You are here
Submitted by Scott Cleland on Wed, 2012-02-22 13:22
Since Privacy International ranked Google worst in the world for Privacy in its 2007 privacy survey for its unique “comprehensive consumer surveillance & entrenched hostility to privacy,” Google has had at least 24 more public scandals/controversies over privacy/security.
Submitted by Scott Cleland on Fri, 2012-02-17 16:20
(Note: The text in quotations are verbatim quotes from Google via a Politico post. The italics in [ ] is a satirical translation of what Google really is saying.)
“Google’s Rachel Whetstone, senior vice president for Communications and Public Policy issued the following statement to POLITICO regarding a WSJ report that the company has been bypassing the privacy settings of Apple's Web browser on iPhones and computers:”
“The Journal mischaracterizes what happened and why.”
“We used known Safari functionality to provide features that signed-in Google users had enabled.”
Submitted by Scott Cleland on Tue, 2012-01-31 12:17
Why are market forces so weak in protecting users’ online privacy?
The main reason is that the online marketplace is economically structured around users being a commodity, data, to be aggregated and mined, not customers to be served and protected in a competitive marketplace. That’s because the overriding economic force that created the free and open commercial Internet – the predominant Silicon Valley venture capital/IPO value creation model – was and remains largely antithetical to protecting online privacy.
The Silicon Valley venture capital/IPO driven model is laser-focused on achieving Internet audience/user scale fastest in order to gain first-mover advantage and then rapid dominance of a new product or service segment. This predominant Internet economic model is predicated on a precious few investments achieving such rapid user scale that it: warrants a buy-out at an enormous premium multiple; enables fast and exceptionally-profitable liquidity (via the new secondary derivative market for private venture shares or employee options); or broad liquidity via a public IPO.
What is the essential critical element of achieving audience/user scale fastest? Free. No direct cost to the user fuels fastest, frictionless, viral adoption. This free economic model presupposes online advertising as an eventual monetization mechanism and shuns products and services directly paid for by the user because their inherent time-to-market is too slow and their upfront sunk cost of sales and customer service is too high for this predominant value creation model.
Submitted by Scott Cleland on Fri, 2012-01-27 19:12
Reports that “Twitter Can Censor by Country” is a perfect example of how the world is changing the Internet. Change is a two-way street. Conventional wisdom that only assumes the Internet is changing the world risks being blind-sided by the Internet’s underappreciated exa-trend: how the world is changing the Internet.
See my Forbes Tech Capitalist post: "Twitter Realpolitik & the Sovereignization of the Internet" to learn about Twitter's new realpolitik and how sovereign powers will increasingly be asserting themselves vis a vis the Internet.
Submitted by Scott Cleland on Wed, 2012-01-11 16:25
Submitted by Scott Cleland on Wed, 2011-12-14 12:20
The House Manager’s Amendment to the pending House Stop Online Piracy Act (SOPA) fixed the major legitimate problems with the original bill, effectively isolating the small but extremely vociferous minority of SOPA opponents, especially Google.
See my Forbes Tech Capitalist post here for a political outlook of the SOPA/PIPA anti-piracy legislation, which is likely to become law in 2012.
Submitted by Scott Cleland on Mon, 2011-12-12 13:59
Many thanks to Adam Thierer of the Technology Liberation Front, for selecting my book, Search & Destroy, as a top twenty most Important Cyber-Law & Info-Tech Policy books of 2011 because “it represented the beginning of an articulation of a philosophy of “cyber-conservatism.” I also thank Adam for his critical and insightful review of Search & Destroy, which clearly delineates his principled cyber-libertarian differences with my principled “cyber-conservative” views.
Submitted by Scott Cleland on Fri, 2011-12-09 10:15
The kerfuffle painting the Google Wallet App as an innocent victim of Verizon blocking -- in violation of an "open" Internet and net neutrality regulations -- completely misses the forest for the trees. This conflict revolves around two ongoing industry battles.
Submitted by Scott Cleland on Wed, 2011-11-30 12:04
The likely passage of online anti-piracy legislation (SOPA/PIPA) in 2012 has put a spotlight on the substantial ad-based business interests aligned with piracy and against piracy enforcement.
See my Forbes Tech Capitalist post here to learn why Grand Theft Auto-mated is such big business and so anti-piracy enforcement.
Submitted by Scott Cleland on Tue, 2011-11-15 12:19
In compiling and ranking the top threats facing Google, I was amazed at the breadth, depth, diversity and seriousness of the threats and liabilities facing Google.
Please see my Forbes Tech Capitalist post here to learn the ranking of what threats to Google are most serious and why.