MOBILE INTERNET CYCLE DRIVING PRIVACY SECURITY SOLUTIONS

With over two billon Internet users and five billon mobile phone users these global networks bring people ever closer together. These technologies which include broadband (terrestrial) and 3G (wireless) allow for more and more data to be carried. We have entered the next Tech Cycle which is called the Mobile Internet. It was preceded by four tech cycles starting in the 1960’s with the Mainframe cycle. Approximately every decade thereafter we have had a new cycle; Mini-computers - 70’s; PC’s - 80’s and desktop Internet - 90’s.

The Mobile Internet cycle triggered by the launch of the iPhone will see mobile internet access overtake fixed access by 2014. This will be driven by smart phone take up and 3G/4G rollout. We are already at the critical point of over 1bn 3G users. Other drivers are video ( YouTube); Social networking (Facebook) and VOIP.

Much of this take up is occurring in emerging markets; there are 5 babies born every second - but there are 30 new mobile phones subscribed to every second.
The majority of these users do not have a bank account and so there is and will be a huge need for financial services such as (remittances/money transfer/payment services) to be done via the mobile.

In addition this increasingly connected global community is accelerating its usage of the Internet for commerce, communication, entertainment, trade, governance and so on -- in fact we are rapidly approaching the time that ALL human activity and interaction will 'somehow' be connected to the Internet.

Online fraud and identity theft have become the scourge of the Internet and are mitigating the efficacy of this Mobile Internet ‘revolution’. Now that Facebook has 500m members and issues of privacy and data protection are exercising the minds of Governments and corporations the need for broad based secure identity management and authentication solutions is escalating.
The current practice of using user names and passwords for ‘identification and authentication’ are seen as inadequate and vulnerable to hackers. New solutions are called for !

Comments

Popular posts from this blog

The End of Passwords

CAPITALISM – no longer fit for purpose ?

WIKILEAKS - the fuss?