Quantcast
Channel: tools – Digital ID Coach
Browsing all 43 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Malware: Coming to a Computer in Front of You

Click for large version The Register has an in-depth piece, Malware menaces poison ads as Google, Yahoo! look away, that’s worth your time. What’s malvertising? Online advertising has become an...

View Article


Image may be NSFW.
Clik here to view.

On Capturing Customers

Kurt Hanks helped us unpack one of the ideas behind VRM, customer control. Allowing your customers to help tailor an appropriate communications channel with you builds trust and loyalty. Even simple...

View Article


Image may be NSFW.
Clik here to view.

Identity Theft of the Deceased

When a person dies and someone steps in to wrap up the details that remain, there’s a window of time after death when thieves can steal the identity of the deceased, resulting in new credit cards...

View Article

Image may be NSFW.
Clik here to view.

Dark Net Going Mainstream?

I’m intrigued by this talk from TEDGlobalLondon (June 2015) that describes the Dark Net. It’s a look at VRM in its most colorful state. The fact that people do illegal things on the dark net is merely...

View Article

Image may be NSFW.
Clik here to view.

Lacking Trust in the Market

Recently, Intercede released news of a consumer survey that reported Millennials (16-35 year olds) in the U.S and UK are losing trust in today’s Digital Economy. “Fewer than 5 per cent of respondents...

View Article


Image may be NSFW.
Clik here to view.

Four Quadrants into the Future (Introduction)

Join me on a journey into the future in which we consider personal and general information gathering, storing, hosting, as viewed against sharing and interpretation of intent. In these stories, we use...

View Article

Image may be NSFW.
Clik here to view.

Four Quadrants into the Future (The Quadrants)

3rd Party Interpretation, Intent & Sharing Data 3rd Party/ Centralized Hosting Quadrant 1 3rd Party Hosting Rules with 3rd Party Sharing Rules Quadrant 2 1st Party Hosting with 3rd Party Sharing...

View Article

Image may be NSFW.
Clik here to view.

Four Quadrants into the Future (Quadrant 1)

This first quadrant might be called We Know What’s Best and We’re Here to Help. In Quadrant One, third parties gather and host people’s personal data, and third parties control the sharing and...

View Article


Image may be NSFW.
Clik here to view.

Four Quadrants into the Future (Quadrant 2)

This quadrant might be called The Official Sharing Highways Department. In Quadrant Two, first parties gather and host our personal or corporate data, and third parties control the sharing and...

View Article


Image may be NSFW.
Clik here to view.

Four Quadrants into the Future (Characters)

Our fictional characters: Siraly, a single mother with two young children (5 and 7 years old). Siraly has a College Degree in Fine Arts. Bob, a single 36 year old man with two girlfriends. Bob travels...

View Article

Image may be NSFW.
Clik here to view.

Four Quadrants into the Future (Quadrant 3)

This quadrant might be called Everybody is Everything. In Quadrant Three, first parties gather and host our personal data, and first parties control the sharing and interpretation of intent for people....

View Article

Personal Information Economy 2015 – London

The Personal Information Economy 2015 conference is coming up! From the event page: As a new digital age unfolds brands have a make-or-break strategic opportunity to place their customer relationships...

View Article

Volvo’s In-Car Delivery Service

In Volvo launches in-car package delivery service in Gothenburg, Volvo’s new service “lets you have your Christmas shopping delivered directly to your car.” Intriguing idea that saves on parking...

View Article


Electronic Health Records and Patient-Centric Design

CIO’s story Why Electronic Health Records aren’t more usable offers an interesting perspective on the current (improved?) state of affairs in medical care records. From the article: The American...

View Article

Human Technology: Communications 2025

The Hypervoice Consortium created this intriguing video. It’s the future! Listen to the whole thing.

View Article


New Models for Privacy Regulation

The Wall Street Journal has an informative conversation with Lawrence Lessig: Technology Will Create New Models for Privacy Regulation. What underlies a change toward new models are two points: the...

View Article

The Things that Listen

Security guru Bruce Schneier offers his usual no-nonsense take on The Internet of Things that Talk About You Behind Your Back. He start out: SilverPush is an Indian startup that’s trying to figure out...

View Article


Traces (That Identify Us)

Love this video by Emily Sheskin about the traces of DNA that we leave behind. From the video’s description: Is our DNA the government’s business? The very things that we discard everyday and never...

View Article

Electronic Health Records and Patient-Centric Design

CIO’s story Why Electronic Health Records aren’t more usable offers an interesting perspective on the current (improved?) state of affairs in medical care records. From the article: The American...

View Article

Human Technology: Communications 2025

The Hypervoice Consortium created this intriguing video. It’s the future! Listen to the whole thing.

View Article
Browsing all 43 articles
Browse latest View live