SlideShare a Scribd company logo
1 of 23
• Blog: jonathonhutchinson.com
• LinkedIn: 272 connections
• Twitter: 808 followers
• Instagram: 82 followers
• Vimeo: 10 followers
• The personal data economy is booming.
• The latest currency: your personal
information.
• Personal data sharing to double every
decade.
• Almost 6 million people are exposed to
scams and frauds during any given year.
• The financial losses equate to almost $1
billion
• Social networking websites and unsecured
wireless internet networks – a huge 50% of
Australia’s networks – are giving identity
thieves a new mine of information.
• Need to create awareness
• Purpose: engaging educational and informational
content on the topics of identity theft and personal
data brokering.
• Short video documentaries
• Textual explanations
• Infographics – Personal Data Value Calculator
• Text news articles and case studies.
• Interviewees:
• ABC social media guru Rod McGuiness
• Stay Smart Online Australian government campaign
• Blogger Mark Cameron of Marketingmag.com.au.
• Targeting audiences in the crime scene.
• Facebook shares link to Personal Data value
Calculator
• 92% of users
• The user will be redirected to the data calculator
page of our feature website.
• Generates interaction
• Possibility of going viral
• Almost 50% of 18-25 year olds admit that they have never
audited their online profile or cleaned up potentially
damaging content.
(AVG Technologies’ Digital Diaries)
• 62% of Australian internet users have a presence on social
networking sites such as Facebook, Twitter, Myspace or
LinkedIn.
• 98% of 18-25 year olds use Facebook.
• Facebook users are on the site 16 times per week.
• Most interested in what businesses can give them in the
form of discounts (57%), giveaways (45%), invitations to
events (41%) and product information (41%).
(Sensis Social Media Report)
Meco3602 Feature Proposal
Meco3602 Feature Proposal
Meco3602 Feature Proposal
Meco3602 Feature Proposal
Meco3602 Feature Proposal
Meco3602 Feature Proposal
Meco3602 Feature Proposal

More Related Content

Viewers also liked

Product life cycle
Product life cycleProduct life cycle
Product life cycleMd Killedar
 
Positioning- Marketing Management
Positioning- Marketing ManagementPositioning- Marketing Management
Positioning- Marketing ManagementMd Killedar
 
Marketing management Promotion
Marketing management  PromotionMarketing management  Promotion
Marketing management PromotionMd Killedar
 
MMM Indonesia - www.WebSupportMMM.com
MMM Indonesia - www.WebSupportMMM.comMMM Indonesia - www.WebSupportMMM.com
MMM Indonesia - www.WebSupportMMM.comsinggihjp
 
transciption powerpoint
transciption powerpointtransciption powerpoint
transciption powerpointNikka Bañez
 
Marketing Channels- Marketing Management
Marketing Channels- Marketing ManagementMarketing Channels- Marketing Management
Marketing Channels- Marketing ManagementMd Killedar
 

Viewers also liked (8)

Product life cycle
Product life cycleProduct life cycle
Product life cycle
 
Positioning- Marketing Management
Positioning- Marketing ManagementPositioning- Marketing Management
Positioning- Marketing Management
 
Marketing management Promotion
Marketing management  PromotionMarketing management  Promotion
Marketing management Promotion
 
MMM Indonesia - www.WebSupportMMM.com
MMM Indonesia - www.WebSupportMMM.comMMM Indonesia - www.WebSupportMMM.com
MMM Indonesia - www.WebSupportMMM.com
 
Egypt as an overwhelming experience
Egypt as an overwhelming experienceEgypt as an overwhelming experience
Egypt as an overwhelming experience
 
transciption powerpoint
transciption powerpointtransciption powerpoint
transciption powerpoint
 
Marketing Channels- Marketing Management
Marketing Channels- Marketing ManagementMarketing Channels- Marketing Management
Marketing Channels- Marketing Management
 
La administración
La administraciónLa administración
La administración
 

Similar to Meco3602 Feature Proposal

Digital And Social Media Linked In
Digital And Social Media Linked InDigital And Social Media Linked In
Digital And Social Media Linked Incrmurray30
 
Unlock The Chinese Market in Australia
Unlock The Chinese Market in AustraliaUnlock The Chinese Market in Australia
Unlock The Chinese Market in AustraliaLuxion Media
 
2015 Digital Marketing Directions for Hotel Marketers
2015 Digital Marketing Directions for Hotel Marketers2015 Digital Marketing Directions for Hotel Marketers
2015 Digital Marketing Directions for Hotel MarketersTim Peter
 
SCORE Minnesota social media update 10-11
SCORE Minnesota social media update 10-11SCORE Minnesota social media update 10-11
SCORE Minnesota social media update 10-11KarenEman
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015
Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015
Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015Leonardo
 
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Erik Ekholm
 
Social Media for Hotels and Hospitality
Social Media for Hotels and HospitalitySocial Media for Hotels and Hospitality
Social Media for Hotels and HospitalityChatterBlast Media
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywherePhil Bradley
 
Social Media For Business | Zurich Workshop
Social Media For Business | Zurich WorkshopSocial Media For Business | Zurich Workshop
Social Media For Business | Zurich WorkshopTwoCents Group
 
American Logistics Association Social Media Presentation 2010
American Logistics Association Social Media Presentation 2010American Logistics Association Social Media Presentation 2010
American Logistics Association Social Media Presentation 2010Bill Evans
 
RJ Pitch for BBI
RJ Pitch for BBIRJ Pitch for BBI
RJ Pitch for BBITaktical
 
RJ Pitch for BBI
RJ Pitch for BBIRJ Pitch for BBI
RJ Pitch for BBITaktical
 
Social Media Marketing - How can you make the most of it?
Social Media Marketing - How can you make the most of it?Social Media Marketing - How can you make the most of it?
Social Media Marketing - How can you make the most of it?Claire Lancaster
 
Social Media Marketing - Claire Lancaster
Social Media Marketing - Claire LancasterSocial Media Marketing - Claire Lancaster
Social Media Marketing - Claire Lancastermadhouseassociates1
 

Similar to Meco3602 Feature Proposal (20)

Digital And Social Media Linked In
Digital And Social Media Linked InDigital And Social Media Linked In
Digital And Social Media Linked In
 
Flett Consulting
Flett ConsultingFlett Consulting
Flett Consulting
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Unlock The Chinese Market in Australia
Unlock The Chinese Market in AustraliaUnlock The Chinese Market in Australia
Unlock The Chinese Market in Australia
 
2015 Digital Marketing Directions for Hotel Marketers
2015 Digital Marketing Directions for Hotel Marketers2015 Digital Marketing Directions for Hotel Marketers
2015 Digital Marketing Directions for Hotel Marketers
 
SCORE Minnesota social media update 10-11
SCORE Minnesota social media update 10-11SCORE Minnesota social media update 10-11
SCORE Minnesota social media update 10-11
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015
Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015
Big, Bold, Visual: What You Need to Know About Hotel Marketing in 2015
 
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27Skapa presentation West Sweden Chamber of Commerce 2018-11-27
Skapa presentation West Sweden Chamber of Commerce 2018-11-27
 
Social Media for Hotels and Hospitality
Social Media for Hotels and HospitalitySocial Media for Hotels and Hospitality
Social Media for Hotels and Hospitality
 
Why Should Big Law do Social Media
Why Should Big Law do Social MediaWhy Should Big Law do Social Media
Why Should Big Law do Social Media
 
Data data everywhere
Data data everywhereData data everywhere
Data data everywhere
 
Social Media For Business | Zurich Workshop
Social Media For Business | Zurich WorkshopSocial Media For Business | Zurich Workshop
Social Media For Business | Zurich Workshop
 
American Logistics Association Social Media Presentation 2010
American Logistics Association Social Media Presentation 2010American Logistics Association Social Media Presentation 2010
American Logistics Association Social Media Presentation 2010
 
RJ Pitch for BBI
RJ Pitch for BBIRJ Pitch for BBI
RJ Pitch for BBI
 
RJ Pitch for BBI
RJ Pitch for BBIRJ Pitch for BBI
RJ Pitch for BBI
 
Content Marketing and the War for Attention: The Rise of Rich Media and How t...
Content Marketing and the War for Attention: The Rise of Rich Media and How t...Content Marketing and the War for Attention: The Rise of Rich Media and How t...
Content Marketing and the War for Attention: The Rise of Rich Media and How t...
 
Social Media Marketing - How can you make the most of it?
Social Media Marketing - How can you make the most of it?Social Media Marketing - How can you make the most of it?
Social Media Marketing - How can you make the most of it?
 
Social Media Marketing - Claire Lancaster
Social Media Marketing - Claire LancasterSocial Media Marketing - Claire Lancaster
Social Media Marketing - Claire Lancaster
 

Recently uploaded

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 

Recently uploaded (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

Meco3602 Feature Proposal

  • 1.
  • 2. • Blog: jonathonhutchinson.com • LinkedIn: 272 connections • Twitter: 808 followers • Instagram: 82 followers • Vimeo: 10 followers
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. • The personal data economy is booming. • The latest currency: your personal information. • Personal data sharing to double every decade. • Almost 6 million people are exposed to scams and frauds during any given year. • The financial losses equate to almost $1 billion • Social networking websites and unsecured wireless internet networks – a huge 50% of Australia’s networks – are giving identity thieves a new mine of information. • Need to create awareness
  • 14. • Purpose: engaging educational and informational content on the topics of identity theft and personal data brokering. • Short video documentaries • Textual explanations • Infographics – Personal Data Value Calculator • Text news articles and case studies. • Interviewees: • ABC social media guru Rod McGuiness • Stay Smart Online Australian government campaign • Blogger Mark Cameron of Marketingmag.com.au.
  • 15. • Targeting audiences in the crime scene. • Facebook shares link to Personal Data value Calculator • 92% of users • The user will be redirected to the data calculator page of our feature website. • Generates interaction • Possibility of going viral
  • 16. • Almost 50% of 18-25 year olds admit that they have never audited their online profile or cleaned up potentially damaging content. (AVG Technologies’ Digital Diaries) • 62% of Australian internet users have a presence on social networking sites such as Facebook, Twitter, Myspace or LinkedIn. • 98% of 18-25 year olds use Facebook. • Facebook users are on the site 16 times per week. • Most interested in what businesses can give them in the form of discounts (57%), giveaways (45%), invitations to events (41%) and product information (41%). (Sensis Social Media Report)