{"id":1041,"date":"2009-05-23T14:27:37","date_gmt":"2009-05-23T22:27:37","guid":{"rendered":"\/?p=1041"},"modified":"2009-05-23T14:50:20","modified_gmt":"2009-05-23T22:50:20","slug":"kim-cameron-secret-riaa-agent","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1041","title":{"rendered":"Kim Cameron: secret RIAA agent?"},"content":{"rendered":"<p><a href=\"http:\/\/vquill.com\/\">Dave Kearns<\/a> cuts me to the polemical quick by <a href=\"http:\/\/vquill.com\/2009\/05\/kim-cameron-secret-riaa-agent.html\" class=\"broken_link\">tarring me <\/a>with the\u00a0smelly brush of the RIAA:<\/p>\n<p style=\"padding-left: 30px;\">&#8216;Kim has an interesting <a href=\"\/?p=1040\"><span style=\"color: #0069c3;\">post<\/span><\/a> today, referencing an article (&#8220;<a href=\"http:\/\/www.nytimes.com\/2009\/05\/17\/magazine\/17credit-t.html?pagewanted=1&amp;_r=1&amp;sq=The\" class=\"broken_link\"><span style=\"color: #0069c3;\">What Does Your Credit-Card Company Know About You?<\/span><\/a>&#8221; by Charles Duhigg in last week\u2019s New York Times.<\/p>\n<p style=\"padding-left: 30px;\">&#8216;Kim correctly points out the major fallacies in the thinking of J. P. Martin, a &#8220;math-loving executive at Canadian Tire&#8221;, who, in 2002, decided to analyze the information his company had collected from credit-card transactions the previous year. For example, Martin notes that &#8220;2,220 of 100,000 cardholders who used their credit cards in drinking places missed four payments within the next 12 months.&#8221; But that&#39;s barely 2% of the total, as Kim points out, and hardly conclusive evidence of anything.<\/p>\n<p style=\"padding-left: 30px;\">&#8216;I&#39;m right with Cameron for most of his essay, up til the end when he notes:<\/p>\n<p style=\"padding-left: 60px;\">&#8220;<span style=\"FONT-STYLE: italic\">When we talk about the need to prevent correlation handles and assembly of information across contexts (for example, in the Laws of Identity and our discussions of anonymity and minimal disclosure technology), we are talking about ways to begin to throw a monkey wrench into an emerging Martinist machine. Mr. Duhigg\u2019s story describes early prototypes of the machinations we see as inevitable should we fail in our bid to create a privacy enhancing identity infrastructure for the digital epoch.<\/span>&#8220;<\/p>\n<p style=\"padding-left: 30px;\">&#8216;Change &#8220;privacy enhancing&#8221; to &#8220;intellectual property protecting&#8221; and it could be a quote from an RIAA press release!<\/p>\n<p style=\"padding-left: 30px;\">&#8216;We should never confuse tools with the bad behavior that can be helped by those tools. Data correlation tools, for example, are vitally necessary for automated personalization services and can be a big help to future services such as Vendor Relationship Management (<a href=\"http:\/\/cyber.law.harvard.edu\/projectvrm\/Main_Page\"><span style=\"color: #0069c3;\">VRM<\/span><\/a>) . After all, it&#39;s not Napster that&#39;s bad but people who use it to get around copyright laws who are bad. It isn&#39;t a cup of coffee that&#39;s evil, just people who try to carry one thru airport security. \ud83d\ude42<\/p>\n<p style=\"padding-left: 30px;\">&#8216;It is easier to forbid the tool rather than to police the behavior but in a democratic society, it&#39;s the way we should act.&#8217;<\/p>\n<p>I agree that we must influence behaviors as well as develop tools.\u00a0 And I&#39;m as positive about Vendor Relationship Management as anyone.\u00a0 But getting concrete, there&#39;s a\u00a0huge gap\u00a0between the kind of data correlation done at a person&#39;s request as part of a relationship\u00a0(VRM), and the data correlation I described in my post that is done without\u00a0a person&#39;s consent or knowledge.\u00a0 As VRM&#39;s <a href=\"http:\/\/blogs.law.harvard.edu\/doc\/\">Saint Searls<\/a> has <a href=\"http:\/\/twopointouch.com\/2008\/02\/28\/so-this-vrm-thing\/\">said<\/a>, \u201cSometimes, I don&#39;t want a deep relationship, I just want a cup of coffee\u201d.\u00a0\u00a0<\/p>\n<p>I&#39;ll come clean with an example.\u00a0 Not a month ago, I was visiting friends in Canada, and since I had an &#8220;extra\u00a0car&#8221;, was\u00a0nominated to go pick up\u00a0some new barbells for the kids.\u00a0<\/p>\n<p>So, off to Canadian Tire to buy a barbell.\u00a0 Who knows what category they put\u00a0me in when 100% of my annual consumption consists of barbells?\u00a0 It had to be right up there with low-grade oil or even a Mega Thruster Exhaust System.\u00a0 In this case, Dave, there\u00a0was no R\u00a0and certainly no\u00a0VRM: I didn&#39;t ask to be profiled by Mr. Martin&#39;s reputation machines.<\/p>\n<p>There is nothing about miminal disclosure that says profiles cannot be constructed when people want that.\u00a0 It simply means that information should only be collected in light of a specific usage, and that usage should be clear to the parties involved (NOT the case with Canadian Tire!).\u00a0 When there is no legitimate reason for collecting information, people should be able to avoid it.\u00a0<\/p>\n<p>It all boils down to the matter of\u00a0people being &#8220;in control&#8221; of their digital interactions, and of developing technology that makes this both possible and likely.\u00a0\u00a0How can you compare an automated profiling service you can turn on and off with one such as Mr. Martin thinks should rule the world of credit?\u00a0 The difference between the two is\u00a0a bit like the difference between a consensual sexual relationship and one based on force.<\/p>\n<p>Returning to the RIAA, in my view Dave is barking up the wrong metaphor.\u00a0\u00a0RIAA\u00a0is\u00a0NOT producing tools that put people in control of their relationships or property &#8211; quite the contrary.\u00a0\u00a0And they&#39;ll pay for that.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not really.  Dave is barking up the wrong metaphor.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49,6,17,40,69],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1041"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1041"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1041\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}