IoT gold rush
Industry analysts agree on one thing: An explosion of Internet-enabled consumer products, connected cars, smart homes and wearables will generate a global economic boom over the next five years. One third of enterprise respondents to Computerworld’s Forecast Study 2015 last November said they were initiating IoT initiatives this year. Forbes reported in July that the pace had dramatically accelerated, with over three-quarters now jumping onto the IoT bandwagon.
The result? Twenty-four billion Internet-connected devices — over three per person on the planet — before the decade is up, by some estimates.
MORE ON CSO: 6 products that will protect your privacy
Whether this explosion amounts to the $1.7 trillion annual spend that IDC predicts depends on two factors: the value this IoT delivers to users and user trust in its privacy and security.
In a May analysis, Gartner said cybersecurity and privacy concerns are the main obstacles to IoT adoption. A January report by the U.S. Federal Trade Commission enumerated the risks of a standard-less IoT: enabling unauthorized access and use of personal information, facilitating attacks on other systems and endangering personal safety.
What are the specific IoT risks people worry about?
Prospective buyers of connected cars have heard the reports of hackers taking over control of the vehicle, putting passengers at risk of an accident. They also worry about others being able to remotely monitor conversations inside the vehicle, monitor compliance with traffic regulations and predict when and where they will be.
Future consumers of smart homes — houses containing interconnected appliances, smart meters and smart TVs — similarly worry about outside parties being able to assume remote control of their living space, monitor activity, predict whereabouts and also draw conclusions about what type of people they are based on their living patterns.
As wearables expand beyond tracking the number of steps per day into more comprehensive health and wellness profiles integrated with smartphones and social networks, users’ commentary and concern about the use and disclosure of their data dossiers are increasing.
Vendors of IoT components should expect that researchers and movie scriptwriters will capitalize on these scenarios and other perceived vulnerabilities of the IoT ecosystem and stoke user fears of the unknown.
How can IoT stakeholders own the narrative and write a lucrative future for the world economy?
Five privacy linchpins
2015 Enterprise Vulnerability Management Trends Report
Affordable Multichannel Contact Center Capabilities
What could an IOT privacy framework look like? I think five core tenets would address the main risks and fears enumerated above.
1. Tested security. It’s one thing to adopt a set of security controls like the Payment Card Industry Data Security Standard, designed to reduce credit card fraud. It’s another thing for those controls to prevail in a sophisticated penetration test. The IoT would need to set the bar at this higher level to earn maximum user trust.
2. Data minimization. IoT components should maintain default settings that use the minimum amount of personal data to perform their service. Minimum can mean minimum types of data fields collected and exposed to other devices as well as minimum periods of data retention.
3. Controlled and transparent disclosure. Law enforcement and national defense around the world will seek to pursue their legitimate objectives within the IoT. Virtually every industry will seek to track or analyze their end consumers as they move through the system. Trust in the whole enterprise will collapse, however, if these pursuits are not counterbalanced with reliable disclosure controls that are proportionate to the identified threat, and widely known and understood.
4. Data portability. Users won’t want any one node of the IoT ecosystem to accumulate too much power by storing data in its own proprietary format. To bolster trust in the entire system, adopt a common data format that allows users to port their data from one platform to the next.
5. Right to be forgotten. The IoT should be safe for the most vulnerable in society: children, victims of crime and the poor. To protect their safety and thereby make the IoT the largest possible marketplace, enable users to completely opt out by being able to withdraw their data.
YOU MIGHT ALSO LIKE
Timothy De Block on the pathway to the security talent we crave
obama jinping summit
No letup seen in Chinese cyber spying
Ron Woerner on the pathway to the security talent we crave
After reading these, marketers may be thinking, “Our consumers and customers aren’t asking for these features.” Product designers are probably saying, “I don’t know how we’d do all that,” and lawyers are adding, “We wouldn’t back this until we could do it.”
If IoT providers want to crack the European market, however, it’s going to be a lot cheaper to design these features in ahead of time instead of waiting for the new EU General Data Protection Regulation (GDPR) to mandate them. The GDOR includes requirements such as “data protection by design” and the “right to be forgotten.”
Along these lines, the Online Trust Alliance has released a call for public comment on its IoT Draft Framework, a more detailed set of controls echoing many of the themes above. The next challenge for this or any IoT framework is whether a critical mass of influential adopters begin enforcing it.
Vanderbilt, Rockefeller and Carnegie ignited the Industrial Revolution that changed the global balance of power. The architects of the IoT stand at the dawn of an even larger opportunity. The degree to which they make the connection between trust and adoption will determine the magnitude of that realization.