16.04.2014 Views

the-impact-of-datafication-on-strategic-landscapes

the-impact-of-datafication-on-strategic-landscapes

the-impact-of-datafication-on-strategic-landscapes

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.2.1<br />

SECURITY<br />

AND PRIVACY<br />

One <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> most comm<strong>on</strong>ly discussed barriers in<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> digital ec<strong>on</strong>omy is <str<strong>on</strong>g>the</str<strong>on</strong>g> effective management <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

security and privacy for corporati<strong>on</strong>s, individuals and<br />

government instituti<strong>on</strong>s – <str<strong>on</strong>g>of</str<strong>on</strong>g>ten <str<strong>on</strong>g>the</str<strong>on</strong>g>se even appear to<br />

be c<strong>on</strong>flicting interests. In many <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> new informati<strong>on</strong>-driven<br />

value chains, however, users are required<br />

to trust that <str<strong>on</strong>g>the</str<strong>on</strong>g>ir data is being used appropriately, in a<br />

manner that <str<strong>on</strong>g>the</str<strong>on</strong>g>y would approve <str<strong>on</strong>g>of</str<strong>on</strong>g> and by entities that<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g>y would ensure such data to. Many <str<strong>on</strong>g>dataficati<strong>on</strong></str<strong>on</strong>g><br />

soluti<strong>on</strong>s rely <strong>on</strong> cloud computing and data analytics<br />

as core comp<strong>on</strong>ents – users are unlikely, <str<strong>on</strong>g>the</str<strong>on</strong>g>refore, to<br />

ever have detailed knowledge <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> exact locati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

how and where <str<strong>on</strong>g>the</str<strong>on</strong>g>ir data is stored (and <str<strong>on</strong>g>the</str<strong>on</strong>g> legal<br />

ramificati<strong>on</strong>s <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> data being stored <str<strong>on</strong>g>the</str<strong>on</strong>g>re), or what<br />

o<str<strong>on</strong>g>the</str<strong>on</strong>g>r data it is being stored with.<br />

Many different methods have been proposed for solving<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> issues <str<strong>on</strong>g>of</str<strong>on</strong>g> privacy – from creating private stores<br />

for pers<strong>on</strong>al digital data to a broad variety <str<strong>on</strong>g>of</str<strong>on</strong>g> security<br />

mechanisms. Each industry will need to implement<br />

its own privacy standards and assess which technical<br />

soluti<strong>on</strong> will work best within its industrial boundaries.<br />

Failures to protect this privacy and security may lead<br />

to legal issues, as discussed in Secti<strong>on</strong> 6.2.4.<br />

The <str<strong>on</strong>g>impact</str<strong>on</strong>g> <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>dataficati<strong>on</strong></str<strong>on</strong>g> <strong>on</strong> <strong>strategic</strong> <strong>landscapes</strong> 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!