grasp. Deal with it.” —Preamble to The Cluetrain Manifesto It's Not Your Relationship to Manage
Index of /CONFIANCE
Mission Impossible: Reaching Customer Service | Now Possible Your mission, Jim, should you choose to accept it. Jim, you know the drill. Press the button above, and listen to your message, then read the top secret information below. Our operatives have been unable to get the information they require from eight major companies: DirecTV, Dish Network, Verizon, Comcast, AT&T Wireless, Bank of America, Sprint Network, Sprint Nextel, T-Mobile, and United Airlines. We have tried all the normal processes: emailing from their web sites, calling customer services, even writing letters. Time and again, we have received incorrect or unhelpful information.
FAQ - tru.ly We use our verification partners to authenticate your identity. This is done by matching your submitted information with that in a national database of government and public data. In order to become verified, specific pieces of information must match. We also use proprietary technology to flag users who may be trying to conduct fraud. Yes, your security is our first priority.
En 2010, dans l’ouvrage Informatique, Libertés, Identités, nous posions la question : “Que pourrais-je accomplir, moi, si je disposais, sous une forme réellement exploitable, des informations sur mes trajets et mes communications des années passées ? Pas seulement pour contrôler ce que d’autres en font, mais pour les utiliser à mes propres fins ?” Début 2011,en présentant les résultats de l’expédition de la Fing sur la Confiance numérique, nous allions plus loin : “A terme, la règle doit être simple : si vous savez quelque chose sur moi, je dois posséder la même information et pouvoir l’exploiter.” MyData : redonner du pouvoir au consommateur - Blogs InternetActu.net
Par Daniel Kaplan le 20/09/11 | 14 commentaires | 5,723 lectures | Impression En 2010, dans l’ouvrage Informatique, Libertés, Identités, nous posions la question : “Que pourrais-je accomplir, moi, si je disposais, sous une forme réellement exploitable, des informations sur mes trajets et mes communications des années passées ? Pas seulement pour contrôler ce que d’autres en font, mais pour les utiliser à mes propres fins ?” Début 2011, en présentant les résultats de l’expédition de la Fing sur la Confiance numérique, nous allions plus loin : “A terme, la règle doit être simple : si vous savez quelque chose sur moi, je dois posséder la même information et pouvoir l’exploiter.” Le 13 avril 2011, le gouvernement britannique a transformé ce qui n’était encore qu’une perspective hétérodoxe, fragilement appuyée sur un projet de recherche américain et une petite communauté d’innovateurs, en un programme d’ampleur nationale : MyData.
We're on your side | Insidr