Difference between revisions of "Nstic-mit-privacy"
(→FILE NOTESNational Strategy for Trusted Identities in CyberspacePrivacy Workshop) |
(→June 27-28, 2011 / MIT Media Lab / Boston, Mass.) |
||
Line 5: | Line 5: | ||
===June 27-28, 2011 / MIT Media Lab / Boston, Mass.=== | ===June 27-28, 2011 / MIT Media Lab / Boston, Mass.=== | ||
<small>[http://www.densmoreassociates.com By Bill Densmore]</small><br><br> | <small>[http://www.densmoreassociates.com By Bill Densmore]</small><br><br> | ||
− | Hash tags: #nstic.mit #nstic | + | Hash tags: #nstic.mit #nstic |
===SPEAKER: Keynote and host -- Sandy Pentland, MIT Media Lab=== | ===SPEAKER: Keynote and host -- Sandy Pentland, MIT Media Lab=== |
Revision as of 12:36, 27 June 2011
QUICKLINKS:
WHITE PAPER / INFOTRUST / INFOVALET / RJI ONLINE
FILE NOTES
National Strategy for Trusted Identities in Cyberspace
Privacy Workshop
June 27-28, 2011 / MIT Media Lab / Boston, Mass.
By Bill Densmore
Hash tags: #nstic.mit #nstic
SPEAKER: Keynote and host -- Sandy Pentland, MIT Media Lab
Keynote speaker Alex “Sandy” Pentland, former head of the Media Lab. He is pioneer of the mobile social web:
“Personal data is the new oil of the internet and the new currency of the diital world.” Meglena Kuneva, European Consumer Commissioner.
Telcoms have to collect personal data to make money. “They see this as their way forward. …. Most large media companies see this as their route back to profitability.”
In two years there will be 200 million medicial devices on and inside people, according to executive at Qualcomm.
“All the private data about people coming through one channel . . . that’s the real point of pain here . . . do not be distracted by Facebook or Google.”
SPEAKER: Jeremy Grant: Personal data: The emergence of a new asset class
“The only people you can trust with this data, are the people themselves. People have to have ownership of their data,” he says. So how do you promote ownership of personal data by the people themselves. Key is to think if data as valuable.
“Companies are willing to do this, because if they give you a copy of your data . . . you have the ability to use it in whatever value-producing way you choose.”
- Privacy-enhancing and voluntary -- user choice of providers
- Secure and resilient
- Interoperabie
- Cost-effective and easy to use
=What problems are sought to be solved?
- User names and passwords are broken
- Identity-theft costs are rising – 11.7M victims, $17.3B cost over two years
- Cybercrime is also on the rise