Can't you have both privacy and utility? Privacy protection opens up new horizons for business

Author: Yan strong

Source: Weizhong Bank Blockchain

 

Speaking of the world's data, points must be divided for a long time.

With the rapid development of computer software and hardware technology, the overall informatization of society has increased, and the value of data has gradually become more prominent, thus creating an information age of data collection, data extraction, and data realization. With the deepening of the commercialization of information technology, the hidden privacy risks of data collection are also increasing.

Marked by a series of laws and regulations and technical specifications such as the "People's Republic of China Cyber ​​Security Law", "Information Security Technology Personal Information Security Specifications", "Personal Financial Information Protection Technical Specifications", "Financial Distributed Ledger Technical Security Specifications" and other marks, privacy The refinement of protection legislation and the awakening of the awareness of data owners' rights and interests have further promoted the return of the unified data control right of the big platform to the scattered data owners.

Changing times, privacy demands and business utility seem to have evolved into a pair of contradictions that are difficult to reconcile, and business models that rely on data are challenging to maintain sustainable growth.

How to solve this dilemma? Here, we will share some thoughts on the relationship between privacy protection and modern commercial reciprocity from the perspective of exploring business opportunities: how to resolve the conflict of claims between the protection of owner's rights and the transformation of commercial interests with the help of technical means, and realize the two Symbiosis.

Clarify the objects and scope of privacy protection

First, we need to clarify the objects and categories of privacy protection.

When it comes to private data, the first impression is mostly related to individual users, such as identity, whereabouts, purchase behavior, etc., but the scope of private data is not limited to this. Any data that is not willing to be publicly disclosed is essentially, such as internal business data The owner of the corresponding data ownership, correspondingly the data owner, should be protected.

Private data is called private data because it has special value to the owner of the data and usually reflects the owner ’s unique identity or other sensitive information. Compared with public data, private data has higher information entropy and can provide better individual discrimination in the commercialization of information.

This is especially true for commercial activities that take swap as the essence, because it not only increases the possibility of finding potential exchange counterparties, but also provides scarce information to determine a more reasonable exchange price.

At present, information service platforms whose main profit model is to match the needs of buyers and sellers, such as e-commerce, search, online advertising, etc., one of the most core competitiveness comes from such data.

Risk analysis of commercial privacy data

The greater the amount of privacy data that the platform brings together, the greater the commercial value that it generates, but it will also make privacy risks "mine".

Privacy protection legislation is gradually improving, and data commercial needs to be legal and compliant

In addition to the privacy protection laws and regulations, in addition to regulating the applicable scope and use restrictions of private data, the original intention is to return control and profit rights of private data to the data owner.

Awareness of data owner protection rises

In the current society, the commercialization of information technology is no longer a new thing. After years of user education, data owners have gradually realized the value of their own private data and the risks of sharing private data. Compared to earlier days, more and more data owners actively explore the value of this type of exchange process, begin to conduct risk assessments on it, and selectively participate in the value exchange process of private data.

If the use of a product faces more than expected privacy risks, a reasonable data owner is likely to make the following choices:

1) Continue to use the product but give false data.

2) Discard the product or switch to a replaceable product of the same type.

The rise of the protection consciousness of data owners, coupled with the improvement of privacy protection legislation and the evolution of privacy data control from concentration to differentiation, will present a series of major challenges to existing business models that use data as the main driving force. . The key to solving the challenge lies not in the zero-sum game between the owner of the data and the user of the data, but in how to align the interests of the two in order to achieve the optimal benefits together.

Expected effect of four layers of privacy protection technology

In resolving the conflict between the privacy protection of data owners and the transformation of commercial interests, we need to introduce privacy protection technologies.

Due to space limitations, this article only outlines the four expected effects of privacy protection technology to resolve conflicts. The scientific theory, technical solutions and case analysis of privacy protection will be shared in subsequent tweets.

The first layer of privacy protection technology: enhanced data transparency

Technical means can reduce the user's cognitive cost and make it easier to understand key data such as what data will be collected and how it will be used to better assess their own risks.

The intelligent recommendation model is appropriately introduced, and a reasonable judgment is automatically made according to the risk preference preset by the user, so as to reduce the potential loss caused by the reduced user participation due to the risk uncertainty.

The second effect of privacy protection technology: enhance data privacy

Technical means can ensure that users cannot be attributed to individuals even if they share sensitive information, so as to increase users' willingness to share real data and reduce potential losses caused by users giving false data due to too sensitive information.

The third layer of privacy protection technology: enhanced data control

Technical means can ensure that private data can only be used in an "authorized" manner. In other cases, data cannot be used at all, further increasing users' willingness to participate in value exchange.

In particular, as the owner of the data, under the premise of protecting the confidentiality of the company's own business data, it can securely develop joint data businesses and promote new business cooperation models.

The fourth layer of privacy protection technology: enhance data collaboration

The privacy protection technology has certain technical theoretical thresholds, and the practice-proven privacy protection technology solutions are relatively limited, which is conducive to the standardization of data interfaces in the industry, reduces the collaboration cost of joint business data between enterprises, and promotes more privacy-friendly business cooperation. The establishment of a regulatory system will ultimately promote the technological upgrading of the entire industry.

It is: Talking about the privacy of information attracting attention, creating opportunities for business and creating new horizons!

The value of privacy protection technology is gradually being demonstrated, and the privacy protection legislation of countries around the world is gradually improving. How can companies ride the waves and effectively achieve legal compliance in the process of business exploration and innovation? Stay tuned for the next breakdown.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Exchanges are temporarily withdrawing cash, data is garbled, or the Amazon server failure in Tokyo

According to Yahoo Japan, the Amazon Web service failed at around 13:00 on August 23, 2019. The service that failed w...

Blockchain

Hackers are getting smarter, with the largest number of exchange attacks ever in 2019

Source | bitcoinmagazine Translation | Huohuo Sauce Production | Blockchain Camp (ID: blockchain_camp) Currently, maj...

Blockchain

Behind Alipay and WeChat Joint "Sniper" Coin: Competition in cryptocurrency stocks

Text | Mutual Chain Pulse · Liang Shan Hua Rong Zhao Changpeng and He Yi did not expect that the road to returni...

Blockchain

The undead black swan: from ICO to IEO

If you want to discuss the biggest hot spot in the currency this year, many people will say that it is IEO. The curre...

Policy

Jurors buckle up as Sam Bankman-Fried's criminal trial takes off with riveting jury directions

SBF faces seven charges of financial fraud in connection with FTX's downfall in November.

Blockchain

Zhongying Internet publicly claimed that it is preparing for the first of the A-share listed companies in the digital currency trading platform.

This article Source: Finance Network · Chain Finance , the original title "Save capital chain break risk A-...