Smart Homes and the Data Underclass

Internet-of-Things-2.jpg

The Internet of everything means connected appliances can generate their own data. What if insurance companies could use it?

Domestic appliance manufacturers and technology companies have big plans for our homes. From remote controlled heating devices such as Nest and Hive to intelligent fridges, smart TVs and connected washing machines, our appliances will become smart, automating many of our everyday tasks.

But true to the notion of the internet of everything in which both things and processes are connected, smart devices won’t just eliminate everyday tasks such as supermarket orders, they will also establish new business relationships.
A recent study by Cognizant and the Economist Intelligence Unit on the rise and impact of the smart product economy found that 40% of businesses plan to use smart products to automate customer service operations, while 46% report that smart products are already bringing them information about their customers that was previously not possible or not cost effective to acquire.

Inevitably this sea of personalised data, generated by linking individuals and households with specific products and services has a huge value to businesses. Whether it is promoting product upgrades or extended warranties and insurance deals, consumers will be exposed more than ever before to the sales and marketing machine. While consumers will default to opting out of sharing personal data, discount deals and promises of preferential upgrade treatment will lead to more opt-ins. So what will this mean?

Strategy consultants Roland Berger released a report in March for the insurance industry. It identified how IoT will lead to increased personalisation of products as a result of being able to harvest data from homes and machine use.
Jörg Oliveri del Castillo-Schulz, partner at Roland Berger, says that while the main aim of insurance firms in using this data is to prevent problems and therefore payouts, it is also about personalising insurance products and offers. It’s then “a question of privacy,” he says, referring to the idea that some consumers will have to opt-in to get deals.
Kevin Roberts, broker director at insurance firm Legal & General admits that this personalisation, although beneficial for many, could also lead to a growing number of people being unable to afford full insurance protection of products. This will, he says, “create a data underclass and exacerbate the current protection gap”.

It is this suggestion of data monetisation and a multi-tiered consumer classification system based on data that sets a few alarm bells ringing. With sensors and cameras in homes, office buildings and cars, are consumers in danger of being over-analysed in terms of product use and service requirements? Will there really be a data underclass?
“There is definitely that danger of companies misusing the data that is captured by consumers,” says Patrick Moorhead, president of at IoT analyst Moor Insights and Strategy. “This is why consumers need to be wary of companies that don’t simplify and externalise their privacy policies.”.
So is there the possibility, then, that insurance companies could use this data through partnerships with vendors to charge higher premiums to anyone that doesn’t connect devices?
“There is a distinct possibility that will happen,” says Moorhead. “Many consumers will opt in if, let’s say, they can get discounts from other services.”

As more connected devices find their way into homes, the issue of data privacy will become an increasingly complicated one. Companies such as Samsung, LG and Miele are already producing internet-enabled appliances with a focus on the consumer benefit of remote control but also remote diagnostics and maintenance. There are clear benefits for the vendors. A report by McKinsey in June claimed that automation through IoT will create a $300bn (£190bn) value added opportunity and a 2% improvement in gross margin for vendors.

Clearly their ability to crunch the numbers on machine performance and identify areas to improve in terms of components and functionality will help to make better products. It will no doubt augment brand loyalty and it is the brand names that will ultimately provide the access to the consumers. This, says Del Castillo-Schulz, is why so many insurance and warranty firms are creating partnerships with the big consumer appliance companies.
Mat Fordy, CEO of Cool Components, a supplier of IoT electronics, says that while the potential benefits for both customers and manufacturers are huge, this aspect of IoT must be monitored closely because of its potential to be abused.
“With such power comes responsibility,” he says. “IoT ‘keyholders’ have to be tightly restrained on how they use the data, and the uses that they put it to. Trust will be key.”

So, is the service industry trustworthy? Kris Oldland, editor of Field Service News says that IoT will “flip the service cycle upside down” as direct access to appliances will save consumers money, but is adamant that the majority of service companies are seeing IoT as a mechanism for improving services.
No one would argue with improved services and product longevity but a level of skepticism is understandable as the lines between consumer and service provider blur due to data access.
Jon Carter, UK head of business development for Connected Home at Deutsche Telekom AG agrees: “IoT must, by default, impact insurers and warranty providers’ risk models, and this will optimise the associated costs of providing maintenance and support services”.

As with all big data, it’s not the size that really matters but how it is interpreted and classified. Brian Barnier, an ISACA risk advisor, principal at ValueBridge Advisors and author of The Operational Risk Handbook warns that businesses should not fall into the trap of “the big data illusion”.

This trap, he says, needs to be worked around in a way that will protect the consumer. IoT will not just be a window on the home and consumer habits, it will be a science of personalisation, where computer tick-boxes get to decide, even more than they do now, on our eligibility for products and services. Surely no one, not even the fast growing IoT industry wants to be responsible for a ‘computer says no’ culture.
Guardian: http://bit.ly/1htr086

« 90% of Android Devices Are DoS Vulnerable
Medical Devices are Vulnerable to Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.