In today’s society, companies and organizations have unprecedented possibilities to collect and use people’s personal information. Using this information in the right way enables new revenue streams and increased profit.
But do consumers understand and perceive the value of their personal information? What are the sensitivity involved with an increased use of personal information by enterprises, governments and consumers? The purpose of the Personal Information Economy report by ConsumerLab has been to describe consumers’ understanding, needs, behaviors and attitudes with respect to personal information as an asset.
For more research from the Ericsson ConsumerLab visit: http://www.ericsson.com/thinkingahead/consumerlab
Impact of M-Commerce Technologies on Developing Countriesijtsrd
M commerce is defined as any transaction with monetary value that is conducted via a mobile telecommunication network. M commerce like E commerce can be B2B business to business , P2P person to person or B2C business to customer oriented. The framework divides into couple sub areas based on user's distribution criterion. Mobile E commerce addresses electronic commerce via mobile devices, where the consumer is not in physical or eye contact with the goods that are being purchased. On the contrary in M trade the consumer has eye contact with offered products and services. In both case the payment procedure is executed via the mobile network. Prof. Rekha D. M | Divya. L "Impact of M-Commerce Technologies on Developing Countries" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29410.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/29410/impact-of-m-commerce-technologies-on-developing-countries/prof-rekha-d-m
Exploring Key Factors Affecting the Adoption of Mobile Commerce: A Case of Pu...paperpublications3
Abstract: The purpose of this research is how to apply TAM model proposed by Davis, F. D. (1989) and Marketing factor to improve the purchasing intention on luxury fashion products via Mobile commerce. Conceptual Framework is mainly based on 3 hypotheses, 7 sub variables. (Fashion Innovativeness, Fashion Involvement, Brand image, and the constructs Perceived usefulness, Perceived ease of use, Social influence, Security) Quantitative research is used to determine the relationship between independent variable and dependent variable. All hypotheses tested factor analysis, Reliability, Correlations, and Multiple regressions. Data were collected from 253 respondents through online questionnaires within the period of 1st of February to 25th of March 2016. Computer program Statistical Package for the social science (SPSS) software was used to analyze the data. Our results illustrated that all variables have positive related on purchase intention. There is no doubt Mobile technologies have the potential to bring changes to traditional shopping.
Voice Commerce, Voice Shopping, or V-CommerceAlex Mari
Understanding shopping-related voice assistants and their effect on brands. Why are voice assistants relevant for brands and retailers? How is voice assistants diffusion affecting market dynamics?
Presented at IMMAA Annual Conference on Media and Innovation, Northwestern University in Qatar, Doha (Qatar), October 4-6, 2019.
Impact of M-Commerce Technologies on Developing Countriesijtsrd
M commerce is defined as any transaction with monetary value that is conducted via a mobile telecommunication network. M commerce like E commerce can be B2B business to business , P2P person to person or B2C business to customer oriented. The framework divides into couple sub areas based on user's distribution criterion. Mobile E commerce addresses electronic commerce via mobile devices, where the consumer is not in physical or eye contact with the goods that are being purchased. On the contrary in M trade the consumer has eye contact with offered products and services. In both case the payment procedure is executed via the mobile network. Prof. Rekha D. M | Divya. L "Impact of M-Commerce Technologies on Developing Countries" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29410.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/29410/impact-of-m-commerce-technologies-on-developing-countries/prof-rekha-d-m
Exploring Key Factors Affecting the Adoption of Mobile Commerce: A Case of Pu...paperpublications3
Abstract: The purpose of this research is how to apply TAM model proposed by Davis, F. D. (1989) and Marketing factor to improve the purchasing intention on luxury fashion products via Mobile commerce. Conceptual Framework is mainly based on 3 hypotheses, 7 sub variables. (Fashion Innovativeness, Fashion Involvement, Brand image, and the constructs Perceived usefulness, Perceived ease of use, Social influence, Security) Quantitative research is used to determine the relationship between independent variable and dependent variable. All hypotheses tested factor analysis, Reliability, Correlations, and Multiple regressions. Data were collected from 253 respondents through online questionnaires within the period of 1st of February to 25th of March 2016. Computer program Statistical Package for the social science (SPSS) software was used to analyze the data. Our results illustrated that all variables have positive related on purchase intention. There is no doubt Mobile technologies have the potential to bring changes to traditional shopping.
Voice Commerce, Voice Shopping, or V-CommerceAlex Mari
Understanding shopping-related voice assistants and their effect on brands. Why are voice assistants relevant for brands and retailers? How is voice assistants diffusion affecting market dynamics?
Presented at IMMAA Annual Conference on Media and Innovation, Northwestern University in Qatar, Doha (Qatar), October 4-6, 2019.
In light of the staggering evolution of mobile technologies, the concept of mobility is gaining more attention worldwide. Recent statistics demonstrate mobile channels’ increasing significance in outreach and service delivery. However, governments and businesses face a challenge in reaping the benefits of mobile platforms: how to confirm the authenticity of mobile users and transactions. Mobile devices, by design, are well suited for enabling authentication and digital signing services, similar to traditional PC and laptop environments. But although various implementations support different authentication schemes, they still do not instill sufficient levels of trust and confidence. In this article we explore the practice of mobile identity management. We provide an overview of how EU countries tackle mobile identity. The main part of the article sheds light on the solution framework adopted in the United Arab Emirates (UAE) to address, recently launched mobile government transformation initiatives. Taking into account the newness of the topic, the content of this article should fuel the current limited knowledge base and trigger debate around the presented approaches.
The Changing Face of E Commerce in Nigeria Prospects and ChallengesYogeshIJTSRD
While prior studies focused on the determinants of adoption of e commerce in large scale businesses and organizations, there is a few of empirical research on this issue of acceptance of e commerce in retail shops in emerging economies. This study addresses this lacuna by focusing on the changing faces of e commerce factors driving Nigerian retail shops’ adoption of online selling. A framework based on the extant literature and established model in the relevant field is critically examined in this study. Data were collected through a structured questionnaire and analyzed using frequency and percentage. The results showed that there is low involvement of consumers in e commerce changes in Nigeria. Secondly, the study also found out that the availability of online shopping does not affect the number of shopping trips that consumers make to physical stores. This finding has implications for e commerce sites and the government in designing an appropriate strategy for the implementation of technological innovation that are highlighted in the study. Dr. Robinson Aristarchus Bananda | Dr. Kennedy O. Nwagwu "The Changing Face of E-Commerce in Nigeria; Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38018.pdf Paper URL: https://www.ijtsrd.com/management/marketing/38018/the-changing-face-of-ecommerce-in-nigeria-prospects-and-challenges/dr-robinson-aristarchus-bananda
Social networks and digital devices are being used to engage government, businesses and civil society, as well as friends and family. People are using mobile, interactive tools to determine who to trust, here to go and what to buy. At the same time, businesses are undertaking their own digital transformations, rethinking what customers value most and creating operating models that take advantage of what’s newly possible for competitive differentiation. The challenge for business is how fast and how far to go down the road to the eBusiness evolution.
Mobile e-commerce (m-commerce) is a term that describes online sales transactions that use wireless electronic devices such as hand-held computers (tablets), mobile phones or laptops. These wireless devices interact with computer networks that have the ability to conduct online merchandise purchases. Any type of cash exchange is referred to as an m-commerce transaction.
At present, generation Y represents the most population in the world and their
acceptance either as consumers, users or clients plays a significant and important role in
making the business world doomed or brighter. Therefore, their behaviour plays the most
important role in ensuring e-commerce does well and making the online business industry
grow tremendously. Yet, little is known about the intention among generation Y with
regards to e-commerce. This study aims to identify the online fraud and trust towards the
technology influencing the intention to use e-commerce among generation Y. A total of
one hundred and twenty respondents of generation Y were recruited in this study through
convenience sampling at Kota Bharu city. This quantitative study using survey as a
method of data collection and a questionnaire was distributed to the respondents to fill.
The respondents were asked for consent before proceeding with the survey, in order to
ensure that the ethical consideration was taken into account while conducting the study.
Data were analysed using Pearson correlation and multiple regression analysis. Findings
revealed that trust and online fraud had a positive and significant relationship with
consumer intention, and they were significantly affecting the intention of generation Y.
This study would suggest that the online business companies and e-commerce
technologies should consider focusing on these variables in the development and
implementation of a strategy to attract and retain buyers in the future.
The Evolution of Marketing in the Context of Voice Commerce: A Managerial Pe...Alex Mari
This paper examines managers’ perceptions of the evolution of voice assistants and their potential effects on the marketing practice. Shopping-related voice assistants are likely to radically change the way consumers search and purchase products with severe impact on brands. However, the behavior of these AI-enabled machines represents a “black box” for brand owners. The study of the managers’ interpretation of a voice-enabled marketplace is critical as it may influence future marketing choices.
Policy Brief : Can the GDPR help SMEs innovate for older adults in Europe?Mobile Age Project
Mobile Age project: https://www.mobile-age.eu/
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 693319.
This material reflects only the author's view and the Research Executive Agency (REA) is not responsible for any use that may be made of the information it contains.
Mobile Payments: How U.S. Banks Can Deal with Disruptive ChangeCognizant
Banks are well-positioned to benefit from mobile payments, if they invest in the technology infrastructure and forge strong partnerships to out-maneuver emerging non-traditional players.
Gen Y consumers will earn 46% of the income in the United States by 2025, but they’re often misunderstood or ignored by financial services providers. This is especially true when it comes to online and mobile behavior and attitudes toward traditional banking.
Understanding this problem and designing to overcome it is critical to our work at Comrade, so we’re pleased to have partnered with Javelin Strategy & Research to publish “The Three Costliest Myths about Gen Y". This report applies consumer data to dispel the myths circulating in financial services today about Gen Y consumers. Beyond exposing pervasive misconceptions, it also explains how to optimize digital and physical touchpoints to attract tomorrow’s most profitable bank customers.
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
Over the past few months we have run a series of expert workshops exploring the future of digital identity. Supported by Mastercard five events took place in London, Singapore, Sydney, San Francisco and Brussels building a collaborative expert view.
The project online and initial perspective is here https://www.futureagenda.org/news/the-future-of-digital-identity
The full report will be published in the New Year
In light of the staggering evolution of mobile technologies, the concept of mobility is gaining more attention worldwide. Recent statistics demonstrate mobile channels’ increasing significance in outreach and service delivery. However, governments and businesses face a challenge in reaping the benefits of mobile platforms: how to confirm the authenticity of mobile users and transactions. Mobile devices, by design, are well suited for enabling authentication and digital signing services, similar to traditional PC and laptop environments. But although various implementations support different authentication schemes, they still do not instill sufficient levels of trust and confidence. In this article we explore the practice of mobile identity management. We provide an overview of how EU countries tackle mobile identity. The main part of the article sheds light on the solution framework adopted in the United Arab Emirates (UAE) to address, recently launched mobile government transformation initiatives. Taking into account the newness of the topic, the content of this article should fuel the current limited knowledge base and trigger debate around the presented approaches.
The Changing Face of E Commerce in Nigeria Prospects and ChallengesYogeshIJTSRD
While prior studies focused on the determinants of adoption of e commerce in large scale businesses and organizations, there is a few of empirical research on this issue of acceptance of e commerce in retail shops in emerging economies. This study addresses this lacuna by focusing on the changing faces of e commerce factors driving Nigerian retail shops’ adoption of online selling. A framework based on the extant literature and established model in the relevant field is critically examined in this study. Data were collected through a structured questionnaire and analyzed using frequency and percentage. The results showed that there is low involvement of consumers in e commerce changes in Nigeria. Secondly, the study also found out that the availability of online shopping does not affect the number of shopping trips that consumers make to physical stores. This finding has implications for e commerce sites and the government in designing an appropriate strategy for the implementation of technological innovation that are highlighted in the study. Dr. Robinson Aristarchus Bananda | Dr. Kennedy O. Nwagwu "The Changing Face of E-Commerce in Nigeria; Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38018.pdf Paper URL: https://www.ijtsrd.com/management/marketing/38018/the-changing-face-of-ecommerce-in-nigeria-prospects-and-challenges/dr-robinson-aristarchus-bananda
Social networks and digital devices are being used to engage government, businesses and civil society, as well as friends and family. People are using mobile, interactive tools to determine who to trust, here to go and what to buy. At the same time, businesses are undertaking their own digital transformations, rethinking what customers value most and creating operating models that take advantage of what’s newly possible for competitive differentiation. The challenge for business is how fast and how far to go down the road to the eBusiness evolution.
Mobile e-commerce (m-commerce) is a term that describes online sales transactions that use wireless electronic devices such as hand-held computers (tablets), mobile phones or laptops. These wireless devices interact with computer networks that have the ability to conduct online merchandise purchases. Any type of cash exchange is referred to as an m-commerce transaction.
At present, generation Y represents the most population in the world and their
acceptance either as consumers, users or clients plays a significant and important role in
making the business world doomed or brighter. Therefore, their behaviour plays the most
important role in ensuring e-commerce does well and making the online business industry
grow tremendously. Yet, little is known about the intention among generation Y with
regards to e-commerce. This study aims to identify the online fraud and trust towards the
technology influencing the intention to use e-commerce among generation Y. A total of
one hundred and twenty respondents of generation Y were recruited in this study through
convenience sampling at Kota Bharu city. This quantitative study using survey as a
method of data collection and a questionnaire was distributed to the respondents to fill.
The respondents were asked for consent before proceeding with the survey, in order to
ensure that the ethical consideration was taken into account while conducting the study.
Data were analysed using Pearson correlation and multiple regression analysis. Findings
revealed that trust and online fraud had a positive and significant relationship with
consumer intention, and they were significantly affecting the intention of generation Y.
This study would suggest that the online business companies and e-commerce
technologies should consider focusing on these variables in the development and
implementation of a strategy to attract and retain buyers in the future.
The Evolution of Marketing in the Context of Voice Commerce: A Managerial Pe...Alex Mari
This paper examines managers’ perceptions of the evolution of voice assistants and their potential effects on the marketing practice. Shopping-related voice assistants are likely to radically change the way consumers search and purchase products with severe impact on brands. However, the behavior of these AI-enabled machines represents a “black box” for brand owners. The study of the managers’ interpretation of a voice-enabled marketplace is critical as it may influence future marketing choices.
Policy Brief : Can the GDPR help SMEs innovate for older adults in Europe?Mobile Age Project
Mobile Age project: https://www.mobile-age.eu/
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 693319.
This material reflects only the author's view and the Research Executive Agency (REA) is not responsible for any use that may be made of the information it contains.
Mobile Payments: How U.S. Banks Can Deal with Disruptive ChangeCognizant
Banks are well-positioned to benefit from mobile payments, if they invest in the technology infrastructure and forge strong partnerships to out-maneuver emerging non-traditional players.
Gen Y consumers will earn 46% of the income in the United States by 2025, but they’re often misunderstood or ignored by financial services providers. This is especially true when it comes to online and mobile behavior and attitudes toward traditional banking.
Understanding this problem and designing to overcome it is critical to our work at Comrade, so we’re pleased to have partnered with Javelin Strategy & Research to publish “The Three Costliest Myths about Gen Y". This report applies consumer data to dispel the myths circulating in financial services today about Gen Y consumers. Beyond exposing pervasive misconceptions, it also explains how to optimize digital and physical touchpoints to attract tomorrow’s most profitable bank customers.
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
Over the past few months we have run a series of expert workshops exploring the future of digital identity. Supported by Mastercard five events took place in London, Singapore, Sydney, San Francisco and Brussels building a collaborative expert view.
The project online and initial perspective is here https://www.futureagenda.org/news/the-future-of-digital-identity
The full report will be published in the New Year
Licensing Factory New Europe 2009 Photo OverviewGoran Kernyak
Take a look how it was last year at first Licensing Factory New Europe event. We are looking forward to seeing you in Zagreb at Licensing New Europe 2010.
Puesta al día en la Ley 26/2007 de Responsabilidad Medioambiental y su Reglam...ABALEO, S.L.
Revisión de Abril de 2015 con todas las novedades sobre la Ley 26/2007 de Responsabilidad Medioambiental y su Reglamento. Incluye los cambios que incorporan la Ley 11/2014 y el Real Decreto 183/2015 en los riesgos ambientales.
Servicios Legales de recuperación de impagados. Gestión integral de recobro de deudas (Prevención de impagos, Extrajudicial y Judicial) www.cmsimpagados.com
Raja Fiber adalah sentra kerajinan wahana water park fiberglass di Jawa Tengah.Kami hadirkan Panduan dan Konsep Bisnis Water Park sebagai referensi Anda dalam memulai Bisnis Rekreasi Air atau Water Park.Dalam Panduan tersebut kami sertakan estimasi RAB dan contoh produk produk Raja Fiber.Produk kami dikenal inovatif dan memiliki kualitas yang baik karena seluruh material dan produk jadi melalui tahap QC yang ketat.Seluruh RAW material komposit kami memiliki sertifikasi dan badan berwenang yaitu FDA dan LR Register untuk chemical product.
Interactive Online Technology Tools to Enhance Learning for English Compositi...Tiffany Smith
This powerpoint presentation was accepted to the
Society for Information Technology & Teacher Education 2011 Conference. It\'s virtually presented and included in the digital library.
Ericsson ConsumerLab: Personal Information Economy Ericsson Slides
In today’s society, companies and organizations have unprecedented possibilities to collect and use people’s personal information. Using this information in the right way enables new revenue streams and increased profit.
But do consumers understand and perceive the value of their personal information? What are the sensitivity involved with an increased use of personal information by enterprises, governments and consumers? The purpose of the Personal Information Economy report by ConsumerLab has been to describe consumers’ understanding, needs, behaviors and attitudes with respect to personal information as an asset.
For more research from the Ericsson ConsumerLab visit: http://www.ericsson.com/thinkingahead/consumerlab
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion. Filed on August 21, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
The FDA’s role in the approval and subsequent review of Vioxx, a.docxmehek4
The FDA’s role in the approval and subsequent review of Vioxx, a pain medication with- drawn from the market by its manufacturer after it was associated with heart attacks and strokes, is discussed in a case at the end of this textbook.
In 2010, Congress established, as part of the Dodd-Frank Act (also discussed in Chapters 8 and 14), a new consumer regulatory body, called the Consumer Financial Pro- tection Bureau. The purposes and actions of this agency are described in Exhibit 15.B. The debate over whether government should become involved in protecting consumer privacy is discussed in the next section of this chapter.
All seven government regulatory agencies shown in Figure 15.2 are authorized by law to intervene directly into the very center of free market activities, if that is considered nec- essary to protect consumers. In other words, consumer protection laws and agencies substi- tute government-mandated standards and the decisions of government officials for decision making by private buyers and sellers.
Consumer Privacy in the Digital Age
In the early 21st century, rapidly evolving information technologies have given new ur- gency to the broad issue of consumer privacy. Shoppers have always been concerned that information they reveal in the course of a sales transaction—for example, their credit card or driver’s license numbers—might be misused. But in recent years, fast-changing tech- nologies have increasingly enabled businesses to collect, buy, sell, and use vast amounts of personal data about their customers and potential customers. The danger is not only that this information might rarely be used fraudulently, but also that its collection represents a violation of privacy and might lead to unanticipated harms.
Individuals are often unaware of how much information about themselves they reveal to others as they shop, interact with friends, play games, or look for information online. A variety of technologies make this possible. Many websites place cookies—or more power- ful Flash cookies—on a computer hard drive, to identify the user during each subsequent visit and to build profiles of their behavior over time. Web beacons embedded in e-mails and websites retrieve information about the viewer. In deep packet inspection, third parties access and analyze digital packets of information sent over the Internet, such as pieces of e-mails or Skype calls, to infer characteristics of the sender. Not just retailers, but also Internet service providers such as Comcast, search engine operators such as Google, and informational services such as Dictionary.com, also track their users. So-called data aggregators purchase and combine data about individuals collected from various sources and compile them into highly detailed portraits to be sold to retailers, service providers, and advertisers.15
An example of a data aggregator is Acxiom Corporation, based in Conway, Arkansas. Acxiom, called the “quiet giant” of the industry, has built the larg ...
Rethinking Health Plan Business Models for the Emerging On-Demand Digital Eco...Cognizant
Even as on-demand healthcare platforms disrupt the industry, they create possibilities for new value propositions, partnerships and business models that will further reshape the cost and delivery of care.
Healthcare Rx: The Rise of the Empowered ConsumerCognizant
Market and digital forces have combined to enable the healthcare industry to treat much of what ails it — or be supplanted by newcomers who can more quickly seize the digital high ground.
The study we present aims to explore several factors pertaining to Consumer Acceptance of business technology as it related to Blockchain. Identifying and developing the relevant measures is of importance to business technology managers and software development managers today. We ask the important question of “what measures best represent the established constructs of the technology acceptance model?” In order to address this issue, it is important to identify the key measurements that help us to understand the proposed constructs as they relate to blockchain technology as well as confirm their validity in isolation and in combination with each other. In this study, the factors we explore are perceived reputation, risk, and usefulness and transaction intentions. A survey was used whereby the methodology adapted previous measurements from related works and new measurements pertaining to usefulness and risk were developed in order to adhere to blockchain’s consumer acceptance framework. 268 students completed the questionnaire and an exploratory factor analysis was used in order to analyze the constructs and their measurements. Through the results we were able to identify and validate the relevant measurements as well as the proposed constructs.
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
“ A proper Big Data strategy makes it possible to once
again have personal relationships with consumers.”
Stef Driessen Sector Banker at ABN AMRO
IQNOMY Customer profiles Center Parcs increase conversion of its website and marketing campaigns
The power of personalized communication through the internet
Similar to Ericsson ConsumerLab: Personal Information Economy (20)
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
Continuous innovation in 5G networks is creating new opportunities for video-enabled services for both consumers and industries, particularly in areas such as the Internet of Things and the automotive sector. These new services are expected to rely on continued video evolution toward 8K resolutions and beyond, and on new strict requirements such as low end-to-end latency for video delivery.
The latest Ericsson Technology Review article explores recent developments in video compression technology and introduces Versatile Video Coding (VVC) – a significant improvement on existing video codecs that we think deserves to be widely deployed in the market. VVC has the potential both to enhance the user experience for existing video services and offer an appropriate performance level for new media services over 5G networks.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
Today millimeter wave (mmWave) spectrum is valued mainly because it can be used to achieve high speeds and capacities when combined with spectrum assets below 6GHz. But it can provide other benefits as well. For example, mmWave spectrum makes it possible to use a promising new wireless backhaul solution for 5G New Radio – integrated access and backhaul (IAB) – to densify networks with multi-band radio sites at street level.
This Ericsson Technology Review article explains the IAB concept at a high level, presenting its architecture and key characteristics, as well as examining its advantages and disadvantages compared with other backhaul technologies. It concludes with a presentation of the promising results of several simulations that tested IAB as a backhaul option for street sites in both urban and suburban areas.
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
Critical Internet of Things (IoT) connectivity is an emerging concept in IoT development that enables more efficient and innovative services across a wide range of industries by reliably meeting time-critical communication needs. Mobile network operators (MNOs) are in the perfect position to enable these types of time-critical services due to their ability to leverage advanced 5G networks in a systematic and cost-effective way.
This Ericsson Technology Review article explores the benefits of Critical IoT connectivity in areas such as industrial control, mobility automation, remote control and real-time media. It also provides an overview of key network technologies and architectures. It concludes with several case studies based on two deployment scenarios – wide area and local area – that illustrate how well suited 5G spectrum assets are for Critical IoT use cases.
5G New Radio has already evolved in important ways since the 3GPP standardized Release 15 in late 2018. The significant enhancements in Releases 16 and 17 are certain to play a critical role in expanding both the availability and the applicability of 5G NR in both industry and public services in the near future.
This Ericsson Technology Review article summarizes the most notable new developments in releases 16 and 17, grouped into two categories: enhancements to existing features and features that address new verticals and deployment scenarios. This analysis and our insights about the future beyond Release 17 is an important component of our work to help mobile network operators and other stakeholders better understand and plan for the many new 5G NR opportunities that are on the horizon.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
Commonly referred to as SIM cards, the universal integrated circuit cards (UICCs) used in all cellular devices today are in fact complex and powerful minicomputers capable of much more than most Internet of Things (IoT) applications require. Until a simpler and less costly alternative becomes available, action must be taken to ensure that the relatively high price of UICC modules does not hamper IoT growth.
This Ericsson Technology Review article presents two mid-term approaches. The first is to make use of techniques that reduce the complexity of using UICCs in IoT applications, while the second is to use the UICCs’ excess capacity for additional value generation. Those who wish to exploit the potential of the UICCs to better support IoT applications have the opportunity to use them as cryptographic storage, to run higher-layer protocol stacks and/or as supervisory entities, for example.
Mobile data traffic volumes are expected to increase by a factor of four by 2025, and 45 percent of that traffic will be carried by 5G networks. To deliver on customer expectations in this rapidly changing environment, communication service providers must overcome challenges in three key areas: building sufficient capacity, resolving operational inefficiencies through automation and artificial intelligence, and improving service differentiation. This issue of ETR magazine provides insights about how to tackle all three.
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
For many operators, the introduction of the 5G System (5GS) to provide wide-area services in existing Evolved Packet System (EPS) deployments is a necessary step toward creating a full-service, future-proof 5GS in the longer term. The creation of a combined 4G-5G network requires careful planning and a holistic strategy, as the introduction of 5GS has significant impacts across all network domains, including the RAN, packet core, user data and policies, and services, as well as affecting devices and backend systems.
This Ericsson Technology Review article provides an overview of all the aspects that operators need to consider when putting together a robust EPS-to-5GS migration strategy and provides guidance about how they can adapt the transition to address their particular needs per domain.
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
The surge in data volume that will come from the massive number of devices enabled by 5G has made edge computing more important than ever before. Beyond its abilities to reduce network traffic and improve user experience, edge computing will also play a critical role in enabling use cases for ultra-reliable low-latency communication in industrial manufacturing and a variety of other sectors.
This Ericsson Technology Review article explores the topic of how to deliver distributed edge computing solutions that can host different kinds of platforms and applications and provide a high level of flexibility for application developers. Rather than building a new application ecosystem and platform, we strongly recommend reusing industrialized and proven capabilities, utilizing the momentum created with Cloud Native Computing Foundation, and ensuring backward compatibility.
The rise of the innovation platform
Society and industry are transforming at an unprecedented rate. At the same time, the network platform is emerging as an innovation platform with the potential to offer all the connectivity, processing, storage and security needed by current and future applications. In my 2019 trends article, featured in this issue of Ericsson Technology Review, I share my view of the future network platform in relation to six key technology trends.
This issue of the magazine also addresses critical topics such as trust enablement, the extension of computing resources all the way to the edge of the mobile network, the growing impact of the cloud in the telco domain, overcoming latency and battery consumption challenges, and the need for end-to-end connectivity. I hope it provides you with valuable insights about how to overcome the challenges ahead and take full advantage of new opportunities.
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
The Internet of Things (IoT) has emerged as a fundamental cornerstone in the digitalization of both industry and society as a whole. It represents a huge opportunity not only in economic terms, but also from a global challenges perspective – making it easier for governments, non-governmental organizations and the private sector to address pressing food, energy, water and climate related issues.
5G and the IoT are closely intertwined. One of the biggest innovations within 5G is support for the IoT in all its forms, both by addressing mission criticality as well as making it possible to connect low-cost, long-battery-life sensors.
With this in mind, we decided to create a special issue of Ericsson Technology Review solely focused on IoT opportunities and challenges. I hope it provides you with valuable insights about the IoT-related opportunities available to your organization, along with ideas about how we can overcome the challenges ahead.
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
A variety of automotive and transport services that require cellular connectivity are already in commercial operation today, and many more are yet to come. Among other things, these services will improve road safety and traffic efficiency, saving lives and helping to reduce the emissions that contribute to climate change. At Ericsson, we believe that the best way to address the growing connectivity needs of this industry sector is through a common network solution, as opposed to taking a single-segment silo approach.
The latest Ericsson Technology Review article explains how the ongoing rollout of 5G provides a cost-efficient and feature-rich foundation for a horizontal multiservice network that can meet the connectivity needs of the automotive and transport ecosystem. It also outlines the key challenges and presents potential solutions.
This presentation explains the importance of SD-WAN technology as part of the Enterprise digital transformation strategy. It goes over the first wave of SD-WAN in a single vendor deployment, with Do-it-yourself (DIY) as the preferred model. Then continues with the importance of orchestration in the second wave of SD-WAN deployments in a multi-vendor ecosystem, turning to SD-WAN Managed Services as the preferred model. It ends up with some examples of use cases and the Verizon customer case. More information on Ericsson Dynamic orchestration - http://m.eric.sn/6rsZ30psKLu
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
Time-Sensitive Networking (TSN) is becoming the standard Ethernet-based technology for converged networks of Industry 4.0. Understanding the importance and relevance of TSN features, as well as the capabilities that allow 5G to achieve wireless deterministic and time-sensitive communication, is essential to industrial automation in the future.
The latest Ericsson Technology Review article explains how TSN is an enabler of Industry 4.0, and that together with 5G URLLC capabilities, the two key technologies can be combined and integrated to provide deterministic connectivity end to end. It also discusses TSN standards and the value of the TSN toolbox for next generation industrial automation networks.
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
Low latency communication and minimal battery consumption are key requirements of many 5G and IoT use cases, including smart transport and critical control of remote devices. Thanks to Ericsson’s 4G/5G research activities and lessons learned from legacy networks, we have identified solutions that address both of these requirements by reducing the amount of signaling required during state transitions, and shared our discoveries with the 3GPP.
This Ericsson Technology Review article explains the why and how behind the new Radio Resource Control (RRC) state model in the standalone version of the 5G New Radio standard, which features a new, Ericsson-developed state called inactive. On top of overcoming latency and battery consumption challenges, the new state also increases overall system capacity by decreasing the processing effort in the network.
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
Cloud-native application design is set to become standard practice in the telecom industry in the near future due to the major efficiency gains it can provide, particularly in terms of speeding up software upgrades and releases. At Ericsson, we have been actively exploring the potential of cloud-native computing in the telecom industry since we joined the Cloud Native Computing Foundation (CNCF) a few years ago.
This Ericsson Technology Review article explains the opportunities that CNCF technology has enabled, as well as unveiling key aspects of our application development framework, which is designed to help navigate the transition to a cloud-native approach. It also discusses the challenges that the large-scale reuse of open-source technology can raise, along with key strategies for how to mitigate them.
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
To meet the requirements of use cases in areas such as the Internet of Things, AR/VR, Industry 4.0 and the automotive sector, operators need to be able to provide computing resources across the whole telco domain – all the way to the edge of the mobile network. Service exposure and APIs will play a key role in creating solutions that are both effective and cost efficient.
The latest Ericsson Technology Review article explores recent advances in the service exposure area that have resulted from the move toward 5G and the adoption of cloud-native principles, as well as the combination of Service-based Architecture, microservices and container technologies. It includes examples that illustrate how service exposure can be deployed in a multitude of locations, each with a different set of requirements that drive modularity and configurability needs.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. Introduction
Personal information has been called the “oil” of the 21st
century. The digital and mobile revolution has brought un-
precedented possibilities of collecting and using consumers’
personal information to develop new personalized services
(e.g. Becky’s story above). It has also brought possibilities
of monetizing this information, finding new revenue streams
and increasing profits. Personal information is the key com-
ponent in the still evolving Personal Information Economy.
Efforts have been made by businesses, governments and in-
stitutions to understand and define the conditions for such a
market. These efforts have largely been focused on systemic
aspects such as legal rights, technical standards and
regulations with regards to the collection, control and use
of personal data. There is a corresponding need to broaden
and deepen the perspective to also include individual con-
sumers.
How do consumers understand and perceive the value of
their personal information? Which are the sensitivity is-
sues and risks involved with an increased use of personal
information by enterprises, governments and consumers
themselves? The purpose of the study has been to describe
consumers’ understanding, needs, behaviors and attitudes
with respect to personal information as an asset.
2 Ericsson consumerLab PERSONAL INFORMATION economy
Contents
1011011 001011001 1110100010
Ericsson ConsumerLab has more than 15 years experience
of studying people’s behaviors and values, including the
way they act and think about ICT products and services.
Ericsson ConsumerLab provides unique insights on market
and consumer trends.
Ericsson ConsumerLab gains its knowledge through a
global consumer research program based on interviews with
100,000 individuals each year, in more than 40 countries and
15 megacities – statistically representing the views of
1.1 billion people. Both quantitative and qualitative methods
are used, and hundreds of hours are spent with consumers
from different cultures.
To be close to the market and consumers, Ericsson
ConsumerLab has analysts in all regions where
Ericsson is present, which gives a thorough global
understanding of the ICT market and business models.
All ConsumerLab reports can be found at
www.ericsson.com/consumerlab
HISTORICAL OUTLOOK 3
information AS AN ASSET 4
The unaware consumer 5
benefit vs. risk 6
THE RULES OF ENGAGEMENT 7
importANCE OF ECO-SYSTEMS 8
BALANCE THE CONTROL 9
BUSINESS OPPORTUNITIES Today 10
EMERGING business opportunities 11
“The alarm on Becky’s smartphone wakes
her up half an hour earlier than expected.
The reason is that her flight to London has
been canceled. In order for Becky to still
make it for her London meeting she needs
to take an earlier flight. The phone also
informs her about the current travel time to
the airport, as well as gives her the option
to directly purchase the train ticket on
the phone.”
3. “Face to face”
Pre-Industrialization
Commercial trade before industrialization was
predominately conducted face-to-face meaning
personal information was shared all the time, par-
ticularly in reoccurring and tailored services. Over
time, the local vendor came to know a customer’s
preferences. Hence personal information was
gathered, but on a scale limited and comprehen-
sible to those involved.
“Engagism”
Post-Industrialization
The mass-market still prevails, however digital-
ization has enabled vendors to gain supreme
knowledge about the buyers’ individual traits due
to their digital footprints and sharing of personal
information. In the days of Big Data, the con-
sumer no longer comprehends what is shared,
to whom or how it is used. By instead utilizing
personal information in a fair manner, the quid-
pro-quo logic of pre-industrialization can
be re-established.
PERSONAL INFORMATION
– HISTORICal OUTLOOK
In the history of relationships between consumers and businesses, a vendor’s gathering of information about
its customers in order to improve services is far from a novel concept.
> Consumer awareness still low
– big data not an issue
Most consumers are aware that their personal
information is collected for commercial purposes
– more than 50% believe so. But why, how or ex-
actly what it is used for is obscure to most.
Sensitivity of personal information should be
understood principally from the perspective of
the individual consumer and not from a vendor
or usage perspective; anonymous big data is
rarely perceived as a big issue.
> Value creation over risk prevention
If the consumer can see a clear and desired
benefit from sharing personal information,
concerns about sensitivity diminish. If the option
is between sharing information and gaining
something on one hand, and guarding informa-
tion to avoid risk on the other, many consumers
will go for sharing. More than 40% are willing
to “trade” personal information for personalization.
> Permission, transparency and value
sharing – pre-requisites going forward
Involving consumers by asking for permission
increases trust and willingness to share per-
sonal information. Transparency improves
attitudes towards the commercial applications
of personal information. Lack of transparency
invariably causes suspicion. Value creation for
one party should correspond to value being
shared with the other.
> The value of personal information
is in relationships
The primary value of personal information will lie
in its potential to build strong relationships be-
tween consumers and businesses. Used ac-
cording to consumer praxis, personal informa-
tion can: improve user experience, increase
loyalty and increase sales.
key findings
“Consumerism”
Industrialization
Industrialization removed the customer from the
producer, creating mass markets and economies
of scale. The familiar customer became an anony-
mous consumer. Later in this era, businesses
started building brands in an effort to re-connect
and create a sense of personalization that had
been lost due to the emergence of the mass
market and middle men.
Ericsson consumerLab PERSONAL INFORMATION ECONOMY 3
4. INFORMATION
AS AN ASSET
The world is at an inflection point, poised for a significant
change in competitive opportunities for nations, busi-
ness, societies and individuals. This change will lead to
the emergence of the Networked Society where everyone
and everything will be connected in real time, creating a
globally-networked, digitally interconnected environment.
Ericsson envisions that by 2020, there will be more than 50
billion connected devices. This means that unprecedented
amounts of information will be generated by consumers and
their household appliances, cars, mobile phones and other
connected devices. Far-reaching technological advance-
ments have enabled vast new opportunities for economic
and societal value creation based on this personal informa-
tion.
Personal information includes a host of different types of
facts and data such as digital identity, relationships, prefer-
ences, behaviors, health and financial data as well as all the
institutional data about us kept by public institutions. This
information is sometimes voluntarily shared, other times
observed by tracking our behavior or even synthesized by
combining different types of data.
Stakeholders in a personal information market
The private sector, governments and public institutions as
well as individual consumers are all stakeholders in how
personal information is generated, stored and used today.
Personal information is used today by private enterprises to
develop and improve services and products,
create new efficiencies and generate revenue and growth.
Companies such as Google and Facebook have business
models built around collecting, aggregating, analyzing and
monetizing personal information.
For governments and public sector institutions, personal
information can and is currently being used to improve
public services such as health care, education and public
transportation but is also valuable from the perspectives of
law enforcement and national security.
Individual consumers are inevitably at the center of this
potential common market for personal information. Under-
standing and adapting to consumers’ needs and behaviors
with regards to personal information will be key for any
stakeholder wanting to benefit from participation in this
market.
A win-win-win situation
The current approach to managing personal information is
typically fragmented and inefficient as technologies and laws
fall short of providing a supportive infrastructure. A common
market for personal information needs to cater to the needs
of the private sector, governments and public sector institu-
tions as well as individual consumers. In order to maximize
benefits for all stakeholders, mutually supportive incentives
need to be established, collective inefficiencies reduced and
collective risks need to be addressed.
Pre-requisites for a framework for a sustainable personal
information market are listed below.
Figure 1: Pre-requisites for a framework for
personal information
> Targeted
> Transparent
> Technology-neutral
> Role-specific
> Flexible
> Efficient
> Cross-border tolerant
Source: “Privacy in the Networked Society: Data Protection principles for the digital
remaking of society,” Ericsson, 2012
4 Ericsson consumerLab PERSONAL INFORMATION economy
5. The unaware
consumer
PERSONAL INFORMATION
(obscure when, what and why)
Figure 3: Consumer understanding of personal information exchange
The gathering, storage and use of personal information is
still an area that is relatively obscure to people in general.
There is a basic awareness that personal information is
actively or passively shared and that information is gathered
by companies, but not to what extent this is happening.
Consumers are most clearly aware of the fact that mobile
phone operators and different applications on smartphones
are collecting personal information in different ways. On a
general level, it is clear that people today view the sharing
of personal information as a pre-requisite for participating in
society, both socially and commercially.
The average person has difficulty fully understanding
exactly how their personal information becomes valuable to
companies. Consumers’ general understanding of the per-
sonal information value exchange is illustrated in figure 3.
Companies that make apps for smartphones and tablets
Other IT companies likeYahoo! and Microsoft
Apple and Google
21%
21%41%
43%
39%
38%
35%
39%
23%
Mobile phone operators
27% 20%
I don’t think they use my personal information
I don’t know
Figure 2: Consumer awareness of
personal information gathering
Social networking sites like Facebook and LinkedIn
52% 30% 19%
Source: Ericsson ConsumerLab,
Analytical Platform 2012
I think they use my personal information
53%
Source: Ericsson ConsumerLab: Personal Information Economy study, 2013
Ericsson consumerLab PERSONAL INFORMATION ECONOMY 5
Commercial application:
Advertisments and offers
Perceived benefit:
Personalized services
6. If the commercial value of personal information is still es-
sentially an obscure concept to most people, sensitivity is
perhaps the more relevant way to relate to personal informa-
tion. Sensitivity of personal information is highly contextual,
but more than anything it is primarily tied to the individual
consumer rather than to commercial value.
High sensitivity applies to information that is close at
heart, that has the potential to cause harm and in cases of
ambiguous information, such as personal photographs. Sen-
sitivity connected with the commercial use of one’s personal
information depends in large part on the relationship with
the vendor at hand. It is also closely connected to trans-
parency and perceived control, as well as the perceived or
offered benefit.
”With a picture, the interpretation is all
in the eyes of the beholder. That makes it
scary and more sensitive”
— Female, 21, Student, San Francisco
A clear benefit in the form of discounts or clearly improved
user experience positively affects the willingness to share
even sensitive information. Consumers are principally
inclined to choose participation over isolation, sharing
information for different forms of benefits rather than
focusing on protecting themselves from risks.
Benefit vs. risk
Figure 4: If you were asked to share personal information
online and you had no control over who could access or see
your personal information, how would you feel about sharing
the following information?
Religious beliefs
Purchase behavior
Political views
Usage of online services and apps
Internet search and browsing behavior
Current location
Medical records
Information or files stored on your computer or mobile phone
39%39%
Feel good about it
Indifferent
Source: Ericsson ConsumerLab,
Analytical Platform 2012
Feel bad about it
Consumers and Big Data
Consumers clearly show less concern about com-
panies using anonymous information, e.g. how many
consumers that buy a certain service or product,
rather than identifiable information such as the iden-
tity of the buyer.
From a privacy perspective, anonymous Big Data is
thus not considered a problem. This does however
highlight a continued lack of consumer understand-
ing around the power of data min-
ing. Most consumers give little or
no thought to the fact that it is not
impossible to reconstruct personally
identifiable information from large
anonymous data sets.
6 Ericsson consumerLab PERSONAL INFORMATION economy
41%
41%
47%
48%
53%
56%
67%
73%
48%
49%
46%
45%
40%
38%
28%
23%
11%
9%
8%
8%
7%
7%
6%
4%
7. The rules of
engagement
Consumers’ view on the issue of ownership of personal
information and consequent rules for vendors to use that
information is flexible and based on the relationship with the
vendor at hand.
Clearly, when it comes to personal information generated
through a specific service, e.g. viewing habits on video
streaming services, consumers grant vendors at least
partial ownership of that information. Partial ownership in
the sense that it is ok for vendors to use that information to
develop and personalize the service and even use it for other
commercial purposes such as targeted advertising. But the
important requirement is that this is done transparently and
with a degree of control on behalf of the user, granting him
or her the opportunity to opt in or out of using the service
under these conditions. It is apparent that consumers are
most willing to accept the collection and use of their per-
sonal information in those cases where this is perceived to
be done within the confinements of a particular service.
Transparency and respect, offering the ability for consumers
to opt in or out of a service and returning user value
will increase consumer engagement and strengthen the
relationship.
“It would be great if my refrigerator could
tell me what I needed to restock. But if it
would tell me what I needed less of, that
would be creepy!”
— Female, 23, Student, San Francisco
More than 40% would allow companies
to use their personal information when an
offer is personalized to them, to improve
current services and develop new ones.
To personalize offers to you
None of these purposes
To sell the information to other companies
To personalize advertisements to you
To use the information in order to improve their
current services or develop new services
To charge you depending on your
level of usage of the service
To charge everyone individually
according to their ability to pay
Source: Ericsson ConsumerLab, Analytical Platform 2012
Figure 5: For what purposes would you allow companies to use your personal information?
Ericsson consumerLab PERSONAL INFORMATION ECONOMY 7
44%
41%
29%
19%
13%
5%
22%
8. IMPORTANCE OF
ECO-SYSTEMS
The importance of owning the first consumer interface in or-
der to gather personal information will continue to increase.
These interfaces can be smartphones, refrigerators, TVs,
PCs, home security systems, dishwashers or different
services.
The same branded devices and services can be used by the
company to provide customers with recommendations and
information based on the personal information gathered.
Examples of such recommendations and targeted offers
could include automated suggestions from your refrigerator
of which groceries to re-stock, coupled with a discount offer
on the same products from a specific store. A company’s
share of this eco-system of consumer interfaces will be one
crucial factor in building relationships with consumers.
Relevance through reputation
Reputation is a key element of the personal information
eco-system - the reputation of companies as well as the
reputation of individual consumers. In the coming years,
we should expect to see the emergence of new and more
practical applications of reputation.
“It’s morning and Becky is in the
kitchen, making herself that vital
cup of morning coffee. Using the
last of the coffee, the machine
simultaneously adds coffee to the
synchronized shopping list on her
smartphone. Later that day, she
gets a notification on her smart-
phone that her local store offers to
deliver all the items directly to her
door. With a single click, she
accepts and pays.”
10110111011011
8 Ericsson consumerLab PERSONAL INFORMATION economy
9. BALANCE THE CONTROL
The importance of personal information will remain high – for the private sector, governments and public institu-
tions as well as the individual consumer. With regards to the issue of where control over personal information will
reside, the possibilities range between two extremes: consumers controlling all their information and consumers
having no control whatsoever. A likely future development will lie somewhere in between.
Source: Ericsson ConsumerLab: Personal Information Economy study, 2013
Ericsson consumerLab PERSONAL INFORMATION ECONOMY 9
No consumer control
Personal information is acquired without the consent of consumers and sold be-
tween vendors to maximize profit. The uncontrolled usage of personal information
aggravates and causes privacy harm. This might trigger new business opportuni-
ties to protect consumer information, e.g. increased usage of VPN-tunnels and
similar tools. This extreme will provide no or little value for the consumers who
probably will shun many online services.
100% consumer managed
The individual consumer is in charge of and responsible for their own personal
information and can allow or block companies from accessing certain parts of in-
formation about them. Inflexible legislation forcing companies to continuously ask
for permission to access or use consumers’ information for every single purpose
will hamper the development of new services and personal information opportuni-
ties for companies. This will also require more consumer effort and knowledge
to administer.
Mutual understanding and gain
Personal information is gathered and used with consumer consent, providing
value in return. Shared responsibility between all stakeholders including consum-
ers is encouraged through effective and flexible, yet limited legislation protecting
the consumer and his or her rights. Successful service providers caring about
their reputation will respect consumers’ integrity and handle their information
accordingly.
No consumer control
100% consumer
managed
Mutual understanding
Figure 6: A likely future development of control
10. business
opportunities today
There are several business opportunities related to the
handling of consumers’ personal information. The prime op-
portunity lies within developing stronger relationships with
existing and potential customers.
As already mentioned development of personal information
based services and business needs to build on three key
components: permission, transparency and value sharing.
– Companies need to acquire and facilitate consumer
permission. Enabling consumers to give their permis-
sion will be a key factor for companies to build trust.
– Transparency with regards to the collection, storage and
use of personal information increases consumers’ will-
ingness to approve of commercial applications. A lack of
transparency almost invariably leads to consumers
adopting a more hostile attitude towards a vendor.
– Commercial value creation based on personal informa-
tion needs to be coupled with value creation for the
customer in the form of personalization of service,
discounts etc.
Potential commercial benefits
Today, companies craft an understanding of markets
through consumer segmentation. Going forward, under-
standing the individual consumer through personal informa-
tion will be vital to success.
Utilizing personal information to build a stronger relationship
with the consumer can improve consumer experience and
increase loyalty as well as sales. In short, this recreates the
close relationship between seller and buyer from the pre-
industrial era as described in page 3.
Improve consumer experience
Whether a one-time only customer or in it for the long run,
consumers want a great experience when using a service.
Personal information can help companies better under-
stand needs and preferences, usage patterns and habits. It
enables personalization of products and services in order to
make them more relevant, easier and quicker.
Increase loyalty
One reason for staying in a long-term relationship is the
knowledge of the benefits it brings. For operators and other
vendors, long-term relationships mean a steady revenue
stream and lessened risk of churn. With the use of personal
information a service can be more flexible and communi-
cation can be more relevant and better support consumer
needs.
Increase sales
Knowing the individual consumer and his or her situation at
any given time brings about unprecedented opportunities
for product and service development. A customer moving
to a new address, lacking the high speed fixed broadband
he or she had at their previous residence, is likely to want to
upgrade to a better mobile broadband.
With access to consumers’ personal information the pro-
vider can offer the right products, at the right price, through
the right channel at the right time.
10 Ericsson consumerLab PERSONAL INFORMATION economy
11. Information gateway
An information gateway could allow consumers to easily
manage what personal information is shared and ensure
that only selected companies can access and utilize it, pre-
venting irrelevant information and offers. It could also sup-
port consumers in opting in and out from different services.
Companies could utilize an information gateway to reach
their target audience without intruding.
Digital identification
Digital identification is needed in several situations; for
public services, for payment services and for personal ser-
vices like email, social networks, etc.
With an existing physical presence, banks and operators are
ideally positioned to offer identification services in the
physical world as well as online. Some banks and operators
in certain markets are already today offering identification
both online and IRL.
EMERGING business
opportunities
There are several areas of handling the consumer’s personal information where vendors have
business opportunities.
Protection and insurance
Who do consumers turn to when exposed to fraud, iden-
tity theft, lost information or not being able to opt out
of a service? There is an opportunity for offering protec-
tion to consumers, including cleanup services, overview
of shared information, legal counseling and backup
services.
Personal cloud
A personal cloud service is a virtual computer taking on
different capabilities as the consumer chooses. It could
enable consumers to view, control and manage their
personal information, rather than access their informa-
tion through limited import and export capabilities as in
today’s cloud services. Reputation will be a key element
in future personal cloud systems. Hence, service provid-
ers within this area will be ideally positioned to also offer
services within reputation.
Information
gateway
Digital
identification
Protection and
insurance
Personal
cloud
Personal Information Economy study 2013
6 consumer interviews, 15 student diaries
and a workshop in San Francisco
7 experts from the US and Europe
October 2012 - January 2013
Quantitative online interviews
Qualitative research
US, UK, Germany, Sweden, Italy, Brazil,
China, Hong Kong, Japan, South Korea,
Australia, India, Indonesia, Russia,
Ukraine
>23 000 online interviews, age 15-69
~1500 per market
May 2012
Ericsson ConsumerLab, Analytical Platform 2012
Methodology
Ericsson consumerLab PERSONAL INFORMATION ECONOMY 11