Smart Homes and the Data Underclass

Internet-of-Things-2.jpg

The Internet of everything means connected appliances can generate their own data. What if insurance companies could use it?

Domestic appliance manufacturers and technology companies have big plans for our homes. From remote controlled heating devices such as Nest and Hive to intelligent fridges, smart TVs and connected washing machines, our appliances will become smart, automating many of our everyday tasks.

But true to the notion of the internet of everything in which both things and processes are connected, smart devices won’t just eliminate everyday tasks such as supermarket orders, they will also establish new business relationships.
A recent study by Cognizant and the Economist Intelligence Unit on the rise and impact of the smart product economy found that 40% of businesses plan to use smart products to automate customer service operations, while 46% report that smart products are already bringing them information about their customers that was previously not possible or not cost effective to acquire.

Inevitably this sea of personalised data, generated by linking individuals and households with specific products and services has a huge value to businesses. Whether it is promoting product upgrades or extended warranties and insurance deals, consumers will be exposed more than ever before to the sales and marketing machine. While consumers will default to opting out of sharing personal data, discount deals and promises of preferential upgrade treatment will lead to more opt-ins. So what will this mean?

Strategy consultants Roland Berger released a report in March for the insurance industry. It identified how IoT will lead to increased personalisation of products as a result of being able to harvest data from homes and machine use.
Jörg Oliveri del Castillo-Schulz, partner at Roland Berger, says that while the main aim of insurance firms in using this data is to prevent problems and therefore payouts, it is also about personalising insurance products and offers. It’s then “a question of privacy,” he says, referring to the idea that some consumers will have to opt-in to get deals.
Kevin Roberts, broker director at insurance firm Legal & General admits that this personalisation, although beneficial for many, could also lead to a growing number of people being unable to afford full insurance protection of products. This will, he says, “create a data underclass and exacerbate the current protection gap”.

It is this suggestion of data monetisation and a multi-tiered consumer classification system based on data that sets a few alarm bells ringing. With sensors and cameras in homes, office buildings and cars, are consumers in danger of being over-analysed in terms of product use and service requirements? Will there really be a data underclass?
“There is definitely that danger of companies misusing the data that is captured by consumers,” says Patrick Moorhead, president of at IoT analyst Moor Insights and Strategy. “This is why consumers need to be wary of companies that don’t simplify and externalise their privacy policies.”.
So is there the possibility, then, that insurance companies could use this data through partnerships with vendors to charge higher premiums to anyone that doesn’t connect devices?
“There is a distinct possibility that will happen,” says Moorhead. “Many consumers will opt in if, let’s say, they can get discounts from other services.”

As more connected devices find their way into homes, the issue of data privacy will become an increasingly complicated one. Companies such as Samsung, LG and Miele are already producing internet-enabled appliances with a focus on the consumer benefit of remote control but also remote diagnostics and maintenance. There are clear benefits for the vendors. A report by McKinsey in June claimed that automation through IoT will create a $300bn (£190bn) value added opportunity and a 2% improvement in gross margin for vendors.

Clearly their ability to crunch the numbers on machine performance and identify areas to improve in terms of components and functionality will help to make better products. It will no doubt augment brand loyalty and it is the brand names that will ultimately provide the access to the consumers. This, says Del Castillo-Schulz, is why so many insurance and warranty firms are creating partnerships with the big consumer appliance companies.
Mat Fordy, CEO of Cool Components, a supplier of IoT electronics, says that while the potential benefits for both customers and manufacturers are huge, this aspect of IoT must be monitored closely because of its potential to be abused.
“With such power comes responsibility,” he says. “IoT ‘keyholders’ have to be tightly restrained on how they use the data, and the uses that they put it to. Trust will be key.”

So, is the service industry trustworthy? Kris Oldland, editor of Field Service News says that IoT will “flip the service cycle upside down” as direct access to appliances will save consumers money, but is adamant that the majority of service companies are seeing IoT as a mechanism for improving services.
No one would argue with improved services and product longevity but a level of skepticism is understandable as the lines between consumer and service provider blur due to data access.
Jon Carter, UK head of business development for Connected Home at Deutsche Telekom AG agrees: “IoT must, by default, impact insurers and warranty providers’ risk models, and this will optimise the associated costs of providing maintenance and support services”.

As with all big data, it’s not the size that really matters but how it is interpreted and classified. Brian Barnier, an ISACA risk advisor, principal at ValueBridge Advisors and author of The Operational Risk Handbook warns that businesses should not fall into the trap of “the big data illusion”.

This trap, he says, needs to be worked around in a way that will protect the consumer. IoT will not just be a window on the home and consumer habits, it will be a science of personalisation, where computer tick-boxes get to decide, even more than they do now, on our eligibility for products and services. Surely no one, not even the fast growing IoT industry wants to be responsible for a ‘computer says no’ culture.
Guardian: http://bit.ly/1htr086

« 90% of Android Devices Are DoS Vulnerable
Medical Devices are Vulnerable to Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Reasonable Risk

Reasonable Risk

Reasonable Risk is the only SaaS GRC platform with Duty of Care Risk Analysis (DoCRA) built in, providing a sensible and defensible cybersecurity position for an organization.