16
ZION: SECURITY & INTERNET OF THINGS. The aim of the project is to provide User a “Digitally Inclusive” platform, for “Security” needs, by which he or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence.

ZION: Security and Internet of Things

Embed Size (px)

DESCRIPTION

The aim of the project is to provide User a “Digitally Inclusive” platform, for “Security” needs, by which he or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence.

Citation preview

Page 1: ZION: Security and Internet of Things

ZION:SECURITY & INTERNET OF THINGS.

The aim of the project is to provide User a “Digitally Inclusive” platform, for “Security” needs, by which he or she can feel secure, by assisting Decision Making complemented by Augmented Intelligence.

Page 2: ZION: Security and Internet of Things

PROJECTABSTRACT01

Behaviours

Beliefs

Meanings

Reasons

Practices

Security is perceived to be of highest priority irrespective of Public or Private setting today.

Human beings are bound to make mistakes in a dynamic environment.

When something Unexpected happens how do we empower the individual to come out of that situation.

Challenge was to design User Centred Next Generation Personal Security System in a highly connected world.

Different contexts, Different meanings.

Page 3: ZION: Security and Internet of Things

FINALDELIVERABLES01

Strategic design of a digital platform for inclusion (security) - as product, process and system that will sustain for next 5 years.

The digital platform on which Honeywell Offerings in the Security domain can be integratedconsidering the dawn of new era i.e. ‘Internet of Things’.

Page 4: ZION: Security and Internet of Things

INITIALBRIEF01

Connected Home, Security, Internet of Things and People

derive deep insight into the behavior and shift in security paradigms in the Indian scenario while also regarding

a. Internet of things, b. Social connectivity,c. Social behavior patterns and d. The mobile phenomenon.

- role of security and how its integration into the connected home? - connected home for major geographies and ethnographies around the globe

- major use cases for the wanderers generation, nuclear families and empty nest scenarios.

- possible metamorphosis of security into the connected home scenario.

- understanding of behavioral influencers: work / environmental, personal product/device usage, personas, competitive influences.

Page 5: ZION: Security and Internet of Things

FIRST THOUGHTS01

Futuristic Technology Internet of Everything Public security Residential security

Finding user group

Millenials

Futuristic concepts

Smart cities UnderstandingEcosystem appraoch Conferences

Contexts Offbeat offeringsTechnology Analysing User groupsHoneywell Offerings

Page 6: ZION: Security and Internet of Things

01 02

03 04 05

PROCESSFOLLOWED

- Project Abstract - Domain Introduction- First thoughts- Stakeholders and directions- Process- Environmental Scan

- Preperation for User Research- Target Audience- Mapping Technology and Anxiety among users- User Research- Deriving and Mapping Insights

- Concept ZION- Information architecture- Persona- Wireframes- Prototyping Customer Journey

- Modelling system- Information processing model- Education, Engineering, Enforcement- Design directions

- Validating the concept- Other concepts- Factors influencingconcepts- Limitations

Page 7: ZION: Security and Internet of Things

ENVIRONMENTALSCAN01

CISCO - INTERNET OF EVERYTHING

ERICCSON - SOCIAL WEB OF THINGS

IBM SMART CITY General Electric: GE - INDUSTRIAL INTERNET

CHINA INTERNET OF THINGS

SAMSUNG - CLOUD INFRASTRUCTURE

CABLE SHOW 2012 KICKSTARTER - CROWDFUNDED VENTURES

Page 8: ZION: Security and Internet of Things

01

Retina Scan Voice Analysis

Finger Print ScanSmart Phone + Gear Augmented reality

Digital Presence

Kinect - Depth sensing

Palm Vein Scan

Smart citiesSurgical ImplantsSpatial Projection

Smart Ring Digital Signature Ear Recognition

Google Glasses Body AuthenticationMood Sensing

PLATFORMS OF INTERACTION

Face Recognition

Page 9: ZION: Security and Internet of Things

APPROACH TAKEN02

Customizable security solution Vs Standalone traditional solutions.

What does security mean to someone? Answer depends on- Age- Gender- Location- Emotional Connect- Value attached- Technology adaption- Technology exposure

User Centred Approach rather than a Ecosystem based approach.

‘ ’What does it mean to be secured?What does it mean to be connected?

‘ ’

Page 10: ZION: Security and Internet of Things

TARGET AUDIENCE02

Retired, Helping Others

Enrichment activities, Stabilisation of kids

Better Purchases, Better place in the career

Moving into larger living spaceAllocation of money for Familiy, Kids

Starting family, Specialization in chosen field

Major decisions such as Marriage, Higher studies

Start Career, First Major decison such as - Career choice

Dependent, Aware, Individual decision maker

Getting exposed to things08 - 12

28 - 35

17 - 22

46 - 55

13 - 16

36 - 45

23 - 27

56 - 65

65 - 78

Page 11: ZION: Security and Internet of Things

ORDER OFQUESTIONS02

What is that you would want to Protect?

Are there any threats or concerns to choices they selected?

What are the measures taken to protect against threats or concerns?

What is theRole of Connectivity in Your Life?

What are the ways by which you connect to your loved ones?

Suggest a Metaphor for Security and Connectivity

Establish a mapping between cards they had selected for Security and Connectivity.

Page 12: ZION: Security and Internet of Things

USERGROUP02

StudentsWorking CoupleEntreprenuerTeacherArtistCompany SecretraitTV actorHouse wivesSoftware professionals

35 Participants

8-78 Age group

Interviewee Profiles

Page 13: ZION: Security and Internet of Things

DESIGNDIRECTIONS

While designing the platform these factors have to be considered:

- Use of medium such as video, text, voice depending upon the context to communicate the information.- Information design - Hassle free navigation- Dynamic trend analysis- Machine learning about threat- Biometric authentication- Crowdsourced Information verification- Clutter free graphics- Interfaceless designs

03A platform for all class of userswhich empowers them to interact with the subsytems. This makes them Prepared for any situation.

‘’

Page 14: ZION: Security and Internet of Things

CONCEPT ZION04

Page 15: ZION: Security and Internet of Things

CONCEPT ZION04

Page 16: ZION: Security and Internet of Things

SYSTEMMODELLING04