<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments for SIIA Digital Discourse</title>
	<atom:link href="http://www.siia.net/blog/index.php/comments/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.siia.net/blog</link>
	<description>SIIA Blog</description>
	<lastBuildDate>Thu, 26 Apr 2012 21:48:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
	<item>
		<title>Comment on Mobile Payments Get Currency by Mark MacCarthy</title>
		<link>http://www.siia.net/blog/index.php/2012/04/mobile-payments-get-currency/comment-page-1/#comment-2399</link>
		<dc:creator>Mark MacCarthy</dc:creator>
		<pubDate>Thu, 26 Apr 2012 21:48:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=6903#comment-2399</guid>
		<description>I want to focus on the area of agreement with Harley.  His work highlights the possibility that actors in the emerging mobile payments market could share more information than was shared in traditional payments card transactions. He’s right, and he’s gotten the attention of policymakers on this point.  Jessica Rich, head of the FTC’s Office of Financial Practices, summed up the situation at the end of today’s mobile payments workshop by saying that players in the mobile payments space “could collect rich data sets from consumers.” 

But market participants know this exchange of information can only be done successfully with consumer permission.  They have built privacy protections and choice mechanisms into their systems from the beginning.  So these possible privacy risks for consumers are not present in the market because market players have controlled them.  As Harley says, “companies have built in user controls to mitigate the risks of exposing consumer information.”  So consumers should feel confident that they can use the new mobile payment technologies, get all the benefits of extra convenience, innovation and security AND control information sharing for marketing purposes arising from this context of mobile payments.   The job now for the industry, for privacy advocates and for policymakers is to keep the market moving in this positive direction.</description>
		<content:encoded><![CDATA[<p>I want to focus on the area of agreement with Harley.  His work highlights the possibility that actors in the emerging mobile payments market could share more information than was shared in traditional payments card transactions. He’s right, and he’s gotten the attention of policymakers on this point.  Jessica Rich, head of the FTC’s Office of Financial Practices, summed up the situation at the end of today’s mobile payments workshop by saying that players in the mobile payments space “could collect rich data sets from consumers.” </p>
<p>But market participants know this exchange of information can only be done successfully with consumer permission.  They have built privacy protections and choice mechanisms into their systems from the beginning.  So these possible privacy risks for consumers are not present in the market because market players have controlled them.  As Harley says, “companies have built in user controls to mitigate the risks of exposing consumer information.”  So consumers should feel confident that they can use the new mobile payment technologies, get all the benefits of extra convenience, innovation and security AND control information sharing for marketing purposes arising from this context of mobile payments.   The job now for the industry, for privacy advocates and for policymakers is to keep the market moving in this positive direction.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Mobile Payments Get Currency by Harley Geiger</title>
		<link>http://www.siia.net/blog/index.php/2012/04/mobile-payments-get-currency/comment-page-1/#comment-2380</link>
		<dc:creator>Harley Geiger</dc:creator>
		<pubDate>Wed, 25 Apr 2012 19:58:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=6903#comment-2380</guid>
		<description>Hello. I am the author of the CDT blog post on mobile payments &amp; privacy, to which your post links. The privacy risks I discuss are not &quot;speculative&quot; at all, and your post supplies the proof: companies have built in user controls to mitigate the risks of exposing consumer information. I wrote about the privacy risks of mobile payment services that do not have strong user controls. Clearly some of the companies have built in user controls because they foresee the very same risks I describe. This is an important issue for the industry to address – surveys consistently show consumers strongly oppose the disclosure of personal information via mobile payments. 

It&#039;s great that some companies have enabled consumers to withhold personal contact information without affirmative consent. In fact, I specifically call upon companies to do so at the end of my own post! These and other user controls will help maintain consumer trust and avoid unnecessary regulation – but the controls must be meaningful and should apply to all the companies in the mobile payment ecosystem. The mobile payments marketplace is still nascent and we will see many more services over time, and likely not all the companies that enter this market will be scrupulous with consumer data. Remember also that the privacy issues relate not just to mobile payment service providers, but also third party apps connected to the core service, like a budget or coupon app linked to the mobile wallet. 

Thanks for linking to my blog post and for discussing this issue.

Sincerely,


Harley Geiger
Policy Counsel
Center for Democracy &amp; Technology</description>
		<content:encoded><![CDATA[<p>Hello. I am the author of the CDT blog post on mobile payments &amp; privacy, to which your post links. The privacy risks I discuss are not &#8220;speculative&#8221; at all, and your post supplies the proof: companies have built in user controls to mitigate the risks of exposing consumer information. I wrote about the privacy risks of mobile payment services that do not have strong user controls. Clearly some of the companies have built in user controls because they foresee the very same risks I describe. This is an important issue for the industry to address – surveys consistently show consumers strongly oppose the disclosure of personal information via mobile payments. </p>
<p>It&#8217;s great that some companies have enabled consumers to withhold personal contact information without affirmative consent. In fact, I specifically call upon companies to do so at the end of my own post! These and other user controls will help maintain consumer trust and avoid unnecessary regulation – but the controls must be meaningful and should apply to all the companies in the mobile payment ecosystem. The mobile payments marketplace is still nascent and we will see many more services over time, and likely not all the companies that enter this market will be scrupulous with consumer data. Remember also that the privacy issues relate not just to mobile payment service providers, but also third party apps connected to the core service, like a budget or coupon app linked to the mobile wallet. </p>
<p>Thanks for linking to my blog post and for discussing this issue.</p>
<p>Sincerely,</p>
<p>Harley Geiger<br />
Policy Counsel<br />
Center for Democracy &amp; Technology</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Just Do It (Again): How Virtual and Video Game Labs Give Students the Freedom to Fail by Zombie games</title>
		<link>http://www.siia.net/blog/index.php/2011/12/just-do-it-again-how-virtual-and-video-game-labs-give-students-the-freedom-to-fail/comment-page-1/#comment-1355</link>
		<dc:creator>Zombie games</dc:creator>
		<pubDate>Thu, 09 Feb 2012 07:46:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=5753#comment-1355</guid>
		<description>Many people use games as an introduction or a closing to their activities.  However, it’s a good idea to add them throughout your day, between or as a part of a larger event.  Games are a great way to break up the monotony of a long day&#039;s learning, or a hard day&#039;s work.  They are also a great way to keep small children busy and big children happy.</description>
		<content:encoded><![CDATA[<p>Many people use games as an introduction or a closing to their activities.  However, it’s a good idea to add them throughout your day, between or as a part of a larger event.  Games are a great way to break up the monotony of a long day&#8217;s learning, or a hard day&#8217;s work.  They are also a great way to keep small children busy and big children happy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on SIIA Survey: Marketing Executives Believe Social Media is an Effective Tool; Not Yet Investing Significant Resources by Staci Davidson</title>
		<link>http://www.siia.net/blog/index.php/2012/02/siia-survey-marketing-executives-believe-social-media-is-an-effective-tool-not-yet-investing-significant-resources/comment-page-1/#comment-1353</link>
		<dc:creator>Staci Davidson</dc:creator>
		<pubDate>Thu, 09 Feb 2012 01:27:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=6246#comment-1353</guid>
		<description>Excellent findings.  It is understandable Executives want trackable results and the tools are becoming more useful to measure success.  At the same time, social media has scaled the one-to-one relationship and developing meaningful relationships with strangers that turn into customers and customers that turn into raving fans is winning out big time - especially, for companies that are getting involved right now.</description>
		<content:encoded><![CDATA[<p>Excellent findings.  It is understandable Executives want trackable results and the tools are becoming more useful to measure success.  At the same time, social media has scaled the one-to-one relationship and developing meaningful relationships with strangers that turn into customers and customers that turn into raving fans is winning out big time &#8211; especially, for companies that are getting involved right now.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Congress: Let&#8217;s Battle Cyber Crime Together by accident attorney</title>
		<link>http://www.siia.net/blog/index.php/2011/12/congress-lets-battle-cyber-crime-together/comment-page-1/#comment-1352</link>
		<dc:creator>accident attorney</dc:creator>
		<pubDate>Wed, 08 Feb 2012 13:16:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=5702#comment-1352</guid>
		<description>Thefts of identities are becoming more and more common as the Internet gradually becomes engrained in our society. However, the fact that this crime is very common does not make it less serious in the eyes of the courts. Cyber crimes, including these types of thefts of personal information, leave a nasty trail behind, making it harder for attorneys to fight for their clients in these cases. This is why it is so vital to have one who understands the nature of the crime as well as the laws that surround computer crimes.</description>
		<content:encoded><![CDATA[<p>Thefts of identities are becoming more and more common as the Internet gradually becomes engrained in our society. However, the fact that this crime is very common does not make it less serious in the eyes of the courts. Cyber crimes, including these types of thefts of personal information, leave a nasty trail behind, making it harder for attorneys to fight for their clients in these cases. This is why it is so vital to have one who understands the nature of the crime as well as the laws that surround computer crimes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on The Stop Online Piracy Act Arrives by Curtis J Neeley Jr., MFA</title>
		<link>http://www.siia.net/blog/index.php/2011/11/the-stop-online-piracy-act-arrives/comment-page-1/#comment-1171</link>
		<dc:creator>Curtis J Neeley Jr., MFA</dc:creator>
		<pubDate>Wed, 09 Nov 2011 21:41:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=5628#comment-1171</guid>
		<description>It has taken over three years in United States Court thus far.
&lt;em&gt;Neeley v NameMedia Inc., et al&lt;/em&gt;,(&lt;a href=&quot;http://www.curtisneeley.com/5-09-cv-05151/Docket/index.htm&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;5:09-cv-05151&lt;/strong&gt;&lt;/a&gt;)(&lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/2558_Docket.htm&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;11-2558&lt;/strong&gt;&lt;/a&gt;)
Briefed and before the three Eighth Circuit judges to INVENT.
Three judges will INVENT &lt;em&gt;another&lt;/em&gt; reason to support the Internet of nearly free pornography.
Otherwise; The wide-open Internet will no longer exist unregulated.

==============================================
Appellant Brief &lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/08_11-2558_Docket_files/2558%20APPEAL%20BRIEF.pdf&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;PDF&lt;/strong&gt;&lt;/a&gt;
Appellee Brief of NameMedia Inc &lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/2558-AppelleeBrief_NameMedia.pdf&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;PDF&lt;/strong&gt;&lt;/a&gt;
Appellee Brief of Google Inc &lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/2558-AppelleeBrief_GOOG.pdf&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;PDF&lt;/strong&gt;&lt;/a&gt;
Appellant Reply Brief &lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/2558%20REPLY%20BRIEF_stamped.pdf&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;PDF&lt;/strong&gt;&lt;/a&gt;
MOTION Pre-ruling Motion for en banc review &lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/Motion%20for%20en%20banc%20review.pdf&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;PDF&lt;/strong&gt;&lt;/a&gt; &lt; &lt; &lt; &lt;a href=&quot;http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/3846072-en-banc-denied.pdf&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;DENIED&lt;/strong&gt;&lt;/a&gt;
===========================================</description>
		<content:encoded><![CDATA[<p>It has taken over three years in United States Court thus far.<br />
<em>Neeley v NameMedia Inc., et al</em>,(<a href="http://www.curtisneeley.com/5-09-cv-05151/Docket/index.htm" rel="nofollow"><strong>5:09-cv-05151</strong></a>)(<a href="http://www.curtisneeley.com/NameMedia/2011-2558/2558_Docket.htm" rel="nofollow"><strong>11-2558</strong></a>)<br />
Briefed and before the three Eighth Circuit judges to INVENT.<br />
Three judges will INVENT <em>another</em> reason to support the Internet of nearly free pornography.<br />
Otherwise; The wide-open Internet will no longer exist unregulated.</p>
<p>==============================================<br />
Appellant Brief <a href="http://www.curtisneeley.com/NameMedia/2011-2558/08_11-2558_Docket_files/2558%20APPEAL%20BRIEF.pdf" rel="nofollow"><strong>PDF</strong></a><br />
Appellee Brief of NameMedia Inc <a href="http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/2558-AppelleeBrief_NameMedia.pdf" rel="nofollow"><strong>PDF</strong></a><br />
Appellee Brief of Google Inc <a href="http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/2558-AppelleeBrief_GOOG.pdf" rel="nofollow"><strong>PDF</strong></a><br />
Appellant Reply Brief <a href="http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/2558%20REPLY%20BRIEF_stamped.pdf" rel="nofollow"><strong>PDF</strong></a><br />
MOTION Pre-ruling Motion for en banc review <a href="http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/Motion%20for%20en%20banc%20review.pdf" rel="nofollow"><strong>PDF</strong></a> &lt; &lt; &lt; <a href="http://www.curtisneeley.com/NameMedia/2011-2558/2558_DocketPDFs/3846072-en-banc-denied.pdf" rel="nofollow"><strong>DENIED</strong></a><br />
===========================================</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Debunking the Myths of Cloud Computing: Cloud Computing Is not Secure by Jordan Krizman</title>
		<link>http://www.siia.net/blog/index.php/2011/06/cloud-computing-myths-security/comment-page-1/#comment-881</link>
		<dc:creator>Jordan Krizman</dc:creator>
		<pubDate>Mon, 18 Jul 2011 20:13:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=4904#comment-881</guid>
		<description>Very insightful.  A few more things to consider: an on-premise system is at risk for fires, floods, earthquakes etc. If the data is only stored at your location, one natural disaster can cause you to lose everything.

Also, on-premise software companies are now positioning themselves to have cloud-based versions of their software.  These offerings are commonly not truly cloud based, but merely hosted versions of on-premise software.

(see    http://blog.360cloudsolutions.com/fake-hosted-cloud/      )</description>
		<content:encoded><![CDATA[<p>Very insightful.  A few more things to consider: an on-premise system is at risk for fires, floods, earthquakes etc. If the data is only stored at your location, one natural disaster can cause you to lose everything.</p>
<p>Also, on-premise software companies are now positioning themselves to have cloud-based versions of their software.  These offerings are commonly not truly cloud based, but merely hosted versions of on-premise software.</p>
<p>(see    <a href="http://blog.360cloudsolutions.com/fake-hosted-cloud/" rel="nofollow">http://blog.360cloudsolutions.com/fake-hosted-cloud/</a>      )</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Take the Vision K-20 Survey &#8211; closes Thursday, June 30 by Hugh McNally</title>
		<link>http://www.siia.net/blog/index.php/2011/06/take-the-vision-k-20-survey-closes-thursday-june-30/comment-page-1/#comment-845</link>
		<dc:creator>Hugh McNally</dc:creator>
		<pubDate>Wed, 29 Jun 2011 12:18:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=4931#comment-845</guid>
		<description>Links to the survey and site in this article are broken... verbatim from the HTML of this page:

href=&quot;../../visionK20/&quot;

The actual URLs are:

http://www.siia.net/visionK20/

and

http://www.siia.net/visionk20/survey/survey.asp</description>
		<content:encoded><![CDATA[<p>Links to the survey and site in this article are broken&#8230; verbatim from the HTML of this page:</p>
<p>href=&#8221;../../visionK20/&#8221;</p>
<p>The actual URLs are:</p>
<p><a href="http://www.siia.net/visionK20/" rel="nofollow">http://www.siia.net/visionK20/</a></p>
<p>and</p>
<p><a href="http://www.siia.net/visionk20/survey/survey.asp" rel="nofollow">http://www.siia.net/visionk20/survey/survey.asp</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Checking in: SIIA Midmarket Growth Conference 2011 by Konny Zsigo</title>
		<link>http://www.siia.net/blog/index.php/2011/06/checking-in-siias-midmarket-growth-conference/comment-page-1/#comment-844</link>
		<dc:creator>Konny Zsigo</dc:creator>
		<pubDate>Tue, 28 Jun 2011 07:14:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=4937#comment-844</guid>
		<description>I&#039;m excited to speak at this year&#039;s conference.  We have dramatic developments that will accelerate the adoption of performance marketing on smartphones &amp; tablets.  It will be the first time I&#039;ve ever spoken about it openly.  &#124; konny zsigo, president, WDA</description>
		<content:encoded><![CDATA[<p>I&#8217;m excited to speak at this year&#8217;s conference.  We have dramatic developments that will accelerate the adoption of performance marketing on smartphones &amp; tablets.  It will be the first time I&#8217;ve ever spoken about it openly.  | konny zsigo, president, WDA</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Member video: Gain a clearer perspective on cloud computing by George Gatsis</title>
		<link>http://www.siia.net/blog/index.php/2011/03/member-video-gain-a-clearer-perspective-on-cloud-computing/comment-page-1/#comment-548</link>
		<dc:creator>George Gatsis</dc:creator>
		<pubDate>Mon, 07 Mar 2011 14:04:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.siia.net/blog/?p=4176#comment-548</guid>
		<description>Mike does a nice synopsis in where cloud computing is today and where it is heading.</description>
		<content:encoded><![CDATA[<p>Mike does a nice synopsis in where cloud computing is today and where it is heading.</p>
]]></content:encoded>
	</item>
</channel>
</rss>