SlideShare a Scribd company logo
The Value Network Map below shows the value flows (in a simplified form) in the current ecosystem around targeted advertising and data aggregation*. The Individual is at the center and a next ring of parties has direct
engagement with the individual (Publisher, Attribute Verifier, Data Collector, Network Address Provider, Payment Processors) while a wider ring does not (Marketers, Data Analytics Providers, Data Set Brokers).
Read the narrative and see the matching colored section of the map. There is numbered value flow for each color that that goes with the narrative.
The individual puts their attention towards a
publisher’s website by clicking to view content, in
doing so data about the view and information about
the ad inventory available in that viewing act is
available to a marketer who places a message (ad) on
the page which is viewed by the individual.
Persuaded by the ad the individual goes to a retail
store advertised, in doing so they become subject to
the terms of use put forward by the site and the data
from the click is sent off to an aggregate data set
broker. Using the data they data broker shares with
the retailer a profile of the user and it uses this
information to adapt the offer it makes to the user.
The individual likes the offer and places an order. It is
an item that requires a proof of an attribute - say a
student in a school or being over the age of 19. 

The individual must go to an attribute verifier to get
proof the attribute (and they are also given explicit or
implicit use rights). They then share this proof of
attribute to the retailer.
Alternatively the user might choose to ask the
Attribute verifier tell the Retailer directly about their
status. Alternatively without the users involvement the
retailer could ask for attribute from the provider
without the individual’s consent or awareness. 

The retailer also requires a valid network end-point a
phone number or e-mail address that works to
contact the individual. So they request this from the
Individual and send a message to the address and
ask for confirmation.

Now the retailer is ready to charge the individual using
a payment processor and once the transaction goes
through the individual gets the good they ordered. 

The data trails from the transaction continue....the
retailer has a data set of transactions and it sells it to
a data broker. The payment processor also has data
and it too sells it to the data broker.
Note that the Data Broker has no direct relationship
to the Individual who’s specific data is contained
within the data set and shared with the broker. 

The Retailer wants an analysis of his data and goes
to a company that can provide that specific service.
The data analytics company uses data from the data
broker to help in its analysis.
The Marketer who is trying to find more information
about who to target taps the services of the data
broker and aggregator.

The whole map goes full circle when this data is used
to shape the ads the individual sees when he goes to
the publishers' website.
DATA USES:
Personal Data Ecosystem
Public
examples:
UTILITY
COMPANIES
MEDIA GOVERNMENT
AGENCIES
examples:
Medical
PHARMACIESHOSPITALS DOCTORS
& NURSES
examples:
Retail
RETAIL
STORES
AIRLINES CREDIT CARD
COMPANIES
examples:
SOCIAL
NETWORKING
SERVICES
RETAIL &
CONTENT
WEBSITES
BUY ONE,
GET ONE!
SPECIAL
OFFER!
Internet
examples:
Financial & Insurace
STOCK
COMPANIES
INSURANCE BANKS
Information Brokers
Websites
Catalog Co-ops
Media Archives
List Brokers
Affiliates
DATA
COLLECTORS
(sources)
Media
Marketers
Employers
Banks
Product & Service
Delivery
Government
Lawyers/
Private Investigators
Individuals
Law Enforcement
DATA
BROKERS
DATA
USERS
Credit Bureaus
Healthcare Analytics
Ad Networks &
Analytics Companies
Examples of uses of consumer information in personally identifiable or aggregated form:
Financial services, such as for
banking or investment accounts
Credit granting, such as for credit or
debit cards; mortgage, automobile
or specialty loans; automobile rentals;
or telephone services
Insurance granting, such as for health,
automobile or life
Retail coupons and special offers
Catalog and magazine solicitations
Web and mobile services, including
content, e-mail, search, and social
networking
Product and service delivery, such as
streaming video, package delivery, or
a cable signal
Attorneys, such as for case
investigations
Individual
examples:
Telecommunications
& Mobile
CARRIERSMOBILE
PROVIDERS
CABLE
COMPANIES
Journalism, such as for fact checking
Marketing, whether electronically,
through direct mail, or by telephone
Data brokers for aggregation and resale
to companies and/or consumers
Background investigations by employers
or landlords
Locating missing or lost persons,
beneficiaries, or witnesses
Law enforcement
Research (e.g., health, financial, and
online search data) by academic
institutions, government agencies, and
commercial companies
Fraud detection and prevention
Government benefits and services,
such as licensing
Public
examples:
UTILITY
COMPANIES
MEDIA GOVERNMENT
AGENCIES
examples:
Medical
PHARMACIESHOSPITALS DOCTORS
& NURSES
examples:
Retail
RETAIL
STORES
AIRLINES CREDIT CARD
COMPANIES
examples:
SOCIAL
NETWORKING
SERVICES
SEARCH
ENGINES
RETAIL &
CONTENT
WEBSITES
BUY ONE,
GET ONE!
SPECIAL
OFFER!
Internet
examples:
Financial & Insurace
STOCK
COMPANIES
INSURANCE BANKS
Information Brokers
Websites
Catalog Co-ops
Media Archives
List Brokers
Affiliates
Media
Marketers
Employers
Banks
Product & Service
Delivery
Government
Lawyers/
Private Investigators
Individuals
Law Enforcement
Credit Bureaus
Healthcare Analytics
Ad Networks &
Analytics Companies
examples:
Telecommunications
& Mobile
ISPsMOBILE
PROVIDERS
CABLE
COMPANIES
examples:
https://www.ftc.gov/sites/default/files/documents/public_events/exploring-privacy-roundtable-series/personaldataecosystem.pdf
Individual: A person
Devices: Mobile phones, computers, self tracking
devices, medical monitoring devices, e-readers.	
	 	 	 	
Context: Where a person is (home, school, work). The
Role they are playing (parent, coach, spouse,
employee, supervisor, athletic team member). Persona
they are presenting (video game player, professional,
goofy hobby identity).
Data: The bits generated explicitly such as photos,
tweets, status updates.
Frameworks: Contractual mutli-party frameworks
connect legal/policy agreements to technical
interoperability to protect the individual and enable
markets. The Personal Cloud service provider is at the
heart of these frameworks, chosen by the end user,
and works on their behalf managing their data and its
participation in the framework.
Personal Data Analytics: Services that help people
gain insight into their own personal data. An example
being one’s daily health status or a personal annual
report.
[Trusted Organizations]	 	
Product Producer: This is an example of a Vendor
Relationship Management connection where a
consumer who bought a product from a producer
manages an open channel with the maker of the
product they bought and willingly share information
under favorable terms they the user set.
Infomediary: A service trusted to have insight into a
person’s data and working on their behalf. They have
an individual’s personally identifiable information (PII)
and protect that data and put it to use.
Data Aggregation Services: Services create
aggregate data sets from personal data, like music
listening habits. Aggregators may compensate people
for their data, people may share altruistically, or people
may unknowingly share.
Public Services: Governments delivering services to
their constituents can enable use of personal data
stores for better access and data quality.
[The Market]

Market Place: This is where an Individual’s business
agents with PII meet Vendor agents without PII.
Retailers: Companies that sell goods to customers.
Service Providers: Companies that provide services
to people.
Vendor Agents: Companies that help retailers and
service providers find good potential leads. They do not
have personally identifiable information.
[Governance]

How systems are regulated take many forms.
Governance starts with laws and regulation but also
includes cultural practices, business norms, and, in
digital systems, how identifiers are allocated and the
code that connects them.	
LEGAL:	 	 	
Government: plays many roles in the systems:
Regulator: Governments set baseline rules for how
markets work. They provide the court system where
contract law is adjudicated.
Public Records: Governments record births,
marriages, divorces, deaths along with licensing,
and property title registries.
Public Safety: Policing and law enforcement.
Ombudsman: Many states have a data protection
commissioner who protects constituents.
International Treaty Organizations: They support the
coordination of international treaties and provide a
meta-international law that hold governments
accountable to each other.
CODE: Computer code and how it runs determines
what is possible in computer systems. The phrase
“Code is Law” was popularized by Lawrence Lessig.
Standards Development Organizations: Bruce
Sterling said “If code is law then standards are like
the Senate.” Standards bodies agree on how code
works regardless of the particular language it is
written in or system it is running on. For example,
the W3C standardizes the HTML specification for
presenting web pages.
IDENTIFIER: Networks run on identifiers for each
endpoint. How these are allocated, and the terms and
conditions of use in a network, govern the network.
Global Identifier Registries: Examples include the
phone system, Domain Names, ISBN numbers,
RFID.
Private Name Spaces: examples include Twitter,
Skype, Google, Facebook etc.
PEER: This kind of governance is the most powerful in
many ways and helps social systems operate.	
Peer-to-Peer: People have opinions about each
other and also about businesses and services they
interact with - like Yelp for small businesses.
Professional: Doctors, lawyers, engineers,
geologists, and architects are professions that peer
regulate.
Institutional: Institutions figure out what other peer
institutions are - such as banks worldwide in SWIFT.
Framework Creators: Organizations that create
contractual legal-policy/technology frameworks that
govern complex multi-party networks.
My Data, My Value, 6 Sense Making Diagrams presented by Kaliya Young, Founder of
PDEC at the Cloud Identity Summit. We invite you to become a member of PDEC to
participate in shaping and influencing the emerging personal data ecosystem. To learn
more about the range of PDEC memberships please visit: http://www.pde.cc/membership 

Feel free to arrange a call with Dean Landsman, PDEC Executive Director. dean@pde.cc

More Related Content

More from Kaliya "Identity Woman" Young

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
Kaliya "Identity Woman" Young
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
Kaliya "Identity Woman" Young
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Kaliya "Identity Woman" Young
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
Kaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
Kaliya "Identity Woman" Young
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
Kaliya "Identity Woman" Young
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
Kaliya "Identity Woman" Young
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
Kaliya "Identity Woman" Young
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
Kaliya "Identity Woman" Young
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
Kaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
Kaliya "Identity Woman" Young
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
Kaliya "Identity Woman" Young
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
Kaliya "Identity Woman" Young
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
Kaliya "Identity Woman" Young
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
Kaliya "Identity Woman" Young
 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
Kaliya "Identity Woman" Young
 
Iiw11introtalk
Iiw11introtalkIiw11introtalk

More from Kaliya "Identity Woman" Young (20)

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
 
Iiw11introtalk
Iiw11introtalkIiw11introtalk
Iiw11introtalk
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Diagrams for My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem

  • 1. The Value Network Map below shows the value flows (in a simplified form) in the current ecosystem around targeted advertising and data aggregation*. The Individual is at the center and a next ring of parties has direct engagement with the individual (Publisher, Attribute Verifier, Data Collector, Network Address Provider, Payment Processors) while a wider ring does not (Marketers, Data Analytics Providers, Data Set Brokers). Read the narrative and see the matching colored section of the map. There is numbered value flow for each color that that goes with the narrative. The individual puts their attention towards a publisher’s website by clicking to view content, in doing so data about the view and information about the ad inventory available in that viewing act is available to a marketer who places a message (ad) on the page which is viewed by the individual. Persuaded by the ad the individual goes to a retail store advertised, in doing so they become subject to the terms of use put forward by the site and the data from the click is sent off to an aggregate data set broker. Using the data they data broker shares with the retailer a profile of the user and it uses this information to adapt the offer it makes to the user. The individual likes the offer and places an order. It is an item that requires a proof of an attribute - say a student in a school or being over the age of 19. The individual must go to an attribute verifier to get proof the attribute (and they are also given explicit or implicit use rights). They then share this proof of attribute to the retailer. Alternatively the user might choose to ask the Attribute verifier tell the Retailer directly about their status. Alternatively without the users involvement the retailer could ask for attribute from the provider without the individual’s consent or awareness. The retailer also requires a valid network end-point a phone number or e-mail address that works to contact the individual. So they request this from the Individual and send a message to the address and ask for confirmation. Now the retailer is ready to charge the individual using a payment processor and once the transaction goes through the individual gets the good they ordered. The data trails from the transaction continue....the retailer has a data set of transactions and it sells it to a data broker. The payment processor also has data and it too sells it to the data broker. Note that the Data Broker has no direct relationship to the Individual who’s specific data is contained within the data set and shared with the broker. The Retailer wants an analysis of his data and goes to a company that can provide that specific service. The data analytics company uses data from the data broker to help in its analysis. The Marketer who is trying to find more information about who to target taps the services of the data broker and aggregator.
 The whole map goes full circle when this data is used to shape the ads the individual sees when he goes to the publishers' website. DATA USES: Personal Data Ecosystem Public examples: UTILITY COMPANIES MEDIA GOVERNMENT AGENCIES examples: Medical PHARMACIESHOSPITALS DOCTORS & NURSES examples: Retail RETAIL STORES AIRLINES CREDIT CARD COMPANIES examples: SOCIAL NETWORKING SERVICES RETAIL & CONTENT WEBSITES BUY ONE, GET ONE! SPECIAL OFFER! Internet examples: Financial & Insurace STOCK COMPANIES INSURANCE BANKS Information Brokers Websites Catalog Co-ops Media Archives List Brokers Affiliates DATA COLLECTORS (sources) Media Marketers Employers Banks Product & Service Delivery Government Lawyers/ Private Investigators Individuals Law Enforcement DATA BROKERS DATA USERS Credit Bureaus Healthcare Analytics Ad Networks & Analytics Companies Examples of uses of consumer information in personally identifiable or aggregated form: Financial services, such as for banking or investment accounts Credit granting, such as for credit or debit cards; mortgage, automobile or specialty loans; automobile rentals; or telephone services Insurance granting, such as for health, automobile or life Retail coupons and special offers Catalog and magazine solicitations Web and mobile services, including content, e-mail, search, and social networking Product and service delivery, such as streaming video, package delivery, or a cable signal Attorneys, such as for case investigations Individual examples: Telecommunications & Mobile CARRIERSMOBILE PROVIDERS CABLE COMPANIES Journalism, such as for fact checking Marketing, whether electronically, through direct mail, or by telephone Data brokers for aggregation and resale to companies and/or consumers Background investigations by employers or landlords Locating missing or lost persons, beneficiaries, or witnesses Law enforcement Research (e.g., health, financial, and online search data) by academic institutions, government agencies, and commercial companies Fraud detection and prevention Government benefits and services, such as licensing Public examples: UTILITY COMPANIES MEDIA GOVERNMENT AGENCIES examples: Medical PHARMACIESHOSPITALS DOCTORS & NURSES examples: Retail RETAIL STORES AIRLINES CREDIT CARD COMPANIES examples: SOCIAL NETWORKING SERVICES SEARCH ENGINES RETAIL & CONTENT WEBSITES BUY ONE, GET ONE! SPECIAL OFFER! Internet examples: Financial & Insurace STOCK COMPANIES INSURANCE BANKS Information Brokers Websites Catalog Co-ops Media Archives List Brokers Affiliates Media Marketers Employers Banks Product & Service Delivery Government Lawyers/ Private Investigators Individuals Law Enforcement Credit Bureaus Healthcare Analytics Ad Networks & Analytics Companies examples: Telecommunications & Mobile ISPsMOBILE PROVIDERS CABLE COMPANIES examples: https://www.ftc.gov/sites/default/files/documents/public_events/exploring-privacy-roundtable-series/personaldataecosystem.pdf
  • 2. Individual: A person Devices: Mobile phones, computers, self tracking devices, medical monitoring devices, e-readers. Context: Where a person is (home, school, work). The Role they are playing (parent, coach, spouse, employee, supervisor, athletic team member). Persona they are presenting (video game player, professional, goofy hobby identity). Data: The bits generated explicitly such as photos, tweets, status updates. Frameworks: Contractual mutli-party frameworks connect legal/policy agreements to technical interoperability to protect the individual and enable markets. The Personal Cloud service provider is at the heart of these frameworks, chosen by the end user, and works on their behalf managing their data and its participation in the framework. Personal Data Analytics: Services that help people gain insight into their own personal data. An example being one’s daily health status or a personal annual report. [Trusted Organizations] Product Producer: This is an example of a Vendor Relationship Management connection where a consumer who bought a product from a producer manages an open channel with the maker of the product they bought and willingly share information under favorable terms they the user set. Infomediary: A service trusted to have insight into a person’s data and working on their behalf. They have an individual’s personally identifiable information (PII) and protect that data and put it to use. Data Aggregation Services: Services create aggregate data sets from personal data, like music listening habits. Aggregators may compensate people for their data, people may share altruistically, or people may unknowingly share. Public Services: Governments delivering services to their constituents can enable use of personal data stores for better access and data quality. [The Market] Market Place: This is where an Individual’s business agents with PII meet Vendor agents without PII. Retailers: Companies that sell goods to customers. Service Providers: Companies that provide services to people. Vendor Agents: Companies that help retailers and service providers find good potential leads. They do not have personally identifiable information. [Governance] How systems are regulated take many forms. Governance starts with laws and regulation but also includes cultural practices, business norms, and, in digital systems, how identifiers are allocated and the code that connects them. LEGAL: Government: plays many roles in the systems: Regulator: Governments set baseline rules for how markets work. They provide the court system where contract law is adjudicated. Public Records: Governments record births, marriages, divorces, deaths along with licensing, and property title registries. Public Safety: Policing and law enforcement. Ombudsman: Many states have a data protection commissioner who protects constituents. International Treaty Organizations: They support the coordination of international treaties and provide a meta-international law that hold governments accountable to each other. CODE: Computer code and how it runs determines what is possible in computer systems. The phrase “Code is Law” was popularized by Lawrence Lessig. Standards Development Organizations: Bruce Sterling said “If code is law then standards are like the Senate.” Standards bodies agree on how code works regardless of the particular language it is written in or system it is running on. For example, the W3C standardizes the HTML specification for presenting web pages. IDENTIFIER: Networks run on identifiers for each endpoint. How these are allocated, and the terms and conditions of use in a network, govern the network. Global Identifier Registries: Examples include the phone system, Domain Names, ISBN numbers, RFID. Private Name Spaces: examples include Twitter, Skype, Google, Facebook etc. PEER: This kind of governance is the most powerful in many ways and helps social systems operate. Peer-to-Peer: People have opinions about each other and also about businesses and services they interact with - like Yelp for small businesses. Professional: Doctors, lawyers, engineers, geologists, and architects are professions that peer regulate. Institutional: Institutions figure out what other peer institutions are - such as banks worldwide in SWIFT. Framework Creators: Organizations that create contractual legal-policy/technology frameworks that govern complex multi-party networks. My Data, My Value, 6 Sense Making Diagrams presented by Kaliya Young, Founder of PDEC at the Cloud Identity Summit. We invite you to become a member of PDEC to participate in shaping and influencing the emerging personal data ecosystem. To learn more about the range of PDEC memberships please visit: http://www.pde.cc/membership Feel free to arrange a call with Dean Landsman, PDEC Executive Director. dean@pde.cc