Refine
Document Type
Is part of the Bibliography
- no (2)
Keywords
- Akquise (1)
- Coopetition (1)
- Data Profiling (1)
- Data Protection Laws (1)
- Disruption (1)
- Fast Follower (1)
- Innovation (1)
- Innovation-Lab (1)
- Outsourcing (1)
- Personal Information Management (1)
Institute
Personal user data is collected and processed at large scale by a handful of big providers of Internet services. This is detrimental to users, who often do not understand the privacy implications of this data collection, as well as to small parties interested in gaining insights from this data pool, e.g., research groups or small and middle-sized enterprises. To remedy this situation, we propose a transparent and user-controlled data market in which users can directly and consensually share their personal data with interested parties for monetary compensation. We define a simple model for such an ecosystem and identify pressing challenges arising within this model with respect to the user and data processor demands, legal obligations, and technological limits. We propose myneData as a conceptual architecture for a trusted online platform to overcome these challenges. Our work provides an initial investigation of the resulting myneData ecosystem as a foundation to subsequently realize our envisioned data market via the myneData platform.
Disruptive innovations confront companies with great challenges. Leading companies are losing their market position to disruptive competitors and are forced to react instantly to defend their position in the market. Companies not only lack knowledge of various strategic options that have been successfully used against disruptive attackers, they also do not know about the effects of these different strategic options on their own company. On the basis of a use case analysis, 30 companies were examined with regard to their strategic reaction on a disruptive attacker. In the evaluation of the use cases, the strategic options were grouped into clusters, from which seven master strategies could be identified. These seven master strategies were then transformed into a regulatory framework, which differentiates between reactive and proactive strategies and classifies them according to their intensity. With the help of the identified master strategies, companies will be able to identify options for action in competition with disruptive attackers, thus giving them greater chances of success in the defense of their market position. In addition, companies can use the master strategies to prepare an emergency strategy even before a disruptive attacker appears on the market, thus significantly minimizing the risk of customer loss.