SlideShare a Scribd company logo
The Internet of Things
Revealing consumer’s hidden desires
by Darya Loban and Anna Krivko,
3rd year, BA, Group 414
What is the Internet of Things?
2
The Internet of Things is a system of electronic devices, which
collect and exchange data.
The IoT is everywhere!
Benefits and threats of the IoT
Benefits
Health and fitness
Food
Smart-parenting
TV
Urbanism
Ecology
Household appliances
Transportation
Threats
Privacy and security
threat
Smart terrorism
Disunity
Development of the
Artificial Intelligence
3
Understand
customers'
experience
Find out
hidden
information
Become
customers‘
friend
Use
personalized
approach
The IoT in Communications and Marketing
4
40%
9%
60%
would share data in
exchange for incentives
would share data
without incentives
would share car data
for a free maintenance
Research and its results
100 respondents
57% female / 43% male
Aged from 14 to 62
General number
With software or
communication
1 - 5 1 - 5 35
1 - 5 32
6 - 10 6
1 - 5 14
6 - 10 5
1 - 5 1
6 - 10 2
11 and more 1
1 - 5 1
11 and more 3
Number of the
same responces
6 - 10
11 - 15
16 - 20
21 and more
General number of
gadgets used per day
5
Conclusion
1. The IoT is good
2. The IoT means customization through optimization
3. The IoT helps to make business decisions and form objectives
4. IoT is one of the ways of getting a competitive advantage
5. Show people, their data is treated properly and used for good
6. Target IoT on youngsters and young-adults
7. Remember, that the IoT is not cheap
8. Teach and study IoT hygiene
6

More Related Content

What's hot

Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact IT
Holly Ross
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
 
Internet of things
Internet of things Internet of things
Internet of things
RachadESSOURI
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
Mohammad Mohtashim
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
university of education,Lahore
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
Varunee Wongwichit
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
Vaishnavu Pathayathodi
 
Article on "internet of things"
Article on "internet of things"Article on "internet of things"
Article on "internet of things"
Team Saral
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT Touch
Intel IT Center
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
Ye Min Khaung
 
Human Agency on Algorithmic Systems
Human Agency on Algorithmic SystemsHuman Agency on Algorithmic Systems
Human Agency on Algorithmic Systems
Ansgar Koene
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
jaswinder singh thind
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
LamisaFaria
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
M phasis
M phasis M phasis
M phasis
Adarsh Mohan
 
IE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 yearsIE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 years
Andrea Salvati
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
Dania Purnama Sari
 
776 s0005
776 s0005776 s0005
776 s0005
oscarh1986
 

What's hot (20)

Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact IT
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Internet of things
Internet of things Internet of things
Internet of things
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Trends in Cybersecurity
Trends in CybersecurityTrends in Cybersecurity
Trends in Cybersecurity
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
Article on "internet of things"
Article on "internet of things"Article on "internet of things"
Article on "internet of things"
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT Touch
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Human Agency on Algorithmic Systems
Human Agency on Algorithmic SystemsHuman Agency on Algorithmic Systems
Human Agency on Algorithmic Systems
 
A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)A basic PPT on Internet Of Things(IOT)
A basic PPT on Internet Of Things(IOT)
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
M phasis
M phasis M phasis
M phasis
 
IE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 yearsIE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 years
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 
776 s0005
776 s0005776 s0005
776 s0005
 

Similar to The Internet of Things. Revealing Consumers' Hidden Desires

The rise of the e-patient - Lee Rainie
The rise of the e-patient - Lee RainieThe rise of the e-patient - Lee Rainie
The rise of the e-patient - Lee Rainie
Pew Research Center's Internet & American Life Project
 
005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15
Angry Mum
 
EY_Utilization of mobile devices in Romania_ALL
EY_Utilization of mobile devices in Romania_ALLEY_Utilization of mobile devices in Romania_ALL
EY_Utilization of mobile devices in Romania_ALL
Constantin Magdalina
 
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
TNS_Australia
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
MOTC Qatar
 
Setfu Tsela- Assignment 1
Setfu Tsela- Assignment 1Setfu Tsela- Assignment 1
Setfu Tsela- Assignment 1
Set4
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
Pew Research Center's Internet & American Life Project
 
Kaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engKaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_eng
Emisor Digital
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
Internet use and health information seeking behavior of adolescents in Mbarar...
Internet use and health information seeking behavior of adolescents in Mbarar...Internet use and health information seeking behavior of adolescents in Mbarar...
Internet use and health information seeking behavior of adolescents in Mbarar...
Center for Innovative Public Health Research
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
Digital Policy and Law Consulting
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
Juniper Networks
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
Louise Jones
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
Forum One
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilities
Firas Dabbagh
 
Audience Analysis
Audience AnalysisAudience Analysis
Audience Analysis
sfenton
 
Gigabit-Summit_2015_Liimatta
Gigabit-Summit_2015_LiimattaGigabit-Summit_2015_Liimatta
Gigabit-Summit_2015_Liimatta
Michael Liimatta
 
Exploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentExploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in Development
Development Innovations
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
 

Similar to The Internet of Things. Revealing Consumers' Hidden Desires (20)

The rise of the e-patient - Lee Rainie
The rise of the e-patient - Lee RainieThe rise of the e-patient - Lee Rainie
The rise of the e-patient - Lee Rainie
 
005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15005 kaspersky-digital-amnesia-19.6.15
005 kaspersky-digital-amnesia-19.6.15
 
EY_Utilization of mobile devices in Romania_ALL
EY_Utilization of mobile devices in Romania_ALLEY_Utilization of mobile devices in Romania_ALL
EY_Utilization of mobile devices in Romania_ALL
 
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
DNA://14 Connecting Consumers, Connecting Brands, Connecting Life by Alistair...
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Setfu Tsela- Assignment 1
Setfu Tsela- Assignment 1Setfu Tsela- Assignment 1
Setfu Tsela- Assignment 1
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
Kaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engKaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_eng
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Internet use and health information seeking behavior of adolescents in Mbarar...
Internet use and health information seeking behavior of adolescents in Mbarar...Internet use and health information seeking behavior of adolescents in Mbarar...
Internet use and health information seeking behavior of adolescents in Mbarar...
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilities
 
Audience Analysis
Audience AnalysisAudience Analysis
Audience Analysis
 
Gigabit-Summit_2015_Liimatta
Gigabit-Summit_2015_LiimattaGigabit-Summit_2015_Liimatta
Gigabit-Summit_2015_Liimatta
 
Exploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentExploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in Development
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 

Recently uploaded

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 

Recently uploaded (20)

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 

The Internet of Things. Revealing Consumers' Hidden Desires

  • 1. The Internet of Things Revealing consumer’s hidden desires by Darya Loban and Anna Krivko, 3rd year, BA, Group 414
  • 2. What is the Internet of Things? 2 The Internet of Things is a system of electronic devices, which collect and exchange data. The IoT is everywhere!
  • 3. Benefits and threats of the IoT Benefits Health and fitness Food Smart-parenting TV Urbanism Ecology Household appliances Transportation Threats Privacy and security threat Smart terrorism Disunity Development of the Artificial Intelligence 3
  • 4. Understand customers' experience Find out hidden information Become customers‘ friend Use personalized approach The IoT in Communications and Marketing 4 40% 9% 60% would share data in exchange for incentives would share data without incentives would share car data for a free maintenance
  • 5. Research and its results 100 respondents 57% female / 43% male Aged from 14 to 62 General number With software or communication 1 - 5 1 - 5 35 1 - 5 32 6 - 10 6 1 - 5 14 6 - 10 5 1 - 5 1 6 - 10 2 11 and more 1 1 - 5 1 11 and more 3 Number of the same responces 6 - 10 11 - 15 16 - 20 21 and more General number of gadgets used per day 5
  • 6. Conclusion 1. The IoT is good 2. The IoT means customization through optimization 3. The IoT helps to make business decisions and form objectives 4. IoT is one of the ways of getting a competitive advantage 5. Show people, their data is treated properly and used for good 6. Target IoT on youngsters and young-adults 7. Remember, that the IoT is not cheap 8. Teach and study IoT hygiene 6

Editor's Notes

  1. Даша From the very beginning of trade sellers were facing a question How to get to know what exactly the customer needs? For many years the answer was Marketing. But time is not staying at the same place. Now the answer is The Internet of Things! This is a new era of revealing consumers’ hidden desires! You need no more researches and questionnaires, you can get whatever data you want from the devices consumers use. Phones, cameras, MiBands – all of these bring the data, the hidden knowledge of the market.
  2. Даша Just imagine: In the morning the alarm gets you up by automatically. The light is switched on, the kitchen is cooking breakfast. Your car has started itself and is waiting for you. Your refrigerator adds ‘milk’ to your shopping list. During the trip your car drives itself, using millions of embedded sensors. Sounds impressive, right? That is the Internet of Things. It is an idea of gathering electronic devices, into a computer network to communicate among each other and external environment. Connections allow devices to collect and exchange data, and we can manage them. Today, 26 billion of connected devices are used globally, which is averaged at 4 units per person, in 3 years the number will double. The Internet of Things touches every aspect of life from home appliances to space expeditions. Possibilities of IoT are unlimited!
  3. Аня Threats: Privacy and security threat. For example, burglars can use data to find a safe time to break in your house. Smart terrorism. For example, hackers who will break into our systems and attack us with our own devices. Disunity. The more we rely on objects, the less we need people. Humans, who used to be the center of communications, become “only a piece of the overall IoT puzzle”. Development of the Artificial Intelligence. Devices becoming smarter and stronger that human beings. Benefits: Health and fitness. For example, devices tracking body changes and informing a doctor when needed. Smart containers for medicines. Food. For example, tracking food from the moment of harvest to final store. Smart-parenting. For example, monitoring options of breath, heart rate, temperature, wetness of the diaper. TV. For example, smart TV adjusting to our preferences, lifestyle and time-schedule. Urbanism. For example, find a parking spot with the help of sensors. More facilities for older people and the disabled. Ecology. For example, new eco-friendly solutions. Household appliances. For example, automated grocery shopping, cleaning, security control. Transportation. Smart cars, motorcycles and bikes, smart systems of traffic monitoring which improve safety.
  4. Аня 40% will share data in exchange for coupons or discounts  9% will share data without incentives  60% would share car data for a free maintenance session Understand customers' experience Find out hidden information Become customers‘ friend Use personalized approach
  5. Даша 12 questions 100 respondents 57% female / 43% male Aged from 14 to 62 81% feel positive or neutral about the concept of IoT 77% dislike the idea of their data being collected via IoT Most of people think they use 1-10 electronic devices a day use, while around a half of them have at least some technology inside People of the age between 17 and 32 own the biggest number of online accounts (3-15 accounts, avg. 9) 60% think that IoT will become a widespread technology shortly 61% already feel influenced by it 92% said it is possible for IoT to influence their consumer decisions To generalize: People are willing to have such a technology in their life, but feel uncomfortable knowing their data is being collected. That is the result of lack of informational intelligence and hygiene People under evaluate how many devices they use and tend to think of their direct gadgets, not taking into consideration the public ones Currently around a half of our devices can potentially collect data Youngsters and young adults are the most active users of the media and innovative technology. They are innovators, who can bring the technology to masses IoT is very much likely to become a widespread technology soon, because of its possible practical implications in various spheres Even though today IoT is only developing, people already feel influenced by it, and think it can affect their consumer behaviour In other words, businesses can use IoT as a tool of revealing consumers’ hidden desires.
  6. Аня