Archive

Archive for the ‘Privacy’ Category

The right to be forgotten, but not forgiven.

July 20, 2014 Leave a comment

Just as with getting tattoos or removing them, (hint: both equally painful experiences), the furore over a recent European Court of Justice (ECJ) ruling on the “Right To Be Forgotten”, (aka #RTBF), appears to be one that will hurt regardless of which end of the ruling you support. Why is this so, what does it mean, and is it even possible to forget anything on-line?

RTBF-handshake-md

Enough time has passed between the ECJ announcement in May and the initial stormy reactions from both mainstream and social media, that it is now possible to perceive the wood for the trees and to separate fact from fiction and fantasy.  First of all, this is about safe guarding individual rights to privacy, and providing some measure of control over the personal data processed by Internet search engines (Google in this case). It is definitely not about erasing personal data from the web, as you might have been led to believe from the initial hue and cry following the announcement.

Secondly, the ruling left it to individuals to approach the search provider and request removal of links to information which are “inadequate, irrelevant, no longer relevant or excessive” from results of searches conducted on their name. However, it is up to the search engine provider to work out if it is appropriate to remove or retain said links, in the public interest. In the latter eventuality, the individual can chose to take the search provider to court in his/her national jurisdiction.

Also, several developments have occurred since this landmark ruling was made in favour of Mr Gonzalez vs. Google Spain, including the take-up of such requests by Microsoft’s Bing search engine. However, according to an article on IP-Watch, this ruling is akin to opening Pandora’s Box because it throws up a host of challenges, such as:

  • Privacy versus free speech – the ruling effectively asks search engine providers to make a judgement call on two competing rights of free speech versus privacy. This arguably goes against the raison d’être of search engines as trusted source of comprehensive search information, and not selective parts thereof.
  • Lost in Translation – The Right to be Forgotten is now accepted as a European Principle, but it is still open to subtle differences in translation, interpretation and implementation among the various member states. Furthermore, because this ruling only applies to Europe, the removed links may still show up in other countries, unless #RTBF becomes a globally adopted principle or if the search provider decides to remove the search links globally. It is thought this differentiation could lead to fragmenting of the web in various jurisdictions.
  • #RTBF overload – Requests to remove links to personal information hit over 70,000 within the first few months of the ruling, which undoubtedly placed some burden on Google (and likely do so eventually for other major on-line players such as Facebook), but perhaps more importantly this also provides an indication of the sort of personal information that people wish to delete (see related article about removed links).
  • FUD Factory – The scale of coverage, and misinformation, associated with this ruling is huge according to international advocacy group, EDRi. They also contend that the number of links removed by European Right to be Forgotten is nothing compared to the scale of DMCA triggered links removal, where it appears Google has had to delete “hundreds of millions of search results” without anywhere near the same level of attention.

Based on the above observations, it seems an element of perception manipulation may be at play with regards to the European Right to be Forgotten, especially given its lack of global scope and the fact that only links are removed (not the actual content). This gives individual requesters some illusion of control over information in a media (the Web) that is not necessarily designed to be manipulated as such. Furthermore, search engines may be an unfair, easy target since removal of links only make it more difficult, but not impossible, to locate users personal information even within Europe.

This ability to control access to personal information may be a good or bad thing, depending on who is looking and why. Everything rests on the motive of the searcher or ‘hider’ of personal information. Paedophiles, terrorists, ex-convicts, or even drunken antics in Magaluf, may wish to be forgotten, but is that beneficial to the interests of potential employers, neighbours or partners? Do we need to know everything, or should we all have some kind of adjustable online reputation filter? What about privacy and forgiveness for reformed offenders? So many questions and not enough answers, as we continue to evolve into a global digital society, but whatever the outcome the signs are clear that the debate and tension between free speech and privacy is far from over.

Image source: Adapted from © Atee83 | Dreamstime Stock Photos.

Advertisement

Copyright and Technology in 2013

November 18, 2013 Leave a comment

Last month’s conference on copyright and technology provided plenty of food for thought from an array of speakers, organisations, viewpoints and agendas. Topics and discussions ran the gamut of increasingly obvious “business models are more important than technology” to downright bleeding edge “hypersonic activation of devices from outdoor displays “. There was something to take away for everyone involved. Read on for highlights.

The Mega Keynote interview: Mega’s CEO Vikram Kumar, discussed how the new and law-abiding cloud storage service is proving attractive to professionals who want to use and pay for the space, security and privacy that Mega provides. This is a far cry from the notorious MegaUpload, and founder Kim Dotcom’s continuing troubles with charges of copyright infringement, but there are still questions about the nature of the service – e.g. the end-to-end encryption approach which effectively makes it opaque to outside scrutiny.  Read more about it here.

Anti-Piracy and the age of big data – Mark Monitor’s Thomas Sehested talked about the rise of data / content monitoring and anti-piracy services in what he describes as the data driven media company. He also discussed the demise of content release windows, and how mass / immediate release of content across multiple channels lowers piracy, but questioned if this is more profitable.

Hadopi and graduated response – Hadopi’s Pauline Blassel gave an honest overview on the impact of Hadopi, including evidence of some reduction in piracy (by factor of 6M-4M) before stabilsation. She also described how this independent public authority delivers graduated response in a variety of ways e.g. from raising awareness to imposing penalties and focusing primarily on what is known as PUR (aka ‘Promotion les Usage Responsible’)

Auto Content Recognition (ACR) and the 2nd Screen – ACR is a core set of tools (including DRM, watermarking and fingerprinting), and the 2nd screen opportunity (at least for broadcasters) is all about keeping TV viewership and relevance in the face of tough competition for people’s time and attention. This panel session discussed monetisation of second screen applications, and the challenges of how TV is regulated, pervasive and country specific. Legal broadcast rights is aimed at protection of broadcast signals, which triggers the 2nd screen application, (e.g. via ambient / STB / EPG based recognition). This begs the question of what regulation should be applied to the 2nd screen, and what rights apply? E.g. Ads on TV can be replaced in the 2 screen, but what are the implications?

Update on the Copyright Hub – The Keynote address by Sir Richard Hooper, chair of the Copyright Hub and co-author of the 2012 report on Copyright Works: Streamlining Copyright Licensing for the Digital Age, was arguably the high point of the event. He made the point that although there are issues with copyright in the digital age, the creative industries need to get off their collective backsides and streamline the licensing process before asking for a change in copyright law. He gave examples of issues with the overly complex educational licensing process and how the analogue processes are inadequate for the digital age (e.g. unique identifiers for copyright works).

Sir Richard Hooper

Sir Richard Hooper

The primary focus of the Copyright Hub, according to Sir Richard, is to enable high volume – low value transactions, (e.g. to search, license and use copyright works legally) by individuals and SMEs. The top tier content players already have dedicated resources for such activities hence they’re not a primary target of the Copyright Hub, but they’ll also benefit by removing the need to deal with trivial requests for licensing individual items (e.g. to use popular songs for wedding videos on YouTube).

Next phase work, and other challenges, for the Copyright Hub include: enabling consumer reuse of content, architectures for federated search, machine to machine transactions, orphan works registry & mass digitisation (collective licensing), multi licensing for multimedia content, as well as the need for global licensing. Some key messages and quotes in the ensuing Q&A include:

  • “the Internet is inherently borderless and we must think global licensing, but need to walk before we can run”
  • “user-centricity is key.  People are happy not to infringe if easy / cheap to be legal”
  • “data accuracy is vital, so Copyright Hub is looking at efforts from Linked Content Coalition and Global Repertoire Database”
  • “Metadata is intrinsic to machine to Machine transactions – do you know it is a crime to strip metadata from content?”
  • “Moral rights may add to overall complexity”

As you can probably see from the above, this one day event delivered the goods and valuable insights to the audience, which included people from the creative / content industries, as well as technologists, legal practitioners, academics and government agencies. Kudos to MusicAlly, the event organiser, and to Bill Rosenblatt, (conference chair), for a job well done.

Next Stop: I’ll be discussing key issues and trends with Digital Economy and Law at a 2 day event, organised by ACEPI,  in Lisbon. Watch this space.

Big Data, Privacy and Intellectual Property

September 29, 2013 2 comments

Big Data, cloud, social and mobility make up Gartner’s Nexus of Forces, aka super disruptors of the digital age. In a previous related post, I discussed how such forces impact the concept of intellectual property, and in this post I’ll focus on two major issues that impact and influence big data.

Big Data, Privacy, IP

Big Data, Privacy, IP

Although a lot has been written about big data and the challenge / opportunity it presents to enterprises and individuals, the sparks really start to fly whenever commercial exploitation of digital information and content (incl. big data), enters the realms of personal privacy and IP rights (IPR).

Big Data

According to a recent Forrester report , your typical firm has on average 125TB of data but only actually utilise 12% of it. This shocking statistic brings home a key attribute and challenge of big data, namely the sheer volume, velocity and variety of data that resides and travels across multiple channels / platforms within and between organisations. As a result, many organisations have turned to ever more advanced analytics and business intelligence solution (including big data and social media) to extract value from the sea of information.

Personal Privacy

Given such powerful tools, and the vast amount of replicated information across various sources, it is relatively easy to get a picture of any individual’s situation, strengths and limitations. For many organisations, such data could become “toxic” if and when they suffer any loss of control. However, personal privacy is subjective at best, and there are differing world views on whether it should be considered a constitutional or fundamental human right.

Furthermore, the explosion in speed / type / channel of interaction may have brought about a certain degree, (perhaps even an expectation or acceptance), of reduced privacy. However, although some users may be happy to share personal data in exchange for financial gain, according to a recent SSRN paper, data protection and privacy entrepreneurship may have their place, but “people should not have to pay to protect their privacy or receive coupons as compensation”, especially as this might further disadvantage the poor.

Intellectual Property

In addition to the above issues, organisations also have to deal with the drama of IP rights and how they apply to the masses of unstructured data and content. In other words, every last piece of the aforementioned 125TB of big data held within your average organisation will have some associated IPR which must be taken into consideration when collecting, storing, processing or sharing that information. According to some legal experts, companies need to think through certain fundamental legal aspects of IPR, e.g. “who owns the input data companies are using in their analysis, and who owns the output?”

If you consider all the information / content, (including employee ‘personal’ content), sloshing around in every organisation, then you might begin to perceive the scale of the problem. There may be a lucrative opportunity for information mining and analysis algorithms aimed at the computer audit and forensic investigations market.

The way forward

Below are 3 things that organisations should bear in mind when dealing with the issues and problems posed by big data, privacy and IP:

  1. Information is the lifeblood of business  – implement the right policies for big data governance. The right information, at the right time, for the right user, is the holy grail for business, and it demands capabilities in Data Science and increasingly Data Art  . 
  1. Soon it may not really matter who owns your data – Personal information is becoming another currency with which the customer can obtain value. There is a growing push to focus big data governance / controls on data usage rather than data collection. 
  1. It’s not the tool, but how you use it – technology is not really that much a differentiator, rather it is the architecture and infrastructure approach that make all the difference – e.g. Forrester’s report recommended the “Hub and Spoke” model for decentralised big data capability3

In conclusion, although it may appear that the heady combination of big data, privacy and IP could be lethal for any organisation,  we mustn’t ignore real opportunities to reap the benefits of big data insight, but first the organisation must put its house in order by adopting the right policies and principles for big data governance.

==========

Note: The above post is adapted from my article of the same title, which was published in the September edition of ITNow magazine,  by the BCS Chartered Institute for IT.

References:

  1. Gartner – Information and the Nexus of Forces: Delivering and Analyzing Data (26, June 2012) – Analyst: Yvonne Genovese
  2. BCS TWENTY:13 ENHANCE YOUR IT STRATEGY – Intellectual property in the era of big and open data (01-03-2013) – Jude Umeh FBCS CITP
  3. Forrester – Deliver On Big Data Potential With A Hub-And-Spoke Architecture (12, June 2013) – Analyst: Brian Hopkins
  4. SSRN – Buying and Selling Privacy: Big Data’s Different Burdens and Benefits (30-June-2013) – by Joseph Jerome (Future of Privacy Forum) – Ref: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2294996
  5. Out-law.com – Big data: privacy concerns stealing the headlines but IP issues of equal importance to businesses – Ref: http://www.out-law.com/en/articles/2013/march/big-data-privacy-concerns-stealing-the-headlines-but-ip-issues-of-equal-importance-to-businesses-says-expert/
  6. BCS Edspace Blog – Big data: manage the chaos, reap the benefits – (17-May-2013) Marc Vael (International VP of ISACA) Ref: http://www.bcs.org/content/conBlogPost/2196
  7. Capping IT Off – Forget Data Science, Data Art is Next! – Simon Gratton Ref: http://www.capgemini.com/blog/capping-it-off/2013/07/forget-data-science-data-art-is-next

Innovating and Enabling Digital Futures

July 14, 2011 Leave a comment

Certain trends and observations in the use and growth of content and communication technologies make it clear that the future of digital enterprise will depend heavily on key enablers such as Mobile Infrastructure. As ever, technology is probably the least of a set of key challenges facing those that would capitalize on such clear foresight, and this was the topic of my webcast at a BrightTalk Summit earlier this week.

Mobile Infrastructure: Innovating and Enabling Digital Futures

Mobile Infrastructure: Innovating and Enabling Digital Futures

First of all, my thanks to the kind people at BrightTalk for inviting me to share some thoughts and opinions at their Mobile Infrastructure Summit (click here to view the full webcast), and despite running out of time near the end, the audience feedback was most generous. To summarise briefly, some key points of discussion included:

  • Social, technology & business trends (with particular relevance to mobile)
  • Demand, usage, fulfillment and monetisation scenarios
  • Key issues around privacy, security, and health & safety
  • Opportunities with business models, Cloud and next generation mobile capabilities
  • An overview of 5 key stakeholders, business model innovation and our approach to innovation

The one message to take away from this, in my opinion, is the clear need and responsibility of any digital / mobile enabled enterprise to engage in constant innovation and adaptation of its business model, process and customer engagement approach. The current business environment has become far too dynamic and fluid for any rigid or hierarchical approach to remain unchallenged for any length of time.

Other events and similar discussions:

Interestingly, some of the above points were either echoed, or expanded on, by speakers at other relevant events I attended this month, notably:

  1. Google Apps Seminar – This event, hosted at Google’s office near Buckingham Palace, addressed four key trends (i.e. innovation, collaboration, social and mobility) and provided insight into what it takes to migrate from hosted services to Cloud based enterprise applications services, including real life examples from companies such as Jaguar Landrover and Ladbrokes.
  1. Mobile Privacy – Another excellent Mashup Event which dealt with various privacy issues thrown up by mobile services, as well as the implication of ‘giving a user control over their data’. This session boasted a good cross section of industry players, in addition to a pretty knowledgeable panel, which made for some intelligent exchange of views on such things as the meaning (or meaninglessness) of Privacy in a mobile and global context.
  1. CW5000 Club – This was a networking event for CIO and IT leaders to discuss the Web’s Next Generation, and featured speakers from Betfair, BBC Worldwide, Net-A-Porter and Interactive Media in Retail Group. Key high-light for me was that discussions consistently returned to the theme of customer centricity. Progress, IMHO!

Citius, Altius, Fortius and the Intellectual Property Roller-coaster

June 23, 2011 Leave a comment

Next year’s Olympic Games mean that both the City of London and global coverage of the events will be awash with logos, slogans, brands and other sponsorship paraphernalia come summer 2012. As the competing athletes get busy completing their training, so too have a particular group of learned athletes, otherwise known as IP lawyers, kept busy by flexing their legal muscles in preparation for an epic battle. Whoever wins in the end must indeed go faster, higher and stronger in that blood sport known as IP litigation.  

I was kindly invited to a seminar on brands and Intellectual Property (IP) at Wedlake Bell, a London Law firm, which helped to bring into sharp focus the current state of the IP landscape, (i.e.: Copyright, Trademark, Designs and Patents), and their legislation or regulation in the UK and Europe. The half day seminar touched on several interesting and notable IP related developments, regulation or litigation outcomes including:

  • Freedom of Expression vs. Privacy – Discussed the tension between these two strange bedfellows, as well as highlighting the bright  line boundary of commercial or state secret infringement versus the blurred line of private information made public (i.e. intrusion of privacy). Not quite the same thing it seems!
  • Copyright Issues – Looked at the challenges facing copyright law and its modern use and interpretation such as the vexed question of just what constitutes a “substantial part” in copyright infringement. Oh, and by the way, newspaper headlines may be copyright too!
  • Social Media and the Law – this final session showed how, despite evidently wide-held belief to the contrary, the law can, and does, apply to social media users. Seven types of social media usage, and some resulting litigation, were used to illustrate how the law can impact unwary users of social media, e.g.: insults, uploading, marketing, employees, litigating, gossip and jokes. Also the memorable analogy of just how social media users are very like London cyclists, (i.e. an explosion in great numbers of modish, largely anonymous individuals who may assume the law does not apply to them), helped to bring the point home.

In conclusion, this seminar provided an excellent update on the state of play with IP and brands; litigation and legislation; as well as historical challenges and emerging trends and usage scenarios. It is the sort of useful event, and time well spent, which I would recommend to any person or organization with even the least exposure to IP, digital social media and the laws and regulations that govern their use. With that in mind, perhaps the toughest contests of the London2012 games may well be fought in courtrooms across the land. IP athletes to your starting positions.

The Myth of Privacy 2.0

May 31, 2011 Leave a comment

Recent headlines around privacy, super injunctions and scandals involving celebrities, sports stars and bankers make it seem like something new and dangerous has appeared out of the ether, when in fact it is nothing other than the usual, albeit grossly exaggerated, effect of disruptive technologies and their use /  abuse, laced with a titillating hint of salacious gossip fodder. The rest is history, or not.

 

Internet technologies and social media applications like Twitter, Facebook and YouTube have made it child’s play for anyone to create instantaneous headline / publicity, or what I call a “flash buzz”, over almost any topic, event or person. There is no gainsaying the fact that social media has established itself as a bonafide media channel through which people can get the fastest and most direct access to world events, and to each other. But this is only just the beginning, if you consider the mountains of so called big data being fed each and every second by these, and other sources of information.

Once upon a time news information trickled down through well established but rather narrow media channels (i.e. news print, Radio and TV), but that trickle has become a fast moving stream, full of all any kind of debris (i.e. meaningless chatter) and valuable nuggets of information about you, your friends (or followers, fans, contacts etc.) and any number of other people. When combined with other Internet applications, such as the World Wide Web and a good search engine, no topic is out of reach for an intrepid seeker. So where does this leave us? What will happen to the existing media / information channels; will they be swallowed up by the deluge of information and get lost in the remarkably high noise-to-signal ratio? Will established media channels, businesses and industry go the way of the music industry?

I think not, because thankfully, there is still something to be said for the perceived authority of the printed word, and many people will still probably take the words on a printed sheet over words on a screen. Also, despite the wow factor of a new information source / channel offered by social media applications, it is still just that; only another source or channel for information. They are not mutually exclusive, and in fact people even use multiple information channels simultaneously. But what has this got to do with privacy?

Why, everything. The increasing trend for easily accessible data, information and knowledge streams means that sooner or later, and to varying degrees of completeness and accuracy, your so called private information will become available online, if it is not already out there. But what does this mean for ordinary individuals that go about minding their own business? Not much, I imagine, but for those with something to hide, or protect (in good cause or not), this can be a very real problem as the recent controversy over super injunctions in the UK will attest. Furthermore, for enterprises that make it a key activity to interact and deal directly with customers, this can be a gold mine (or just a plain minefield) to be navigated and exploited with extreme care as significant legal battles will likely continue to be fought over this particular topic.

In any case, one thing that seemingly escapes attention in the increasingly episodic furore over privacy is that the upcoming generation of Internet savvy digital natives may not see privacy in the same light our current generation of digital immigrants do. If social media was the norm at the time of your birth, or before, then it may be fair to ask just what the fuss is all about.

Creative Commons: Addressing the perils of re-using digital content.

February 27, 2011 2 comments

Do you still dream of owning an iPad? If so, you are one of millions of people salivating at the thought of using such a sexy device to create and consume all manner of digital content e.g. books, pictures, music and video. Indeed such devices promise exciting times for all digital content creators; and even entire industries, (e.g. news and magazine publishers), can hardly contain their excitement at the prospect of a device that just might single-handedly revive their ailing fortunes. But this is not another gushing product review, instead it is meant to highlight the challenges that this, and other such devices, will surely pose to the already embattled system of Intellectual Property or Copyright. Namely, how can you be sure that the content you create, re-use and consume on your device does not infringe another party’s copyright?

This is a burning question in the minds of many professional and non-professional creators and re-users of digital content, (e.g.: authors, bloggers, photographers, film-makers, illustrators, web-designers, as well as teachers and students); especially in light of new governmental instruments like the Digital Economy Act1. The right answer must provide, at the very least, a clear and simple method by which anyone can legally create, distribute, use and remix digital content without fear of inadvertent copyright infringement. This article examines one such method, which is increasingly being used by many creative people to get around this difficult issue, and it’s called the Creative Commons.

What Is The Creative Commons?

According to their website2, the Creative Commons (or CC) is a non-profit organisation devoted to increasing the amount of creative works that are free and legal to: share, use, re-purpose and remix by the general public (aka “The Commons”). The CC was established in 2001 by an eight strong group of experts in such relevant fields as cyber law, Intellectual Property (IP), computing and education. The first version of CC Licences were released in 2002, and since then over 130 million works have been licensed under this, and subsequent versions (it’s currently at version 3.0). Furthermore, CC licenses have now been ported to over 50 countries or jurisdictions internationally, with more coming onboard every year.

How Do CC Licenses Work?

The Creative Commons provides free, legal tools that enable content creators to grant: clear, simple and more liberal copyright-based permissions for the use of their works. It operates alongside existing copyright laws, but instead of the default copyright position of “all rights reserved”, CC allows content creators to specify a more flexible proposition with only “some rights reserved”. This is achieved via a multi-step gradient of pre-bundled permissions which bridge the gap between binary positions of copyright (i.e. all rights reserved) and the public domain (i.e. no rights reserved).

There are six commonly used types of CC licenses, which are shown, in order of increasing restrictiveness, as follows:

Creative Commons Licenses

Creative Commons Licenses

Figure 1: Creative Commons. Source of CC License Symbol / Images3: http://creativecommons.org/about/licenses/

All CC licenses are represented in three levels, which are easily accessible for: computers (i.e.  Machine-readable digital code, or metadata); lawyers (i.e. the “Legal Code”); and ordinary people (i.e. the Commons Deed).

What are the Limitations and Pitfalls of Using CC Licenses?

CC is by no means perfect for every situation, especially since it doesn’t cover every single type of rights and privileges related to content. For example, CC licenses do not affect the rights of content creators or consumers in areas like: Fair Use or Fair Dealing, Moral Rights and / or Privacy. The latter aspect of Privacy has been in the spotlight on a few occasions, most memorable of which involved a minor whose image was used in an advertising campaign without her knowledge or permission4, and which ultimately led to charges of violation of her privacy, (notwithstanding the fact that the photograph in question had been posted on Flickr.com under a CC-By-Attribution license!)

Furthermore, the global scope of CC and the Internet only adds to the complexity and geo-political implications of such allegations. For example, the minor and photographer in the above case were both based in the USA, but the ad campaign took place in far away Australia. In light of this and other similar cases, Maria Kessler5, President of the Picture Archive Council of America, advises caution in all uses of digital images, even those under CC license, due to the many subtleties / unintended consequences of digital image rights and their usage.

In Conclusion

The rise in digital content, fuelled by ubiquity and relative ease of digital content creation, remix and distribution emphasises the urgent need for a more flexible approach to usage rights and permissions under copyright. This need is fulfilled to a large degree by the Creative Commons system described above, in spite of the mind-numbing complexity and subtlety of copyright (i.e. the various rights / privileges / restrictions that are attributable to content and their authors). In summary, the key messages to take away include:

  1. CC is probably the best thing we currently have to enable the legal use / reuse of digital content that would otherwise be legally inaccessible to users under full copyright. This is because CC simplifies and facilitates content use / reuse / sharing for  the benefit of all (and not just for commercial stakeholders or content rights owners)
  2. The widespread popularity and adoption of CC clearly points the way to how we might evolve, or remix, the global copyright system into something that can better cope with the relentless relentless pace of change driving the digital economy during this crucial transition period in human cultural evolution
  3. Finally, as with most other things, CC is not a silver bullet. The subtleties of copyright versus individual rights are a minefield, even for the best of legal experts; therefore extreme caution is highly recommended when considering the use of CC licensed works in a commercial way.

Please Note: This article has been submitted and accepted for publication in a forthcoming edition of ITNow Magazine

============================================

References:

  1. The Creative Commons website can be found at http://www.creativecommons.org and the UK version is at: http://www.creativecommons.org.uk. More information on other jurisdictions can be found at: http://creativecommons.org/international
  2. Digital Economy Act – More on the debate over this bill can be found on the BCS DRM blog, including comments, at: http://www.bcs.org/server.php?show=conBlogPost.1606
  3. Creative Commons Images: The CC license buttons and graphics remain the property and trademark of the Creative Commons. More information on their use and reuse can be found at: http://creativecommons.org/policies
  4. More information on this lawsuit against Virgin Mobile and the Creative Commons can be found at: http://creativecommons.org/weblog/entry/7680
  5. Conversation with Maria Kessler who is also Senior Vice President of Image Rights (http://www.imagerights.com), an Image monitoring services company.


We Heard It Through The Grapevine

February 25, 2011 Leave a comment

What happens when you mash up social media monitoring, insight and sentiment analysis, with business intelligence and BPM? Answer: You get an enterprise that is engaged in multiple ways with its customers, suppliers and even employees. Or at least that is the vision of what you could get according to an offer Capgemini have called ‘Grapevine’.

Apologies if you’ve already seen this topic covered in an excellent post by my colleague, Laurence Buchanan, but even that doesn’t prepare you for a hands-on experience of just one of the key components of this proposition. I am talking about the social media monitoring / analysis part of the solution which I had the opportunity to test drive last week in a partner training session by vendor, Attensity.

Imagine if you or your organisation could see all that is said about you on social media networks, and other online sources, in a way that separates the noise out from more relevant opinions and sentiments (e.g. positive praise or negative criticism), then you can probably understand the amazing power at your grasp, not only to pinpoint and respond to your biggest fans or harshest critics, but to do so with out missing a beat.

And this is where things really start to get interesting, because the BPM part of the solution (from Pega) promises the capability to quickly adapt your internal processes in order to address issues appropriately and in a highly responsive manner, if you so chose! What could possibly go wrong with this picture?

Well, people for one thing, because if your organisation is not geared up for speed and flexibility, or if your culture does not tolerate change and innovation, then you might struggle with this concept – as you probably are currently doing anyway – given the speed of change and perception all around.

Also, to my mind, the ultimate trade-off is this: if end-users can blog / tweet /chat about their experience with your company’s services or products with impunity, then it’s only fair that your organisation is able to respond swiftly and appropriately to its advantage. However this cuts both ways, because although end- users might have, consciously or unconsciously, provided their information to online / social media platforms (which can be legally mined, repurposed and exploited), there is still a perception of privacy, which might get in the way of full engagement with a third party organisation. But that is probably only a transient issue, as more and more people are becoming aware that privacy flew out the social media window / door / portal the minute they signed-up online.

So what will it be; my ecosystem or yours?

February 12, 2011 1 comment

It seems to me that anywhere you go these days, there’s bound to be someone dropping that term like it’s going out of fashion. You’ll hear them talk about this ecosystem, or that ecosystem, usually in reference to any number of things from consumer products, business models, IT systems or even personal social networks (I kid you not). So just what is an ecosystem, really?


For one thing, it is an over-used / overloaded term which, according to the Oxford English Dictionary, refers to a biological system comprising all organisms that live in, and interact with, a particular physical environment. This definition is consistent with others from a variety of both lexical and semantic sources, and as a result, one can only conclude that ecosystem is used, by most non-scientific types, as a metaphor to describe similar complex systems.

As buzzwords go, the term “ecosystem” has been around for a while, yet for some reason its use (and abuse) appears to have gained traction with a much wider variety of people, professions and circumstances. For example, it is no longer unusual to hear it from the lips of: economists, technologists, consultants, media folk and even start-ups and their VCs. In a recent panel session, at a music/tech seminar, it seemed that each panelist used “ecosystem”, in different contexts & meanings, to answer to a single question! Surely it must be time to stop and call amnesty on such indiscriminate use of this term.

To be fair, there is a certain attraction to using such a rich metaphor to describe certain things, and this perhaps reflects a rather complex, information-rich and often confusing electronic age. The ecosystem concept communicates this complexity rather eloquently, comprising as it does, such intricate components as: environments, niches, food chains, roles, relationships (e.g. specialists, generalists, predators, prey, symbiosis or parasitism), and an idea of balance and equilibrium. As a result, one can easily see a similarity and applicability to modern businesses, (e.g. high-tech or financial systems), which themselves also have a complex set of interacting entities and components including: value chains, webs & networks; IT systems; information flows & controls; as well as various business and revenue models (complete with predators, prey, and mutants with emergent skills e.g. in Internet, social network, or Cloud technologies).

However, there are limitations to the ecosystem metaphor, and perhaps not everything can or should be described in terms of an ecosystem. For example, it is extremely difficult to find anything like true balance or equilibrium in areas such as high-technology, business, politics or global economics and finance (don’t even get me started). Furthermore, new and emerging patterns of complex digital interaction, usage and convergence are not yet fully understood, and this is particularly true for: content, context, rights and entitlements (e.g. individual privacy). To my mind, this is a clear indication that even complex metaphors like ecosystems may not be rich enough to properly describe the evolutionary fusion of human beings, digital technology and our physical environment, e.g. the emergence of Augumented Reality applications are a case in point.

In conclusion, ecosystem is an over-loaded term that is increasingly used by people in business, technology and other fields, to describe complexity. It works well to a large extent, but indiscriminate and uninformed use can only add further confusion and FUD to an already complex situation. It may well be that as people, technology and environment continue to evolve / converge we’re going to need even richer metaphors to describe it all. So next time someone says ecosystem, you might do well to ask: “…my ecosystem or yours?”

Privacy versus Mobility

July 30, 2010 4 comments

This appears to be a worrying trend whereby mobile devices are playing an increasing role in the erosion of personal privacy. Why does privacy not translate very well for mobile technology?

Starting from easily accessible and recoverable SMS text messages, to mobile apps that secretly send your data to 3rd parties, it would seem that most people are not really aware of, or concerned with, what goes on under the hood when it comes to mobile technology.

This is a topic that’s well explored in a book I recently reviewed for the BCS, entitled My Digital Footprint, which makes a good argument for why multi-capable mobile devices will soon become the primary source of information from and about the user, as opposed to the information hungry device they currently are. However, the problem with this scenario is that unless users are aware / in control of their own Digital Footprints, along with the capability to choose who they wish to manage it on their behalf (perhaps in exchange for some appropriate benefit); they will most certainly be ripped off by unscrupulous third parties.

Interestingly, this would appear to be a reversal of the usual “consumers are stealing our digital content” mantra that we have become accustomed to hearing from the content industry. Clearly, if personal data, identity and privacy really belong to the individual, as in “My Digital Footprint”, then such parties that solicit and use surreptitiously gathered mobile data are themselves guilty of stealing “My digital footprint”. No?

Perhaps the UK’s Digital Economy Act, and other such rules, should also make provision for individuals that wish to pursue mobile operators / advertisers / and other co-beneficiaries of such an illicit activity, for invasion of privacy and theft of their Digital Footprint. Or am I just barking up the wrong tree?