How to Make Use of Data in a Car: Connected Cars, Payment Tech, Analytics, and Other Opportunities
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Connected Car
Connected Car [email protected] 1 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted I've always been asked, „What is my favorite car?” and I've always said „The next one”. Carroll Shelby Source: Wikipedia 2 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted Connected Car or Autonomous Car Connected vehicles can exchange information wirelessly with other vehicles and infrastructure, but also with the vehicle manufacture or third-party service providers. Automated vehicles, on the other hand, are vehicles in which at least some aspects of safety- critical control functions occur without direct driver input. 3 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted The Race is On to Capture In-Vehicle Commerce By 2020, there will be 250 Million connected vehicles on the road globally Gartner & Connected Vehicle Trade Association 82% of new cars will be connected to Internet in 2021 Business Insider Connected car commerce will zoom to $265 billion by 2023 Juniper Research Automakers align with tech firms Voice technology will prevail Source: Business Insider 4 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted Car Data Facts • What are the risks of allowing direct access to car data? • How do vehicle makers and third party providers protect my personal data and privacy? • Why share car data? • What is the safest and most secure way to share car data? • Will vehicle data be available to all service providers and under the same conditions? • What kind of data can my car share? 5 Confidential – © 2019 Oracle Internal/Restricted/Highly Restricted Car Data • Diverse data types • Speed, Engine RPM, Throttle, Load, Pressure, Gear, Braking, Torque, Steer, Wheels rotations and many more (eg. -
Society Persuasion In
PERSUASION IN SOCIETY HERBERT W. SIMONS with JOANNE MORREALE and BRUCE GRONBECK Table of Contents List of Artwork in Persuasion in Society xiv About the Author xvii Acknowledgments xix Preface xx Part 1: Understanding Persuasion 1. The Study of Persuasion 3 Defining Persuasion 5 Why Is Persuasion Important? 10 Studying Persuasion 14 The Behavioral Approach: Social-Scientific Research on the Communication-Persuasion Matrix 15 The Critical Studies Approach: Case Studies and “Genre-alizations” 17 Summary 20 Questions and Projects for Further Study 21 2. The Psychology of Persuasion: Basic Principles 25 Beliefs and Values as Building Blocks of Attitudes 27 Persuasion by Degrees: Adapting to Different Audiences 29 Schemas: Attitudes as Knowledge Structures 32 From Attitudes to Actions: The Role of Subjective Norms 34 Elaboration Likelihood Model: Two Routes to Persuasion 34 Persuasion as a Learning Process 36 Persuasion as Information Processing 37 Persuasion and Incentives 38 Persuasion by Association 39 Persuasion as Psychological Unbalancing and Rebalancing 40 Summary 41 Questions and Projects for Further Study 42 3. Persuasion Broadly Considered 47 Two Levels of Communication: Content and Relational 49 Impression Management 51 Deception About Persuasive Intent 51 Deceptive Deception 52 Expression Games 54 Persuasion in the Guise of Objectivity 55 Accounting Statements and Cost-Benefit Analyses 55 News Reporting 56 Scientific Reporting 57 History Textbooks 58 Reported Discoveries of Social Problems 59 How Multiple Messages Shape Ideologies 59 The Making of McWorld 63 Summary 66 Questions and Projects for Further Study 68 Part 2: The Coactive Approach 4. Coactive Persuasion 73 Using Receiver-Oriented Approaches 74 Being Situation Sensitive 76 Combining Similarity and Credibility 79 Building on Acceptable Premises 82 Appearing Reasonable and Providing Psychological Income 85 Using Communication Resources 86 Summary 88 Questions and Projects for Further Study 89 5. -
The Informative Speech of Newsgames
GÓMEZ, S. y CABEZA, J. The informative speech of newsgames CUADERNOS.INFO Nº 38 ISSN 0719-3661 Versión electrónica: ISSN 0719-367x http://www.cuadernos.info doi: 10.7764/cdi.38.593 Recibido: 06-02-2014 / Aceptado: 03-22-2015 The informative speech of newsgames: the “Bárcenas case” on games developed for mobile devices1 El discurso informativo de los newsgames: el caso Bárcenas en los juegos para dispositivos móviles O discurso informativo dos Newsgames: O caso Barcenas nos jogos para dispositivos móveis SALVADOR GÓMEZ GARCÍA, Universidad de Valladolid, Valladolid, España ([email protected]) JOSÉ CABEZA SAN DEOGRACIAS, Universidad Rey Juan Carlos, Madrid, España ([email protected]) ABSTRACT RESUMEN RESUMO The purpose of this research is to analyze El propósito de esta investigación es O objetivo desta pesquisa é analisar o the impact of a political corruption analizar el impacto de un escándalo de impacto de um escândalo de corrupção scandal in Spain (the Bárcenas case) corrupción política en España (el caso política em Espanha (no caso Bárcenas) in the production of games developed Bárcenas) en la producción de juegos na produção de jogos para dispositivos for mobile devices across all major desarrollados para dispositivos móviles móveis durante esse ano através das platforms for content distribution. The a través de las principales plataformas prin cipais plataformas de distribuição data were obtained with questionnaires de distribución de contenidos. Los datos de conteúdo. A coleta de dados foi to developers, content coding sheets and se obtuvieron mediante cuestionarios a realizada a partir de questio nários para the feedback given by the users of the los desarrolladores, fichas de codificación os desenvolvedores, fichas de codificação games. -
On Processing Personal Data in the Context of Connected Vehicles and Mobility Related Applications
Guidelines 1/2020 on processing personal data in the context of connected vehicles and mobility related applications Version 1.0 Adopted on 28 January 2020 Adopted - version for public consultation 1 Table of contents 1 INTRODUCTION ................................................................................................................................ 3 1.1 Related works ........................................................................................................................... 4 1.2 Applicable law .......................................................................................................................... 5 1.3 Scope ........................................................................................................................................ 6 1.4 Definitions ................................................................................................................................ 9 1.5 Privacy and data protection risks ........................................................................................... 10 2 GENERAL RECOMMENDATIONS..................................................................................................... 12 2.1 Categories of data .................................................................................................................. 12 2.2 Purposes ................................................................................................................................. 14 2.3 Relevance and data minimisation ......................................................................................... -
Connected Car Is Talking
Your connected car is talking. Who’s listening? Moving the data-driven user experience forward with value, security and privacy @YourCar: Feeling extra #chatty today. kpmg.com @YourCar: “Monday. 8:23 a.m. 37 degrees. Pulling out of the driveway with Passenger Alex and heading to the office at 123 Main Street.” © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 604896 Contents About the authors 1 A message from Gary Silberg 3 Securing the high value of data 5 Big data speaks volumes 8 The risky road ahead 14 A closer look under the hood 19 Cybersecurity in a connected car 22 Reaching your data destination 24 About KPMG 28 © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. The KPMG name and logo are registered trademarks or trademarks of KPMG International. NDPPS 604896 About the authors Gary Silberg is KPMG LLP’s (KPMG) national sector lead partner for the automotive industry. With more than 25 years of business experience, including more than 15 years in the automotive industry, he is a leading voice in the media on global trends in the automotive industry. He advises numerous domestic and multinational companies in areas of strategy, mergers, acquisitions, divestitures, and joint ventures. -
Driving Security Into Connected Cars: Threat Model and Recommendations
Driving Security Into Connected Cars: Threat Model and Recommendations Numaan Huq, Craig Gibson, Rainer Vosseler TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted 4 upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro The Concept of Connected Cars reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 10 the original language official version of the document. Any discrepancies or differences created in the translation are Research on Remote Vehicle Attacks not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree 20 that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro Threat Model for Connected Cars disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, 26 use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. -
POLITICAL REPORTING in the AGE of INFOTAINMENT Melissa
POLITICAL REPORTING IN THE AGE OF INFOTAINMENT Melissa Oribhabor Jennifer Rowe, Committee Chair August 2014 Introduction The effects of infotainment have been felt by the news industry since politicians started appearing on talK shows and comedy shows, hoping to humanize themselves to the voting public. One of the earliest examples was in 1968 when presidential candidate Richard Nixon appeared on “Rowan and Martin’s Laugh-In” (Xenos 198). Even earlier than that, John F. Kennedy appeared on the “The Tonight Show” with Jack Paar in 1960. But with the 24-hour news cycle and the Internet drawing the public away from traditional forms of news, infotainment has become even more prevalent during the past 30 years. Infotainment can be seen easily on television, with programs such as “The Daily Show” and CNN’s “RidicuList” with Anderson Cooper; however, infotainment in terms of print journalism has not been studied as in- depth. This research not only looks at infotainment in print journalism but more specifically how it affects political journalists. Literature Review Moy, Xenos and Hess in their 2005 article “Communication and Citizenship: Mapping the Political Effects of Infotainment” define infotainment as the convergence of news and entertainment. The paper states that in recent years news programs started developing more elements of entertainment, and entertainment programs started to disseminate the news. The term “infotainment” is largely used in reference to entertainment programs that have elements of news (Moy et. al. 2005, 113). “Soft news” and “infotainment” are often used interchangeably in research on this topic. Soft news includes sensationalized stories, human-interest stories, and stories that focus more on entertainment over serious hard news content (Jebril et. -
Monetizing Car Data New Service Business Opportunities to Create New Customer Benefits
Monetizing car data New service business opportunities to create new customer benefits Advanced Industries September 2016 Foreword As privately owned vehicles become increasingly connected to each other and to external infrastructures via a growing number of sensors, a massive amount of data is being gener- ated. Gathering this data has become par for the course; leveraging insights from data in ways that can monetize it, however, is still in its nascent stages. To answer key questions around car data monetization and to understand how players along the connected car value chain might capture this potential, McKinsey & Company launched a large-scale, multimodality knowledge initiative course of research: Roundtable sessions conducted in Germany and the USA convened leaders from the automotive (OEMs, suppliers, sales), high-tech, insurance, telecommunications, and finance sectors. Surveys administered in China, Germany, and the USA assessed the preferences, trends, and concerns of about 3,000 customers regarding car data. One-on-one interviews explored the perspectives of car data leaders on the trends and monetization matters in the space. “Customer clinics” collected user observations around preferences and attitudes towards the practicality of various car connectivity features and services. A model was developed to quantify the overall revenue pool related to car data and the opportunity for key industry players based on selected, prioritized use cases. In the following you will find a synthesis of the key findings of this broad, ongoing knowl- edge effort. We would like to thank the many organizations that participated in this exploration of the potential and requirements of car data monetization and that through their contributions made this effort possible. -
Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies
Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies Numaan Huq, Craig Gibson, Vladimir Kropotov, Rainer Vosseler TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. 4 Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing The Concept of Connected Cars herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. 7 Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise Research on Remote Vehicle related to the accuracy of a translation, please refer to Attacks the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 13 Although Trend Micro uses reasonable efforts to include Cybersecurity Risks of Connected accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Cars to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. -
Volume 4, 2014, NEIA Connections
Volume 4, 2014 IACP’S ANNUAL CONFERENCE IN THIS ISSUE: OCTOBER 23 – 27 - ORLANDO FLORIDA IACP Conference 1 As is our traditional custom, the Major Cities Chiefs/FBI NEIA Board Meeting Save the Date 2 were held during the IACP conference. A number of the chiefs, graduates Members 3 of the NEI, provided great benefit to their colleagues in attendance. Salt National News 8 Lake City Chief Chris Burbank spoke on “First Net;” Bill Blair, Toronto’s top Chief addressed the serious issue involving police encounters with International News 17 mentally disabled individuals; Baltimore Country’s Chief Johnson on his The Future 21 agency’s Partnership to Prevent Gun Violence; and Chief David Brown Points to Ponder 23 on Dallas’ Ebola Preparations. Typical of such presentations, were the presence of non-law enforcement experts providing added value to the Humor 24 issues under discussion. On the second day, Director Toney Armstrong Contact Information 26 provided information on how his department in Memphis handled what was called the “Memphis Blue Flu.” The issues involving Marijuana Legalization Conference Dates 26 in Colorado and the state of Washington were handled by Chiefs Robert Sponsors 27 White and Kathleen O’Toole. They were followed by an Overall Legislation Committee report provided by Chief Tom Manger, Montgomery County, MD. A little later, a program under consideration with the LAPD called Ceasefire – Cure Violence was presented by Chief Charlie Beck and accompanied by a medical presenter. I would be remiss if I were to ignore the contributions of other law enforcement personnel that represented Philadelphia, Washington DC, Las Vegas, Missouri, Austin TX, and the US Attorney Office. -
The Growing Threat of Car Hacking | Mandiant | Fireeye
FireEye iSIGHT Intelligence CONNECTED CARS: THE OPEN ROAD FOR HACKERS SPECIAL REPORT / JUNE 2016 WI-FI INTERNET ACCESS Wireless access points frequently featured in new vehicles raise the potential for abuse if they are VEHICLE-TO-VEHICLE COMMUNICATIONS poorly secured and connected to Commonly referred to as V2V, vehicles will increasingly the vehicle’s other systems. Ever- communicate with one another autonomously in order to assist with increasing bandwidth capabilities vehicle spacing and lane changing, while using other data that can potentially increase the damage a improve vehicle operation.1 Eventually, vehicle-to-infrastructure (V2I) malicious actor could cause. will allow vehicles to communicate with traffic signals and road INTRODUCTION signs in order to better manage traffic flow and share data on road usage. Manipulating driver assist systems that use V2V or V2I could undermine safety and potentially cause collisions. THE ACCELERATION OF THE “INTERNET OF THINGS” (IOT) VEHICLE REVOLUTION HAS INCREASED SYSTEMS THE CONNECTIVITY OF EXTERIOR PASSENGER VEHICLES, WHICH IS LIKELY TO IMPACT AVERAGE CONSUMERS SIGNIFICANTLY. Today, most vehicle functions – steering, acceleration, braking, remote start, and even unlocking the doors – are controlled by software that accepts commands from a diverse array of digital systems operating both inside and outside the vehicle. However, this software contains millions of lines of code, and in these lines of code there may be vulnerabilities that can be exploited by individuals with malicious intent. FireEye iSIGHT Intelligence analysts and Mandiant consultants reviewed the key threats to interior and exterior vehicle systems and assessed the top five threats created by vehicle software vulnerabilities. These include: COLLISION AVOIDANCE Braking assist systems often use radar or other sensors to detect an imminent crash. -
Guide to Driving Alternative Fuel Vehicles
Getting the most out of Alternative Fuel Vehicles A guide for driving AFVs Getting the most out of Alternative Fuel Vehicles Evaluating the suitability of an alternative fuel vehicle and placing an order for one are just the beginning of the process of familiarisation. Once the vehicle is delivered, the driver can begin to appreciate how the driving experience differs to that of a conventional car. While those new to AFVs will need to adapt their driving style to get the best out of their new vehicle, they’re also likely to have some new technology to get to grips with. Some of this technology is only found on vehicles with some form of electrification, but other new features are shared across modern petrol and diesel models too. We’ll look first at how operating an AFV can differ to driving a conventional vehicle and then look at some of the emerging technologies. 2 Operating an AFV Getting the most out of an AFV is likely to take a little practice, but there are some relatively simple rules that will help any driver to get started. While these rules will make the biggest difference to drivers of pure electric vehicles and plug-in hybrids, they will also help any hybrid driver maximise fuel efficiency and enhance enjoyment of their car. Watch for the torque Unlike ICE powered vehicles, electric cars and hybrids can access the full twist action of their electric motors from a standstill - this means very rapid acceleration from junctions and traffic lights. While this can be very handy in the cut and thrust of urban driving, it can take the unwary by surprise if they are not used to it.