Can't you have both privacy and utility? Privacy protection opens up new horizons for business

Author: Yan strong

Source: Weizhong Bank Blockchain

 

Speaking of the world's data, points must be divided for a long time.

With the rapid development of computer software and hardware technology, the overall informatization of society has increased, and the value of data has gradually become more prominent, thus creating an information age of data collection, data extraction, and data realization. With the deepening of the commercialization of information technology, the hidden privacy risks of data collection are also increasing.

Marked by a series of laws and regulations and technical specifications such as the "People's Republic of China Cyber ​​Security Law", "Information Security Technology Personal Information Security Specifications", "Personal Financial Information Protection Technical Specifications", "Financial Distributed Ledger Technical Security Specifications" and other marks, privacy The refinement of protection legislation and the awakening of the awareness of data owners' rights and interests have further promoted the return of the unified data control right of the big platform to the scattered data owners.

Changing times, privacy demands and business utility seem to have evolved into a pair of contradictions that are difficult to reconcile, and business models that rely on data are challenging to maintain sustainable growth.

How to solve this dilemma? Here, we will share some thoughts on the relationship between privacy protection and modern commercial reciprocity from the perspective of exploring business opportunities: how to resolve the conflict of claims between the protection of owner's rights and the transformation of commercial interests with the help of technical means, and realize the two Symbiosis.

Clarify the objects and scope of privacy protection

First, we need to clarify the objects and categories of privacy protection.

When it comes to private data, the first impression is mostly related to individual users, such as identity, whereabouts, purchase behavior, etc., but the scope of private data is not limited to this. Any data that is not willing to be publicly disclosed is essentially, such as internal business data The owner of the corresponding data ownership, correspondingly the data owner, should be protected.

Private data is called private data because it has special value to the owner of the data and usually reflects the owner ’s unique identity or other sensitive information. Compared with public data, private data has higher information entropy and can provide better individual discrimination in the commercialization of information.

This is especially true for commercial activities that take swap as the essence, because it not only increases the possibility of finding potential exchange counterparties, but also provides scarce information to determine a more reasonable exchange price.

At present, information service platforms whose main profit model is to match the needs of buyers and sellers, such as e-commerce, search, online advertising, etc., one of the most core competitiveness comes from such data.

Risk analysis of commercial privacy data

The greater the amount of privacy data that the platform brings together, the greater the commercial value that it generates, but it will also make privacy risks "mine".

Privacy protection legislation is gradually improving, and data commercial needs to be legal and compliant

In addition to the privacy protection laws and regulations, in addition to regulating the applicable scope and use restrictions of private data, the original intention is to return control and profit rights of private data to the data owner.

Awareness of data owner protection rises

In the current society, the commercialization of information technology is no longer a new thing. After years of user education, data owners have gradually realized the value of their own private data and the risks of sharing private data. Compared to earlier days, more and more data owners actively explore the value of this type of exchange process, begin to conduct risk assessments on it, and selectively participate in the value exchange process of private data.

If the use of a product faces more than expected privacy risks, a reasonable data owner is likely to make the following choices:

1) Continue to use the product but give false data.

2) Discard the product or switch to a replaceable product of the same type.

The rise of the protection consciousness of data owners, coupled with the improvement of privacy protection legislation and the evolution of privacy data control from concentration to differentiation, will present a series of major challenges to existing business models that use data as the main driving force. . The key to solving the challenge lies not in the zero-sum game between the owner of the data and the user of the data, but in how to align the interests of the two in order to achieve the optimal benefits together.

Expected effect of four layers of privacy protection technology

In resolving the conflict between the privacy protection of data owners and the transformation of commercial interests, we need to introduce privacy protection technologies.

Due to space limitations, this article only outlines the four expected effects of privacy protection technology to resolve conflicts. The scientific theory, technical solutions and case analysis of privacy protection will be shared in subsequent tweets.

The first layer of privacy protection technology: enhanced data transparency

Technical means can reduce the user's cognitive cost and make it easier to understand key data such as what data will be collected and how it will be used to better assess their own risks.

The intelligent recommendation model is appropriately introduced, and a reasonable judgment is automatically made according to the risk preference preset by the user, so as to reduce the potential loss caused by the reduced user participation due to the risk uncertainty.

The second effect of privacy protection technology: enhance data privacy

Technical means can ensure that users cannot be attributed to individuals even if they share sensitive information, so as to increase users' willingness to share real data and reduce potential losses caused by users giving false data due to too sensitive information.

The third layer of privacy protection technology: enhanced data control

Technical means can ensure that private data can only be used in an "authorized" manner. In other cases, data cannot be used at all, further increasing users' willingness to participate in value exchange.

In particular, as the owner of the data, under the premise of protecting the confidentiality of the company's own business data, it can securely develop joint data businesses and promote new business cooperation models.

The fourth layer of privacy protection technology: enhance data collaboration

The privacy protection technology has certain technical theoretical thresholds, and the practice-proven privacy protection technology solutions are relatively limited, which is conducive to the standardization of data interfaces in the industry, reduces the collaboration cost of joint business data between enterprises, and promotes more privacy-friendly business cooperation. The establishment of a regulatory system will ultimately promote the technological upgrading of the entire industry.

It is: Talking about the privacy of information attracting attention, creating opportunities for business and creating new horizons!

The value of privacy protection technology is gradually being demonstrated, and the privacy protection legislation of countries around the world is gradually improving. How can companies ride the waves and effectively achieve legal compliance in the process of business exploration and innovation? Stay tuned for the next breakdown.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Discussing the SEC's lawsuit against Binance: Years of regulatory balance disrupted, optimistic about the final outcome

Currently, the SEC and Binance's feud only reflects one fact: the imbalanced "ambiguous" regulatory relationship in t...

Opinion

Former close friend to testify against SBF, list of other witnesses revealed.

SBF's trial started on October 2nd, and his once closest friends will testify in court, becoming his biggest threat. ...

Blockchain

A number of exchanges will openly call the FATF proposal at the G20 opening meeting

The G20 summit of the G20, which everyone is paying attention to, will be held on June 28 and 29, 2019 in Osaka, Japa...

Policy

FTX Customers Buckle Up! $9B Shortfall Claim Payout Expected to Roll Out by Mid-2024

Good news for fashion lovers! FTX has reached a settlement with their debtors and creditors, potentially returning $9...

Opinion

Vitalik said he has never sold ETH for personal gain, we took stock of his personal and charitable wallets

Even if Vitalik Buterin occasionally sells some ETH, it will not have a significant impact on the long-term developme...

Blockchain

Why did the mining pool business become the "sweet bun" of the exchange?

The three major domestic institutes are all involved in the mining pool business. As an exchange, how to use its own ...