Marketing In The Age of AI Agents, Bots, Behavioural Tech and Crime
Copyright 123RF

Marketing In The Age of AI Agents, Bots, Behavioural Tech and Crime

May 17, 2024

Updated September 23, 2024

As AI agents, virtual/physical bots, and behavioural tech invade our lives, it's rapidly changing marketing. This article dives into this. It also includes a discussion on marketing and security. If you're interested, read on...

Story Line Used As An Example For This Article

Jane Doe and her son John Doe, each have several different types of AI agents with which they use some of them to purchase goods/services from Acme Retailer Inc, VR Game Inc. and Grocer Inc (e.g. ShopBot). The retailers leverage behavioural tech to predict what both Jane and john will like to buy or services to offer them.

Challenge #1 - Arrival Of AI Agents

Skim “AI Leveraged Smart Digital Identities of Us”. It discusses consumers stating:

  • They’ll quickly adopt AI leveraged?smart digital identities of them?to do tasks on their behalf –?which is what Personal AI??is an early forerunner of
  • This will grow to include?shopping, doing financial transactions,?interacting with companies?who supply?goods and services to them,?like a telco, utility, gas company, etc.
  • They'll leverage it to?pay taxes to local, regional?and national governments
  • All of which will increasingly?impact enterprise marketing and security strategies

Then consider beyond the ShopBot type AI agents:

Yet, there are many new challenges from this...

Challenge #2 - Identifying Who's Behind the AI Agent

  • How does Acme Retailer inc., VR Game Inc. and Grocer inc. know who's the real person behind the AI agent and/or physical bots?
  • if they're not already a customer, and they're interacting with your marketing/sales services digitally, how do you know if it's an AI agent or the real person?

Challenge #3 - As Risk Rises, What Identity Systems Externally and Internally Are You Going To Use?

Here's you first major hurdle. Today, on the planet, there isn't any government issued legal identity systems which say Jane Doe can register her AI Agent against her legal physical identity.

Low Risk

You probably don't care. As long as the credit card Jane is using is good, then her actual legal identity really doesn't matter.

Medium to High Risk

Then you need to be able to ascertain, at the least, within your own systems some kind of unique identifiers for Jane Doe, and her AI agent she's using to interact with your enterprise.

Drilling down into the identity/coding weeds, it means that for these types of situations, you're going to need to be able to write into Jane's AI agents code, a unique identifier by which it can identify itself to you.

Within your marketing, sales and CRM (Customer Relationship Marketing) systems, you need to build rule sets for levels of payments/services offered, authorization rights, etc.

Challenge #4 - Determining Age and Legal Identity Relationships

I used John in the story to illustrate the growing marketing complexity coming at your enterprise. If John's a legal minor, and he's using an AI agent, with his mother's credit card, how are you to know this?

Low Risk

It likely won't matter as long as the good/services John is buying, via his AI Agent, using his mom's credit card aren't "age sensitive" or "financially large".

Medium To High Risk

It becomes important for you to know early on in the sales relationship the:

  • Age of John
  • Legal identity relationship between John and Jane i.e., child/mother
  • Approval from Jane to offer John and his AI agent goods/services
  • etc.

Here's your next major challenge. Today, on the planet, there isn't a government issued legal identity framework you can instantly leverage. Thus, you're going to have to create marketing/sales business process rules to try and head off at the pass these types of digital situations and/or leverage services like Privo.

To see a legal architecture discussion of legal identity relationships skim ??????????? “Legal Identity Relationships”.

Challenge #5 - Ability To Rapidly Scale

Come with me a year or two down the marketing road, where all of a sudden 20-70% of your customers want to use their AI agents to interact with your company buying good or services. This will happen because your customers can now do things faster, cheaper and better rather than them having to manually do this. It means that now your enterprise needs to effectively get it's marketing, sales, ordering, finance and support, to deal with AI agents and not people.

Challenge #6 - Predicting Customer Behaviour When It's An AI Agent

The lure of using VR and AR tech, is you can now obtain LOTS of personal data about a customer and leverage it to predict they're buying behaviour. Yet, what if it's an AI agent you're interacting with? To see an example of this, in a new legal identity architecture I've created, skim to the section titled, "Jane Walks By Women's Clothing Stores" in “An Identity Day in the Life of Jane Doe”.

All I can see coming your way is increasing complexity in your marketing strategy re leveraging data to predict your customer's behaviour. Further, your enterprise MUST stay abreast of privacy laws and regulations which will likely increasingly spring up due to the rapid tech change.

Challenge #7 - Customer Support When It's An AI Agent

Come with me one to two years down the road where significant purchases are made by AI Agents. In parallel, your enterprise has reduced call centre costs by leveraging chat bots for customer service. Ironically, it could be your chat bot literally talking to Jane Doe's AI agent! All of this new type of complexity needs to be thought through.

Challenge #8 - Fraud and Evil Inc. Attacks

First, skim “National Security – Reduce Risk By Instantly Determining Entity Friend From Foe”. It describes the following:

"An AI system in one jurisdiction can create smart, malicious, digital bots at speeds of thousands or more per second. In the next second, they’re operating in all other jurisdictions on the planet, including yours, targeting your citizens, companies, enterprises, and different levels of government. Today on the planet, there’s no ability to instantly determine entity friend from foe. Thus, it results in increasing economic, criminal, and political chaos."

As the numbers of these malicious digital bots soar into the billions and trillions, the odds increase that your enterprise's marketing and sales infrastructure will be targeted. Thus, how do you know it's really Jane Doe's AI agent and not an Evil Inc. one masquerading as you. To give you an idea of the sophistication rapidly coming your way skim "Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’".

My point? The types of attacks will likely rapidly increase in sophistication as well as sheer numbers of them.

Challenge #9 - Keeping Up With Faster Tech Changes

Look at this curve. It shows a logarithmic shaped tech change curve we can now no longer cognitively keep up with. If you skim to "Problem #5 - Rapid Rate of Change" in "CISO's - What's Your Security Strategy For AI, Bots, IoT Devices & AI Leveraged Smart Human Digital Identities?" you see it stating:

"My message to your Board and C-suite? You folks should strongly consider creating a new "Innovation & Risk Committee" WHICH MEETS DAILY, WITH REPRESENTATION FROM ALL PARTS OF YOUR COMPANY."

Marketing is a key component of an enterprise. Thus, you folks should be very active participants in the new committee.

Challenge #10 - Marketing & Your Legal Department

As AI, AI agents, IoT devices, etc. invade your enterprise, and you, the marketing department leverage this, it brings with it LOTS of new risks. YOUR LEGAL DEPARTMENT MUST BE HEAVILY INVOLVED. I strongly suggest you read Legal Departments - AI/Bots, LLM AI, AI Agents, Hives, Behavioural Tech And AI's Ability To Own LLC's”. IT WILL AFFECT CONTRACTS WITH YOUR EMPLOYEES, CONTRACTORS AND CUSTOMERS.

Challenge #11 - The Above is Crying Out For A New Enterprise Architecture To Manage The Above

All the above is crying out for a new enterprise architecture. You might want to have your enterprise architects skim these articles:

I also strongly suggest you read these articles:

All of the above is the down in the weeds "security guts" your enterprise needs to think through.

Challenge #12 - It's Also Crying Out For A Rethought Legal Identity Architecture

I've spent the last 8 years slowly working my way through it and now have the architecture, budgets, etc.

Note: What drove me into this was I wanted to rethink learning. I realized years ago I couldn't do this until I'd created a rethought legal identity architecture for humans, AI systems and bots. Once I arrived with this, I then created an out of the box learning architecture.

To See My Message To Governments & Industry Leaders

To See The Architectures

To See The Costs

The Chances of Most Local Jurisdictions Rapidly Adopting This Are Slim To None

Which is why, a year ago, I put myself in the shoes of an enterprise CISO. I asked myself what my enterprise should be doing to rapidly leverage tech innovation, while mitigating risks? To see my answers skim these two articles:

You'll see me thinking outside the box.

Summary - Your Enterprise Is Entering a New Paradigm

Where your old marketing ways won't work so well anymore. Thus, it requires out of the box marketing thinking for your our of the box times. My message to you?

You need to get your asses into gear doing rapid, small, iterative architectural and marketing changes, rather than trying to slay the enterprise architecture dragon. Do LOTS of POC's, and small, controlled pilots. Learn what works, what doesn't work, and then rapidly scale. Create a red team to constantly attack yourselves. It's much better to be successfully attacked by your red team than by an Evil Inc.

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT



要查看或添加评论,请登录

Guy Huntington的更多文章

社区洞察

其他会员也浏览了