22,425 research outputs found

    How the Internet of Things (IoT) is Adding Proactivity to Insurance

    Get PDF
    20 pagesIn recent years, the insurance industry has seen a major shift in how data is used, specifically in the realm of risk prevention. Advancements in technology within the Internet of Things (IoT) have enabled more comprehensive data analysis, changing the way the industry views risk. This has led to an increased emphasis on solutions that are proactive, preventing risk as opposed to merely mitigating losses. Despite the industry being historically slow-moving and focused on response to risk, new offerings are now promoting prediction and prevention of risk. This report will explore the implementation of the Internet of Things into the insurance industry. First, the concepts of IoT and proactivity will be described. The state of the insurance industry will then be examined, followed by the culture of innovation within insurance companies and how it holds a significant role in driving the industry forward. A select overview of insurtech solutions that contribute to the theme of proactivity within IoT will be detailed. To follow, looming adoption issues will be addressed. Finally, the report will outline up-and-coming strategies in the industry, including the rising trends of integration and gamification

    Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies

    Full text link
    This paper proposes a methodology for designing decision support systems for visualising and mitigating the Internet of Things cyber risks. Digital technologies present new cyber risk in the supply chain which are often not visible to companies participating in the supply chains. This study investigates how the Internet of Things cyber risks can be visualised and mitigated in the process of designing business and supply chain strategies. The emerging DSS methodology present new findings on how digital technologies affect business and supply chain systems. Through epistemological analysis, the article derives with a decision support system for visualising supply chain cyber risk from Internet of Things digital technologies. Such methods do not exist at present and this represents the first attempt to devise a decision support system that would enable practitioners to develop a step by step process for visualising, assessing and mitigating the emerging cyber risk from IoT technologies on shared infrastructure in legacy supply chain systems

    Internet of Things and Their Coming Perspectives: A Real Options Approach

    Get PDF
    Internet of things is developing at a dizzying rate, and companies are forced to implement it in order to maintain their operational efficiency. The high flexibility inherent to these technologies makes it necessary to apply an appropriate measure, which properly assesses risks and rewards. Real options methodology is available as a tool which fits the conditions, both economic and strategic, under which investment in internet of things technologies is developed. The contribution of this paper is twofold. On the one hand, it offers an adequate tool to assess the strategic value of investment in internet of things technologies. On the other hand, it tries to raise awareness among managers of internet of things technologies because of their potential to contribute to economic and social progress. The results of the research described in this paper highlight the importance of taking action as quickly as possible if companies want to obtain the best possible performance. In order to enhance the understanding of internet of things technologies investment, this paper provides a methodology to assess the implementation of internet of things technologies by using the real options approach; in particular, the option to expand has been proposed for use in the decision-making process

    Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things

    Get PDF
    In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical application, a commercial vehicle, and reconfirmed our findings discussing an attack vector for an off-line societycritical facility. More work is necessary to increase usage of security strategies, available methods, processes and standards. The security information, currently often insufficient, should be provided in the user manuals of products and services to protect system users. We confirmed it lately when we conducted an additional survey of users, with users feeling as left out in their quest for own security and privacy. Finally, hardware-related security questions begin to come up on the agenda, with a general increase of interest and awareness of hardware contribution to the overall cyber-physical security. At the end of this paper we discuss possible countermeasures for dealing with threats in infrastructures, highlighting the role of authorities in this quest
    • …
    corecore