Topics for Consideration 2019

Total Page:16

File Type:pdf, Size:1020Kb

Topics for Consideration 2019 Topics for consideration 2019 Voice assistants, constantly listening to your private life 02 Cloud computing under the GDPR 06 Data sharing: public interest issues 08 Political communication & GDPR: updating recommendations and clarifying best practices 10 The reuse of data accessible “online” by the research community: challenges and prospects 12 How is children’s data protected? 14 02 Voice assistants, constantly listening to your private life Smart speakers, voice-controlled personal assistants, conversational interfaces or chatbots, the vocabulary is vast and attests to the current significance of voice assistants. First rolled-out on phones, and later on speakers and headphones, voice assistants are gradually being added to our cars, our household appliances, and much more. Considered butlers of the 21st century, these assistants aim to help users with their day-to-day lives: answering questions, playing music, providing weather forecasts, adjusting heating, turning on lights, booking a chauffeur-driven vehicle/taxi, buying tickets, etc. Yet, whilst the aim of industrialists is to render technology invisible and to simplify exchanges, it is now clear that these technologies pose some real issues relating to users’ privacy. 03 Voice assistants are often paired with Having appeared in mass consumption These products are offered by major smart or connected speakers. However, goods in the early 2010s, many voice international groups such as GAFAM it is important to note that speakers are assistants are now being rolled out. (Google, Amazon, Facebook, Apple, only vectors and that assistants can be Depending on the activity carried out by Microsoft), BATX (Baidu, Alibaba, integrated into any type of appliance. the enterprises’ developing them, these Tencent, Xiaomi) and even smaller In practice, voice assistants are devices assistants meet very specific needs: enterprises (such as Snips) with different with a speaker and a microphone, online sales, listening to music, task economic positions. more or less-developed computational planning, home automation, etc. abilities depending on assistants and, in nearly all cases, the ability to connect to the internet. How do these devices work? Vocal assistants generally work Step 3 a history of audio requests in order to according to five main steps. Take the The user makes a request enable the individual to listen to them example of a “smart” speaker: The phrase spoken by the user is and the publisher to improve its speech recorded locally by the assistant. This processing technology; Step 1 audio request recording can then be: metadata relating to the request, such The user “wakes the speaker up” as the date, time, account name, etc. using a key phrase (“Hey Snips”/ stored in the device, in order to allow “Ok Google”/“Hey Alexa”/etc.) the user to manage his/her data (e.g. a Step 5 The speaker is always listening for this smart speaker with a vocal assistant The speaker returns key phrase. It does not record anything from the company Snips); or to “stand-by” and does not perform any operations The assistant returns to a passive state until it hears this key phrase. This step sent to the cloud, or in other words to the of listening and waits to hear the key is performed locally and does not require company’s processing servers (which is phrase before being reactivated. any external exchanges. the case for example for Amazon Echo, Google Home and other speakers). Step 2 (optional) The speaker recognises the user Step 4 Some assistant models ask the user The audio recording is transcribed to pre-record samples of his/her voice into text and interpreted in order in order to create a voice profile and to provide a suitable response therefore recognise the user during Speech is automatically transcribed into interactions with the assistant. The text (speech-to-text) and interpreted purpose of identifying the user is to using Natural Language Processing be able to suggest different services to technology in order to provide a suitable the device’s different users (parents, response. A response is then synthesized children, guests, etc.). We call this vocal (text-to-speech) and then played and/ biometrics. It should be noted that or an order is executed (open the blinds, biometric data are considered sensitive increase the temperature, play music, data within the meaning of the GDPR, answer a question, etc.). and as such can only be processed with Whether these different processing the data subject’s explicit consent. operations are performed locally or on remote servers, the device (or its services) may store: a history of transcribed requests in order to enable the individual to view them and the publisher to adapt the service’s features; 04 The confidentiality The monetisation What are the of exchanges of intimate data stakes and While they are permanently on stand-by, As they mainly target homes by what are the vocal assistants can be activated and controlling smart devices and unexpectedly record a conversation entertainment services, devices with recommen- when they consider that they have a voice assistant are now central to dation to detected the key phrase. To better protect households. Users’ profiles are therefore users’ privacy and to avoid these types of fed by the different interactions between protect privacy? malfunctions, we advise: them and the assistant (e.g., life habits: favouring the use of devices with a the time they wake-up, heating settings, button to deactivate the microphone; cultural taste, purchases made, interests, The voice is an essential component of turn off the microphone/turn off the etc.). To control the use of such data, we human identity. As such, it is extremely device/unplug the device when users recommend: personal. Personal characteristics are do not want to be listened to. Some syncing services that are actually found both in acoustics (identity, age, devices do not include an on/off button useful to the user, while weighing gender, geographical and sociocultural and must be unplugged; the risks of sharing intimate data or origin, physiognomy, state of health warn third parties/guests of sensitive features (opening doors, andemotional state, etc.) and linguistics the potential recording of any alarm systems, etc.); (meaning of the words used, vocabulary conversations had (or turn off the being aware that any speech around used, etc.). Thus, providing voice microphone when they are present); the device can serve to fuel marketing recordings is not an inconsequential act. supervise children’s interactions with profiles; Furthermore, by developing outside these devices (stay in the same room, do not hesitate to contact the support of telephones, vocal assistants have turn off the device when not with service of the company providing the progressively transitioned from a them); assistant in case of questions. “personal” status to “shared” status. They In this case, check that the device have now permeated intimate areas and is configured by default to filter areas shared by several individuals such information targeting children. as living rooms, bedrooms and even the insides of vehicles. These paradigm shifts raise new questions such as those relating to the collection and processing The lack of a screen of third-party data. The purpose of vocal assistants is to provide a human-machine interface Lastly, as stated above, in most cases, without any visual media. vocal assistants rely on the processing of speech signals on remote servers. As However, to both configure these a result, although speech is generally devices and manage data, tools such as associated with a certain degree of dashboards are still necessary. Without volatility, vocal requests are still recorded an external screen or any display in the cloud as are text requests when features, it is hard to see which traces entered into some search engines. are recorded, to assess the relevance of suggestions, to learn more or to have The CNIL has identified three areas to access to answers from other sources. In be aware of, which add to the various order to manage how such data is used, questions that users may be faced with: we recommend regularly visiting the dashboard (or the application) provided with the assistant to delete the history of conversations or questions asked and to personalise the device based on needs; e.g. configure the default search engine or source of information used by the assistant. 05 What future developments and CNIL works are yet to come? Manufacturers are very active in improving voice assistants’ abilities and security. Although some are increasingly interested in putting an end to the use of a key phrase to wake assistants, others are working to carry out processing operations to separate sound sources in order to improve systems’ listening capacity - for example, to reduce TV volume, to separate one person’s speech from another’s, etc. Lastly, professionals are also looking into new places where these systems can be used, such as in hotels and workspaces, thereby reviving questions relating to the effective use of data. The topic of vocal assistants was identified as an area for works to be carried out by the CNIL in 2017. The latter quickly made contact with various stakeholders in order to gain a perfect understanding of the systems deployed. It has led important discussions within the CNIL’s digital innovation laboratory (LINC), its structure dedicated to experiments and studies on emerging digital use trends. As such, a thematic dossier comprised of articles and interviews with professionals was published on its website. In 2019, the CNIL plans to pursue these works, by continuing to exchange with the industrialists and academics working on these topics, but also by continuing tests on these devices. In particular, the aim is to study how we can guarantee that users are well informed of the data collected, the uses made of such data and the means at their disposal to exercise their rights of access, modification, erasure and portability, as well as to assess the security of the data processed and how the artificial intelligence algorithms that are inherent to these devices learn.
Recommended publications
  • Les Champions De L'internet Chinois
    LES CHAMPIONS DE L’INTERNET CHINOIS : L’ALLIANCE DU PARTI ET DES APPLICATIONS › Patrick Allard epuis les mesures prises par l’administration Trump à l’encontre de WeChat et de TikTok et la menace brandie envers Alibaba, le conflit technologique entre la Chine et les États-Unis a pris un tour bizarre en s’étendant à des sociétés gestionnaires Dde plateformes de jeux en ligne, de partage de vidéos, ou de com- merce et de paiement en ligne. Autrement dit, des entreprises liées à la consommation et au loisir. La joute entre la Chine et l’Occident serait-elle une guerre de l’otium, plus futile encore que la rivalité enga- gée autour des entreprises chinoises de téléphonie, ZTE et Huawei, en englobant des firmes chinoises symboles des techniques de l’infor- mation et de la communication ? Ne s’agit-il pas de ces mêmes tech- nologies dont l’économiste américain Robert Gordon a mis en doute l’impact économique, notant que la productivité n’a cessé de ralentir aux États-Unis et en Europe (et d’ailleurs en Chine) alors qu’elles se multipliaient et se diffusaient ? 32 NOVEMBRE 2020 NOVEMBRE 2020 le siècle de la chine Toutefois, sous la page ou l’application Web, il y a les données et les algorithmes. L’enjeu de la rivalité transpacifique n’est sans doute pas tant la prééminence économique que la suprématie technologique et la sécurité nationale. Les principales entreprises technologiques chinoises, Baidu, Alibaba, Tencent, désignées collectivement par le sigle BAT (ou BATX, par l’ajout de Xiaomi), et une kyrielle de start-up ou plateformes d’applications en ligne, comme WeChat ou TikTok, sont aujourd’hui le symbole des prouesses économiques de la Chine, faisant écho aux Gafam (Google, Apple, Facebook, Amazon, Patrick Allard est consultant auprès Microsoft) américaines.
    [Show full text]
  • Geopolitical Implications of New Technology: a French Perspective Council of Councils Annual Conference May 6–8, 2018
    Panelist paper Geopolitical Implications of New Technology: A French Perspective Council of Councils Annual Conference May 6–8, 2018 Council on Foreign Relations, New York, NY Marc Hecker, French Institute of International Relations During the 2017 French presidential election, the socialist party’s candidate Benoit Hamon advocated for a universal basic income. Arguing that the progress of artificial intelligence (AI) and robotics will destroy three million French jobs in the coming decade, he insisted that the workers replaced by robots or algorithms still be paid. The winner of the election, Emmanuel Macron, rejected Hamon’s idea. However, after one year in power, Macron has shown an interest in the potential harmful effect of new technology on the cohesion of French society, and, more broadly, on the world order. Several official reports released over the past few months have focused on new technology. First, the Strategic Review of Defense and National Security was published in October 2017.1 It includes a section on disruptive technological and digital innovation that stresses a double risk. On the one hand, “major powers are stepping up their efforts to develop leading edge systems (such as hypersonic and stealth), creating a risk of Europe lagging behind.” On the other hand, operational leveling risks—due to the widespread use of new technology, such as encryption or geolocation—benefit nonstate or hybrid actors. 2 Second, in February 2018, the French government released its first Strategic Review of Cyber Defense. It describes evolving cyberspace threats and underscores that major attacks can have “critical consequences for the Nation.” The review notes that cyberspace still lacks efficient international regulation and global powers have divergent perceptions of “the international security architecture that should govern relations between states in the digital age.” Hence, it recommends a reinforcement of French cyber defense capabilities and the establishment of a doctrine for action.
    [Show full text]
  • Cross Asset # Investment Strategy 12
    CROSS ASSET # INVESTMENT STRATEGY 12 THIS MONTH’S TOPIC Big Tech at the crossroads… Big Tech’s stock market performance has become more hesitant. A simple market rotation or a more durable phenomenon? With the exit from the crisis getting closer, sectors shunned during the pandemic could actually benefit from a catching-up movement. However, between its disruptive nature which is cannibalising traditional companies and interest rates which, apart from a slight increase, look set to remain durably low, Big Tech retains major advantages. Especially as its valuation is less exceptional than it seems, provided however that its profits momentum remains sustainable... Since 2015, and more particularly since Before continuing, it is worth remembering the beginning of the pandemic, Tech in that Big Tech is a new name for the famous general and Big Tech in particular have GAFAM companies (Google, Amazon, reigned supreme on the stock markets. Facebook, Apple and Microsoft). However, IBRA WANE, However, its development has been more this goes further than the traditional Senior Equity Strategist hesitant over the last few weeks (see acronym since, apart from their huge graph 1). With the prospect of the arrival market capitalisation, what characterises of a vaccine and an exit from the crisis these digital leaders is the fact that getting closer, sectors that have been the they have managed to create such a rich most adversely affected by the pandemic ecosystem that it has become difficult to could actually benefit from a catching-up do without them. And digital technology, movement. However, in the longer term, which was already extensively present in between its disruptive nature which is everyday life, has moved to a new level cannibalising traditional companies and since the pandemic and the restrictions of interest rates which, apart from a slight movement that followed.
    [Show full text]
  • Silicon Dragons' Business Model Innovation
    Silicon Dragons’ Business Model Innovation An explorative case study Master Thesis May 7th 2019 Cand. Merc. International Business Cand. Merc. Finance and Strategic Management Denise Gaia Jennifer Stefansson Supervisor: Steffen Brenner Number of pages: 102 Number of characters (including spaces): 216.349 Title: Silicon Dragons’ Business Model Innovation. An explorative case study. Master Thesis in Cand. Merc. International Business and Finance and Strategic Management Authors: Denise Gaia and Jennifer Stefansson Supervisor: Steffen Brenner Copenhagen Business School 2019 Abstract The purpose of this thesis is to explore how Business Model Innovation is conducted in China. In particular, to unveil how the Innovation Ecosystem influences the process of BMI. The empirical context of the study is represented by Baidu, Alibaba, Tencent, Xiaomi, known as China’s Silicon Dragons. Furthermore, the nature of this paper is exploratory and follows a pragmatism philosophy. The study was conducted using an abductive research approach. Moreover, a qualitative strategy was used to gather empirical data, which was done through a multiple case study of BATX. The findings reveal that BMI was driven by external factors such as: ‘flaws in existing market’, ‘growing market’, ‘market disruption’, ‘changes in consumer preferences’. Furthermore, the companies pursued mainly adaptive and evolutionary BMI through micro-innovations. Among the capabilities fundamental to conduct the BMI process were strong leadership, entrepreneurship and being quick to seize and shape opportunities. The Innovation Ecosystem influenced the BMI process in several ways such as: ‘Access to a new market’; ‘Support to Technological Innovation’; ‘Co-Creation’; ‘Access to knowledge and resources’ leading to ‘Accelerate BMI process’. Furthermore, it was found that that the IE is a driver, enabler and success factors of Business Model Innovation.
    [Show full text]
  • The Digital Markets Act: European Precautionary Antitrust
    The Digital Markets Act: European Precautionary Antitrust AURELIEN PORTUESE | MAY 2021 The European Commission has set out to ensure digital markets are “fair and contestable.” But in a paradigm shift for antitrust enforcement, its proposal would impose special regulations on a narrowly dened set of “gatekeepers.” Contrary to its intent, this will deter innovation—and hold back small and medium-sized rms—to the detriment of the economy. KEY TAKEAWAYS ▪ The Digital Markets Act (DMA) arbitrarily distinguishes digital from non-digital markets, even though digital distribution is just one of many ways rms reach end users. It should assess competition comprehensively instead of discriminating. ▪ The DMA’s nebulous concept of a digital “gatekeeper” entrenches large digital rms and discourages them from innovating to compete, and it creates a threshold effect for small and mid-sized rms, because it deters successful expansion. ▪ This represents a paradigm shift from ex post antitrust enforcement toward ex ante regulatory compliance—albeit for a narrowly selected set of companies—and a seminal victory for the precautionary principle over innovation. ▪ By distorting innovation incentives instead of enhancing them, the DMA’s model of “precautionary antitrust” threatens the vitality, dynamism, and competitive fairness of Europe’s economy to the detriment of consumers and rms of all sizes. ▪ Given its fundamental aws, the DMA can only be improved at the margins. The rst steps should be leveling the playing eld with reforms that apply to all rms, not just “digital” markets, and eliminating the nebulous “gatekeeper” concept. ▪ Authorities in charge of market-investigation rules need to be separated from antitrust enforcers; they need guidance and capacity for evidence-based fact-nding; and they should analyze competition issues dynamically, focusing on the long term.
    [Show full text]
  • La Stratégie Du Criquet Des GAFAM-BATX Menace La Démocratie Et L’Économie Par Aurélie Luttrin | 18/08/2020, 16:52
    La stratégie du criquet des GAFAM-BATX menace la démocratie et l’économie Par Aurélie Luttrin | 18/08/2020, 16:52 TRIBUNE. Tout comme ... et de la politique le criquet, les géants du numérique restent dans Et ce hold-up concerne, aujourd’hui, les territoires et les Etats. En maîtrisant les données d’un Etat, nous maîtrisons désormais sa population. Une guerre un secteur tant qu’il y a nouvelle génération se déroule sous nos yeux, tout aussi dangereuse et bien des opérateurs à « man- plus pernicieuse car silencieuse. En laissant nos données à des entreprises ger » puis, quand l’éco- qui dépendent d’Etats impérialistes, nous hypothéquons notre démocratie, système est pieds et nos valeurs et l’avenir de nos entreprises et des citoyens. Nous dépendrons, poings liés ou supprimé, si nous ne réagissons pas, d’autres Etats et de leur bon vouloir, laissant le ils changent de secteurs, tuant toute véritable concurrence peuple dépossédé de sa souveraineté. sur leur passage. Par Aurélie Luttrin, présidente de Ciwik (*) La démocratie et la cité telle que nous la concevons sont en danger. Les femmes et hommes politiques doivent prendre conscience qu’ils peuvent aussi se faire phagocyter, les géants du numérique considérant que les pro- GAFAM vs BATX, tel est le nouveau combat dans l’arène mondiale du nu- blèmes politiques ne sont que de vastes problèmes mathématiques dont la mérique. Cette lutte entre les géants américains d’un côté (Google, Apple, solution réside dans le traitement de données. Facebook, Amazon, Microsoft) et leurs homologues chinois de l’autre (Baidu, Alibaba, Tencent, Xiaomi) n’est pas qu’une lutte entre entreprises, il s’agit Les citoyen(ne)s méritent mieux que des Etats plateformes où ils ne seraient d’une guerre étatique pour prendre le contrôle du monde et de l’humanité.
    [Show full text]
  • Consult Cigref's Report
    Avr. Understanding digital stakes to support business in China Apr. APRIL 2021 Understanding digital stakes to support business in China Intellectual property rights All Cigref publications are made freely available to the general public but remain protected by the applicable laws on intellectual property. UNDERSTANDING DIGITAL STAKES TO SUPPORT BUSINESS IN CHINA Editorial Editorial It is no longer possible to consider the global economy without taking into account the growing importance of China in international trade. This is also true in the digital sector. China has become a major player in the international digital sector, with a clear desire to become a leader in key technologies of this early 21st century. Eric Schmidt, former CEO of Alphabet and Chairman of the Pentagon’s Defense Innovation Board, stated back in 2016: “It’s pretty simple. By 2020, China will have caught up. By 2025, they will be better than us. By 2030, they will dominate the industries of AI.” This quote illustrates China’s ambition and its recognition by the major players in the digital economy. China’s digital strategy has led to the emergence of Chinese digital champions. Very quickly and with the benefit of a significant domestic market, they developed in China and then set out to conquer the world. Only the current geopolitical tensions with the United States, and in particular the technological war, represent a barrier in the international expansion of these players. More importantly, an excessive conflict between these two superpowers would weaken the global economy. Chinese President Xi Jinping said in his speech to Europe that he wants cooperation to prevail over competition, consensus over disagreement.
    [Show full text]
  • The New Kids on the Block Exploring the Brand Identity of Disruptive Innovators
    The New Kids on the Block Exploring the brand identity of disruptive innovators By: Jana Tigges, Bettina van der Stelt & Jessica Volk The New Kids on the Block Exploring the brand identity of disruptive innovators Jana Tigges, Bettina van der Stelt & Jessica Volk Abstract Aim: The aim of this paper is to examine the corporate brand identity of disruptive innovators that have changed entire industries. Moreover, this paper strives to answer the question, whether a universal pattern of corporate brand identities for these “New kids on the block” can be identified and if so, what it looks like. Approach: Firstly, a literature review is conducted in order to provide theoretical background in regard to the research question of this paper. Secondly, a qualitative multiple case study approach is used to understand the background and development of the investigated companies. Further, the corporate brand identity of each company was explored in order to identify significant similarities and differences. Thirdly, a corporate brand identity matrix for “New kids on the blocks” was established based on the universal commonalities of the brand identities. Findings: A universal pattern of disruptive corporate brand identities exists and is illustrated in a model matrix created by the authors. Originality/ value: The paper’s added value lies on the creation of a corporate brand identity matrix of disruptive innovators, here referred to as the “New kids on the block”. Keywords: disruptive innovation, corporate brand identity, technological shifts Paper type: Research paper Introduction Indeed, literature provides evidence that a First #GAFA - Google, Apple, Facebook, brand’s innovative technology alone, is not Amazon sufficient for a successful market driving Then #BATX - Baidu, Alibaba, Tencent, strategy.
    [Show full text]
  • THINKERS50 / INNOVATION@WORK Innovative Ways of Organizing in the East
    THINKERS50 / INNOVATION@WORK Innovative ways of organizing in the East Google, Amazon, Facebook and Apple (Gafa) may still be the world's largest technology companies, but a new generation of contenders is coming from the East. The Chinese giants are consistently on the MIT Technology Review’s list of smartest companies in the world. While Chinese enterprises were long written off as copycats, this has now become a bad joke. Gafa needs to be aware of BATX’s boundaryless business approach, leveraging a new way of organising and exploiting the benefits of both strategic planning and entrepreneurial decision-making. Alibaba and its peers Baidu, Tencent and Xiaomi (popularly termed BATX in China) not only lead but also create and disrupt markets. With a combined market capitalisation of about $900bn, incubating more than 1,000 new ventures within a decade and an average annual growth in excess of 50 per cent, they are showing their unprecedented expansion and relentless ambition to the world. Tencent’s WeChat has more than a billion users worldwide. Xiaomi overtook Apple in the Chinese market just four years after its establishment. Baidu is one of the big boys in artificial intelligence (AI), not less than Google and Microsoft. Gafa needs to be aware of the rise of BATX. The BATX companies have no respect for boundaries: sectors, countries or technologies. While the roots of BATX are in search technology, e-commerce, social communication and software, times have changed in the past five years. These new technology giants are active in more than 20 sectors, both online and offline and increasingly in hardware electronics.
    [Show full text]
  • Entering the New Paradigm of Artificial Intelligence and Series
    Entering the new paradigm of artificial intelligence and series A Study commissioned by the Council of Europe and Eurimages - December 2019 Authors: - Peacefulfish UG, Berlin, Germany: - Thierry Baujard - Rémi Tereszkiewicz - Axel de Swarte - Digital Media Finland, Helsinki, Finland: - Timoteus Tuovinen 2 Index Introduction: ...................................................................................................................................................... 4 1. Artificial Intelligence in the audio-visual sector ........................................................................................ 6 1.1. Introduction ............................................................................................................................................ 6 1.2. How Artificial Intelligence is used. .................................................................................................... 7 1.2.1. Description of Artificial Intelligence technologies ........................................................................... 7 1.2.2. Examples of Artificial Intelligence uses ............................................................................................ 8 1.2.2. Who uses Artificial Intelligence ..................................................................................................... 13 1.2.3. Artificial Intelligence ethics ............................................................................................................ 17 1.3. Impact of Artificial Intelligence.......................................................................................................
    [Show full text]
  • Artificial Intelligence Opportunities and Conditions for European Land Forces
    Focused Question Artificial Intelligence Opportunities and Conditions for European Land Forces AN EXPERTISE FORUM CONTRIBUTING TO EUROPEAN CONTRIBUTING TO FORUM AN EXPERTISE SINCE 1953 ARMIES INTEROPERABILITY European Army Interoperability Center This text was drawn up with the help of Mrs. Laurane Chédaleux, member of the Finabel research team, under the supervision and guidance of the Head of the Permanent Secretariat. This focused question is a document that gives an initial reflection on the theme. The content is not reflecting the positions of the member states, but consists of elements that can initiate and feed the discussions and analyses in the domain of the theme. It was drafted by the Permanent Secretariat and is supported by the organisation. LIST OF ACRONYMS AND TABLE OF CONTENTS ABBREVIATIONS Introduction 3 AI Artificial Intelligence BATX Baidu, Alibaba, Tencent et Xiaomi A wide field of possible CCP Chinese Communist Party applications for AI DTIB Defence Technological and within land forces 4 Industrial Base EU European Union - AI implementation out of GAFAM Google, Amazon, Facebook, Apple, the battlefield 5 Microsoft - AI implementation on ICT Information and Communication the battlefield 7 Technology IO International Organisation A large set of conditions requested IOT Internet of Things for AI implementation 7 LAWS Lethal Autonomous Weapons Systems - Technical issues 8 NATO North Atlantic Treaty Organisation - Human resources issues 9 NBIC Nanotechnology, Biotechnology, - Ethical issues 11 Information technology and
    [Show full text]
  • Four Corporate Strategies for Coping with Triumphant Digital Platforms
    36 Four corporate strategies for coping with triumphant digital platforms Christophe Deshayes, Digital Matters, École de Paris du Management Original article in French published in Gérer & Comprendre, September, 2019, pp. 16-26. Menaced with extinction as a result of a presumably inevitable “uberization”, firms have to speed up their digital transformation. This detailed study of approximately twenty French firms and organizations that have advanced toward this transformation shows that theories based on management fashions do not suffice to explain such a deep trend. The strategies worked out and applied by these firms are much more specific and thorough than specialists’ vague strategic recommendations. The facts of these cases even lead us to question whether the scare of uberization is a valid explanation, since it is, as shown, possible to survive from Uber, Airbnb, Booking and even Amazon. Various strategies can be adop- ted: confront these platforms head-on (even belatedly), avoid them, negotiate with them or become their vassals. Returning to the work of drafting an in-depth corporate strategy would signal a break with the rudimentary, mimetic strategies that prevailed during the past two decades of globalization. he rhetoric of corporate management and its Toward the infinite firm? Tdiscourses about investment center around the issue of the digital transformation.(1) Should this situation Digital technology is no longer just a means for a firm be analyzed by borrowing the theories about “mana- to just sell more to the same customers in its usual field gerial fashions” (or “modes”)? Or does it shed light of business. It enables the firm to expand its scope on a different sort of phenomenon? To answer these of action, its business, infinitely.
    [Show full text]