Marketing challenges emerged from consumers’ perception of security issues of the Internet of things
Characterization of the main methods of perform marketing study to find marketing leverages of communication on connected devices security. Research and analysis of features of benchmarks of the companies successfully adopting the IoT into the business.
Ðóáðèêà | Ìàðêåòèíã, ðåêëàìà è òîðãîâëÿ |
Âèä | äèïëîìíàÿ ðàáîòà |
ßçûê | àíãëèéñêèé |
Äàòà äîáàâëåíèÿ | 08.11.2015 |
Ðàçìåð ôàéëà | 1,1 M |
Îòïðàâèòü ñâîþ õîðîøóþ ðàáîòó â áàçó çíàíèé ïðîñòî. Èñïîëüçóéòå ôîðìó, ðàñïîëîæåííóþ íèæå
Ñòóäåíòû, àñïèðàíòû, ìîëîäûå ó÷åíûå, èñïîëüçóþùèå áàçó çíàíèé â ñâîåé ó÷åáå è ðàáîòå, áóäóò âàì î÷åíü áëàãîäàðíû.
The next problem is a threat to privacy violations. We use and own a growing number of "things" that transmit data to a third party about their condition and whereabouts. This data can tell a lot about it. A few years ago there was a first attempt at mass use of long-lived radio-frequency tags to track the movements of goods sold. The attempt ended in failure - the owners bought clothes famous brand together rebelled and manufacturers immediately ceased to use such marks. However, in other cases, this approach is appropriate - for example, to quickly find the missing expensive thing (Narayanan, 2014). The other important factor in information security related to the emergence of the "Internet of things" is difficulties in carrying out authorization. Secure authentication provides the exchange of messages between the parties and the use of cryptographic keys. It is difficult to achieve on the internet of low-power and limited power consumption in "things". Moreover, these "things" are often able to only one-way communication. For the same reason, in the "Internet of things" it is difficult to use conventional means to ensure the integrity of the information (Mitchell, 2014).
4. Marketing study
4.1 Study Context: company and market environment overview
4.1.1 Company overview
By the end 2014 worldwide Orange has become one of the leading telecommunication companies having operations in 29 countries. It served 244 million customers (including 185 million mobile customers and 16 million fixed broadband internet customers). By the end of 2014 company's revenues equaled 39,5 billion euros.
French market is plying a significant role in company's business; France market shares in details are presented below.
Figure 13 - Key figures of Orange SA worldwide
As to the French market, Orange is a leading company in terms of market shares within broadband Internet and Mobile telephony segments thus having 30,3 million fixed line and 10,4 million Internet users, and 27,1 million mobile users. Whereas overall market revenues are in decline (equally for France and for Orange), Orange number of clients is incrementing.
In addition to High-speed broadband and Mobile services, the main company's activities include traditional fixed line telephony services; Internet portals and advertising management business (in particular orange.fr having brought 55 million euros in 2014); Content-related activities; Carrier services, and Online, Internet access and Media services.
Figure 14 - Orange market share in France, nb of users
Besides, while searching other ways of to boost business revenues, for years Orange has been active in the R&D of connected devices. So in 2014 Orange launched the Homelive pack, which includes a home safety control box and three connected devices (a smoke detector, a window / door sensor and a movement sensor). Equally witnessing intense developing of the connected devices in general and being inspired by the successful examples (Withings, ImperiHome, Jeedom Withings is a system uniting sport oriented devices such as connected balance and bands. ImperiHome and Jeedom are both systems integrating home control devices.), Orange has been working on the idea of uniting the connected devices of various kinds on the platform of Orange application..
It is also important to mention that Orange is not the only company working in the direction of uniting independent devices data on one platform, by the end of 2013 eleven internet cloud solution existed.
Potential target audience of the described proposition - multi-connected users having several connected devices, willing to pay for the comfort, either Orange clients or not (see target audience description later in chapter 4.1).
4.1.2 Connected devices (French market)
Connected device definition proposed by Mercator and then used in questionnaire: “Un objet connecté comporte un système d'identification et de captation des données (température extérieure, rythme cardiaque, etc.), un système de transmission des données alimentant une application «intelligente », une interface comme un Smartphone, pour piloter l'application”.
Translation in English: “A connected device includes a system for the identification and capture of data (e.g. outside temperature, heart rate, etc.), a data transmission system communicating with a 'smart' application, and an interface like a Smartphone, to control the application”
Speaking of Orange interest to the connected devices subject, it was induced from the devices expansion on the market and people's devices adoption due to the multiple purposes of the last ones.
According to the Harris report, by 2020 in France the connected devices will represent 85% of all devices composing the Internet of Things (or 50 billion units) whilst the French connected devices' market value will reach 500 million euros by 2016. 11 million of French are expected to possess at least 1 connected device by 2017.
According to the La Poste-opinionway study of sample representing national audience realized 17-18 December 2014, 9 out 10 French have heard about connected devices (minimum 2 devices cited). .
Areas of the biggest potential are Nearby services, Home, Wellbeing and Health. The most expected benefits from the nearby services are urgent intervention - 88%, in home assistance - 85%, children security - 71%. As to the home oriented devices, the expected benefits are anti-theft protection - 77%, energy saving -74%, fire detection -74%, remote control - 71% and smart and simple home management - 63%. At the same time health and wellbeing expected benefits are motivation to do sport more often - 54%, shape improvement - 53%, healthier eating - 47%, better sleep - 35%, control over alcohol intake - 34%.
Apart of significant benefits expectations, users also speak about important barriers hindering devices adoption in daily life namely security concerns - 75% and multiple applications for control - 74%. More precisely, according to Harris study, the security is a complex of data piracy risks (70% of respondents are concerned) and worries about personal data security (71%).
Another revealed challenge is a sufficient data transparency and user control issue. This application quality must be well balanced in order to provide vision of data flows and its usage. However, lack of further control over the transparent data can create additional tensions, on the contrary.
This way the Orange proposition could be exactly what consumer needs if satisfy one's security level demands.
All the connected devices in dependence with their usage situation could be divided on the following categories.
Table 1 - Internal connected devices classification, precise and extended
Domicile |
Performances sportives |
Santé |
|
Appareil électroménager Objets de design, meuble, décoratifs Sécurité maison Contrôle d'électricité et de chauffage Jardin |
Bracelet connecté (à destination de sport ou analyse avancée des performances sportives) Equipement sportif (golf, raquette de tennis, tapis, balles etc.) |
Mesure et suivi de pression artérielle, insuline, cholestérol, médicaments |
|
Double écran |
Ceux qu'on aime (enfants, animaux) |
Forme physique et bien-être |
|
• Smart montre • Smart lunettes • Bracelet connecté |
• Baby phone - téléphone • Caméra de sécurité • Vêtement d'enfant • Traceur GPS pour les animaux • Alimentation à distance pour les animaux |
• Balance connectée • Podomètre connecté • Bracelet connectés (type suivie des habitudes quotidienne : heures du sommeils, nombre de pas...) |
|
Jeux |
TV |
Voiture |
|
Drones Jeux |
Smart TV Vidéo projecteur Haut-parleur |
Voiture connectée Adaptation de Smartphone |
4.2 Study design
Managerial problematic
English: What marketing actions (communication, garanties) orange needs to undertake to reassure its consumers in their personal data security (collected by connected devices in particular) that Orange is going to gather in the future?
French: Quelles actions (communication, garanties…) doit mener Orange pour rassurer les consommateurs sur la sécurité des données personnelles (en particulier des objets connectés) qui vont être recueillies par Orange dans le futur?
Scenarios
• S0 To do nothing
Conditions of data sharing with third companies
• S1 Decide for all the data at once
• S2 Untick the data off the list one by one
Sharing of anonymous data options
• S3 Tick data off the list one by one
• S4 Decide for all the data at once
• S5 Decide according to the further data usage purpose
Compagny lanching the application legitimacy
• S7 Start-up
• S8 Big company
• S9 Internet provider
• S10 Mobile operator
Criteria of choice
• Willingness to install the app is higher than 70%
• Overall app security perception is higher than 2 out 4
• Maximal option's acceptability level
– To do nothing if lower than 2 out 4
• Highest legitimaty
– To do nothing if lower than 2 out 4
Study problematic
• Measure application security perception on different levels
• Measure demanded security level according to the data categories
• Measure degree of acceptability of the proposed options of data sharing
• Find whether Orange is legitimate to propose the service (the app)
• Find which data consumers are more incline to protect
• Find which audience is more sensitive to data sharing
Study results limitations
Study is valid for the French market, for the early adopters audience represented by Orange clients
4.3 Qualitative study stage
As the following stage, preliminary to the quantitative study, series of qualitative interviews was performed.
Each of 6 interviews on online data sharing and trust triggers was 40 minutes long approximately. The audience involved in the interviews represented common French population without specific segmentation since it was important to receive a common vision of a problem. Respondents were 3 females (2 of 24 years old and 1 of 27 years old) and 3 males of 24, 34 and 60 years old.
All the respondents were
• Internet and Mobile telecom users
• Smartphone owners
• Owners or considering buying a connected device
4.3.1 General data security perception
The interviews analysis revealed several important insights.
1. Security conscious ones willing to trust companies more than people. Actually, the willingness to share personal data with companies via one-to-one dialogue was claimed to be higher than the one with public and friends.
2. Attributes of a reliable company described by the respondents were generally homogeneous. This way we can conclude that generally the following features contribute to the company image and can be considered as trust triggers
• Bigger company size (on the specific market)
• Famous brand
• High number of actual users
• Quality of the site/app
3. As to security conditions, some of them are already commonly expected and must be an offer “must have”:
• Promise to delete all user data after profile removal
• Claim to be strictly confidential vis-a-vis other users
• Detailed terms and conditions (though these are not always read by users)
• Valid security certificates (though these are not always understood by users)
4.3.2 Summary of data sharing particularities
Data sharing particularities vocabulary revealed other important insights listed below:
1. Data indicated only when needed and demanded by a service provider
2. Data is communicated only in volume sufficient to obtain the service and not a bit more
3. Necessity to indicate the real data is proper to trustworthy legal sites
4. Leaders of security expertise (banks) use autofilling of personal data
5. Specialized sites and applications are more eligible to collect specific data
6. Platforms can be considered equally legitimate
7. Company must be perceived as being dependent of its security services (banks are the best example)
8. Users potentially can communicate all the data needed yet only in condition of high quality adjusted services proposed in return of that data
4.3.3 Summary of specific data perceived value
Further analysis of specific value perception allowed distinguishing different specific perceived value in dependence of
1. Revenue data are the most protected
2. Health and Home data can be communicated to specialized sites and platforms exclusively
• Health data value is tend to vary from person to person in dependence with health issues (real problems = no open data)
3. Women are more sensitive to wellness data than men
4. Domestic data collection still need to prove itself
5. Geolocation is preferred not to be shared with other users but with company confidentially
• Acknowledge to be collected by every service anyway
Unfortunately, while analyzing more additional barriers were discovered within general French population. Firstly, people tend not to trust telecom companies whose primary business is based on consumers' data usage. Secondly, the idea of integrated data profile seems less secure and hence more dangerous in comparison with type by type data profiles.
On the contrary, the important insights to enhance the data security perception were discovered as well. The respondents commonly prefer the transparent data usage which transfer them an idea that they are in control. This way it is preferred to provide:
1. Information on further data usage: when, where, by what companies exactly, how exactly, for what purposes
2. Full list of company's partnerns
This way during the forthcoming quantitative study it was important to check, verify and precise
1. People readiness to unite data at one profile
2. Various data security sensitivity according to the type of data
3. Importance to separate sport, well-being and health data
4. Legitimacy of telecom companies of bigger size to collect the connected object data
5. Importance of perception to be in control
Finally, the preliminary qualitative study permitted to form precise marketing promises related to data sharing to test further.
4.4 Quantitative study stage
Quantitative study was realized within the respondents' base of the Orange Lab study laboratory. The questionnaire was aligned with Orange Lab standards and then diffused online within Orange Lab software. Since the access to the data based was confidential the work between questionnaire filter settings and result analysis was outsourced to the Orange Lab team.
Quantitative study was complicated at the beginning by the fact that another study on connected devices was carried out 2 weeks prior the launch of the questionnaire. Consequently there was a higher risk of respondents' base exhaustion. Because of it was taken the decision to unite the given study questionnaire with the other related study one, i.e. only a part of information related questions of the questionnaire were analyzed by the author.
However, despite of that fact 1728 full response were received by the end of the next to the launch day what witnesses a significant interest of the public to the subject. Questionnaire is composed with 2 studies questions: the one on general interest to the data integration within one application, the other on information security perceptions. The part of users description questions which is usually placed at the beginning of the questionnaire is missing since it was the topic of Orange lab previous study (those study results are confidential and belongs the other business school, hence was not used within this study either). The security information part of the questionnaire was shown only to those evaluating the common application appreciation question (i.e. to 1381 out of 1728 respondents). Within this part at the end of the questionnaire different marketing promises were tested nomadically, possible answers rotated automatically. All the scale questions use 4 levels scale of appreciation/agreement/etc according to the Orange Lab standards.
4.4.1 Orange Lab respondents data base properties
Figure 15 - “Lab Explores” profile at the Orange Lab
It was decided to use the Orange Lab respondents' base instead of launching the questionnaire for the general France population as these “Lab Explores” affine with the target audience of the future service.
After eliminating answers of those who did not responded to the information and application part question (1381 out 1728 respondents), the respondents' base kept being affinitive.
Figure 16 - Sex and age distribution within Orange Lab Sample and target audience universe of 1328 respondents
Figure 17 - Users segments distribution within Orange Lab Sample and target audience universe of 1328 respondents
4.4.2 Connected Devices Experience
First of all, it is necessary to mention that though all devices were analyzed in term of consumer experience up to the date, only a part of categories were examined further in term of information security study purposes. The Second Screen devices, Smart TV and Drones were excluded due to their little capacity to generate data for collection and gathering.
Table 2 - Analyzed connected devices list
Domicile |
Performances sportives |
Santé |
|
· Appareil électroménager · Objets de design, meuble, décoratifs · Sécurité maison · Contrôle d'électricité et de chauffage · Jardin |
· Bracelet connecté (à destination de sport ou analyse avancée des performances sportives) · Equipement sportif (golf, raquette de tennis, tapis, balles etc.) |
· Mesure et suivi de pression artérielle, · insuline, cholestérol, médicaments |
|
Double écran |
Ceux qu'on aime (enfants, animaux) |
Forme physique et bien-être |
|
· Smart montre · Smart lunettes · Bracelet connecté |
· Baby phone - téléphone · Caméra de sécurité · Vêtement d'enfant · Traceur GPS pour les animaux · Alimentation à distance pour les animaux |
· Balance connectée · Podomètre connecté · Bracelet connectés (type suivie des habitudes quotidienne : heures du sommeils, nombre de pas...) |
|
Jeux |
TV |
Voiture |
|
· Drones · Jeux |
· Smart TV · Vidéo projecteur · Haut-parleur |
· Voiture connectée · Adaptation de Smartphone |
Analysis has shown that Health, Second Screen and Baby cameras object categories are unrevealed territories of the market since the per cent of users (base of 1728 respondents) who never used a connected object of precise category is significantly high:
• Health - 82%
• Second Screen- 78%
• Baby, pet surveillance - 72%
The users have never tried those object cause of their price or/and the absence of need. Security issues were the 4th common reason mentioned by 16%.
Meanwhile Smart TV, Home and Car took its place in consumers' lives. They are the most actively used devices (base of users ever tried an object of a given category)
• Smart TV - 55%
• Home - 37%
• Car - 35%
At the same they are the most fidelizing devices since the % of those who stopped using the object after a trial are the lowest (base of users ever tried an object of a given category)
• Smart TV - 12%
• Home - 16%
• Car - 13%
It can be explained by the fact they have the highest overall satisfaction level with important “very satisfied” answers share:
• Smart TV - 89% (38%)
• Home - 91% (40%)
• Car -93% (39%)
In contrast with Smart TV, Home and Car, Drones, Health and Baby cameras don't stay with users for a long time. Whereas they are tried by a few (Health and Baby cameras were mentioned above as market newbies), they are yet the most abandoned devices (base of users ever tried an object of a given category).
• Drones30%44%
• Health tried by 18%then rejected by34%
• Baby, pet surveillance28%39%
The reasons of abandon of these devices are the same as main reasons of stopping the usage, for all categories of devices the following are:
• Absence of need - 53% (in particular for categories: 67% for Surveillance, 56% for Health)
• Undeveloped technology - 27% (in particular for categories: 31% for Health, 29% for Drones and just 18% for Surveillance)
• Lack of reliability - 16% (in particular for categories: 20% for Drones, 19% for Health)
• Security issues - 10% (in particular for categories: 11% for Health, 8% for Drones and Surveillance)
4.4.3 Consumers' security issues profiles
Statistical analysis has revealed significant variations in security related behavior only among segments, smartphone operation systems and age.
1. Users particularities among Segments
Dynamic Parents trust technologies the most - smartphones and its application are believed to be secure by 58% and 65% respectively.
Value Optimizers follow up Dynamic Parents in terms of level of trust, yet in contrast with them, only 31% vs 45% believes in higher Devices' applications security.
Enthusiastic Explores trust nor smartphones neither Devices' applications (the last ones are perceived to be secured by 47% and 36% respectively). Moreover, these segments demonstrate a strong tendency to indicate the false data - 60%.
Positive Aspires have the least faith in Smarphone security - 29% only, and the strongest tendency to use false data - 69% though they scored the 2nd in the biggest trust in Devices Apps - 40% (after Dynamic Parents). However, at the same time the tendency to use the false data can be explained as a security measure since they are the most sharing users - 67% claimed to share their data with other users vs 42% (others' score).
2. Users particularities depending to Smartphone system
iOS users feel safe significantly more than others which is inferred from their the hignest Smartphone and its Apps trust - 65% and 74%. Simultaneously they show the highest transferred trust in Object - 72% and the biggest willigness to share their data with other users - 50%.
Meanwhile only 56% Windows and 53% Android users trust their phones. Furthermore, Windows phone users don't feel like sharing data - 25% vs 43% Android.
Consequently, Windows and Android platforms are obviously to demand more intensive communication on application security.
3. Users particularities among ages
The older a person is, the more one believes that Devices' Apps are more secure than the rest of the phone apps (decline from 57% of trust for 55+ to 35% for 18-24).
The younger a person is, the more fake data one uses (decline from 61% for age 18-24 to 38% for 55+).
4.4.4 Application test results
For the beginning the respondents were invited to evaluate a basic application proposition on which further modification option were proposed later. The basic proposition is presented below:
«Vos données personnelles recueillies par l'application ne seront visibles que par vous et ne seront pas partagées avec des tiers ou d'autres utilisateurs sans votre autorisation.
Afin d'avoir accès à des services supplémentaires fournis par des entreprises partenaires, vous pouvez partager ces données recueillies avec elles.
A tout moment, vous pouvez annuler cette autorisation de partage.
Les données issues de l'usage de vos objets connectés pourraient être rendues anonymes puis partagées avec des entreprises partenaires dans le but de créer de nouveaux services ou améliorer les services existants. »
The average results of security appreciation on different levels are presented in the Figure below.
Figure 18 - Application security scores split, 4 is maximum
The results witness that the application “as it is” has a good security score. The most is to highlight that the proposition itself already persuade the consumers that they are in control and that no data abuse will happen within the app (3,03 out 4).
As to the target audience segments application perception, it is believed to be secure by 60% of respondents at minimum (Value Optimizers) whilst Positive Aspirers are the most persuaded in security audience for the moment (79%). Dynamic parents have the biggest absolute trust (24%) whereas Value optimizers, being the second largest group, have doubts the most (2,64 is the weakest average security score). Details are presented in the Figure below.
Figure 19 - Average security scores by target audience segments, 4 is maximum
Finally, 72% of respondents were ready to install the application “as it is”.
In order to understand the reasons not to install the application, volunteer comments were analyzed. Overall 113 respondents decided to comments their choices 67% of which were comments to the negative answers. Fortunately, the vocabulary analysis show the security is not the main issue not to install the app. Moreover, negative answers are massively biased by the proposed usage situation description (precisely: 85% of “Definitely no” and 54% of “Probably no”).
Figure 20 - Intention to install question's comments distribution
Further vocabulary analysis of negative answers (in other words, absence of intention to install the app) witness that the following subjects were revealed (% of comments):
• Necessity of larger investment in connected devices - 21%
• Usage of devices not active enough to have a such application need - 11%
• Compatibility with already bought devices issue - 8%
• Gadget - 5% (only cited by “probably no”)
• Security and Application quality - 3% each
This way it is possible to conclude that the application must be compatible with a larger diversity of already existing devices not to force addition investments.
Other mentioned topics were:
• Willingness to test - 7% (“maybe” and “yes” respondents)
• “6 month is too early” - 2% (“probably no” respondents) have doubts in integrating such an app in their lives.
• Already have a solution - 4% of respondents are already using alternatives (in particular ImperiHome and Jeedom solutions were cited, both are for house control only).
4.4.5 Monadic tests results and options approval
Company legitimacy test
The Orange legitimacy to launch the app check resulted in conclusion that providers are far from being the target audience favorites. In fact, in spite of qualitative stage findings the startups are the most legitimate companied to launch such an app.
Figure 21 - Companies' legitimacy to launch the app to the market
Firstly, analysis has shown that consumer trust in the famous brands has nothing to do with service provider choice (no correlation).
Secondly, the younger the audience is, the more legitimate Start-ups/Big companies are, and the less legitimate Internet and Mobile providers are (progressive decline with the age from 56% to 30%, and from 91% to 80% of total positive answers respectively). Consequently, it is vital to communicate with youngsters better.
Figure 22 - Trust in providers decline with the age
Then, Dynamic Parents and Positive Aspires have the more trust in Internet Providers than others. Besides, Positive aspires have relatively less trust in Start-ups (legitimate for 65% vs 85%) and in Big companies 50% vs 75%.
As to the sex, women have relatively less trust in Start-ups (they legitimate for 78% vs 88%, where totally legitimate for 32% vs 45%) and more to Mobile operators (legitimate for 80% vs 70%, where totally legitimate for 39% vs 27%).
Data sharing options test
According to the test results picky data sharing option is audience favorite, see results in the Figure below:
Figure 23 - Data sharing options test results
Respondents homogeneously prefer choosing data pieces to share one by one from a list, so this option is accepted by 90% of respondents and totally accepted by 51%. More important, this option is accepted by 60% of those rejecting to authorize the whole list, consequently can serve as the additional incentive to share the data for those audience.
The younger the audience is, the more is willingness to tick off (the most acceptable option share: from age 18-24 - 68%, 25-34 - 52% to 47% for 55+).
Anonymous data sharing options test
Anonymous data sharing option shall be distinguished by purposes (new service creation and existing service improvement are better to be approved independently from each other), see test results in the Figure below:
Figure 24 - Anonymous data sharing options test results
Choosing anonymous data sharing options according to further data usage is accepted by 87% of respondents, totally accepted by 41,6%. Besides, it is accepted by 68% of those rejecting to authorize anonymous data usage all at once which makes it the preferred option at the end.
Enthusiastic explores are especially attracted to this option (the most acceptable option share equals 59% vs 42% at an average).
4.4.6 Data Categories Features
At the beginning it is important to mention that an attitude towards demanded security levels for various data is homogenous. Only Positive Aspires are less concerned with home and children data security in terms of “very important” and just “important” answers balance. This way, for instance their 90% of total answers claiming the importance of children related data security are split like 40% of “very important” answers and 50% of just “important” answers whereas others' answers are distributed like 80% of “very important” answers and 13% of just “important” answers. Nevertheless the Positive Aspires can be considered as equally concerned by the security issues. In general all the data but sport performance one is valuable for a user since the demanded security levels were always higher than median (i.e. 2 out 4). The lowest security is demanded for sport performance data (2,71 out 4) in comparison with others yet it is still significant. Children, Home and Health data need to be protected the most The highest level is attributed to the “loved ones” i.e. children related data (3,79 out 4).
Table 3 - Demanded security levels for different types of data
Children |
3,79 |
|
Home |
3,77 |
|
Health (specific medical data) |
3,69 |
|
Car |
3,27 |
|
Physical form (basic body and health information) |
3,25 |
|
Sport performance |
2,71 |
Data recommended to be included in app
Children and pets surveillance. Data collected by children and pets surveillance devices is valued the most by the consumers. Its demanded security level is the highest and equals 3,79 out 4. When integrating this devices category in the application, at least localization and health and physical data must be included as the most collected by the users
Table 4 - The most collected Children and pets surveillance data (base of 325 resp. ever used an object)
Children and pets surveillance |
||
Suivi de l'enfant (localisation) |
43% |
|
Santé et forme physique de l`enfant |
27% |
|
Localisation des animaux domestiques |
20% |
|
Autre(s) = babycameras |
20% |
|
Alimentation à distance des animaux |
8% |
Home
Home related data is the second needing the highest protection. So the demanded security level goes up to 3,77 out 4. Five the most collected data segments are movements detector, inside/outside temperature, fire alarm, windows/doors openings and electricity/light control. Those types of data are collected at least by 42% of this devices users, hence recommended to be included in the app.
Table 5 - The most collected Home related data (base of 647 resp. ever used an object)
Home |
||
Détection des mouvements |
59% |
|
Température |
57% |
|
Alerte incendie |
45% |
|
Ouverture de portes / fenêtres |
43% |
|
Électricité / éclairage |
42% |
|
Humidité |
18% |
|
Qualité de l'air |
15% |
|
Fuites de gaz / eau |
11% |
|
Mesure sonore (sonomètre) |
10% |
|
Plantes (humidité, lumière, température du sol) |
9% |
|
Autre(s) |
9% |
Health (specific medical data)
Health related data (in particular specific medical data) is considered to be highly personal and is preferred to be protected. Its demanded security level is 3,69. As to the most commonly collected data categories, they are heart rate, body temperature and blood sugar rates meanwhile the heart rate is the most tracked data with those devices.
Table 6 - The most collected Health related data (base of 189 resp. ever used an object)
Health (specific medical data) |
||
Rythme cardiaque |
84% |
|
Température du corps |
16% |
|
Taux de sucre dans le sang |
14% |
|
Activité cérébrale |
11% |
|
Taux de cholestérol |
11% |
|
Taux d'alcool dans le sang |
10% |
|
Autre(s) |
9% |
|
Taux d'exposition aux UV |
9% |
Car
The most collected Car related data is GPS, speed and mileage and its demanded security level is 3,27 out 4.
Table 7 - The most collected Car related data (base of 609 resp. ever used an object)
Car |
||
Données de localisation (GPS) |
90% |
|
Vitesse |
58% |
|
Distance parcourue |
56% |
|
Consommation énergétique |
27% |
|
Autre(s) |
9% |
Physical form and well-being
Physical form and well-being data in contrast with the Health related data is less valuable. The demanded security level equals 3,25 vs 3,69 of health data one. Consequently, it is proven to be important to distinguish those data communication and persuade more health concerned consumers in data security.
In the app the physical data is recommended to be represented at least by weight, heart rate, calories intake/calories burnt, sleep data.
Table 8 - The most collected Physical form and well-being data (base of 421 resp. ever used an object)
Physical form and well-being |
||
Poids |
61% |
|
Rythme cardiaque |
53% |
|
Calories ingérées / dépensées |
45% |
|
Sommeil |
43% |
|
Masse graisseuse / musculaire |
35% |
|
Taille |
21% |
|
Posture / position du corps |
7% |
|
Autre(s) |
5% |
Sport performance
Sport performance data demanded security level is 2,71 out 4 which is the lowest yet still more the median. This data segment is better to be represented all the proposed data types since at least they are collected by 57% of users. Distance, calories burnt, GPS and steps are the most tracked by far.
Table 9 - The most collected Sport performance data (base of 518 resp. ever used an object)
Sport performance |
||
Distance parcourue |
91% |
|
Calories dépensées |
70% |
|
Données de localisation |
68% |
|
Nombre de pas |
67% |
|
Vitesse |
62% |
|
Données récoltées spécifiques à l'activité (vélo, running, tennis) |
58% |
|
Type d'activité exercée / Suivi des activités |
57% |
|
Autre(s) |
5% |
4.5 Recommendations
1. Work on the Orange image harder with younger audience
Since the young audience is the most attractive for the company in terms of early adopters' ratio within it, it is crucial to ameliorate the company image.
Nowadays, Orange being the most expansive provider and having a quarter of century long history (it's created 1 January 1991) i.e. being one of the oldest French telecom providers, Orange is not organically associated with the company for the youngsters. Even though the company communicates actively to the younger audience, those actions don't seem to be efficient enough.
At present moment, the company communication is sooner quality oriented with a premium touch which is putting accent on its expertise and quality services. In my opinion, Orange must not deteriorate this image. However the company could add more start-up style agility, challenge, dare to the market mood and play on the ground of young ambitious companies whereas not losing the side of the stable truth-worthy telecom giant.
2. Sheer youngsters to share their true data
As we discovered the correlation: the more data the person reveals the more fake data are in it. Somehow people tend to self-protect themselves by creating false data to fill the gaps in profiles.
Consequently, the purpose is to communicate more on shared data security while simultaneously support people's data sharing. As it was explored in qualitative and quantitative study various levels of data protection (from security certificates to promises to delete consumer's profile on demand) must be shown. In addition, it is essential to secure company-person communication with no access to the specific not generalized and not anonymous data by the third companies OR if giving such an access, to propose real high value services in return of the data.
This way Orange must dedicate all its expertise and data findings to creation of true original service propositions genuinely affinitive to consumers' needs. It is probably to be more preferable to hide partly pertinent offers unless it is demanded so by the consumer, and to show the best matches only.
3. Communicate on security more for Windows and Android phone users
Apple phone users seem to benefit from iOS security advantages. Apple security communication spreads as an echo to its devices and applications. Windows and Android users feel more insecure about their data since they are more likely to be hacked by side unauthorized programs.
Hence, for Orange it's preferably to present all the possible security guarantees in the application description without omit any. Furthermore, in order to reinforce communication and ensure better understanding of security and privacy conditions, I recommend creating a mobile Q&A page whose link's to be placed in the application description. That Q&A would explain further all security and privacy related details thus filling consumers' gaps in the application's security perception.
4. Integrate the top collected data of different categories in the App
At the moment of the application launch it is not necessary to ensure collection of all the possible data. It is sufficient to include into the application's options the gathering of the most frequently used data. Thus the demand for the essential data is satisfied without extra expenses from the company part.
Other data collection options can be added in subsequent period after ongoing analysis of consumer trends and new so-called “must-have” data detection. As soon as specific data is started being collected by larger number of consumers while the more and more devices propose the analysis of that data, it is the moment for the company to include such a data in the application.
This way the company can be sure both in return of its investments and in larger consumers' need coverage.
5. Communicate more on data security when including Children, Home and Health (medical) data in the app
Since people are more sensitive to the data concerning their loved ones they tend to protect it more. Consequently, not to hinder data sharing and not to deteriorate the security perception of the application, it is still preferable to create the Q&A page with several questions regarding children, home and health data in particular.
There it is important to highlight that company appreciate consumers' trust and values that data the most. It's also crucial to mention that security of such data is the company's foremost priority.
6. Communicate on data invisibility for others and not sharing with the third companied without permission
Consumers tend to trust to just a counterpart of the deal. This way, being persuaded in company's credibility and security, they don't expand this trust to the company's partners or other users of the system.
Moreover, other users are perceived hostilely, since they have no direct dependence of the data and their intentions are unknown (in contrast with company that needs the data for business) they can be trusted.
As a result, all the data a consumer share must be invisible for all the users by default. As to the third companies, if their additional value propositions (highly pertinent for a specific consumer services) are considered useful and attractive by the consumer, the one could authorize the chosen company to receive and treat the consumer data. In order to create incentives and promote the third companies services, the application could have online mobile page with the third companies' and their services' descriptions. Those examples must be interactive, representative and appealing otherwise the consumer won't see any need.
7. Communicate on users possibility to change their decision on data sharing with the third companies
It is recommended as well to give a trial period of the chosen third company services with automatic prolongation unless the consumer withdraws.
However, the consumers must be communicated in advance that the withdrawal is possible at any time; otherwise the trials' demand will be low if considered as a definitive subscription.
8. Allow to share the collected data one by one and allow to stop this share at any moment
It was discovered that guided by security / privacy issues the consumers prefer both at the moment of registration and at any moment of usage to consult the whole list of the data available for gathering. Then picking a data one by one gives the consumers the perception of control over the data and enhances their trust to the company (since they are sure not to have “blind spots” as they approve the data to share manually).
In addition, even if people choose not to share all the data, this option will let the coverage of larger audience: the application becomes attractive even to those who want to hide the health related data, for instance, and to share all the rest. In other case those concerned consumers won't install the application at all.
9. Allow to choose sharing of anonymous data according to its further usage (new services creation / service improvement)
The results also have shown that even a person, allowing the data collection to the third company, still share more willingly the anonymous data with the company application-provider directly (for the application improvement sake). Since the anonymous data sharing with the third companies for new services detection purposes is considered as a for-profit operation only, it is better to split the anonymous data sharing on two categories.
This will allow the company to stress the application security and transparency one more time thus stimulating the application installation and further data sharing.
Brief Executive Summary
Concluding the study results to generate additional revenues with a help of services collateral to the broadband Internet and Mobile, it's recommended to launch the app having the satisfying the following criteria:
ü Not sharing collected data with other users
ü Not sharing collected data with third companied automatically
ü Allowing to share the collected data one by one and allowing to stop this share at any moment
ü Allowing to choose sharing of anonymous data according to its further usage (new services creation / service improvement)
ü Allowing to work at least with the top collected data of different data categories
When building communication it's advised to make sure to
ü Communicate more on data security when including Children, Home and Health (medical) data in the app
ü Persuade in security Windows and Android users harder
ü Improve Orange image among younger audience
Conclusion
Internet of Things is gradually changing the world in which we live, our habits and means of communication. Security experts still have a lot of work to find effective ways to protect this new world.
Internet of Things is a new stage in the development of the Internet, greatly enhances the collection, analysis and distribution of data, which a person can be turned into information, knowledge and, ultimately, into wisdom. In this sense, the Internet of Things is of paramount importance.
According to the definition given by the Gartner research company, the Internet of Things is a "computer network of physical objects (things), equipped with built-in technologies for communication, perception of the outside world and interact with each other and with the environment."
In other words, any devices, systems and services from almost any industry can be automated by means of modern communications technology. Objects, endowed with intelligence, also referred to as the Internet of things. Thus, the Internet of Things is the objects in the physical world can send information about their own state and environment as well as data to be analyzed (e.g., via embedded devices).
Despite the fact that the Internet of things opens up many new possibilities realized through the use of software and network resources with this technology it involves a variety of tasks and problems in the field of security, which need to be resolved and overcome.
By 2020, the Internet will be 26 billion connected devices. The abundance of new applications and embedded devices will lead to a significant increase in web generated data, which in turn will dictate the need for improved storage and processing of data. But more importantly, with the increased need for data protection and security of these new Internet-connected devices from hackers.
Safety aspects will be of particular importance for a number of sectors where the development of the Internet of things can lead to very serious changes, for example, in manufacturing industry - where the global network will be connected to transport, equipment and production capacity. Under these conditions, the potential damage depends on the motivation of those persons who are involved in the process, but at the same time it means that external attackers can collect private information, or to pursue an even more sinister purposes: for example, turn off the alarm, or disable critical equipment for power.
It is important to ensure an appropriate level of security, authentication and encryption of communications for all the devices connected to the network, especially of those collecting Children, Home and Health data.
Security seems to be is a basic requirement that must be taken into account. However in term of marketing study we discovered that security of connected devices among other reasons is far from being the first one. In practice, being the emerging high-tech market proposition, those devices have a lots of shortcomings in eyes of consumers. Firstly, some of the smart devices categories have not proved yet their utility for consumers, so they don't see any benefit of owning one. Secondly, even if a consumer buys one, he or she is likely to be disappointed since the promise of devices performance exceeds their real capacities. Consequently, since the security comes as the fourth reason, the H1 is rejected.
Although security issues raise some concerns, there remains no doubt that the Internet of Things is able to provide organizations a number of advantages: network-connected devices will be able to generate valuable information that will enable companies to better understand how to use their products and services to provide a more high quality service to its customers and continue to monetize its software for competitive advantage.
Yet only by solving reliability, functionality and then security problems, every counterpart (producers, service-providers and consumers) will be able to fully take advantage of the "Internet of Things".
References
10. La Poste-opinionway. (17-18 December 2014). Connected devices study. Paris.
11. Ashton, K. (June 2009). That 'Internet of Things' Thing, in the real world things matter more than ideas. Auto-ID Center MIT.
12. CCM Benchmark. (2014). Les Francais et les objets connectes.
13. Deloitte. (2014). Technology, Media, Communication Predictions. London.
14. Evans, D. (2011, April). The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. Cisco.
15. Gartner. (2013, December). Press Release. Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020.
16. Harris Interactive. (2014). Objets connectes: the next big thing.
17. Hogan, M. (2014). The 'The Internet of Things Database' Data Management Requirements. ScaleDB.
18. IDC. (n.d.). The Internet of Things Across Western European Vertical Markets: New Insights on Opportunities and Use Cases. 2014, August.
19. Kharif, O. (8 January 2014). Cisco CEO Pegs Internet of Things as $19 Trillion Market. Retrieved from Bloomberg.com
20. KPCB. (2014, May). Internet trends 2014 - Code conference.
21. Lahlou, S. (2015). Identity, social status, privacy and face-keeping in digital society. Social Science Information, 47(3), 300-330.
22. Lexique de marketing. (n.d.). Retrieved 12 4, 2015, from Mercator-Publicitor: http://www.mercator-publicitor.fr/lexique-marketing-definition-objets-connectes
23. Magrassi, P., & Berg, T. (12 August 2002). A World of Smart Objects. Gartner research report R-17-2243.
Ïîäîáíûå äîêóìåíòû
The collection and analysis of information with a view of improving the business marketing activities. Qualitative & Quantitative Research. Interviews, Desk Research, Test Trial. Search Engines. Group interviews and focus groups, Secondary research.
ðåôåðàò [12,5 K], äîáàâëåí 17.02.2013Definition and classification of marketing communications, their variety and comparative characteristics. Models of formation of enterprise marketing, evaluation of their efficiency, structure and components. Factors influencing consumer behavior.
ïðåçåíòàöèÿ [2,7 M], äîáàâëåí 25.11.2015Marketing of scientific and technical products and services in the field of information technology. Differences sales activity in B2B and B2C. The role of the procurement center and features of the procurement decision-making in the industrial market.
ðåôåðàò [167,3 K], äîáàâëåí 27.05.2014Event marketing is a promotional strategy that involves face-to-face contact between companies and their customers at special events like concerts, fairs, and sporting events. Red Bull GmbH: facts and history. Efficacy of event marketing in the company.
ðåôåðàò [36,6 K], äîáàâëåí 18.03.2015Strategy and major stages of project’s fruition. Production of Korean cuisine dishes. Analysis of the industry sector, of produce’s market, of business rivals. Marketing plan, volume of sales, personnel and company management. Cost of the project.
êóðñîâàÿ ðàáîòà [724,1 K], äîáàâëåí 17.02.2013The history of the company. Entering the market of pastas and the present position of the company. The problem of the company. The marketing research. The history of the market of pastas of Saint Petersburg and its present state.
êóðñîâàÿ ðàáîòà [28,2 K], äîáàâëåí 03.11.2003Research tastes and preferences of consumers. Segmenting the market. Development of product concept and determine its characteristic. Calculating the optimal price at which the firm will maximize profits. Formation of optimal goods distribution.
êóðñîâàÿ ðàáîòà [4,4 M], äîáàâëåí 09.08.2014Getting to know the sources of competitive advantage. Consideration of the characteristics of the implementation of the marketing strategy. Characteristics of branding forms: corporate, emotional, digital. Analysis of the online advertising functions.
êóðñîâàÿ ðàáîòà [66,3 K], äîáàâëåí 09.02.2016Purpose of the Marketing Plan. Organization Mission Statement. The main strategies employed by BMW. Sales volume of automobiles. New records set for revenues and earnings. Current models of BMW. Product life cycle. Engagement in Celebrity Endorsement.
êóðñîâàÿ ðàáîòà [879,4 K], äîáàâëåí 03.05.2015Theoretical aspects of efficiency of development of advertising activity and your place in marketing system, development and its value for manufacturers and consumers. Research of the advertising campaign of the new goods in open company "Nataly".
äèïëîìíàÿ ðàáîòà [49,3 K], äîáàâëåí 19.06.2010