Tag: Joe Andrieu

VRM Mojo Working

Think of the industrialized world as Kansas and the Internet as Oz. The difference is actually more radical than that, because the Internet is real. From the perspective of industry, the Internet is actually surreal. It’s a place that calls for depiction by Dalí, or Escher or Magritte. For example, the term “content” suggests a quantity of stuff we can “upload”, “download” and “distribute.” Yet, most of the time we are actually copying and proliferating. That’s because data moves by a process of replication. “The Internet is a copy machine”, Kevin Kelly says.

So, how do we “protect” something that is not a thing, has value, and is easily copied? Well, there are lots of ways, but maybe that’s the wrong question. Maybe the better question is, Who do we share it with, and what decisions about it do we, as a couple, make about it?

Questions about protection usually devolve into arguments about ownership, and that’s a red herring. As Joe Andrieu explains in Beyond Data Ownership to Information Sharing, “sometimes the arguments behind these efforts are based on who owns—or who should own–the data. This is not just an intellectual debate or political rallying call, it often undermines our common efforts to build a better system.” Joe offers five propositions for consideration:

  1. Privacy as secrecy is dead
  2. Data sharing is data copying
  3. Transaction data has dual ownership
  4. Yours, mine, & ours: Reality is complicated
  5. Taking back ownership is confrontational

Of #3, Joe says,

In the movie Fast Times at Ridgemont High, in a confrontation with Mr. Hand, Spicoli argues “If I’m here and you’re here, doesn’t that make it our time?” Just like the time shared between Spicoli and Mr. Hand, the information created by visiting a website is co-created and co-owned by both the visitor and the website. Every single interaction between two endpoints on the web generates at least two owners of the underlying data.

This is not a minor issue. The courts have already ruled that if an email is stored for any period of time on a server, the owner of that server has a right to read the email. So, when “my” email is out there at GMail or AOL or on our company’s servers, know that it is also, legally, factually, and functionally, already their data.

Because of all five points, Joe suggests,

Rather than building a regime based on data ownership, I believe we would be better served by building one based on authority, rights, and responsibilities. That is, based on Information Sharing.

Joe isn’t just talking here. He and others are working on exactly that regime:

At the Information Sharing Work Group at the Kantara Initiative, Iain Henderson and I are leading a conversation to create a framework for sharing information with service providers, online and off. We are coordinating with folks involved in privacy and dataportability and distinguish our effort by focusing on new information, information created for the purposes of sharing with others to enable a better service experience. Our goal is to create the technical and legal framework for Information Sharing that both protects the individual and enables new services built on previously unshared and unsharable information. In short, we are setting aside the questions of data ownership and focusing on the means for individuals to control that magical, digital pixie dust we sprinkle across every website we visit.

Because the fact is, we want to share information. We want Google to know what we are searching for. We want Orbitz to know where we want to fly. We want Cars.com to know the kind of car we are looking for.

We just don’t want that information to be abused. We don’t want to be spammed, telemarketed, and adverblasted to death. We don’t want companies stockpiling vast data warehouses of personal information outside of our control. We don’t want to be exploited by corporations leveraging asymmetric power to force us to divulge and relinquish control over our addresses, dates of birth, and the names of our friends and family.

What we want is to share our information, on our terms. We want to protect our interests and enable service providers to do truly amazing things for us and on our behalf. This is the promise of the digital age: fabulous new services, under the guidance and control of each of us, individually.

And that is precisely what Information Sharing work group at Kantara is enabling.

The work is a continuation of several years of collaboration with Doc Searls and others at ProjectVRM. We’re building on the principles and conversations of Vendor Relationship Management and User Driven Services to create an industry standard for a legal and technical solution to individually-driven Information Sharing.

Our work group, like all Kantara work groups, is open to all contributors–and non-contributing participants–at no cost. I invite everyone interested in helping create a user-driven world to join us.

It should be an exciting future.

It isn’t easy to “set aside questions of data ownership”, of course, because possession is 9/10ths of human perception. We are grabby animals. Our thumbs do not oppose for nothing. We even “grasp” ideas. This is why one of the first words a toddler utters is “mine!”

As it happens, this is also a key insight of The Mine! Project, whose About page says,

The Mine! project is about equipping people with tools and functionality that will help them:

  1. take charge of their data (content, relationships, transactions, knowledge),
  2. arrange (analyse, manipulate, combine, mash-up) it according to their needs and preferences and
  3. share it on their own terms
  4. whilst connected and networked on the web.

The Mine! aims to be an (infra)structure for other solutions – VRM (relationships with individuals and vendors, transactions), self-defined identity, authentication, data portability and hopefully many more.

These and other projects are visited by Neil Davey in a post in MyCustomer.com on VRM and the new tools of engagement. This follows up on an earlier post, based on the same interview with me. I wrote about it as well in How VRM helps CRM.

When we started here at the Berkman Center, the idea was never that we’d do this development ourselves, but would instead provide a place where we could share our thoughts, show our work, do research, publish what we’ve learned, and encourage more development.

Nice to see the mojo working.

VRM and the Four Party System

I think we can get some clarity about VRM — and growth of customer power in the marketplace — by re-positioning what we’ve been calling “parties.”

Among numbered parties the best-known one today is the third party. Wikipedia currently defines a third party this way (at least for the computer industry):

  • Third-party developer, hardware or software developer not directly tied to the primary product that a consumer is using
  • Third-party software component, reusable software component developed to be either freely distributed or sold by an entity other than the original vendor of the development platform

In general, a third party works on the vendor’s side of the marketplace. However, the vendor is not generally called the “first party” (except in the game business, as Wikipedia says here). In fact, the most common use of the term “first party” in business is with insurance, where the term refers to the insured. (The insurer is the second party.)

So I see this as an opportunity. Let’s give numbers to parties involved in customer relationships, starting with the customer. In the process we can unpack some distinctions between categories of work within the VRM development community.

The first party is the customer:

The second party is the vendor:

The third party is vendor-driven, and on the vendor’s side:

The fourth party is customer-driven, and on the customer’s side:

Together, they look like this:

Here’s how the r-button might represent both sides of the marketplace, and how those sides are attracted to each other:

There are lots of ways one can look at this.

For example, on the left half is VRM, on the right half is CRM.

VRM is about enabling the first party. It is also about building fourth-party user-driven (and within that, customer-driven) services, which make use of first-party enablement.

We can also substitute user for customer, and organization for vendor, since the scope of VRM far exceeds the vendor-customer relationship continuum. Thus fourth parties are user-driven and not just customer-driven. The picture here would look like this:

Fourth parties will provide many services for first parties. In fact, VRM should grow large new fourth party businesses, and give new work to large old businesses in the same categories. (Banks, brokers and insurance companies come to mind.) Native enablements, however, need to live with first parties alone, even if fourth parties provide hosting services for those enablements.

Fourth parties also need to be substitutable. They need service portability, just as the customer needs data portability between fourth (and other) party services. That way whatever they can provide can be swapped out by the user, if need be.

A good example of how this works is email. Before the Net took off in the mid-’90s, there were many email services. Customer choice was between silos:

None of the email companies could crack the interoperability problem. That had to come from the user’s side, by way of geeks who defined email via protocols that saw workstations as the units that mattered. While servers were involved, they could also live anywhere. Both SMTP (which appeared first in RFC 821) and POP (which first appeared in RFC 918) were born in the early 1980s, out of the need for workstations to communicate with each other.

What matters for our purposes is that email enables individuals to do two things that are VRM hallmarks: 1) be independent of other entities (including both providers and vendors), and 2) be better able to engage with those entities.

Even to this day, anybody can host a mail server — or even a Web server — on their own device. Yet there are big businesses in hosting email, and most users opt to host their email on those services out in various clouds. So, just as mail and Web servers and services are Net-native, so should VRM enablements be Net-native.

Silo mentality is mostly gone from Net-native businesses. But it’s still going strong in lots of brick & mortar business categories. For example, the hotel business. Right now that business still looks like your-choice-of-silo:

With the customer in charge, it should look more like this:

Here’s how all four parties fit together:

For travel, third parties include Orbitz, Travelocity and other intermediaries operating mostly on the vendor side of the marketplace. They wouldn’t have to stay there, of course. They could become instruments of customers as well. There can be blurring between third and fourth parties.

But, as customers get more power, fourth parties are bound to flourish — and not just because they’re located on the side of the customer and his or her money. Fourth parties will flourish because they will help more intelligence flow into the marketplace, and help the customer both manage and apply that intelligence.

Fourth party business will bloom for every company that wishes to be user-driven and customer-driven. This will include countless new companies, of course. But there will also be fresh work for existing companies that already side with the individual in some way. This group includes banks, real estate agents, travel agents, insurance companies… any business that wants to side with free customers, because they know in their bones that free customers are more valuable than captive ones.

Even traditionally locked-down monopolies, such as phone and cable companies, are in good positions to provide, or help provide, fourth party services — simply because these companies already have relationships with millions of customers. (Not to mention old and in some cases dying core businesses.)

What will keep fourth parties from turning on customers, and becoming essentially third parties for the big silo-maintaining vendors — in other words, wolves in sheeps’ clothing?

The only answer is native individual power. This is why it is critical to provide individuals with tools that enable their independence. A tool such as PayChoice‘s “pricing gun” cannot be something provided by only one company. It has to belong to nobody and therefore to everybody, just like the existing suite of native Internet protocols. In fact, these native capabilities should enlarge the roster of protocols and other enablements that comprise the Internet’s suite of benefits for everybody.

Kinds of work

There will be many new development projects and organizations involved in making VRM happen. Some are already underway and have moved far downstream. In the course of this, there is a need to distinguish types and scopes of development efforts, and types and scopes of organizations.

I want to leave the latter open for now, and concentrate just on development work. Here the challenge is reconciling closed and open source work — and to help migrate some of the former into the latter.

There are now perhaps a million or more open source code bases in the world. Most are small. Some, such as Linux, Apache, MySQL, Perl and Python, are large and familiar. Nearly all are not run by companies, or even by .orgs. The programmers who contribute to the code base are inherently independent, even if they work for a company with an interest in the project. Such is the case with the many Linux kernel programmers who work for IBM, Red Hat and Oracle. It’s also true of Monty Widenius and David Axmark, who founded MySQL and came with it to Sun.

Open source code essentially belongs — in the sense that somebody has control over it — to the individual developers who contribute to it. The closest expression to ownership is usually the license. Developers on a free software or open source project like to pick a license and move forward without any further concern about legalities, including issues of ownership. “Intellectual property” is anathema to them. The only form of intellectual property that interests them much is copyright — which is why the free software folks invented copyleft, which carries forward with open source as well.

Both free and open source software possesses qualities we call NEA: Nobody owns it, Everybody can use it, and Anybody can improve it. These qualities make that code generative: that is, maximally supportive of the largest variety of uses. In his book The Future of the Internet — and How To Stop It, Jonathan Zittrain shows how generative code and standards work by locating them at the waist of an hourglass with many possibilities both below and above:

While all code is in some ways owned, it is controlled by those who write it. These include contributors, committers and maintainers. Some projects use just one or two of those terms. A good example of one using all three is here. Some small projects just use one term or none at all. Practice varies widely It is always understood, however, that somebody, or some small group of people, decide which code gets added to the base. The Mine! Project is one open source effort within VRM. ListenLog will be another. There will be many more.

What matters for VRM purposes is that free software and open source projects are inherently independent. Even if a company hires programmers to write code, both the code and its authors will be independent of those paying for it. This means the employed programmers, or anybody, can work on the code, and do whatever they want with it — provided it passes muster with the maintainers (or whoever decides what code gets into the base).

Closed source code for which there are no open source ambitions will play roles in many fourth party services and applications. Where we face challenges with VRM is with closed source code that does have open source ambitions. If we want to open closed source code, how do we do it? Craig Burton uses this illustration in his discussions of various options:

These options are faced where companies already have code under intellectual property burdens, and where code development is already far downstream and decisions about what to release and where to put it (such as in code repositories, with choices about versioning, etc.) impact administrative as well as developmental overhead. There are existing organizations that can help with this kind of thing. Work has already begun on our own as well.

A Personal Note

While I’m not a developer (the only code I know is Morse), I’ve been covering open source development for the better part of two decades, and have been working toward VRM for most of my adult life. I’m 61 years old, and most benefits of VRM won’t appear until after I’m gone. So I take a long view, even though I am as impatient as anybody to make things happen soon.

What I want for VRM is maximal enablement of first parties, and maximum business for the other three parties — especially the fourth parties that will grow on top of the enormous because effects of first parties in the world.

Because effects are positive externalities of public goods that support boundless economic activity. Think of them as private benefits of public goods. The Internet Protocol, for example, is a public good. While nobody makes money with the Internet Protocol, the whole world can make money because of it.

We want the same kind of leverage from first-party enablement of VRM. None of us will make much, if any, money with the native enablements of customers, and users, in the marketplace. (Though we will save much money and hassle.) Perhaps $trillions will be made because of those enablements.

In respect to what happens with first and fourth parties, I locate my interests primarily with the individual, and with enabling the individual. For that reason I look for minimal organizational restrictions on how that happens. I just want to see as much open source development as we can possibly bring in. This also means I welcome all kinds of organizational activity outside the VRM “kernel,” in the fourth party space. In fact I think we need that very much, and have for a long time.

My perspective here is something like that of Linus Torvalds, who makes a point of only caring about kernel development, and not about what’s done with the kernel. When asked about what happens outside the kernel, Linus often says, “That’s user space. I don’t care about user space.” (The distinction is explained at that last link.) The scope of my interests, however, is much larger. I do care about what happens outside the individual’s “kernel space.” I especially want to see business grow in the fourth party space, which to me is analogous to Linux’s “user space.”

But I don’t have the time or the inclination to care about everything. I need to focus. And what I want to focus on is enabling individuals, and getting enormous because effects out of that. So I rely on others to do the organizing outside of the individual’s “kernel space.” This does not involve giving up power on my part, but locating power outside my own immediate interest area, out where others are more interested and competent than I am.

In respect to those, I see my main job as helping make clear where “kernel space” ends and “user space” begins. Hence this draft. Hope it makes sense to all of you.

Bonus Links: Making a New World — my chapter in O’Reilly’s Open Sources 2.0; and Net Worth, the 1999 book by John Hagel and Marc Singer that introduced the infomediary concept (a fourth party, basically), way ahead of its time.

And special thanks to Hugh McLeod for the fun images used here.

Loose links

Lots of VRM Hub action. Here’s the page for the one coming up on 30 March. Be sure not to miss the related VRM Labs. Here’s a review there of chi.mpVRM Hub last night and this post by Graham Sadd both report on the latest. So does Jake at omelette.es.

Nic Brisbourne sources Joe Andrieu in If You Love Your Customer, Set Her Free. Joe also sees $300 million in the One night stand use case.

Also in London, The Mine! Project has a developer meeting coming up next week. In a parallel way, other VRMers, including Iain Henderson (coming over from the London hotbed) will be coming to SXSW in Austin, where we plan to bring VRM up at a Barcamp there.

Jeff Jarvis brings up VRM in his end of a volley with Richard Edelman. (I had posted a long response here, but half of it got lost and I yanked it off the blog. Maybe I’ll give it another try soon.)

Live From Gartner CRM Summit UK: Customers Take Ownership. No VRM, but “social CRM” and “customer managed relationships.” Via Graham Hill. Geoff finds no VRM here, either.

Get ready for “fourth party” services. An intro to user-driven services. A new category driven by customers. Brings up PayChoice. So does Echovar.

Here’s a podcast of a call in which I explain VRM to skeptics.

© 2014 ProjectVRM

Theme by Anders NorenUp ↑