• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
ZION: Security and Internet of Things
 

ZION: Security and Internet of Things

on

  • 441 views

The aim of the project is to provide ...

The aim of the project is to provide
User a “Digitally Inclusive” platform,
for “Security” needs, by which he
or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence.

Statistics

Views

Total Views
441
Views on SlideShare
334
Embed Views
107

Actions

Likes
0
Downloads
117
Comments
0

2 Embeds 107

http://www.behance.net 91
https://www.behance.net 16

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    ZION: Security and Internet of Things ZION: Security and Internet of Things Presentation Transcript

    • The aim of the project is to provide User a “Digitally Inclusive” platform, for “Security” needs, by which he or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence. ZION:INTERNET OF THINGS. SECURITY &
    • 01 PROJECT ABSTRACT Different contexts, Different meanings. Behaviours Reasons Security is perceived to be of highest priority irrespective of Public or Private setting today. Meanings Practices Beliefs Human beings are bound to make mistakes in a dynamic environment. When something Unexpected happens how do we empower the individual to come out of that situation. Challenge was to design User Centred Next Generation Personal Security System in a highly connected world.
    • 01 Strategic design of a digital platform for inclusion (security) - as product, process and system that will sustain for next 5 years. The digital platform on which Honeywell Offerings in the Security domain can be integrated considering the dawn of new era i.e. ‘Internet of Things’. FINAL DELIVERABLES
    • 01 - role of security and how its integration into the connected home? - connected home for major geographies and ethnographies around the globe - major use cases for the wanderers generation, nuclear families and empty nest scenarios. - possible metamorphosis of security into the connected home scenario. - understanding of behavioral influencers: work / environmental, personal product/ device usage,  personas, competitive influences.   INITIAL BRIEF ‘ Connected Home, Security, Internet of Things and People derive deep insight into the behavior and shift in security paradigms in the Indian scenario while also regarding a. Internet of things, b. Social connectivity, c. Social behavior patterns and d. The mobile phenomenon. ’
    • 01 Futuristic Technology Ecosystem appraoch Finding user group FIRST THOUGHTS Internet of Everything Conferences Public security Smart cities Honeywell Offerings Technology Futuristic concepts Millenials Analysing User groups Contexts Residential security Understanding Offbeat offerings
    • 01 - Project Abstract - Domain Introduction - First thoughts - Stakeholders and directions - Process - Environmental Scan PROCESS FOLLOWED 02 - Preperation for User Research - Target Audience - Mapping Technology and Anxiety among users - User Research - Deriving and Mapping Insights 03 - Modelling system - Information processing model - Education, Engineering, Enforcement - Design directions 04 - Concept ZION - Information architecture - Persona - Wireframes - Prototyping Customer Journey 05 - Validating the concept - Other concepts - Factors influencing concepts - Limitations
    • 01 ERICCSON - SOCIAL WEB OF THINGS CHINA INTERNET OF THINGS ENVIRONMENTAL SCAN IBM SMART CITY SAMSUNG - CLOUD INFRASTRUCTURE CISCO - INTERNET OF EVERYTHING General Electric: GE INDUSTRIAL INTERNET CABLE SHOW 2012 KICKSTARTER - CROWDFUNDED VENTURES
    • 01 Smart Phone + Gear Smart Ring PLATFORMS OF INTERACTION Finger Print Scan Palm Vein Scan Retina Scan Kinect - Depth sensing Voice Analysis Spatial Projection Surgical Implants Mood Sensing Google Glasses Augmented reality Face Recognition Digital Signature Ear Recognition Body Authentication Digital Presence Smart cities
    • 02 Customizable security solution Vs Standalone traditional solutions. What does security mean to someone? Answer depends on - Age - Gender - Location - Emotional Connect - Value attached - Technology adaption - Technology exposure APPROACH TAKEN ‘ User Centred Approach rather than a Ecosystem based approach. ’ ‘ What does it mean to be secured? ’ What does it mean to be connected?
    • 02 TARGET AUDIENCE 65 - 78 Retired, Helping Others 56 - 65 Enrichment activities, Stabilisation of kids 46 - 55 Better Purchases, Better place in the career 36 - 45 Moving into larger living space Allocation of money for Familiy, Kids 28 - 35 Starting family, Specialization in chosen field 23 - 27 Major decisions such as Marriage, Higher studies 17 - 22 Start Career, First Major decison such as Career choice 13 - 16 Dependent, Aware, Individual decision maker 08 - 12 Getting exposed to things
    • 02 ORDER OF QUESTIONS What is that you would want to Protect? Are there any threats or concerns to choices they selected? What are the measures taken to protect against threats or concerns? What is theRole of Connectivity in Your Life? What are the ways by which you connect to your loved ones? Suggest a Metaphor for Security and Connectivity Establish a mapping between cards they had selected for Security and Connectivity.
    • 02 USER GROUP 35 Participants 8-78 Age group Interviewee Profiles Students Working Couple Entreprenuer Teacher Artist Company Secretrait TV actor House wives Software professionals
    • 03 While designing the platform these factors have to be considered: - Use of medium such as video, text, voice depending upon the context to communicate the information. - Information design - Hassle free navigation - Dynamic trend analysis - Machine learning about threat - Biometric authentication - Crowdsourced Information verification - Clutter free graphics - Interfaceless designs DESIGN DIRECTIONS class of users ‘ A platform for allthem to interact which empowers with the subsytems. This makes them Prepared for any situation. ’
    • 04 CONCEPT ZION
    • 04 CONCEPT ZION
    • 04 SYSTEM MODELLING