Koushik Chatterjee''s presentation at eComm 2008

1,955 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,955
On SlideShare
0
From Embeds
0
Number of Embeds
20
Actions
Shares
0
Downloads
38
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Koushik Chatterjee''s presentation at eComm 2008

    1. Privacy and the Web’s Possible Future in Telco Services Koushik Chatterjee Business Strategy Manager Embarq Wholesale Markets
    2. Disclaimer <ul><li>This presentation discusses ideas and products that are under development and may still be in the ideation phase. The slides do not necessarily represent products and services that will be deployed by Embarq. </li></ul>
    3. Privacy and the Web’s Possible Future in Telco Services <ul><li>Thoughts on Privacy & Security </li></ul><ul><li>The Different Types of Privacy </li></ul><ul><li>Social Networking’s Bad Press </li></ul><ul><li>Anonymous Services for Social Networks </li></ul><ul><li>Safely transfer information over the “phone” </li></ul><ul><li>Sharing your data with advertisers </li></ul><ul><li>Social Networks meet the phone </li></ul><ul><li>About Embarq </li></ul>
    4. Thoughts on Privacy & Security <ul><li>Why do we want privacy anyway? </li></ul><ul><ul><li>Are we doing something wrong </li></ul></ul><ul><ul><li>Are we embarrassed about something </li></ul></ul><ul><ul><li>Do we simply want to control what others know about us </li></ul></ul><ul><ul><li>Is privacy valuable in and of itself </li></ul></ul>
    5. Thoughts on Privacy & Security <ul><li>“ Privacy can be a means of achieving security” </li></ul><ul><ul><li>Security from telemarketer disturbances </li></ul></ul><ul><ul><li>Security from criticism and hurt feelings </li></ul></ul><ul><ul><li>Security from predators and safety concerns </li></ul></ul><ul><ul><li>Security from strangers and the unknown </li></ul></ul>Security Privacy
    6. Thoughts on Privacy & Security <ul><li>“ What happens when security is achieved by another means? Is privacy still required?” </li></ul>
    7. Thoughts on Privacy & Security <ul><li>Todd Davis is the CEO of LifeLock </li></ul><ul><li>Todd freely publishes his social security number </li></ul><ul><li>Todd does not need privacy because he has security </li></ul>LifeLock images used with permission
    8. The Different Types of Privacy Does Information Exist in Two States? PRIVATE INFORMATION PUBLIC INFORMATION
    9. The Different Types of Privacy The Private Phone Number <ul><li>“ My phone number is not public. I have a private phone number that is not in the phone book” </li></ul>PRIVATE INFORMATION PUBLIC INFORMATION
    10. The Different Types of Privacy UNIX File Permissions and Relationships <ul><li>Unix has three ownership relations. </li></ul><ul><ul><li>Owner </li></ul></ul><ul><ul><li>Group </li></ul></ul><ul><ul><li>All/World </li></ul></ul><ul><li>Users are able to access files based on their relationship to the Owner’s account </li></ul><ul><li>The file is not inherently private or public </li></ul>[prompt]$ ls –l -rwxr-xr-x 1 kc users 312 Jan 21 10:30 index.html -rwxr-xr-x 2 kc users 2010 Jan 21 10:30 index.html
    11. The Different Types of Privacy Profile Permissions and Relationships <ul><li>Your Social Networking Profile can be public or private based on your relationship with the observer </li></ul><ul><ul><li>The profile is public to the Owner </li></ul></ul><ul><ul><li>The profile is public to your Group of friends </li></ul></ul><ul><ul><li>The profile can be private to All/World </li></ul></ul><ul><li>Users are able to access files based on their relationship to the Owner’s account </li></ul><ul><li>The profile is not inherently private or public </li></ul>SOCIAL NETWORK PROFILE Private Public
    12. <ul><li>Relationship based privacy only works when both parties have been properly authenticated. </li></ul>The Different Types of Privacy Relationship based privacy
    13. The Different Types of Privacy Relationship based privacy Authentication is the key to successful relationship based privacy SECURITY PRIVACY AUTHENTICATION
    14. The Different Types of Privacy The Local Telco Advantage <ul><li>Authentication is the key to providing accurate relationship based privacy </li></ul><ul><li>A facility based Telecommunications company has a physical connection and often a long history with the customer </li></ul><ul><li>There are many false profiles online unlike customers of the facility based Telecommunications company </li></ul><ul><li>The Local Telco is in a strong position to create private trust communities among customers. </li></ul>SECURITY PRIVACY AUTHENTICATION
    15. Pew Internet & American Life Project July 19 th , 2006 <ul><li>“ More than half of bloggers use a pseudonym. Blog content that is appropriate or even funny for a friend can also be cause for dismissal to a supervisor or employer. To avoid the problem of colliding life spheres and to protect personal privacy, many bloggers use a pseudonym to keep their offline life separate from their online thoughts. In fact, a bit more than half of bloggers (55%) surveyed say they blog under a pseudonym or made-up name, while 43% say they blog using their real name. “ </li></ul>Source: http://www.pewinternet.org/pdfs/PIP%20Bloggers%20Report%20July%2019%202006.pdf Is there a market for private trust communities based on Local Telco authentication?
    16. Social Networking’s Bad Press <ul><li>In the past, MySpace.com had a security leak where photos from private profiles could be viewed </li></ul><ul><li>Dateline NBC’s “To Catch a Predator” </li></ul><ul><li>October 2006 Megan Meier, age 13 hangs herself after breaking up with Josh Evans on MySpace </li></ul><ul><ul><li>Josh Evans was created by an Adult neighbor </li></ul></ul><ul><ul><li>Megan had a history of depression </li></ul></ul><ul><ul><li>The Adult neighbors admitted to creating the false profile </li></ul></ul><ul><li>Kids can have a private online life away from parents view while still remaining at home. </li></ul>Is there a market for private trust communities based on Local Telco authentication? If a crime is committed, the Local Telco will know everyone involved Behavior online can be curbed when consequences exist for bad behavior
    17. Social Networking’s Bad Press <ul><li>Society may move to private trust communities where strong security replaces privacy </li></ul><ul><li>Society could move towards improved levels of online interaction with greater levels of privacy through anonymous services </li></ul>Privacy Security
    18. Anonymous Services: Voice Hello? Conversation This is an EMBARQ Phonymizer call from “Jeremy”. Press 1 to be connected with your caller. Anonymous VOIP services can bring people together and still maintain privacy Your VOIP call will last for 10 minutes Conversation W W W
    19. Anonymous Services: Shipping Anonymous shipping services can bring people together and still maintain privacy My online friend can send me gaming equipment and still remain anonymous
    20. Safely Transfer Information over the Phone Please listen to this entire message because our menu options have changed… In a future with VOIP, should customers have to waste time listening to automated phone menu systems? VOIP Phone with Display
    21. Safely Transfer Information over the Phone <ul><li>The following would display on a phone after the user has dialed a number that uses a phone tree menu. The user reads the phone display to know what menu option to push. </li></ul>Thank you for being a part of KC Royals Baseball 1 - 2008 single game ticket info 2 - Become a 2008 full season ticket holder --scroll--
    22. Safely Transfer Information over the Phone <ul><li>The User can enter private information directly into online systems </li></ul>Thank you for being a part of KC Royals Baseball 1 - 2008 single game ticket info 2 - Become a 2008 full season ticket holder --scroll--
    23. Sharing Your Data with Advertisers Community Caller ID <ul><li>Who you call reveals your interests and can suggest your buying behavior </li></ul><ul><li>Individuals may be willing to share their calling histories with advertisers if they know the data will not be connected to other personal information </li></ul><ul><li>The pay per click or call models in online advertising are effective, since advertisers only pay when users click on the ads </li></ul><ul><li>The pay per call model of online advertising can be adapted to the Caller ID model of traditional and VOIP telephones </li></ul>
    24. Sharing Your Data with Advertisers Community Caller ID <ul><li>With pay per click advertising, advertisers bid on key words </li></ul><ul><li>With Community Caller ID pay per call advertising, advertisers bid on phone numbers that are being dialed by consumers </li></ul><ul><li>The consumer’s privacy is maintained since advertisers only know that a call to a specific number has taken place </li></ul><ul><li>Just as users today search online for services only to be lured by advertisements from competitors, calls placed to business could result in consumers choosing their competitors instead </li></ul>Outgoing call to Pizza Hut Coupons triggered to be displayed from Dominos and Papa Johns
    25. Sharing Your Data with Advertisers Community Caller ID <ul><li>Almon Brown Strowger (1829-1908), an undertaker from Kansas City Missouri, invented the Automatic Strowger Exchange </li></ul><ul><li>It was invented to deal with the frustration of human operators misdirecting/hijacking his customer calls to competitors </li></ul><ul><li>Community Caller ID once again allows customer calls to be “hijacked” to competitors via advertising </li></ul>http://en.wikipedia.org/wiki/Almon_Strowger
    26. Social Networks Meet the Phone Community Caller ID <ul><li>Open up Caller ID information so that it is expanded and user generated </li></ul><ul><li>Calls placed by customers to businesses would display expanded caller id information </li></ul><ul><li>Calls to the local restaurant would instantly reveal comments from the community about the food quality </li></ul><ul><li>Calls to your neighbors would instantly reveal comments from the community about your neighbor or would reveal enhanced comments created by your neighbor </li></ul><ul><li>Relationship based privacy may be employed to control who can see the Community Caller ID messages </li></ul>
    27. Social Networks Meet the Phone Community Caller ID Examples <ul><li>Know about the telemarketer calling your neighborhood before you pick up the phone. </li></ul><ul><li>Let the neighbors leave you congratulation messages that your other neighbors can see when you call them or they call you. </li></ul><ul><li>Tell other Embarq customers in your community about yourself such as the fact that you have a car for sale or you are learning to ski. </li></ul><ul><li>See coupon codes when you call local businesses. </li></ul><ul><li>College students can see profile comments (or other social networking) which is more useful and personal than having a ring-back tone. </li></ul><ul><li>Create different messages that appear for different users. </li></ul>
    28. About EMBARQ <ul><li>Embarq Corporation (NYSE: EQ), headquartered in Overland Park, Kansas, offers a complete suite of common-sense communications services. The company has approximately 18,000 employees and operates in 18 states. EMBARQ is included in the S&P 500. </li></ul><ul><li>For consumers, EMBARQ offers an innovative portfolio of services that includes reliable local and long distance home phone service, high-speed Internet, wireless, and satellite TV from DISH Network(R) -- all on one monthly bill. </li></ul><ul><li>For businesses, EMBARQ has a comprehensive range of flexible and integrated services designed to help businesses of all sizes be more productive and communicate with their customers. This service portfolio includes local voice and data services, long distance, Business-Class High Speed Internet, wireless, enhanced data network services, voice and data communication equipment and managed network services. </li></ul><ul><li>EMBARQ believes that by focusing on the communities the company serves and by employing common sense and practical ingenuity, it is able to provide customers with a committed partner, dedicated customer service and innovative products for work and home. For more information, visit http://www.embarq.com. </li></ul>
    29. Questions? Privacy Security
    30. An eComm 2008 presentation – http://eCommMedia.com for more

    ×