Archive for RB

Banks & Bosses Use Social Media to Assess Risk

Updated 10-22-10 – GigaOm has a post about Rapleaf here.

If you’re among the 67% of the global online population which Nielsen Online says uses social media networks to stay in touch with friends, grow their business, or just have fun then your information is for sale to banks, insurance companies, employers, and the government. Some banks are turning to social media analytics firms to enhance their credit-check procedures.

Banks are now looking at an applicant’s social media profile, behavior, and associations on sites like Facebook (FB), Twitter, and MySpace according to a recent article on the banking industry site CreditCards.com. The banker’s theory is that people run with folks who share their values and behavior. If your Facebook friends are deadbeats, the banks theorize you are a deadbeat also. These assumptions may make it harder to get a credit card or mortgage, according to CreditCards.com.

Many banks are now outsourcing their social network data mining operations to firms such as Rapleaf. Rapleaf, is a San Francisco, CA-based company that specializes in social media monitoring. According to CreditCard.com, Rapleaf compiles everything you and your network do – including status updates, “tweets,” joining online clubs, linking a Web site or posting a comment on a blog or news Web site. These firms turn the conversations into consumer profiles called social graphs. Social graphs give companies insight into behavior patterns: what you like and dislike, want and don’t want, do well and do poorly.

Banks & Bosses Use Social Media to Assess RiskIn the article, Rapleaf characterizes its social network data mining operations as “a unique way to improve customer experience by whitelisting customers based on their social circles and friend relationships.”  Since the firm uses data to “whitelist” people, it may also very easily be used to “blacklist” people and deny them a credit card or a job. “Who you hang around with has empirical implications with how you behave,” Joel Jewitt, Rapleaf’s vice president of business development told FastCompany.

“It’s a marketing trend as opposed to a credit score trend,” says Jewitt.  Despite his assurances, Rapleaf’s Web site suggests that clients “use friend networks to enhance … credit scoring” according to FastCompany. Jesse Torres, president, and CEO of Pan American Bank in Los Angeles told CreditCards.com that online information aggregators fill a need within the banking community. “They’re able to scour the social media universe. They are constantly listening and reporting back.”

The bankers are protecting their bottom line, “credit card companies have been stung very hard during this downturn, and they’re going to work that much harder to avoid extending credit…,” Ken Clark, author of The Complete Idiot’s Guide to Boosting Your Financial IQ told CreditCards.com. Rob Garcia, senior director of product strategy at The Lending Club, a peer-to-peer lender, says his firm uses multiple sources of “social information collateral” for its decision-making processes “It’s a wealth of information about a person,” says Garcia.

Not everyone in the industry is data mining social networks. “It’s difficult to make a judgment about an individual’s credit based on the people around them,” says Gregory Meyer, community relations manager for Meriwest Credit Union in San José, CA.  Meriwest only assesses credit reports and application data to make lending decisions. “[Social media] is a great way to keep up with what my 10-year-old nephew is up to, but it doesn’t have a place in the credit process.”

What you divulge can have an unintended impact. “We’ve seen this with applicants not getting jobs and employees getting fired for their Facebook and Twitter-based escapades,” financial personality Clark told CreditCards.com, “so we shouldn’t imagine this to be any different.” There are steps to take to guard your privacy. “I think it is crucial that everyone visit the privacy notices for the sites they use, read them, and change their settings to limit who can see their information,” says Clark. “For example, on Facebook, you can change your privacy settings so that only your acknowledged friends can see the majority of your information.” You can also enable “private filtering” on your browser. Do so and your activity will be entirely out of the Web profiling system.

Scott Stevenson, president, and CEO of EliminateIDTheft.com told CreditCards.com people should:

  1. Don’t accept invitations until you check the profile out first.
  2. Be acutely aware of what you write. Don’t make public anything you don’t want public.
  3. Take an annual inventory of all your social networking sites and delete people and information that can potentially damage you in the eyes of a creditor or employer.

Rapleaf offers a service to discover your online footprint and see what others might see on your social graph. Google (GOOG) offers a similar tool, the Google Privacy Dashboard. which presents an overview of the accounts and information you are connected with through Google. Take advantage of tools like these to check your own online reputation. What you don’t know can hurt you. Rapleaf’s Jewitt reminds users that, “The custodian of the information is you.”

rb-

There is nothing illegal about social network data mining banks and firms like Rapleaf do. Facebook and the other social networks are legal commercial enterprises that openly broker user data for exactly these kinds of purposes. People freely put information on Facebook with the full knowledge that it will become permanent parts of the public Internet record. Users need to know about this kind of data mining for two reasons. First, the stakes are high. It’s about getting access to credit that might be necessary for your family or business or even getting your next job.

Second, data mining gives the lenders insights into relationships that are unknown to and often completely out of the control of the applicant. Maybe being a Facebook fan of NASCAR says something in the sum about your socioeconomic status and your creditworthiness or employability, according to some second-order derivative analysis of millions of data records.

The asymmetry in the relationship between data-driven marketers and consumers is structural and permanent. Institutions like banks (and, potentially, insurance companies, employers, and the government) will use it to gain an advantage, because that’s what they do.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

PAETEC Buys Again

PAETEC Buys AgainPAETEC has expanded again. PAETEC Holding Corp.(PAET) recently announced that it has signed an agreement to acquire Cavalier Telephone Corporation. The acquisition will add Cavalier’s wholly-owned subsidiary, Intellifiber Networks’ fiber-optic network to PAETEC’s existing service footprint.

Intellifiber Networks is Intellifiber Networks logoone of the largest network providers in the nation with a high-capacity fiber network spanning nearly 17,000 route miles and representing over $2 billion of investment. The expansive 12,262 route mile intercity network spans the Midwest and Eastern U.S., as well as 4,689 route miles throughout several existing PAETEC metro areas,  allowing for broad connectivity options for customers. Intellifiber offers scalable network solutions for service provider, enterprise, and government customers. Their offerings include private networks, low latency routing, SONET services, wavelengths, Ethernet, and data options.

The expanded PAETEC fiber network will encompass a combined 10,609 metro fiber-route miles and 37,023 total fiber-route miles and a combined 1,178 collocations. After the closing of this transaction, PAETEC expects to have a local presence in 86 of the top 100 Metropolitan Statistical Areas (MSAs). The transaction will further solidify PAETEC as one of the largest competitive local communication service providers in the United States

PAETEC logoMarketWatch reports PAETEC Holding Corp. will acquire Cavalier Telephone Corporation in an all-cash $460 million transaction. Cavalier will become an indirect wholly-owned subsidiary of PAETEC Holding Corp. Cavalier is a privately held company whose majority owner is M/C Venture Partners, a private equity firm based in Boston.

This planned acquisition of Cavalier fits our strategic plan to add both fiber assets and regional density to better serve our customers and realize increased network synergies, both in the local loop and long haul,” Arunas A. Chesonis, chair, and CEO of PAETEC told MarketWatch. “Cavalier’s fiber infrastructure, network assets, and corporate culture make it a perfect match for PAETEC and dramatically strengthen the company in the Eastern United States.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Hourglass Syndrome

Hourglass SyndromeA July 2010 technology online study conducted by Harris Interactive (NASDAQ: HPOL) and sponsored by Intel Corporation (NASDAQ: INTC), reveals that eight out of 10 (80%) U.S. adults get frustrated waiting for technology, and over half (51%) have done something out of character when frustrated while waiting for technology. Intel calls this the “Hourglass Syndrome.

Intel logoIntel says that of those who suffer from the hourglass syndrome:

  • 69% admitted acting inappropriately while waiting.
  • 62% of U.S. adults admit to yelling or cursing out loud when their technology can’t keep up with them.
  • 29% hit their computer mouse.
  • 24%  bang on their computer screen and keyboard, hopefully not to the extent as the guy in the video.

The integral role technology plays in everyday life causes the hourglass syndrome phenomenon says the chipmaker. Intel marketing experts say the “malady” has developed with the modern pace of life. In an environment where mobile devices are constantly on to answer emails within minutes of receiving them, people feel anger and frustration when outdated technology fails to keep up with the speed of life.

Margaret (Margie) Morris, a clinical psychologist and health technology researcher at Intel, states in the Intel press release;”We are closely connected with our devices  … They become extensions of ourselves and become critically involved in our relationships with others, how we express ourselves, and our efforts to manage stress. We enjoy the freedom to communicate and work from anywhere, so we rely on the technology to work. When it lets us down, the disappointment runs high and sometimes spills over into our feelings about ourselves.

Of those who have acted or seen someone act inappropriately in public due to frustrations with technology:

  • 70% saw strangers.
  • 46% have seen family or friends.
  • 33% have seen co-workers act out in frustration while waiting for technology.

According to the online survey taken between July 27-29, 2010 sluggish technology often causes people to miss out on something while they are waiting. 35% of U.S. adults said that they missed out on something while waiting for technology, such as losing an opportunity to take part in an online sale (13%) or buy airline, concert, or sporting event tickets. “Intel understands how stressful technology can be,” said Karen Regis, Director of Intel’s Consumer PC Marketing in the press release. “We are determined to design products that can improve the quality of your life and lower your stress levels, as opposed to increasing them.

rb-

Kudos to Intel for the imaginative use of pseudo-science to wrap a marketing message for Intel Turbo Boost Technology in a factoid.  GigaOm points out that Intel, “helpfully notes that Hourglass Syndrome “is not a real syndrome or medical condition.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Steve Jobs – Ninja?

Steve Jobs - Ninja? Apple CEO Steve Jobs was at the heart of another wild rumor circulating on the inter-tubes. This rumor claims the Apple boss was stopped at Japan’s Kansai International Airport for carrying ninja stars in his carry-on luggage. Rumor has it Mr. Jobs was stopped when he about to board a private plane in late July. Apple officials disputed the claims from SPA! magazine in an article on Bloomberg.

Taiwanese agency Next Media Animation, has created more “proof” of the alleged incident. The Apple-related tabloid provided the following animation.

rb-

After all, if it’s on the inter-tubes it’s got to be true!

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

D-Link Raises Net Security Bar

D-Link Raises Net Security Bar Help Net Security reports that D-Link (TSEC dlink) has upgraded its products to rival some of the “enterprise-level” devices I see at client sites. The vendor has enhanced its router security to a higher level of protection to guard against hacking, worms, viruses, and other malicious Web attacks. by incorporating DNSSEC, IPv6, and CAPTCHA.

DNSSEC is a suite of Internet Engineering Task Force (IETF) specifications (Core DNSSEC RFCs are RFC 4033, RFC 4034, and RFC 4035) that adds security to the DNS to offer assurance that the information received from a Domain Name Server is authentic according to the article. The security extensions are designed to protect the DNS from man-in-the-middle and cache poisoning attacks, which can occur when hackers corrupt DNS data stored on recursive name servers to redirect queries to malicious sites.

DNSSEC applies digital signatures to DNS data to authenticate the data’s origin and verify its integrity as it moves across the Internet and can give users an effective means of verification that their applications, such as Web or email, are using the correct addresses for servers they want to reach.

D-Link is also providing additional security and future-proofing its routers, by migrating to IPv6 certification according to Help Net Security. With the growing number of Internet-capable devices on the market, the pool of IPv4 addresses has dropped to six percent and is expected to run out sometime in 2011. While this is a major motivation for IPv6, other improvements are also realized.

The IPv6 specification now specifies certain security measures that were not defined in IPv4, such as IPSec. IPSec is a method of authenticating and encrypting data transferred between pairs of hosts. Although it was possible to implement IPSec with IPv4, it was not part of the specification. IPSec is now a requirement, not an option, in the IPv6 specification.

CAPTCHAD-Link has previously implemented a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) to improve security. CAPTCHA is a challenge-response test that ensures that a response during a user login is not computer-generated but instead is truly entered by a human hand, by requiring a user to manually enter a small amount of text displayed in an image to help prevent automated registration and fraud.

rb-

I looked at a production switch today that was still running only CatOS 9.0 (EOL 2009), they might be better protected with a new D-Link.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.