Some Enchanted Evening

Honey, that evening is, like, now.

 

Integration of platforms, communications, tools and strategies are all geared toward communicating with customers in a way that is convenient for them, right? meeting them where they are at.

So, it would make sense, then, that the idea of Enchanted Objects is the next evolution of this idea and that everyone is “game” and eager to see the evolution.

Nope.

Two things to consider about the Internet of Things and Enchanted Objects – are we robbing the sense of self and #2 Security – how does that get managed?

#1 Self Image or Imposed Beliefs

I read this extract  “From Neuromorphic Sensors to a Chip Under Skin”,where the author, Palese said:

“Today being able to choose means to be responsible for our own individuality with the opportunity to be included – and then – accepted in a global society. This particular form of society sees the market for consumers as the sole holder of sovereign power.”

With the advent of the Internet of Things…

“To the market is delegated – also by the state – the task of establishing wants and needs in addition to the parameters of exclusion and inclusion of the individual. The result is that each individual runs frantically towards the construction of the “self” according to a model, which in turn is generated by the policies of the impersonal market producing a misleading reality.”

I get this. It feels like that’s already happening with the myriad of platforms available for selfies, and the already-ever-present existence of marketing messages that tell us to be better, look better, feel better, etc. As if ones current state is not “enough”

I think enchanted objects are fascinating, but as Integrated Marketing Communications professionals, there are definitely things to consider about our approach and what we want our customers to do.

#2 Security and Who’s Worrying About it?

IoT at Work

Not only are consumers worried about security breeches and hacked debit cards, but corporations are worried, too! With reports in the CIO Journal that CIO’s are stressing about employees wearing their devices to work and with their interconnectivity,the corporate system gets hacked. Loeb writes:

“Related to this risk is that workplaces are becoming more difficult to secure as connected devices like fitness bands and smart watches spread in popularity and make their way to the office on the wrists and in the pockets of employees. If these seemingly harmless devices connect to your company’s networks or servers and share and store information, they create more entry points where such information can be compromised. Cybercriminals realize this. Many of your employees probably don’t.”

Yet, other CIOs are thinking with Integrated tactics in mind, too. Thinking that the convenience should lie in the hands of the consumer – not IT.

“Reports challenging the safety of self-driving cars prompted Deloitte Global’s chief information security officer to question approaches to cyber security that depend on employee vigilance. Instead of relying on fallible employees, he writes, cyber security professionals should build systems that anticipate and prevent human errors.” (CIO Journal)

I get that too.

CIOs and our IT teams need to advance with the times. They do, i know they do – but they, too, just like communications professionals need to keep up with emerging media, IoT and Enchanted Objects –to provide the infrastructure, fire walls and protection that are needed to avoid the hackers. Thinking an employee is going to remove their device is not fail-proof.

Related:

How many people turn off their cell phones when they are on an airplane?
Who had to change?
It wasn’t the passenger.

Big businesses everywhere will need to be responsible for the evolution of communication, marketing, security and the customer’s convenience.

 

 

 

4 thoughts on “Some Enchanted Evening

  1. I really loved learning more about enchanted objects and the internet of things. I am not very high tech when it comes to this sort of thing, and reading this and a couple other articles recently really opened my eyes to the next wave of technology.

    The idea of devices transmitting information that could be hacked is a very real fear since many companies that produce such devices may not take advanced precautions to protect consumer data, and even if they do, the measures are not fail-proof. Do you think that consumers are willing to sacrifice some measure of privacy for the convenience of such devices, and are there any types of legislation that you think may need to be put into place to protect consumers?

    Liked by 1 person

    1. Great questions – I think there are some people -like ‘early adopters” who could probably care less about their privacy, they just want the newest “gadget” and then, there are others who will join late because it scares them and would probably be willing to sacrifice until they were more comfortable with their security. as far as legislation, that’s so tough – we want it and we hate it, right? Not sure how it would fly – but I do think consumers should expect some level of protection against those who mis-use..

      Like

  2. Hey! I am actually hoping my car will have all of this technology to make me a better driver! My sister has a Subaru and when I drove it, it essentially slowed the car down if I got to close to another car in front of me, alerted me when I went over the lines, turned down the area and more! It scared the daylights out of me to be honest but I know it is something that I need. Also, my 2020 Subaru is anticipating on having a self-driving car. http://www.torquenews.com/1084/how-subaru-plans-automatic-driving-2020

    Liked by 1 person

    1. wouldn’t it be great! I do think it would help a lot of people!!! including me. in VA, we have soo much traffic and a lot of reckless drivers. i think a little safety could go a long way in minimizing accidents, etc.

      Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s