SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
The aim of the project is to provide
User a “Digitally Inclusive” platform,
for “Security” needs, by which he
or she can feel secure, by assisting
Decision Making complemented by
Augmented Intelligence.

ZION:INTERNET OF THINGS.
SECURITY &
01

PROJECT
ABSTRACT
Different contexts,
Different meanings.

Behaviours

Reasons

Security is perceived to be of highest priority
irrespective of Public or Private setting today.
Meanings
Practices

Beliefs

Human beings are bound to make mistakes in a
dynamic environment.
When something Unexpected happens how do
we empower the individual to come out of that
situation.
Challenge was to design User Centred Next
Generation Personal Security System in a highly
connected world.
01
Strategic design of a digital platform for inclusion (security) - as product, process and system
that will sustain for next 5 years.
The digital platform on which Honeywell Offerings in the Security domain can be integrated
considering the dawn of new era i.e. ‘Internet of Things’.

FINAL
DELIVERABLES
01
- role of security and how its integration into the connected home?
- connected home for major geographies and ethnographies around the globe
- major use cases for the wanderers generation, nuclear families and empty nest
scenarios.
- possible metamorphosis of security into the connected home scenario.
- understanding of behavioral influencers: work / environmental, personal product/
device usage,  personas, competitive influences.

 

INITIAL
BRIEF

‘ Connected Home, Security,
Internet of Things and People
derive deep insight into the
behavior and shift in security
paradigms in the Indian
scenario while also regarding
a. Internet of things,
b. Social connectivity,
c. Social behavior patterns and
d. The mobile phenomenon.

’
01
Futuristic Technology

Ecosystem appraoch

Finding user group

FIRST
THOUGHTS

Internet of Everything

Conferences

Public security

Smart cities

Honeywell Offerings Technology

Futuristic concepts

Millenials

Analysing User groups Contexts

Residential security

Understanding

Offbeat offerings
01

- Project Abstract
- Domain Introduction
- First thoughts
- Stakeholders and directions
- Process
- Environmental Scan

PROCESS
FOLLOWED

02

- Preperation for User Research
- Target Audience
- Mapping Technology and
Anxiety among users
- User Research
- Deriving and Mapping Insights

03

- Modelling system
- Information processing model
- Education, Engineering,
Enforcement
- Design directions

04

- Concept ZION
- Information architecture
- Persona
- Wireframes
- Prototyping Customer Journey

05

- Validating the concept
- Other concepts
- Factors influencing
concepts
- Limitations
01
ERICCSON - SOCIAL
WEB OF THINGS

CHINA INTERNET OF
THINGS

ENVIRONMENTAL
SCAN

IBM SMART CITY

SAMSUNG - CLOUD
INFRASTRUCTURE

CISCO - INTERNET OF
EVERYTHING

General Electric: GE INDUSTRIAL INTERNET

CABLE SHOW 2012	

KICKSTARTER
- CROWDFUNDED
VENTURES
01
Smart Phone + Gear

Smart Ring

PLATFORMS OF
INTERACTION

Finger Print Scan

Palm Vein Scan Retina Scan

Kinect - Depth sensing

Voice Analysis

Spatial Projection Surgical Implants Mood Sensing Google Glasses

Augmented reality

Face Recognition

Digital Signature Ear Recognition

Body Authentication Digital Presence

Smart cities
02
Customizable security solution Vs Standalone traditional solutions.
What does security mean to someone? Answer depends on
- Age
- Gender
- Location
- Emotional Connect
- Value attached
- Technology adaption
- Technology exposure

APPROACH
TAKEN

‘ User Centred Approach rather than
a Ecosystem based approach.

’

‘ What does it mean to be secured? ’
What does it mean to be connected?
02

TARGET
AUDIENCE
65 - 78

Retired, Helping Others

56 - 65

Enrichment activities, Stabilisation of kids

46 - 55

Better Purchases, Better place in the career

36 - 45

Moving into larger living space
Allocation of money for Familiy, Kids

28 - 35

Starting family, Specialization in chosen field

23 - 27

Major decisions such as Marriage,
Higher studies

17 - 22

Start Career, First Major decison such as Career choice

13 - 16

Dependent, Aware,
Individual decision maker

08 - 12

Getting exposed to things
02

ORDER OF
QUESTIONS
What is that you would want to Protect?
Are there any threats or concerns to
choices they selected?
What are the measures taken to protect
against threats or concerns?
What is theRole of Connectivity in Your
Life?
What are the ways by which you connect
to your loved ones?
Suggest a Metaphor for Security and
Connectivity
Establish a mapping between cards they
had selected for Security and
Connectivity.
02

USER
GROUP

35 Participants
8-78 Age group
Interviewee
Profiles
Students

Working Couple
Entreprenuer
Teacher
Artist
Company Secretrait
TV actor
House wives
Software professionals
03
While designing the platform these factors have to be considered:
- Use of medium such as video, text, voice depending upon the context
to communicate the information.
- Information design
- Hassle free navigation
- Dynamic trend analysis
- Machine learning about threat
- Biometric authentication
- Crowdsourced Information verification
- Clutter free graphics
- Interfaceless designs

DESIGN
DIRECTIONS

class of users
‘ A platform for allthem to interact
which empowers
with the subsytems. This makes
them Prepared for any situation.

’
04

CONCEPT
ZION
04

CONCEPT
ZION
04

SYSTEM
MODELLING

Weitere ähnliche Inhalte

Was ist angesagt?

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT TouchIntel IT Center
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPTHarsh Kumar
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationJisc
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistMatthew Rosenquist
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 

Was ist angesagt? (20)

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT Touch
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and education
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 

Ähnlich wie ZION: Security and Internet of Things

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
The Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceThe Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceJuho Vaiste
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
New Communication Paradigm and Security
New Communication Paradigm and SecurityNew Communication Paradigm and Security
New Communication Paradigm and SecurityMarco Raposo
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-programPaige Rasid
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 

Ähnlich wie ZION: Security and Internet of Things (20)

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
The Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceThe Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before Superintelligence
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
New Communication Paradigm and Security
New Communication Paradigm and SecurityNew Communication Paradigm and Security
New Communication Paradigm and Security
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 

Kürzlich hochgeladen

The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Delhi Call girls
 
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
SCRIP Lua HTTP PROGRACMACION PLC  WECON CASCRIP Lua HTTP PROGRACMACION PLC  WECON CA
SCRIP Lua HTTP PROGRACMACION PLC WECON CANestorGamez6
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵anilsa9823
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfParomita Roy
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...BarusRa
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️soniya singh
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...Suhani Kapoor
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxTusharBahuguna2
 
Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...
Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...
Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...nagunakhan
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Delhi Call girls
 
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiVIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
 

Kürzlich hochgeladen (20)

The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
 
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
SCRIP Lua HTTP PROGRACMACION PLC  WECON CASCRIP Lua HTTP PROGRACMACION PLC  WECON CA
SCRIP Lua HTTP PROGRACMACION PLC WECON CA
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
 
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdfChapter 19_DDA_TOD Policy_First Draft 2012.pdf
Chapter 19_DDA_TOD Policy_First Draft 2012.pdf
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
 
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
Call Girls in Kalkaji Delhi 8264348440 call girls ❤️
 
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
VIP College Call Girls Gorakhpur Bhavna 8250192130 Independent Escort Service...
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
 
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
 
Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...
Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...
Nepali Escort Girl Gomti Nagar \ 9548273370 Indian Call Girls Service Lucknow...
 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
 
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiVIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
 

ZION: Security and Internet of Things

  • 1. The aim of the project is to provide User a “Digitally Inclusive” platform, for “Security” needs, by which he or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence. ZION:INTERNET OF THINGS. SECURITY &
  • 2. 01 PROJECT ABSTRACT Different contexts, Different meanings. Behaviours Reasons Security is perceived to be of highest priority irrespective of Public or Private setting today. Meanings Practices Beliefs Human beings are bound to make mistakes in a dynamic environment. When something Unexpected happens how do we empower the individual to come out of that situation. Challenge was to design User Centred Next Generation Personal Security System in a highly connected world.
  • 3. 01 Strategic design of a digital platform for inclusion (security) - as product, process and system that will sustain for next 5 years. The digital platform on which Honeywell Offerings in the Security domain can be integrated considering the dawn of new era i.e. ‘Internet of Things’. FINAL DELIVERABLES
  • 4. 01 - role of security and how its integration into the connected home? - connected home for major geographies and ethnographies around the globe - major use cases for the wanderers generation, nuclear families and empty nest scenarios. - possible metamorphosis of security into the connected home scenario. - understanding of behavioral influencers: work / environmental, personal product/ device usage,  personas, competitive influences.   INITIAL BRIEF ‘ Connected Home, Security, Internet of Things and People derive deep insight into the behavior and shift in security paradigms in the Indian scenario while also regarding a. Internet of things, b. Social connectivity, c. Social behavior patterns and d. The mobile phenomenon. ’
  • 5. 01 Futuristic Technology Ecosystem appraoch Finding user group FIRST THOUGHTS Internet of Everything Conferences Public security Smart cities Honeywell Offerings Technology Futuristic concepts Millenials Analysing User groups Contexts Residential security Understanding Offbeat offerings
  • 6. 01 - Project Abstract - Domain Introduction - First thoughts - Stakeholders and directions - Process - Environmental Scan PROCESS FOLLOWED 02 - Preperation for User Research - Target Audience - Mapping Technology and Anxiety among users - User Research - Deriving and Mapping Insights 03 - Modelling system - Information processing model - Education, Engineering, Enforcement - Design directions 04 - Concept ZION - Information architecture - Persona - Wireframes - Prototyping Customer Journey 05 - Validating the concept - Other concepts - Factors influencing concepts - Limitations
  • 7. 01 ERICCSON - SOCIAL WEB OF THINGS CHINA INTERNET OF THINGS ENVIRONMENTAL SCAN IBM SMART CITY SAMSUNG - CLOUD INFRASTRUCTURE CISCO - INTERNET OF EVERYTHING General Electric: GE INDUSTRIAL INTERNET CABLE SHOW 2012 KICKSTARTER - CROWDFUNDED VENTURES
  • 8. 01 Smart Phone + Gear Smart Ring PLATFORMS OF INTERACTION Finger Print Scan Palm Vein Scan Retina Scan Kinect - Depth sensing Voice Analysis Spatial Projection Surgical Implants Mood Sensing Google Glasses Augmented reality Face Recognition Digital Signature Ear Recognition Body Authentication Digital Presence Smart cities
  • 9. 02 Customizable security solution Vs Standalone traditional solutions. What does security mean to someone? Answer depends on - Age - Gender - Location - Emotional Connect - Value attached - Technology adaption - Technology exposure APPROACH TAKEN ‘ User Centred Approach rather than a Ecosystem based approach. ’ ‘ What does it mean to be secured? ’ What does it mean to be connected?
  • 10. 02 TARGET AUDIENCE 65 - 78 Retired, Helping Others 56 - 65 Enrichment activities, Stabilisation of kids 46 - 55 Better Purchases, Better place in the career 36 - 45 Moving into larger living space Allocation of money for Familiy, Kids 28 - 35 Starting family, Specialization in chosen field 23 - 27 Major decisions such as Marriage, Higher studies 17 - 22 Start Career, First Major decison such as Career choice 13 - 16 Dependent, Aware, Individual decision maker 08 - 12 Getting exposed to things
  • 11. 02 ORDER OF QUESTIONS What is that you would want to Protect? Are there any threats or concerns to choices they selected? What are the measures taken to protect against threats or concerns? What is theRole of Connectivity in Your Life? What are the ways by which you connect to your loved ones? Suggest a Metaphor for Security and Connectivity Establish a mapping between cards they had selected for Security and Connectivity.
  • 12. 02 USER GROUP 35 Participants 8-78 Age group Interviewee Profiles Students Working Couple Entreprenuer Teacher Artist Company Secretrait TV actor House wives Software professionals
  • 13. 03 While designing the platform these factors have to be considered: - Use of medium such as video, text, voice depending upon the context to communicate the information. - Information design - Hassle free navigation - Dynamic trend analysis - Machine learning about threat - Biometric authentication - Crowdsourced Information verification - Clutter free graphics - Interfaceless designs DESIGN DIRECTIONS class of users ‘ A platform for allthem to interact which empowers with the subsytems. This makes them Prepared for any situation. ’