CVS update: openprivacy/htdocs/notes

From: cvs@openprivacy.org
Date: Tue Feb 27 2001 - 22:22:10 PST

  • Next message: cvs@openprivacy.org: "CVS update: openprivacy/htdocs/includes"

    Date: Tuesday February 27, 19101 @ 22:22
    Author: fen
    CVSWEB Options: -------------------

    Main CVSWeb: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi

    View this module: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes

    -----------------------------------

    Update of /usr/local/cvs/public/openprivacy/htdocs/notes
    In directory giga:/home/fen/projects/openprivacy/htdocs/notes

    Modified Files:
            whitepaper.shtml
    Log Message:
    removed background section - placed on web site

    *****************************************************************
    File: openprivacy/htdocs/notes/whitepaper.shtml

    CVSWEB Options: -------------------

    CVSWeb: Annotate this file: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes/whitepaper.shtml?annotate=1.28

    CVSWeb: View this file: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes/whitepaper.shtml?rev=1.28&content-type=text/x-cvsweb-markup

    CVSWeb: Diff to previous version: http://openprivacy.org/cgi-bin/cvsweb/cvsweb.cgi/openprivacy/htdocs/notes/whitepaper.shtml.diff?r1=1.28&r2=1.27

    -----------------------------------

    Index: openprivacy/htdocs/notes/whitepaper.shtml
    diff -u openprivacy/htdocs/notes/whitepaper.shtml:1.27 openprivacy/htdocs/notes/whitepaper.shtml:1.28
    --- openprivacy/htdocs/notes/whitepaper.shtml:1.27 Tue Feb 27 22:04:13 2001
    +++ openprivacy/htdocs/notes/whitepaper.shtml Tue Feb 27 22:22:10 2001
    @@ -9,7 +9,7 @@
       </head>
       <body bgcolor="#ffffff">
     
    - <!-- $Id: whitepaper.shtml,v 1.27 2001/02/28 06:04:13 fen Exp $ -->
    + <!-- $Id: whitepaper.shtml,v 1.28 2001/02/28 06:22:10 fen Exp $ -->
         
         <h1>OpenPrivacy - Building a Better Internet</h1>
     
    @@ -362,168 +362,6 @@
             strike a deal with B to provide her with the editorial filtering
             process, saving A time and aiding B at least in reputation if not
             also financially.
    - </p>
    - </blockquote>
    - <h2><a name="overview">Background</a></h2>
    - <blockquote>
    - <h3>What a Profile Is (and How Profile Data Is Used)</h3>
    - <p>
    - When we talk of a person's <i>profile</i> we are referring to a
    - store of information that may include one's name, age, gender, phone
    - number, postal or electronic mail address, purchase history, web
    - surfing habits, subscriptions or any of a multitude of personal
    - preferences, traits and abilities. Often, a persistent cookie is
    - deposited by a company's web site on one's computer or other
    - personal information device so that the company can track the
    - individual's behavior as they browse the company's site. More
    - advanced systems, such as those used by DoubleClick, can track a
    - person from site to site. The capability to accumulate and
    - cross-reference this data is what supports the multi-billion dollar
    - direct marketing industry.
    - </p>
    - <h3>Data Mining</h3>
    - <p>
    - Technology enables the collection and storage of vast quantities of
    - data. Finding, summarizing, and creating models of the patterns,
    - trends and projections from this data is what <i>data mining</i> is
    - all about. It is a marriage of statistics, machine learning,
    - information theory and computing that has formed a mathematical
    - base for a science that has increasingly powerful tools at its
    - disposal. In particular, direct marketers have created data mining
    - techniques that allow them to pinpoint desired market segments for
    - inclusion in their advertising and marketing campaigns.
    - </p>
    - <p>
    - The manner in which personal (profile) information is collected
    - and used today is grossly inefficient not to mention a massive
    - violation of privacy. It [current standard practice] developed
    - over the course of the last hundred years as capitalism matured
    - and corporations grew more powerful. New, precise mechanisms
    - could replace the current shotgun approach, but Industry is so far
    - along the path paved by their marketers that they can't see the
    - opportunity. (Remember that the marketers were originally
    - beholden to Industry, but now Industry is beholden to the
    - marketers.) Their fear, reinforced by the marketers, is that
    - without a person's name, address, phone number and/or email address,
    - they will not be able to reach the people who may be most interested
    - in the products or services that they are trying to sell.
    - </p>
    - <blockquote>
    - <p>
    - [From: <i>Web-Mining: New Data Tools to Manage Web Strategy</i>
    - &lt;<a
    - href="http://www.the-dma.org/cgi/dispnewsstand?article=244">http://www.the-dma.org/cgi/dispnewsstand?article=244>&gt;
    - <font color=red>This is copyrighted - paraphrase!</font>]
    - </p>
    - <p>
    - There are three interdependent types of Web mining: usage,
    - structure, and content mining.
    - </p>
    - <p>
    - Usage mining is concerned with the discovery of site access
    - patterns as logged in server access logs. The types of analysis
    - range from custom reporting, usage profiling and banner ad
    - targeting, to real-time recommendations and cross-sale analysis,
    - to such CRM applications as customer attraction, segmentation,
    - retention and Web-time value.
    - </p>
    - <p>
    - Web structure mining refers to the application of data mining
    - techniques to improve the structure and design of Web
    - pages/sites. Structure mining could help assess the problem areas
    - on your sites, such as major traversal paths associated with quick
    - exits, preferred paths customers take to get to specific areas of
    - the site, and paths that lead to sales and cross-sales. Studies
    - show that people are gravitating to sites that deliver products
    - and services customized to their needs.
    - </p>
    - <p>
    - Web content mining is the mining of the content of Web pages and
    - refers to the automated search, extraction and classification of
    - primarily textual content information resources available
    - on-line. Application areas include customer support/service,
    - automated e-mail routing and reply, and knowledge management, such
    - as document clustering, content categorization, and keyword
    - extraction and associations.
    - </p>
    - </blockquote>
    - <h3>Collaborative Filtering and Recommendation Systems</h3>
    - <p>
    - The data mining of anonymous data can have its uses, as in simple
    - collaborative filtering systems. These systems collect inputs
    - from many potentially anonymous people on a particular subject
    - (say, what their current favorite movie is) and then average the
    - results and come up with recommendations. This works with
    - reasonable accuracy in a well behaved populace - that is, within a
    - group that does not have shills and spoofers that may attempt to
    - throw the decision one way or the other by flooding the system
    - with bogus or weighted inputs.
    - </p>
    - <h3>Direct ("One-to-One") Marketing</h3>
    - <p>
    - For traditional direct marketing mechanisms to work, profile data
    - must be linkable to the people that it refers to so that they may be
    - reached by phone, mail (electronic or physical), banner ads or
    - regional advertising campaigns. The value of such information is
    - immense. One vivid example can be seen in the acquisition of
    - Hotmail by Microsoft for a total of $395 million. While the
    - software to create such a system was trivial, what Microsoft
    - actually bought was the access to Hotmail's 10 million users.
    - Another view as to the value of personal profile information can be
    - seen by looking at the sales figures attributed to direct marketing:
    - <blockquote>
    - U.S. sales revenue attributable to direct marketing is estimated to
    - reach more than $1.7 trillion in 2000. Through 2005, sales are
    - estimated to grow by 9.6 percent annually to reach $2.7 trillion.
    - [<i>Economic Impact: U.S. Direct Marketing Today Executive
    - Summar</i> &lt;<a
    - href="
    http://www.the-dma.org/library/publications/libres-ecoimpact2.shtml">http://www.the-dma.org/library/publications/libres-ecoimpact2.shtml>&gt;]
    - </blockquote>
    - </p>
    - <p>
    - Further, the Direct Marketing Association predicts that "Direct
    - Marketing's E-Growth Projected to Exceed Rest Of Web In 2001" (see
    - &lt;<a
    - href="
    http://www.the-dma.org/cgi/dispnewsstand?article=238">http://www.the-dma.org/cgi/dispnewsstand?article=238>&gt;).
    - </p>
    - <h3>Privacy Concerns</h3>
    - <p>
    - Once all this data is collected, there are many ways that it can be
    - used and disseminated by the corporations and government agencies
    - that obtain it. In the simplest cases, one's profile data may be
    - mined for direct mail or demographically-directed marketing
    - campaigns. But it may also be used to determine health care and
    - insurance premiums, credit ratings, and any of a myriad of other
    - uses that the trillion dollar marketing industry may find useful.
    - </p>
    - <p>
    - While it is reasonable that a vendor can check one's credit before
    - extending same, should that vendor then be allowed to sell that
    - credit information - attached to your name and address - to any and
    - all takers? And as mentioned above, such trade in personal
    - information is not limited to one's credit-worthiness, but also
    - includes school, work and health records, purchase and travel
    - history, and even sexual preferences. It is clear why many privacy
    - advocates are raising alarms as we become the most tracked and
    - watched society.
    - </p>
    - <p>
    - While companies involved in e-commerce are placing "privacy policy"
    - decalarations linked from their home page, they may change these
    - without warning at any time <font color=red>[insert Amazon
    - reference here]</font> or perhaps simply get bought, as with
    - Hotmail discussed above. In Europe, there are strong laws that
    - govern the collection and storage of profile data. These statutes
    - allow for only the collection of data needed for a transaction
    - (such as a credit report) and require that this data be destroyed
    - when no longer needed. However, the United States offers no such
    - protection, and as activists raise concerns, they are met with an
    - industry that offers only "voluntary compliance" with no legal
    - means to enforce adherance to any particular policy.
    - </p>
    - <p>
    - [Privacy page from the DMA: &lt;<a
    - href="
    http://www.the-dma.org/library/privacy/index.shtml">http://www.the-dma.org/library/privacy/index.shtml>&gt;]
           </p>
         </blockquote>
         <h2>References</h2>



    This archive was generated by hypermail 2b30 : Tue Feb 27 2001 - 22:22:11 PST