CIS13: Which Way Forward

215 views

Published on

Ron Carpinella
Traditional data aggregators have pursued business models and partnerships in the same way for a very long time. However, they are progressively unable to adapt to the demands of Internet services for identity information, consumer insight and permission. What are the alternatives and how do the existing models need to change?

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
215
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
4
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

CIS13: Which Way Forward

  1. 1. Identity, Data and Dollars Transformative thoughts on monetization
  2. 2. In the beginning,… § Dust § Attributes § Fig Leaves
  3. 3. Today we rely on sources § Data providers § Identity Providers § Relying parties
  4. 4. Where does the buck stop? (or flow) § Revenue based on Identity is derived across multiple paths: 1) Identity & attributes providers 2) Exchange/ Use 3) Infrastructure
  5. 5. So what’s the problem? §  I make money when you use my data §  You make money when I use your service to ID proof §  “Website” makes money because the transaction is secure §  They make money ‘cause they can sell ads to me based on the data/ Identity
  6. 6. How does the money move? § Data Provider Sells Information to § 1) Service Provider or § 2) Sells service using the information § ID Provider Purchases Data or ID Proofing service, then provides credentials to customer for a fee § RP pays for Credential Service § RP get paid (for service, sale etal) using the Identity
  7. 7. But…. § If the Credential is issued and used by mutliple RP’s should the data provider be paid? § If the RP payed for a credential, should the Credential provider be able to re-use the Identity that was issued for said RP? § If the credential provider has acquired data to enhance the initial ID that was proofed, should they continue to engage/ pay the data provider?
  8. 8. What do we pay for? Value Benefits Risk Identity Proofing Authentication Attribute Verification
  9. 9. Who should get paid? § Data Providers only “score” identity, they don’t decide… § CSP’s/ ID Providers decide on identity, should they be able to gather more data? § RP’s pay for Identity, should that info be useable elsewhere?
  10. 10. New money thoughts § Liability = Risk = Reward § Data Exchange = Cost Control § Purchase = Ownership

×