Text archives Help


RE: [projectvrm] VRM tool characteristics


Chronological Thread 
  • From: "Luk Vervenne" < >
  • To: "'Gon Zifroni'" < >, "'Project VRM'" < >
  • Subject: RE: [projectvrm] VRM tool characteristics
  • Date: Thu, 16 Jun 2011 23:53:25 +0200
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:reply-to:from:to:references:in-reply-to:subject:date :organization:message-id:mime-version:content-type:x-mailer :thread-index:content-language; b=mz1Ilya/4+fMbj/P/06dtVYDqsscGBUF6jYX17JIJrBOzHKqEhhqrESMvriqbXKFCP WI9KHJlXLPyGH+ipTKOB8zBDLrdeJ0uDDfwrx1EuKX1HbHiRshdvrLJc6ZEct9AhmNyS 4QdVWKgx/+3JBg8rhmTeS7Sq5jMTb7qiSOTGg=
  • Organization: Synergtics NV

1 and 2 can be compressed (without losing meaning) into : you have full access control over you data.

While doing you also avoid using the data ownership issue. You don’t own many of ‘your’ data elements, but you do control who gets to see them.

 

 

Luk Vervenne
CEO

Synergetics NV/SA 
Terlinckstraat 75 | 2600 Antwerp | Belgium 
T(+32)3/239.58.13 | F(+32)3/239.59.88 
M(+32)478.64.23.46 | VAT BE 0455.690.261 
www.synergetics.be |  ">


--------------------------------------------- 
Disclaimer:
This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the system manager.
Please note that any views or opinions presented in this email are solely those of the author and do not necessarily represent those of the company.
The integrity and security of this message cannot be guaranteed on the Internet.

 

Van: Gon Zifroni [mailto: ]
Verzonden: donderdag 16 juni 2011 23:19
Aan: Project VRM
Onderwerp: Re: [projectvrm] VRM tool characteristics

 

Devon hi,

 

Yes and no, it seems to me like a potential leak. 

 

Since it is a construction built on trust, if you decide to trust a second (vendor) or third (platform, right?) party with the same privileges as the fourth party then yes, but you clearly entrust it with your data. Even if it is granular typically you'll have repeat interactions (subsequent or at a later time). 

 

i.e. By trusting the second or third party for that role of managing your identity (who you are) and data (what I do, who I know, where I am, where I go, what I like, what I buy, what I want, etc) you open up to tracking and profiling based on repeat exchanges (not just transactions I believe).

 

How did you see it though? I was also thinking of the PGP architecture.

 

Gon

 

On 16 Jun 2011, at 11:07, Devon Loffreto wrote:



Ill submit an edit:

First part #7 = 4th parties can be first, second and third parties, but can only authenticate one role per transaction.

 

Devon Loffreto

 

On Thu, Jun 16, 2011 at 9:18 AM, Gon Zifroni < " target="_blank"> > wrote:

Hi list, I've been following silently for the last year and took part in IIW 11 last year.

 

I'm not sure if I got everything right with the terminology, but from what I can synthesize it seems to me we're talking about a system like so:

 

In a VRM system...

1. your data is private

2. your data is yours

3. only fourth parties get only temporary access to shares of your data

4. third and second parties never get access to your data, the second trusts the third and the third trusts the fourth.

5. fourth parties of your choosing share your data for you

6. only fourth parties can be polled on your behalf

7. fourth parties can not be third parties too

 

Let me flesh this out a little bit further:

1. TOS, your data is your legal private property

2. You are the only one who has complete access to all of your data. Even if it is in the cloud, you are the only one authorized full access at any given time.

3. Only fourth parties are allowed to get and index only portions of your data, and you can set for how long that data is retained.

4. They can index it along with other people's data so they can be queried by third and second parties. The query is not a query for data but a query for matching people. The fourth party only returns to third parties the number of matching people not their identity nor data about them. Second parties can connect with first parties via the current fourth party.

5. In terms of data storage and indexing it is a federated system like email whereby you can choose your fourth party and have several for different kind of data if you choose for it, jsut like people have several email accounts.

6. see 4.

7. Fourth parties cannot make use of your data.

 

I'm not sure if this is exactly the logic but I thought, given the Google Wallet discussion (I think it'd be a mistake to let it aggregate, index and know about all of your transactions, see 7), that it is a good moment to zoom in and draft an architecture that by its nature keeps data private while maintining certain level of flexibility and performance. Disclosure: my background is in industrial design and architecture (housing). I moved to SF to start a LBS with a group of engineers.

 

I'm sure this can be further compressed into 3 or 4 basic rules that qualify any VRM system.

 

Gon

 

On 16 Jun 2011, at 03:29, Katherine Warman Kern wrote:



+1

Katherine Warman Kern

Thanks!

 

I had meant #4 to cover that, in the sense that "managing" one's data would include understanding it; but maybe that's not the case. Gotta think about it....

 

Doc

 

On Jun 15, 2011, at 3:44 PM, Jamie Smith wrote:



Thanks Doc, this is a great start.

Would you say that number 4 ('help customers manage') would include tools to analyse your own data?

Such tools might help you identify your own behavioural or commercial trends (for example by finding patterns in your travel expenses or your weekly shopping), and in doing so would help you better a) express intent (#3) and b) engage (#4).

I suspect that such VRM tools would not necessarily have to have this characteristic, but if they did, then I'd want it to be a separate and distinct characteristic from 'help customers manage' - perhaps along the lines of:

6. VRM tools help customers better understand their own data. This is helping the customer discover and expose new value in their own data sets, on their terms and for their own benefit.

Keen to hear your views.

Jamie

On 15 June 2011 19:07, Doc Searls < " target="_blank"> > wrote:

@jamiedsmith tweeted a pointer to Alex Bogusky's New Conscious Consumer Bill of Rights...

 

 

 

... adding "needs more symmetry of power for consumers though". 

 

Rather than critique or seek to improve Alex's Bill, I thought I'd post something we've needed for awhile: a list of characteristics shared by VRM tools. I did that here:

 

 

Here they are:

 

1.    VRM tools are personal. As with hammers, wallets and mobile phones, people use them as individuals,. They are social only in secondary ways.

2.    VRM tools help customers express intent. These include preferences, policies, terms and means of engagement, permissions, requests and anything else that’s possible in a free market (i.e. the open marketplace surrounding any one vendor’s silo or walled garden for “managing” captive customers).

3.    VRM tools help customers engage. This can be with each other, or with any organization, including (and especially) its CRM system.

4.    VRM tools help customers manage. This includes both their own data and systems and their relationships with other entities, and their systems.

5.    VRM tools are substitutable. This means no vendor of VRM tools can lock users in.

Suggestions and improvements welcome.

 

Doc

 

 

 

 

 

 

 

 

 




Archive powered by MHonArc 2.6.19.