Privacy on the Wireless Web (mCommerce is getting personal) Privacy on the Wireless Web (mCommerce is getting personal) Marc Le Maitre – Nextel Communications.

Slides:



Advertisements
Similar presentations
Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
Advertisements

Microsoft Dynamics CRM Online Choice Begins Today! Ralph R. Zerbonia President Universe Central Corporation.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Creating Collaborative Partnerships in Business
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Ch 2. Mobile Computing Applications Myungchul Kim
E-Marketplaces: Structures and Mechanisms
Layer 7- Application Layer
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Negotiated Privacy and Security Policies for Web Services George Yee (Joint work with Larry Korba)
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
Making Contact With Your Customers. Who are Klick2Contact? Highly experienced telecommunications professionals Backed by major European investment group.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Karolina Muszyńska Based on
Online Game JAVA for PDA WAP for Mobile Phone. Java for PDA  Hardware limit - Java API Power Memory  JDK 2M byte. Connectivity Display size.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
XML AND THE LEGAL FOUNDATIONS FOR ELECTRONIC COMMERCE: Making XML Pay: Revising Existing Electronic Payments Law to Accommodate Innovation Copyright (c)
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
WELCOME TO UNIT 7 Customer Service MT 221 Marilyn Radu, Instructor.
Management Information Systems
Classroom User Training June 29, 2005 Presented by:
University of Kentucky Proxy Service Presentation By Kelly Vickery
Information Systems and Management. E-Commerce Properties of the Internet 1.Mediating Technology o Connects parties 2.Universality o Enlarges the world.
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
TOPICS TO BE DISCUSSED  Mobile Commerce Mobile Commerce  M-Commerce Technology M-Commerce Technology  M-Commerce Services and Applications M-Commerce.
The Internet and World Wide Web Robert T. Grauer
Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman MODULE 13 ELECTRONIC COMMERCE Learning Units 13.1 What is E-Commerce? 13.2 Electronic.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Privacy, P3P and Internet Explorer 6 P3P Briefing – 11/16/01.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Scripting Scripting provides complete scripting and survey capabilities, including both authoring tools and a script engine. Scripts can be created, modified,
Gaurav Aggarwal and Elie Bursztein, Collin Jackson, Dan Boneh, USENIX (Aug.,2010) A N A NALYSIS OF P RIVATE B ROWSING M ODES IN M ODERN B ROWSERS 1.
Mobile Commerce (M-Commerce)
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Electronic Resource Management: Licensing and Interlibrary loan Diane Carroll Head, Collections and Acquisitions Washington State University, Pullman September.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
ELECTRONIC COMMERCE, STRATEGY & MANAGEMENT (COM350)
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Chapter 7 Mobile Commerce— The Business of Time
© Copyright 2002 Anite Business Systems Limitedhttp:// Practical CRM Steve Dobson Director of Technical Development
Frameworks for the Access and Use of Administrative Data, With the Example of Current Practice in the UK Steven Vale Office for National Statistics UK.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
A global, public network of computer networks. Computer Network A collection of computing devices connected to share resources such as: Files Software.
1 Agribusiness library LESSON : Applying Trading Techniques.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
E-Marketplaces: Mechanisms, Tools, and Impacts of E-commerce.
IBT - E-Commerce Contracts Issues Victor H. Bouganim WCL, American University.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
WELCOME TO UNIT 7. Unit 7 The Impact of Globalization on Customer Service Objectives Understand the impact globalization has had on the world economy.
CMPE 494 Service-Oriented Architectures and Web Services Platform for Privacy Preferences Project (P3P) İDRİS YILDIZ
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
SSL Certificates for Secure Websites
THE DEVELOPMENT SERVICE
CSCD 330 Network Programming Spring
Presentation transcript:

Privacy on the Wireless Web (mCommerce is getting personal) Privacy on the Wireless Web (mCommerce is getting personal) Marc Le Maitre – Nextel Communications 12/6/2000

Taxonomy of Commerce n eCommerce –Performing commercial transactions on the Internet n Wireless eCommerce –Performing the same commercial transactions on the Internet over wireless n mCommerce –Performing commercial transactions on the Internet over wireless using real-time context-sensitive, personalized information such as location, state and intent nState defines the customer’s availability

Why Must mCommerce Get Personal? n Data deals with transmission of bytes n Information is the presentation of data n Knowledge addresses the relationship of information in context of other information n Wisdom is the prediction of knowledge and is learned or “mined” Presentation Context Prediction Data Information Knowledge Wisdom Increasing value and Increasing need for privacy

The Privacy Challenge n The privacy challenge is not primarily a technology issue, not primarily a governance issue but a business issue –Passing too little control to the user will result in low take up users because of trust issues –Passing too much control to the user will result in low take up by business because of inadequate marketing opportunities

Privacy Is Not a Point but a Continuum Don’t tell anyone Tell these people on these terms Advertise it to everyone Never reveal information about me If I request as service or authorize access Give it to anybody, but give me a good deal I’ll pay you to advertise my information

What Does Privacy Mean to Businesses? n It is fundamental to gaining the customer’s trust and building valuable relationships n It will require a re-think in their existing CRM and marketing practices –Access to personal information is increasingly under the control of the customer n The good news is; If businesses address privacy concerns in the right way they will accelerate the delivery of value added services not hold them back

What Businesses Must Do to Exceed the Customer’s Privacy Requirements n Start building a privacy framework now –Consumers are already educated to the threat –Before you are required to do so by law n Ensure that the framework –places the customer in complete control of how their privacy is managed and is… –open –controllable –extensible and flexible –enforceable

Building a Privacy Framework

The Way Privacy Policies Work Today PC Browser or WAP gateway Service provider’s web site Phone User browses to site requiring information or service 2 Site provides hypertext link to a human readable privacy policy 3 User has to manually read the policy in its entirety Human readable privacy policies are not effective. Very few users (less than 0.05% according to a recent survey) actually read the policy and therefore cannot realistically be considered to have given their informed consent to its terms

The Way P3P Policies Will Work PC Browser or WAP gateway Service provider’s web site Phone P3P plug-in module containing user’s privacy preferences 1 User browses to site requiring information or service 2 Site serves the client with its privacy policy 3 Client passes site privacy policy to a P3P plug-in which matches the sites policy with the preferences of the user. 4If site’s policy does not violate user’s preferences the site is displayed as normal. If the site’s policy violates the user’s preferences the user is alerted by the plug-in and can choose their next action 4 P3P requires that the client device be fitted with a dedicated plug-in module to interpret the site’s machine- readable privacy policy. Once personalized, this plug-in module is only available on the device in which it is installed and cannot be moved to other devices, that is to say a user’s privacy preferences do not follow them

What is Missing From P3P? n Negotiation when privacy terms are at variance n Signed copies of agreed privacy contract n Storage of the resulting contract in the user’s control n Support for bi-directional requests for information n Support for multi device access (i.e. PC, PDA, Phone) n Dispute resolution

Anatomy of the desired Privacy Framework 1 User selects a service requiring information 2 Site re-directs client to their agent because personal information is required 3 Client instructs agent to establish contact with service provider’s agent 4 Client's agent asks for details of information requested and the SP’s privacy contract 5 SP’s agent responds 6 Client’s agent supplies the information or negotiates variance to contract (can request client intervention if needed) 7 SP’s agent passes information to web site 8 Web site acknowledges receipt 9 SP’s agent returns receipt together with signed privacy ‘s contract to client agent where it is stored 10 & 11 Client's agent redirects client to the web site for service fulfillment PC Browser or WAP gateway Client’s agent Containing User-information and privacy Contract defaults Service provider’s web site Service Provider’s agent Containing business forms and privacy contract defaults Phone External databases or directories linked to client agent

Examining the Impact of Privacy on the Business Model

Recognizing the Current Business Model n The current business model for wireless eCommerce is based on the following….. –The merchant/portal/ service provider will pay slotting fees to gain access to a wireless carrier’s customers nThis only succeed whilst there is a wireless “walled garden” –The wireless carrier can secure a share of the revenue from the eCommerce transaction as a finder’s or broker’s fee nThis is lucrative whilst there is a sufficient margin to be shared or mCommerce is not a commodity service

Meeting the Business Plan For mCommerce n The business desires a relationship with a wireless carrier’s customers n The carrier hosts the customer’s agent under the customer’s control n The carrier allows businesses to extend links to the customer’s agent –Charges service providers a relationship fee for links to the customer’s agent –Linking (relationship) fees can be adjusted based on value of the information being shared between customer and business –Both customer and business can break the link at any time if the relationship becomes unprofitable or undesirable

The solution we are investigating n eXtensible Naming Service –Open source, open standard via XNSORG n Agent to Agent architecture –Auto/evoked transfer of data between agents –Privacy rules transferred with every data exchange –Linking and synchronization of exchanged data –Addressing scheme to allow agent discovery

How we see this Meeting our Privacy Challenge n Privacy of information under the customer’s control deprives the business –They currently have access and ownership of customer data with very few rules n Having moved that data into the customer’s control we can then provides mechanisms for the business to access it under rules dictated by the customer n In doing so, we creates links (synchronized) between customer and businesses –Provides businesses with a powerful customer retention tool and us a method of monitizing the relationship

Conclusions n Without adequate privacy, services requiring increasingly personal information will not succeed –Customers will become aware of the threat n Businesses must deploy a privacy framework before delivering context-sensitive value added services in order to avoid a user-revolt n Existing P3P privacy protocol does not sufficiently meet the needs expressed by our customers n We are investigating XNS as a the solution whereby we host the customer’s “agent” and develop profitable relationships by monitizing links between our customers and external businesses