Honey, that evening is, like, now.
Integration of platforms, communications, tools and strategies are all geared toward communicating with customers in a way that is convenient for them, right? meeting them where they are at.
So, it would make sense, then, that the idea of Enchanted Objects is the next evolution of this idea and that everyone is “game” and eager to see the evolution.
Two things to consider about the Internet of Things and Enchanted Objects – are we robbing the sense of self and #2 Security – how does that get managed?
#1 Self Image or Imposed Beliefs
I read this extract “From Neuromorphic Sensors to a Chip Under Skin”,where the author, Palese said:
“Today being able to choose means to be responsible for our own individuality with the opportunity to be included – and then – accepted in a global society. This particular form of society sees the market for consumers as the sole holder of sovereign power.”
With the advent of the Internet of Things…
“To the market is delegated – also by the state – the task of establishing wants and needs in addition to the parameters of exclusion and inclusion of the individual. The result is that each individual runs frantically towards the construction of the “self” according to a model, which in turn is generated by the policies of the impersonal market producing a misleading reality.”
I get this. It feels like that’s already happening with the myriad of platforms available for selfies, and the already-ever-present existence of marketing messages that tell us to be better, look better, feel better, etc. As if ones current state is not “enough”
I think enchanted objects are fascinating, but as Integrated Marketing Communications professionals, there are definitely things to consider about our approach and what we want our customers to do.
#2 Security and Who’s Worrying About it?
Not only are consumers worried about security breeches and hacked debit cards, but corporations are worried, too! With reports in the CIO Journal that CIO’s are stressing about employees wearing their devices to work and with their interconnectivity,the corporate system gets hacked. Loeb writes:
“Related to this risk is that workplaces are becoming more difficult to secure as connected devices like fitness bands and smart watches spread in popularity and make their way to the office on the wrists and in the pockets of employees. If these seemingly harmless devices connect to your company’s networks or servers and share and store information, they create more entry points where such information can be compromised. Cybercriminals realize this. Many of your employees probably don’t.”
Yet, other CIOs are thinking with Integrated tactics in mind, too. Thinking that the convenience should lie in the hands of the consumer – not IT.
“Reports challenging the safety of self-driving cars prompted Deloitte Global’s chief information security officer to question approaches to cyber security that depend on employee vigilance. Instead of relying on fallible employees, he writes, cyber security professionals should build systems that anticipate and prevent human errors.” (CIO Journal)
I get that too.
CIOs and our IT teams need to advance with the times. They do, i know they do – but they, too, just like communications professionals need to keep up with emerging media, IoT and Enchanted Objects –to provide the infrastructure, fire walls and protection that are needed to avoid the hackers. Thinking an employee is going to remove their device is not fail-proof.
How many people turn off their cell phones when they are on an airplane?
Who had to change?
It wasn’t the passenger.
Big businesses everywhere will need to be responsible for the evolution of communication, marketing, security and the customer’s convenience.