SlideShare a Scribd company logo
Virtual Money, Internet,
Privacy, Piracy and
E-commerce
Indian Professionals Association
26th February 2006
Presented by Vijayan GANAPATHY
The Digital Economy
 Money, Privacy, Piracy, Internet, E-Commerce
 Using a credit (or debit) card, Surfing the internet,
Checking our bank account balance online,
Viewing a pirated version of a block-buster movie,
Buying the latest iPod online
 Amazon.com earned 8.42 billion in 2005, Apple
iTunes (represents 5% of the company’s revenue)
 Top sellers online include travel, books, music,
videos, electronics and toys
 Leading consumer purchases on the Internet -
gambling, games, pornography and information
leading to automobile purchases
The actors in the digital economy
 Suppliers or Service Providers
 Buyers or Customers
 Facilitators – Venture capitalists
 Mr. X – The Government and Secret
Services
Money
 The notion of money
 Virtual money
 De-nationalization of money
« Private enterprises that issued distinct
currencies would have an incentive to
maintain their currency's purchasing
power »
- Friedrich August Hayek
The convergence of resources
and ideas
 Technology backbone
 The development of the Internet
 Low-cost computing power
 End of bandwidth
 Low-cost international tele-communication
 Public key encryption
Technology meets the Economist
 Circa 1990
 No smart cards or digital funds transfer
 The economist had no idea what the internet
could do
 The people who were implementing
payment systems didn’t understand the
international monetary mechanics
 Public Policy issues involved
The money transition
The currency note
 Wrinkled, dirty, germs and drugs
 Even worse with coins – we don’t have the right
set of coins or tokens when we need them
In the digital age, all that is going to disappear…
Smart card and smart keys
 Chip with information which identifies you
 It has some protection features (PIN, biometrics)
 Value attribution (money, points, etc.)
Real-time settlements
 The currency note is a non-earning asset
 Loses one or two percent value every year
 Most of us carry some quantity of it
Why ?
 There is a time period between getting rid of one
productive asset and acquiring another productive
asset, good or service we want
Changes !
In the digital age, this time period can collapse to a
fraction of a second, and suddenly the need for
money as we thought of it begins to disappear
The risks for Mr. X
Over the Internet, from your home or from your
telephone, you will be able to take digital money
and transfer it around the world virtually at the
speed of light
You can easily encrypt any message, just with a
couple of keystrokes on your computer and no
government or anybody else will know what
you’ve done, and with a new public key
encryption, it’s almost impossible for any security
agency to break your secret code.
Privacy – Then and Now
 Phone tapping at the phone company
 Analog systems
 Armed with a court order
 Phone tapping at the phone company
 Digital systems
 Codes to the digital systems
 Law
Mr. X: Houston we have a
problem
 Mr. X wants to know what is going on
 Public key encryption empowers the sender and
the receiver of the message
 The new technologies are very liberating
 Nothing can be derived from the encrypted
message
 The need to know who encrypted what and who
decrypted what
 The continuing struggle between financial privacy
and new technologies
Central Banks – The change
 No reason to produce real money anymore
 Most of the digital money will be issued by
private institutions
 Banks are facing an uncertain future
 There is no reason why any well known
company can’t go ahead and start supplying
digital money
 Trading of digital money at par or at a
discount
Many Faces of Virtual Money
 Frequent Flyer card (miles)
 Fidelity card + credit card (points and money)
 Parking card (money and points)
 Debit & Credit cards (money and points)
 Company Restaurant card (money and points)
 Building access control cards (employee or
occupant id)
 Etc.
Digital Control & Intelligence
 ATMs, Parking meters, Vending machines with in-
built intelligence
 Replacement of electro-mechanical devices and
humans by digital devices
 Centralized control or intelligence stored in cards
 Security cameras and surveilance
 Electronic recognition and identification – facial
or fingerprint
 Theft prevention devices in shops and
supermarkets (RFID chips)
The pains of a digital life
 Loss of anonymity
 Loss of privacy
 There is a total electronic trail of everything
we do with the card or key
 Embedded RFID chips in the currency notes
track where and how the money goes
 The ability to detect where we were and
what we were doing when
The fight to control encryption
 Deny encryption except to a select few
 Keeping it at low levels
 Export controls on encryption
 The fact that a book describing encryption
can be exported but a disk or CD containing
the program cannot
The fight to control bank secrecy
 The banks are obliged to report any big
transactions to Mr. X
 The limit keeps lowering
 Know your customer programs
 The cost of fighting fraud is enormous
The fight to control taxation
 The problem is overwhelming
 Massive violation of civil liberties
 Inability to enforce the tax
 Monitoring issues related to each
transaction
 The choice of currency to pay such a tax (?)
Virtual flight of capital
 Digital money can change hands in a
fraction of a second
 The talk of tax harmonization
 Extensive information sharing among
governments
 Almost any asset can be securitized
 Financial capital will flow through any
electronic hole that is not blocked
Virtual facade of crime
 Personal & institutional financial
information are subject to leaks and misuse
 Financial privacy no longer exists
 The possibility of sensitive information
falling into the wrong hands deliberately or
inadvertently puts individuals and
institutions at risk
 Civil society is being undermined and
ultimately destroyed
Virtual value preservation
 The governments will lose their ability to tax
 This may mean a downsizing of governments
 Pension funds will be in trouble
 Governments try to deny pensions by using a filter
criteria
 Default in bonds or inflation
 Better to have assets in things that are real
 You can preserve value by choosing where you
live rather than accumulating more of digital
money and living in an expensive city
 Shift in taxation from capital to labour
Virtual company
 Tries to have minimum staff
 Sets up operations in a tax friendly state or
country
 Sells products or services that are virtual
(externalized, outsourced or catalog based)
 Has the ability to send a product over the
internet (eg. digital music, digital
documents, digital movies, digital services,
etc.)
Virtual piracy
 Digital content flows as fast as digital
money
 The ability to replicate, copy, convert to
formats that mask the origin of the original
 The ability to see virtually anybody,
anything, anywhere, anytime and to
send/receive encrypted voice and video in
real time
Virtual threats
 Viruses, trojans, worms, hackers, spyware
 Distributed denial of service attacks
 Spam mail from virtual users due to flaws
in the email systems
 Software which hijack PCs and networks
 Phishing
 Public opinion
Virtual people
 People across the world are communicating with
each other in real time using fake email addresses,
fake Ids – boy posing as a girl (vice-versa), using
a fake location, a fake name and a fake identity
 This is causing the common person to be lured
into internet scams, internet hoaxes, internet fraud,
auction scams, chain letters, Nigerian scams,
Pyramid scams, investment scams, marriage
scams, etc.
 The difficulty to trace the real person who
perpetrated a crime
Virtual credit
 The digital economy is making us think different
about the extent of credit a person has access to
 A person can own as many credit cards as he
wants, whether he has the capacity to pay all of
them or not
 We will see more credit card defaults,
bankruptcies, etc.
 We will also see people vanish without a trace and
assume altogether new identities and gain access
to fresh credit
 We may even see the same person under multiple
identities (the recent Demat scam in India)
Virtual marketing
 Get Rich Quick for Doing Nothing
 Many people have gotten all excited about
affiliate, associate, referral, or co-op
programs as they are sometimes called
 But very few of the thousands of these
being promoted have any real chance of
making any significant money for the vast
majority of people who get involved
Virtual sales
 People are selling more and more virtual
things and concepts
 Eg. Selling things for which there is no
known ownership (like land on the moon)
 Making money from virtually nothing
(people, scenarios and objects in online
games)
Virtual network
 We build our virtual network by knowing and
meeting more people online
 Things get done faster
 Enables greater access to knowledge of the
privileged few, provided we know how to navigate
through this mass of information
 There are good and bad people and information
out there
 So, we need to have the intuition to see through
this virtual facade and make intelligent choices
 Empowers us to have an edge over competitors
Virtual end of this presentation
 We see more and more virtual concepts and
ideas emerging everyday
 Whatever you do, look for ways to keep
yourself engaged in making this virtual
money securely work for you
 Finally, our value is not in the amount of
digital money we have or make, but in the
choices we make using the information
from our real and virtual networks
Virtual questions
 Virtual / Real answers

More Related Content

What's hot

Electronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational PrivacyElectronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational Privacy
Dev Khare
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
BUSINESS SOFTWARES & SOLUTIONS
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
Eric BILLIAERT
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
Timothy Holborn
 
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Asociación de Marketing Bancario Argentino
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
Timothy Holborn
 
What is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use casesWhat is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use cases
Appinventiv
 
E-BUSINESS
E-BUSINESSE-BUSINESS
E-BUSINESS
SANDEEP JENA
 
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
Caroline B Ncube
 
Better use of data
Better use of dataBetter use of data
Better use of data
Jerry Fishenden
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Timothy Holborn
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Timothy Holborn
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
Timothy Holborn
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
DudleyDoright
 
Alternative payments: Turning Virtual Into Reality
Alternative payments: Turning Virtual Into RealityAlternative payments: Turning Virtual Into Reality
Alternative payments: Turning Virtual Into Reality
MetraTech, now part of Ericsson
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
Slava Buga
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
Inês Almeida
 
E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)
eSignLive by VASCO
 

What's hot (20)

Electronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational PrivacyElectronic Frontier Foundation - Locational Privacy
Electronic Frontier Foundation - Locational Privacy
 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
Tecnologías emergentes y la evolución continua de los pagos electrónicos en l...
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
What is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use casesWhat is blockchain beyond cryptocurrencies - 16 use cases
What is blockchain beyond cryptocurrencies - 16 use cases
 
E-BUSINESS
E-BUSINESSE-BUSINESS
E-BUSINESS
 
Electronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principlesElectronic transactions law lecture series: lecture 2 - basic principles
Electronic transactions law lecture series: lecture 2 - basic principles
 
Better use of data
Better use of dataBetter use of data
Better use of data
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Alternative payments: Turning Virtual Into Reality
Alternative payments: Turning Virtual Into RealityAlternative payments: Turning Virtual Into Reality
Alternative payments: Turning Virtual Into Reality
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)
 

Similar to Virtual money, internet, privacy, piracy & e-commerce

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
Zev Aidikoff
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
prathamchhabra166
 
Ecommerce
EcommerceEcommerce
Ecommerce
ecommerce
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
4IR and Digital Transformation Opportunities and Strategies to achieve goal
4IR and Digital Transformation Opportunities and Strategies to  achieve goal4IR and Digital Transformation Opportunities and Strategies to  achieve goal
4IR and Digital Transformation Opportunities and Strategies to achieve goal
Syed Shoeb
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
Cyber crime
Cyber crimeCyber crime
Blockchain Use Cases In Business
Blockchain Use Cases In BusinessBlockchain Use Cases In Business
Blockchain Use Cases In Business
Johan Zammit
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
E Com
E ComE Com
006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat
Lori Head
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
Daniel Austin
 
Electronic money transfer
Electronic money transferElectronic money transfer
Electronic money transfer
Bandhana Harlalka
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?
CogitoMedia
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 

Similar to Virtual money, internet, privacy, piracy & e-commerce (20)

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
4IR and Digital Transformation Opportunities and Strategies to achieve goal
4IR and Digital Transformation Opportunities and Strategies to  achieve goal4IR and Digital Transformation Opportunities and Strategies to  achieve goal
4IR and Digital Transformation Opportunities and Strategies to achieve goal
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Blockchain Use Cases In Business
Blockchain Use Cases In BusinessBlockchain Use Cases In Business
Blockchain Use Cases In Business
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
E Com
E ComE Com
E Com
 
006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat006 Diversity Essays For College Sample Graduat
006 Diversity Essays For College Sample Graduat
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Electronic money transfer
Electronic money transferElectronic money transfer
Electronic money transfer
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 

Virtual money, internet, privacy, piracy & e-commerce

  • 1. Virtual Money, Internet, Privacy, Piracy and E-commerce Indian Professionals Association 26th February 2006 Presented by Vijayan GANAPATHY
  • 2. The Digital Economy  Money, Privacy, Piracy, Internet, E-Commerce  Using a credit (or debit) card, Surfing the internet, Checking our bank account balance online, Viewing a pirated version of a block-buster movie, Buying the latest iPod online  Amazon.com earned 8.42 billion in 2005, Apple iTunes (represents 5% of the company’s revenue)  Top sellers online include travel, books, music, videos, electronics and toys  Leading consumer purchases on the Internet - gambling, games, pornography and information leading to automobile purchases
  • 3. The actors in the digital economy  Suppliers or Service Providers  Buyers or Customers  Facilitators – Venture capitalists  Mr. X – The Government and Secret Services
  • 4. Money  The notion of money  Virtual money  De-nationalization of money « Private enterprises that issued distinct currencies would have an incentive to maintain their currency's purchasing power » - Friedrich August Hayek
  • 5. The convergence of resources and ideas  Technology backbone  The development of the Internet  Low-cost computing power  End of bandwidth  Low-cost international tele-communication  Public key encryption
  • 6. Technology meets the Economist  Circa 1990  No smart cards or digital funds transfer  The economist had no idea what the internet could do  The people who were implementing payment systems didn’t understand the international monetary mechanics  Public Policy issues involved
  • 7. The money transition The currency note  Wrinkled, dirty, germs and drugs  Even worse with coins – we don’t have the right set of coins or tokens when we need them In the digital age, all that is going to disappear… Smart card and smart keys  Chip with information which identifies you  It has some protection features (PIN, biometrics)  Value attribution (money, points, etc.)
  • 8. Real-time settlements  The currency note is a non-earning asset  Loses one or two percent value every year  Most of us carry some quantity of it Why ?  There is a time period between getting rid of one productive asset and acquiring another productive asset, good or service we want Changes ! In the digital age, this time period can collapse to a fraction of a second, and suddenly the need for money as we thought of it begins to disappear
  • 9. The risks for Mr. X Over the Internet, from your home or from your telephone, you will be able to take digital money and transfer it around the world virtually at the speed of light You can easily encrypt any message, just with a couple of keystrokes on your computer and no government or anybody else will know what you’ve done, and with a new public key encryption, it’s almost impossible for any security agency to break your secret code.
  • 10. Privacy – Then and Now  Phone tapping at the phone company  Analog systems  Armed with a court order  Phone tapping at the phone company  Digital systems  Codes to the digital systems  Law
  • 11. Mr. X: Houston we have a problem  Mr. X wants to know what is going on  Public key encryption empowers the sender and the receiver of the message  The new technologies are very liberating  Nothing can be derived from the encrypted message  The need to know who encrypted what and who decrypted what  The continuing struggle between financial privacy and new technologies
  • 12. Central Banks – The change  No reason to produce real money anymore  Most of the digital money will be issued by private institutions  Banks are facing an uncertain future  There is no reason why any well known company can’t go ahead and start supplying digital money  Trading of digital money at par or at a discount
  • 13. Many Faces of Virtual Money  Frequent Flyer card (miles)  Fidelity card + credit card (points and money)  Parking card (money and points)  Debit & Credit cards (money and points)  Company Restaurant card (money and points)  Building access control cards (employee or occupant id)  Etc.
  • 14. Digital Control & Intelligence  ATMs, Parking meters, Vending machines with in- built intelligence  Replacement of electro-mechanical devices and humans by digital devices  Centralized control or intelligence stored in cards  Security cameras and surveilance  Electronic recognition and identification – facial or fingerprint  Theft prevention devices in shops and supermarkets (RFID chips)
  • 15. The pains of a digital life  Loss of anonymity  Loss of privacy  There is a total electronic trail of everything we do with the card or key  Embedded RFID chips in the currency notes track where and how the money goes  The ability to detect where we were and what we were doing when
  • 16. The fight to control encryption  Deny encryption except to a select few  Keeping it at low levels  Export controls on encryption  The fact that a book describing encryption can be exported but a disk or CD containing the program cannot
  • 17. The fight to control bank secrecy  The banks are obliged to report any big transactions to Mr. X  The limit keeps lowering  Know your customer programs  The cost of fighting fraud is enormous
  • 18. The fight to control taxation  The problem is overwhelming  Massive violation of civil liberties  Inability to enforce the tax  Monitoring issues related to each transaction  The choice of currency to pay such a tax (?)
  • 19. Virtual flight of capital  Digital money can change hands in a fraction of a second  The talk of tax harmonization  Extensive information sharing among governments  Almost any asset can be securitized  Financial capital will flow through any electronic hole that is not blocked
  • 20. Virtual facade of crime  Personal & institutional financial information are subject to leaks and misuse  Financial privacy no longer exists  The possibility of sensitive information falling into the wrong hands deliberately or inadvertently puts individuals and institutions at risk  Civil society is being undermined and ultimately destroyed
  • 21. Virtual value preservation  The governments will lose their ability to tax  This may mean a downsizing of governments  Pension funds will be in trouble  Governments try to deny pensions by using a filter criteria  Default in bonds or inflation  Better to have assets in things that are real  You can preserve value by choosing where you live rather than accumulating more of digital money and living in an expensive city  Shift in taxation from capital to labour
  • 22. Virtual company  Tries to have minimum staff  Sets up operations in a tax friendly state or country  Sells products or services that are virtual (externalized, outsourced or catalog based)  Has the ability to send a product over the internet (eg. digital music, digital documents, digital movies, digital services, etc.)
  • 23. Virtual piracy  Digital content flows as fast as digital money  The ability to replicate, copy, convert to formats that mask the origin of the original  The ability to see virtually anybody, anything, anywhere, anytime and to send/receive encrypted voice and video in real time
  • 24. Virtual threats  Viruses, trojans, worms, hackers, spyware  Distributed denial of service attacks  Spam mail from virtual users due to flaws in the email systems  Software which hijack PCs and networks  Phishing  Public opinion
  • 25. Virtual people  People across the world are communicating with each other in real time using fake email addresses, fake Ids – boy posing as a girl (vice-versa), using a fake location, a fake name and a fake identity  This is causing the common person to be lured into internet scams, internet hoaxes, internet fraud, auction scams, chain letters, Nigerian scams, Pyramid scams, investment scams, marriage scams, etc.  The difficulty to trace the real person who perpetrated a crime
  • 26. Virtual credit  The digital economy is making us think different about the extent of credit a person has access to  A person can own as many credit cards as he wants, whether he has the capacity to pay all of them or not  We will see more credit card defaults, bankruptcies, etc.  We will also see people vanish without a trace and assume altogether new identities and gain access to fresh credit  We may even see the same person under multiple identities (the recent Demat scam in India)
  • 27. Virtual marketing  Get Rich Quick for Doing Nothing  Many people have gotten all excited about affiliate, associate, referral, or co-op programs as they are sometimes called  But very few of the thousands of these being promoted have any real chance of making any significant money for the vast majority of people who get involved
  • 28. Virtual sales  People are selling more and more virtual things and concepts  Eg. Selling things for which there is no known ownership (like land on the moon)  Making money from virtually nothing (people, scenarios and objects in online games)
  • 29. Virtual network  We build our virtual network by knowing and meeting more people online  Things get done faster  Enables greater access to knowledge of the privileged few, provided we know how to navigate through this mass of information  There are good and bad people and information out there  So, we need to have the intuition to see through this virtual facade and make intelligent choices  Empowers us to have an edge over competitors
  • 30. Virtual end of this presentation  We see more and more virtual concepts and ideas emerging everyday  Whatever you do, look for ways to keep yourself engaged in making this virtual money securely work for you  Finally, our value is not in the amount of digital money we have or make, but in the choices we make using the information from our real and virtual networks