How businesses behave can be based on the perceived traits of consumers and clients, or professionally said, the personality construct of an entities belief system whose competency considerations attributes failure or success, so in today's new norm, how does your business operating environment consider;
•Perceived Control: Internal/External Locus of Control.
•Success Based Services: Risk Appetite Behaviour.
•Life Science Services: Consumer Traits & Influences.
•Patent Development: Marketplace Execution.
•Thematic Designs: Regulation & Framework Selection.
The term is mainly used within the psychology industry but it gives a welcomed sounding board for progressing your cyber security posture. The new low-touch economy and its use of cognitive last mile technology has heightened consumer needs, not only from a service delivery perspective, but also by innovating accessible technologies for health and well-being.
Overnight, the design of new products and industries has created the newest categories of data-disposition strategies and from our cyber security perspective it assists in clarifying applicable data privacy risks.
We've seen some concentric business units referred to as blobs or bubbles - these are now the new perimeters for technology that your design and privacy principals need to adapt to, including identifying applicable cyber security mechanisms.
If you are designing a new product or service, it is important to consider the functional traits and behaviours of new platforms and associated product interactions and how they represent risk perception. Consumers by necessity may need access to your new platform, but if the user design does not feel safe or the platform introduces technology risk, then your value is undermined. From a business view, it is important to understand the thematic and scientific telemetry -based thinking approach when considering what risk model is appropriate for your new product or service.
New modern smart solutions are extending the ‘just in time model’ of the 1980's to envelope consumer led customisation. It's only now possible as 5G, Internet of Things and Edge technologies provide the new foundations required to give consumers the ability to experience real time needs, but also select solutions based on their risk appetites.
Individuals with an 'internal' locus of control have higher propensity of adopting appropriate technologies, while those with an 'external' locus of control are less likely to adopt these newer technologies - 'Hierarchy Of Needs' play an important factor, so the reverse can be true too, and that's where design thinking is vital for your design and business resiliency.
Commonly, engineers adopt the view 'there is a design fault with the glass - not that it's half empty or half full'. Qualified design thinking will let you take digital logic into discrete thinking, so you can design for the multiple propensities of technology adoption. If you design a new pandemic-based solution, it is inherently going to have digital privacy techniques afore whilst also considering the perception of social distancing and other published pandemic standards.
Perhaps federated consent is mandatory across your technology ecosystem, if so, how will it be designed into your low-touch economy proposition? Getting it right now will mean you do not have an unmanageable list of compensatory controls within your risk register. Perhaps your new solution will use smart API's to connect the physical and virtual realities - if so, what assurances have you in place for data privacy against the new attach vectors,
Consumer technology must promote the concept of control, smart automatic lawn mowers only work once you have manually configured the garden range of the base unit - the user-based locus of control is simple here. For automated cars, the complex trait for each ecosystem vehicle-component needs to have applicable internal and external locus of control considerations applied correctly.
Whatever your industry, getting independent, qualified help in design thinking techniques will clarify your value proposition so your business can enterprise by design securely.
#RUCyberReady