the-impact-of-datafication-on-strategic-landscapes
the-impact-of-datafication-on-strategic-landscapes
the-impact-of-datafication-on-strategic-landscapes
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
6.2.1<br />
SECURITY<br />
AND PRIVACY<br />
One <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> most comm<strong>on</strong>ly discussed barriers in<br />
<str<strong>on</strong>g>the</str<strong>on</strong>g> digital ec<strong>on</strong>omy is <str<strong>on</strong>g>the</str<strong>on</strong>g> effective management <str<strong>on</strong>g>of</str<strong>on</strong>g><br />
security and privacy for corporati<strong>on</strong>s, individuals and<br />
government instituti<strong>on</strong>s – <str<strong>on</strong>g>of</str<strong>on</strong>g>ten <str<strong>on</strong>g>the</str<strong>on</strong>g>se even appear to<br />
be c<strong>on</strong>flicting interests. In many <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> new informati<strong>on</strong>-driven<br />
value chains, however, users are required<br />
to trust that <str<strong>on</strong>g>the</str<strong>on</strong>g>ir data is being used appropriately, in a<br />
manner that <str<strong>on</strong>g>the</str<strong>on</strong>g>y would approve <str<strong>on</strong>g>of</str<strong>on</strong>g> and by entities that<br />
<str<strong>on</strong>g>the</str<strong>on</strong>g>y would ensure such data to. Many <str<strong>on</strong>g>dataficati<strong>on</strong></str<strong>on</strong>g><br />
soluti<strong>on</strong>s rely <strong>on</strong> cloud computing and data analytics<br />
as core comp<strong>on</strong>ents – users are unlikely, <str<strong>on</strong>g>the</str<strong>on</strong>g>refore, to<br />
ever have detailed knowledge <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> exact locati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g><br />
how and where <str<strong>on</strong>g>the</str<strong>on</strong>g>ir data is stored (and <str<strong>on</strong>g>the</str<strong>on</strong>g> legal<br />
ramificati<strong>on</strong>s <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> data being stored <str<strong>on</strong>g>the</str<strong>on</strong>g>re), or what<br />
o<str<strong>on</strong>g>the</str<strong>on</strong>g>r data it is being stored with.<br />
Many different methods have been proposed for solving<br />
<str<strong>on</strong>g>the</str<strong>on</strong>g> issues <str<strong>on</strong>g>of</str<strong>on</strong>g> privacy – from creating private stores<br />
for pers<strong>on</strong>al digital data to a broad variety <str<strong>on</strong>g>of</str<strong>on</strong>g> security<br />
mechanisms. Each industry will need to implement<br />
its own privacy standards and assess which technical<br />
soluti<strong>on</strong> will work best within its industrial boundaries.<br />
Failures to protect this privacy and security may lead<br />
to legal issues, as discussed in Secti<strong>on</strong> 6.2.4.<br />
The <str<strong>on</strong>g>impact</str<strong>on</strong>g> <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>dataficati<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>strategic</strong> <strong>landscapes</strong> 22