SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
The aim of the project is to provide
User a “Digitally Inclusive” platform,
for “Security” needs, by which he
or she can feel secure, by assisting
Decision Making complemented by
Augmented Intelligence.

ZION:INTERNET OF THINGS.
SECURITY &
01

PROJECT
ABSTRACT
Different contexts,
Different meanings.

Behaviours

Reasons

Security is perceived to be of highest priority
irrespective of Public or Private setting today.
Meanings
Practices

Beliefs

Human beings are bound to make mistakes in a
dynamic environment.
When something Unexpected happens how do
we empower the individual to come out of that
situation.
Challenge was to design User Centred Next
Generation Personal Security System in a highly
connected world.
01
Strategic design of a digital platform for inclusion (security) - as product, process and system
that will sustain for next 5 years.
The digital platform on which Honeywell Offerings in the Security domain can be integrated
considering the dawn of new era i.e. ‘Internet of Things’.

FINAL
DELIVERABLES
01
- role of security and how its integration into the connected home?
- connected home for major geographies and ethnographies around the globe
- major use cases for the wanderers generation, nuclear families and empty nest
scenarios.
- possible metamorphosis of security into the connected home scenario.
- understanding of behavioral influencers: work / environmental, personal product/
device usage,  personas, competitive influences.

 

INITIAL
BRIEF

‘ Connected Home, Security,
Internet of Things and People
derive deep insight into the
behavior and shift in security
paradigms in the Indian
scenario while also regarding
a. Internet of things,
b. Social connectivity,
c. Social behavior patterns and
d. The mobile phenomenon.

’
01
Futuristic Technology

Ecosystem appraoch

Finding user group

FIRST
THOUGHTS

Internet of Everything

Conferences

Public security

Smart cities

Honeywell Offerings Technology

Futuristic concepts

Millenials

Analysing User groups Contexts

Residential security

Understanding

Offbeat offerings
01

- Project Abstract
- Domain Introduction
- First thoughts
- Stakeholders and directions
- Process
- Environmental Scan

PROCESS
FOLLOWED

02

- Preperation for User Research
- Target Audience
- Mapping Technology and
Anxiety among users
- User Research
- Deriving and Mapping Insights

03

- Modelling system
- Information processing model
- Education, Engineering,
Enforcement
- Design directions

04

- Concept ZION
- Information architecture
- Persona
- Wireframes
- Prototyping Customer Journey

05

- Validating the concept
- Other concepts
- Factors influencing
concepts
- Limitations
01
ERICCSON - SOCIAL
WEB OF THINGS

CHINA INTERNET OF
THINGS

ENVIRONMENTAL
SCAN

IBM SMART CITY

SAMSUNG - CLOUD
INFRASTRUCTURE

CISCO - INTERNET OF
EVERYTHING

General Electric: GE INDUSTRIAL INTERNET

CABLE SHOW 2012	

KICKSTARTER
- CROWDFUNDED
VENTURES
01
Smart Phone + Gear

Smart Ring

PLATFORMS OF
INTERACTION

Finger Print Scan

Palm Vein Scan Retina Scan

Kinect - Depth sensing

Voice Analysis

Spatial Projection Surgical Implants Mood Sensing Google Glasses

Augmented reality

Face Recognition

Digital Signature Ear Recognition

Body Authentication Digital Presence

Smart cities
02
Customizable security solution Vs Standalone traditional solutions.
What does security mean to someone? Answer depends on
- Age
- Gender
- Location
- Emotional Connect
- Value attached
- Technology adaption
- Technology exposure

APPROACH
TAKEN

‘ User Centred Approach rather than
a Ecosystem based approach.

’

‘ What does it mean to be secured? ’
What does it mean to be connected?
02

TARGET
AUDIENCE
65 - 78

Retired, Helping Others

56 - 65

Enrichment activities, Stabilisation of kids

46 - 55

Better Purchases, Better place in the career

36 - 45

Moving into larger living space
Allocation of money for Familiy, Kids

28 - 35

Starting family, Specialization in chosen field

23 - 27

Major decisions such as Marriage,
Higher studies

17 - 22

Start Career, First Major decison such as Career choice

13 - 16

Dependent, Aware,
Individual decision maker

08 - 12

Getting exposed to things
02

ORDER OF
QUESTIONS
What is that you would want to Protect?
Are there any threats or concerns to
choices they selected?
What are the measures taken to protect
against threats or concerns?
What is theRole of Connectivity in Your
Life?
What are the ways by which you connect
to your loved ones?
Suggest a Metaphor for Security and
Connectivity
Establish a mapping between cards they
had selected for Security and
Connectivity.
02

USER
GROUP

35 Participants
8-78 Age group
Interviewee
Profiles
Students

Working Couple
Entreprenuer
Teacher
Artist
Company Secretrait
TV actor
House wives
Software professionals
03
While designing the platform these factors have to be considered:
- Use of medium such as video, text, voice depending upon the context
to communicate the information.
- Information design
- Hassle free navigation
- Dynamic trend analysis
- Machine learning about threat
- Biometric authentication
- Crowdsourced Information verification
- Clutter free graphics
- Interfaceless designs

DESIGN
DIRECTIONS

class of users
‘ A platform for allthem to interact
which empowers
with the subsytems. This makes
them Prepared for any situation.

’
04

CONCEPT
ZION
04

CONCEPT
ZION
04

SYSTEM
MODELLING

Más contenido relacionado

La actualidad más candente

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
Lillie Coney
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Market Engel SAS
 

La actualidad más candente (20)

Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT Touch
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and education
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 

Similar a ZION: Security and Internet of Things

Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
Shivananda Rai
 

Similar a ZION: Security and Internet of Things (20)

TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
The Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceThe Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before Superintelligence
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
New Communication Paradigm and Security
New Communication Paradigm and SecurityNew Communication Paradigm and Security
New Communication Paradigm and Security
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 

Último

Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
amitlee9823
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
eeanqy
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
home
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
TusharBahuguna2
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
nirzagarg
 
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men 🔝jhansi🔝 Escorts S...
➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men  🔝jhansi🔝   Escorts S...➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men  🔝jhansi🔝   Escorts S...
➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men 🔝jhansi🔝 Escorts S...
amitlee9823
 
Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...
Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...
Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...
amitlee9823
 

Último (20)

Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Basavanagudi Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Q4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationQ4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentation
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
 
Book Paid In Vashi In 8976425520 Navi Mumbai Call Girls
Book Paid In Vashi In 8976425520 Navi Mumbai Call GirlsBook Paid In Vashi In 8976425520 Navi Mumbai Call Girls
Book Paid In Vashi In 8976425520 Navi Mumbai Call Girls
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfJordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
 
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
HiFi Call Girl Service Delhi Phone ☞ 9899900591 ☜ Escorts Service at along wi...
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard  ...
Anamika Escorts Service Darbhanga ❣️ 7014168258 ❣️ High Cost Unlimited Hard ...
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
 
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Jp Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Vasundhra (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
 
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 105, Noida Call girls :8448380779 Model Escorts | 100% verified
 
➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men 🔝jhansi🔝 Escorts S...
➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men  🔝jhansi🔝   Escorts S...➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men  🔝jhansi🔝   Escorts S...
➥🔝 7737669865 🔝▻ jhansi Call-girls in Women Seeking Men 🔝jhansi🔝 Escorts S...
 
Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...
Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...
Vip Mumbai Call Girls Bandra West Call On 9920725232 With Body to body massag...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
 

ZION: Security and Internet of Things

  • 1. The aim of the project is to provide User a “Digitally Inclusive” platform, for “Security” needs, by which he or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence. ZION:INTERNET OF THINGS. SECURITY &
  • 2. 01 PROJECT ABSTRACT Different contexts, Different meanings. Behaviours Reasons Security is perceived to be of highest priority irrespective of Public or Private setting today. Meanings Practices Beliefs Human beings are bound to make mistakes in a dynamic environment. When something Unexpected happens how do we empower the individual to come out of that situation. Challenge was to design User Centred Next Generation Personal Security System in a highly connected world.
  • 3. 01 Strategic design of a digital platform for inclusion (security) - as product, process and system that will sustain for next 5 years. The digital platform on which Honeywell Offerings in the Security domain can be integrated considering the dawn of new era i.e. ‘Internet of Things’. FINAL DELIVERABLES
  • 4. 01 - role of security and how its integration into the connected home? - connected home for major geographies and ethnographies around the globe - major use cases for the wanderers generation, nuclear families and empty nest scenarios. - possible metamorphosis of security into the connected home scenario. - understanding of behavioral influencers: work / environmental, personal product/ device usage,  personas, competitive influences.   INITIAL BRIEF ‘ Connected Home, Security, Internet of Things and People derive deep insight into the behavior and shift in security paradigms in the Indian scenario while also regarding a. Internet of things, b. Social connectivity, c. Social behavior patterns and d. The mobile phenomenon. ’
  • 5. 01 Futuristic Technology Ecosystem appraoch Finding user group FIRST THOUGHTS Internet of Everything Conferences Public security Smart cities Honeywell Offerings Technology Futuristic concepts Millenials Analysing User groups Contexts Residential security Understanding Offbeat offerings
  • 6. 01 - Project Abstract - Domain Introduction - First thoughts - Stakeholders and directions - Process - Environmental Scan PROCESS FOLLOWED 02 - Preperation for User Research - Target Audience - Mapping Technology and Anxiety among users - User Research - Deriving and Mapping Insights 03 - Modelling system - Information processing model - Education, Engineering, Enforcement - Design directions 04 - Concept ZION - Information architecture - Persona - Wireframes - Prototyping Customer Journey 05 - Validating the concept - Other concepts - Factors influencing concepts - Limitations
  • 7. 01 ERICCSON - SOCIAL WEB OF THINGS CHINA INTERNET OF THINGS ENVIRONMENTAL SCAN IBM SMART CITY SAMSUNG - CLOUD INFRASTRUCTURE CISCO - INTERNET OF EVERYTHING General Electric: GE INDUSTRIAL INTERNET CABLE SHOW 2012 KICKSTARTER - CROWDFUNDED VENTURES
  • 8. 01 Smart Phone + Gear Smart Ring PLATFORMS OF INTERACTION Finger Print Scan Palm Vein Scan Retina Scan Kinect - Depth sensing Voice Analysis Spatial Projection Surgical Implants Mood Sensing Google Glasses Augmented reality Face Recognition Digital Signature Ear Recognition Body Authentication Digital Presence Smart cities
  • 9. 02 Customizable security solution Vs Standalone traditional solutions. What does security mean to someone? Answer depends on - Age - Gender - Location - Emotional Connect - Value attached - Technology adaption - Technology exposure APPROACH TAKEN ‘ User Centred Approach rather than a Ecosystem based approach. ’ ‘ What does it mean to be secured? ’ What does it mean to be connected?
  • 10. 02 TARGET AUDIENCE 65 - 78 Retired, Helping Others 56 - 65 Enrichment activities, Stabilisation of kids 46 - 55 Better Purchases, Better place in the career 36 - 45 Moving into larger living space Allocation of money for Familiy, Kids 28 - 35 Starting family, Specialization in chosen field 23 - 27 Major decisions such as Marriage, Higher studies 17 - 22 Start Career, First Major decison such as Career choice 13 - 16 Dependent, Aware, Individual decision maker 08 - 12 Getting exposed to things
  • 11. 02 ORDER OF QUESTIONS What is that you would want to Protect? Are there any threats or concerns to choices they selected? What are the measures taken to protect against threats or concerns? What is theRole of Connectivity in Your Life? What are the ways by which you connect to your loved ones? Suggest a Metaphor for Security and Connectivity Establish a mapping between cards they had selected for Security and Connectivity.
  • 12. 02 USER GROUP 35 Participants 8-78 Age group Interviewee Profiles Students Working Couple Entreprenuer Teacher Artist Company Secretrait TV actor House wives Software professionals
  • 13. 03 While designing the platform these factors have to be considered: - Use of medium such as video, text, voice depending upon the context to communicate the information. - Information design - Hassle free navigation - Dynamic trend analysis - Machine learning about threat - Biometric authentication - Crowdsourced Information verification - Clutter free graphics - Interfaceless designs DESIGN DIRECTIONS class of users ‘ A platform for allthem to interact which empowers with the subsytems. This makes them Prepared for any situation. ’