Amazon Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 4 November 2009

Obfuscating customer behaviour to maintain privacy

Posted on 03:30 by Unknown
Listening to a discussion about telecom operators aggregating customer data, profiling people based on behavioural software and so on. Not surprisingly, there's the usual questions about privacy, peoples' dislike of personal advert-targetting and so forth.

Don't get me wrong, some of this stuff may be useful in terms of making sure adverts are more interesting and entertaining. But many people (and some countries' legal systems) will take an exceptionally dim view of telco data mining. It fits a bit into what I mentioned last week about the "social web" last week - who really wants all their contacts and behaviour and calls and traffic aggregated and analysed?

For those who do value their privacy, I see a broad set of options emerging to ensure fragmentation will endure. Firstly, the ability to share and federate anonymised connectivity via devices using Joiku Boost or MiFi-type connection sharing. And then I would also expect to see software that makes decoy calls/SMS's with your "spare" minutes and texts, or visits random websites on your flatrate data plan. That should make for some interesting "social graph" analysis.... lastly, I expect a fair amount of messaging or other traffic to be extracted by independent platforms like Facebook (and maybe Vodafone 360)...
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Quick musing on Cloud Computing
    I just heard the phrase "Everything as a Service" during a presentation on Cloud, SaaS and other forms of managed service offering...
  • New Cisco VNI traffic report out
    One of the broadband industry's "bibles" has been published in a 2010 edition . Cisco's "Visual Networking Index...
  • Pre-MWC notes for analyst relations staff
    OK, it's the time of the year when I get bombarded by emails and phone calls from a million people inviting me to briefings and similar ...
  • Apple, embedded SIMs, NFC and mobile payments - some speculation
    I wonder if I've just managed to join up the dots on something rather important: - Recent reports suggest that Apple is intending to use...
  • Hosted mobile services in the recession - Caveat Emptor
    I used to work as an equity analyst at an investment bank back in 2000-2001. I remember an unending stream of first generation Application S...
  • "You can't use my eyeballs for free"
    Let's look forward 10 years. We've all got augmented reality browsers on our handsets, or perhaps our 4G-connected sunglasses. They ...
  • Mobile broadband traffic - be careful about language
    I am currently writing a Disruptive Analysis research report on mobile broadband traffic management strategies. I have discussed various c...
  • Mobile traffic management - the Inter-technology war begins
    I've been following the proliferation of mobile broadband traffic management technologies for some considerable time now, having publish...
  • Mobile websites
    I am getting increasingly annoyed with mobile versions of websites. I really wish there was a way of configuring handset browsers (I'm ...
  • Mobile operators' future voice strategies decoded
    Apologies in advance, but this blog post is deliberately a bit of a tease. I'm not going to spell out the answer here, as it's too v...

Blog Archive

  • ►  2013 (31)
    • ►  October (2)
    • ►  September (3)
    • ►  August (1)
    • ►  July (2)
    • ►  June (6)
    • ►  May (5)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (46)
    • ►  December (5)
    • ►  November (4)
    • ►  October (3)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (1)
    • ►  May (6)
    • ►  April (4)
    • ►  March (1)
    • ►  February (9)
    • ►  January (4)
  • ►  2011 (73)
    • ►  December (4)
    • ►  November (10)
    • ►  October (8)
    • ►  September (6)
    • ►  August (3)
    • ►  July (5)
    • ►  June (7)
    • ►  May (9)
    • ►  April (4)
    • ►  March (7)
    • ►  February (6)
    • ►  January (4)
  • ►  2010 (130)
    • ►  December (4)
    • ►  November (10)
    • ►  October (10)
    • ►  September (6)
    • ►  August (9)
    • ►  July (7)
    • ►  June (19)
    • ►  May (19)
    • ►  April (11)
    • ►  March (18)
    • ►  February (7)
    • ►  January (10)
  • ▼  2009 (126)
    • ►  December (4)
    • ▼  November (14)
      • Does anyone really want to converge mobile social ...
      • Tethering and mobile connection-sharing. Microsoft...
      • SMS spam advertising - completely unacceptable
      • A quick way of deciding if you're being ripped off...
      • Is it worth going to MWC next February?
      • The quadplay myth
      • Some thoughts on Android
      • Operators should push vendors & silicon companies ...
      • Thought experiment - two-sided broadband models
      • OneVoice for LTE + IMS : Necessary but not sufficient
      • Music industry: stop whingeing
      • Finally, an MNO breaks the service/access link. Vo...
      • Obfuscating customer behaviour to maintain privacy
      • Telling anecdote about US views on prepay mobile
    • ►  October (9)
    • ►  September (8)
    • ►  August (9)
    • ►  July (10)
    • ►  June (21)
    • ►  May (14)
    • ►  April (2)
    • ►  March (11)
    • ►  February (15)
    • ►  January (9)
  • ►  2008 (94)
    • ►  December (24)
    • ►  November (26)
    • ►  October (25)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile