Page 14 - AeM_July_2017
P. 14

BEST PRACTICES & STRATEGIES




            for a growing number of users. Businesses no longer   es need to create a security monitoring and update par-
            just know what products a customer buys, but for in-  adigm for their products, including products long past
            stance how and in what contexts the person uses these   their physical warranty dates, to keep them patched
            products, too. The ability to use this information to opti-  and up-to-date automatically and transparently”, re-
            mize not only products, but also marketing and service   minding that “in today’s world safety and security must
            communications is becoming an essential part of com-  be built in with all known and unknown use cases in
            petitiveness. In addition, new communication channels   mind.”
            are opening through networked end devices. Smart-
            watches and other wearables, connected cars, smart   New end devices, new channels
            homes, networked household appliances, etc. offer
            great potential for not only gathering data, but also com-  Indeed, whether smartwatches, smart glasses, con-
            municating with the customer. Even though this is not   nected cars or the infamous internet-capable refrigera-
            yet possible with many networked end devices, it’s time   tor, all networked devices that communicate with the
            to start conceptualizing application scenarios.      customer can theoretically also be used to spread mar-
                                                                 keting messages – and cyberthreats
            In the B2B sector, service communication can benefit
            from the Internet of Things, too. For example, the con-  Here, it is up to the device manufacturers and their
            tinuous monitoring of machines can detect deterioration   partners to develop application scenarios for marketing
            and point out that an inspection is needed at a specific   and service communication, to define software and
            time. Or the reordering of consumables can be request-  communication standards, as well as to produce corre-
            ed, depending on the production capacity, etc.       sponding end devices. Although all this seems still a
                                                                 long way off and wishful thinking, many devices, such
            Highest demands on data protection and               as e.g. networked household appliances, have the po-
            data security                                        tential to open new communication channels.

            Whether healthcare data from medical devices in the   Some already integrate existing communication chan-
            B2C, or business-relevant data on manufacturing pro-  nels, like social media or email, making it important to
            cesses in B2B, many data collected in the Internet of   monitor their developments, possibly even influence
            Things are highly sensitive, making great demand on   them, and at the very least conceptually deal with appli-
            data protection and data security. With each data-   cation scenarios at an early stage: The Apple Watch,
            producing device, a further source as well as a further   for example, enables the reception of emails and push
            transmission path is created, on which data must be   messages from apps and is therefore a relevant device
            protected against misuse.                            for location-based marketing in real-time, and via the
            That’s why some have reservations when considering   onboard computer of a connected car not only traffic
            the Internet of Things as they fear data misuse and loss   information or entertainment content could be ac-
            of control. It is therefore an important prerequisite for   cessed, but it can also serve as a channel for market-
            companies to create both (legally) secure technical pro-  ing and service communication.
            cesses for the collection, storage and processing of da-
            ta from the Internet of Things, and to win the trust of   Let’s stay curious about the future Internet of Things,
            private and business customers whose data marketers   as it is certainly an important trend that will shape the
            want to use.                                         marketing of tomorrow. ◊
            Dr William H. Saito, Special Advisor to the Cabinet,                               By Daniela La Marca
            Government of Japan, explained during the INTERPOL
            World 2017 Congress earlier this month, that
            ‘executives would surely be able to utilize security as an
            effective tool to enhance the corporate value of their
            organizations, rather than seeing it as a cost center or a
            liability, if the concept of ‘security by design’, giving suf-
            ficient consideration to convenience, would be applied.
            Aside from that, Mr Saito said: “Developers of IoT devic-
      14            July 2017 - Internet of Things (IoT) & Wearables
   9   10   11   12   13   14   15   16   17   18   19