Cover Image
市場調查報告書

連網家庭市場及電腦網路風險預測

Connected Home Market and Implications of Cyber Risks

出版商 Frost & Sullivan 商品編碼 370702
出版日期 內容資訊 英文 98 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
連網家庭市場及電腦網路風險預測 Connected Home Market and Implications of Cyber Risks
出版日期: 2016年08月10日 內容資訊: 英文 98 Pages
簡介

北美的住宅的智慧技術生態系統的機會及威脅相關的理解。

本報告提供北美連網家庭的與生態系統相關資料,電腦網路風險的可能性分析,智慧家庭解決方案的現在、未來的使用情形,現在認識的漏洞,優點及缺點,網路安全,及設備相關的安全課題等系統性資訊。

第1章 分析目的、手法

第2章 摘要整理、預測

第3章 智慧家庭解決方案的使用情形:現在、未來

  • 智慧家庭解決方案的使用情形
  • 目前智慧技術/功能的使用情形
  • 未來的智慧技術/功能的使用情形
  • 使用系統、設備簡介
  • 使用雲端服務簡介

第4章 認識到的安全的漏洞及預測

  • 重要的預測
  • 重要的預測:各使用類別
  • 認識到的整體安全/漏洞 - 配接器:各國
  • 認識到的整體安全/漏洞:各技術類型 - 全體
  • 認識到的整體安全/漏洞:各技術類型 - 各國
  • 認識到的整體安全/漏洞:各技術類型 - 各使用類別
  • 認識到的使用技術的智慧

第5章 智慧家庭解決方案:優點、疑慮點

  • 成為智慧家庭解決方案的最大動機的優點:各國
  • 難以成為智慧家庭解決方案的動機的優點:各國
  • 智慧家庭解決方案關於的最重要的疑慮點:各國
  • 難以成為智慧家庭解決方案的疑慮的點:各國
  • 定為智慧家庭解決方案的最大的動機的優點:各使用類別
  • 難以定為智慧家庭解決方案的動機的優點:各使用類別
  • 智慧家庭解決方案關於的最重要的疑慮點:各使用類別
  • 難以成為智慧家庭解決方案的疑慮的點:各使用類別

第6章 影響供應商選擇的要素及連網家庭網路安全的作用

  • 偏好的安裝的方法:各國
  • 已設置智慧解決方案網路安全的預定供應商:各國
  • 網路安全支援設備的預定供應商:各國
  • 供應商的智慧家庭技術的安全:各國
  • 企業/供應商/服務供應商所扮演的角色:各國
  • 消費者的技術精通度、網路安全能力

第7章 消極安全經驗及目前保護

  • 消極的安全經驗:各國
  • 消極的安全經驗:各使用類別
  • 家居系統裂口:配接器
  • 家居系統裂口的響應時間:配接器
  • 最脆弱的系統:配接器
  • 目前網路安全手段:各國
  • ID盜竊、個人信息
  • 保險保障:各國
  • 保險保障:各使用類別

第8章 設備相關的安全課題

  • 設備安全:各國
  • 行動/穿戴式設備的漏洞
  • 第三方存取/監測的設備
  • 第三方的安全提供:各國
  • 第三方的安全提供:各使用類別
  • 免責聲明

第9章 附錄

第10章 關於Frost&Sullivan

目錄
Product Code: K05A-01-00-00-00

Understanding Threats and Opportunities within Smart Technology Ecosystems of North American Homes

The ecosystem of the connected homes market has expanded quite rapidly over the last five years, encompassing a host of technology vendors and service providers from home automation to information and communications technology (ICT), integrated service providers, utilities, and more. This study, based on a survey of 1,263 respondents in the United States and Canada, reveals that the adoption of smart home technologies is significant, growing, and challenging. It identifies key differences in the attitudes and behaviors of connected home solution adopters, potential adopters, and non-adopters. The study provides an understanding of the types of smart technologies, devices, and cybersecurity measures that are being used in North American homes.

Table of Contents

1. RESEARCH OBJECTIVES AND METHODS

  • 1. Background and Objectives
  • 2. Methodology

2. EXECUTIVE SUMMARY AND IMPLICATIONS

  • 1. Summary of 5 Key Findings
  • 2. Key Finding 1-The Connected Home Landscape is Significant, Growing, and Challenging
  • 3. Connected Homes-A Fast Growing Landscape
  • 4. Strategic Implications
  • 5. Key Finding 2-Connected Homes Experience More Cybersecurity-related Incidents
  • 6. Adopters are 2x More Likely than Potential Adopters and 3x More Likely than Non-adopters to have Experienced Cybersecurity-related Problems
  • 7. Strategic Implications
  • 8. Key Finding 3-Connected Homes Use a Broader Mix of Connected Devices
  • 9. Adopters are Confident in the Security of a Broader Set of Devices when Controlling Smart Home Solutions
  • 10. Strategic Implications
  • 11. Key Finding 4-Connected Homes Use More Cybersecurity Measures, but Gaps Remain
  • 12. Majority of Devices More Commonly Used by Adopters for Remote Tracking and Wiping are Password-protected
  • 13. 1 out of 4 adopters have lost personal information and are more likely to ask how their data is being protected
  • 14. Strategic Implications
  • 15. Key Finding 5-Connected Homes Expect More Security from Providers but also have Greater Confidence in them
  • 16. Home Security Service Providers and Smart Home Solution Specialists are the More Trusted Providers of Cybersecurity
  • 17. For Cybersecurity-enabled Devices, Adopters Turn to Home Security Service Providers, ISPs, and Device Vendors
  • 18. Home Security Service Providers and Smart Home Solution Specialists are the Top-rated Providers of Cybersecurity
  • 19. When a Vendor's Security Support is Deficient, it Creates a Sense of Vulnerability among Adopters
  • 20. Strategic Implications

3. SMART HOME SOLUTION ADOPTIONCURRENT AND FUTURE

  • 1. The Adoption of Smart Home Solutions
  • 2. Current Smart Technology/Capability Adoption
  • 3. Future Smart Technology/Capability Adoption Intent
  • 4. Profile of Systems and Devices Used
  • 5. Profile of Cloud Services Used

4. PERCEIVED SECURITY VULNERABILITIES AND EXPECTATIONS

  • 1. Important Expectations
  • 2. Important Expectations-By Adoption Category
  • 3. Perceived Overall Security/Vulnerability-Adopters by Country
  • 4. Perceived Security/Vulnerability by Technology Type-Overall
  • 5. Perceived Security/Vulnerability by Technology Type-By Country
  • 6. Perceived Security/Vulnerability by Technology Type-By Adoption Category
  • 7. Perceived Smartness of Technologies Adopted

5. SMART HOME SOLUTIONS-BENEFITS AND CONCERNS

  • 1. Most Motivating Benefits of Smart Home Solutions-By Country
  • 2. Least Motivating Benefits of Smart Home Solutions-By Country
  • 3. More Important Concerns About Smart Home Solutions-By Country
  • 4. Less Important Concerns About Smart Home Solutions-By Country
  • 5. More Motivating Benefits of Smart Home Solutions-By Adoption Category
  • 6. Less Motivating Benefits of Smart Home Solutions-By Adoption Category
  • 7. More Important Concerns About Smart Home Solutions-By Adoption Category
  • 8. Less Important Concerns About Smart Home Solutions-By Adoption Category

6. FACTORS AFFECTING PROVIDER SELECTION AND THEIR ROLE IN CONNECTED HOME CYBERSECURITY

  • 1. Preferred Installation Approach-By Country
  • 2. Likely Provider of Cybersecurity for Installed Smart Solutions-By Country
  • 3. Likely Provider of Cybersecurity Enabled Devices-By Country
  • 4. Security of Suppliers' Smart Home Technologies-By Country
  • 5. Security of Suppliers' Smart Home Technologies-By Country (continued)
  • 6. The Role of Companies/Vendors/Service Providers-By Country
  • 7. Consumers' Technology Savviness and Cybersecurity Competence
  • 8. Consumers' Technology Savviness and Cybersecurity Competence (continued)

7. NEGATIVE SECURITY EXPERIENCES AND CURRENT PROTECTION

  • 1. Negative Experience Related to Security-By Country
  • 2. Negative Experience Related to Security-By Adoption Categories
  • 3. Home System Breach-Adopters
  • 4. Home System Breach Response Time-Adopters
  • 5. Most Vulnerable System-Adopters
  • 6. Current Cybersecurity Measures-By Country
  • 7. Identity Theft and Personal Information
  • 8. Insurance Protection-By Country
  • 9. Insurance Protection-By Adoption Category

8. DEVICE-RELATED SECURITY ISSUES

  • 1. Device Security-By Country
  • 2. Device Security-By Country (continued)
  • 3. Mobile/ Wearable Device Vulnerability
  • 4. Devices Accessed/Monitored by Third Parties
  • 5. Third-Party Security-Overall
  • 6. Third-Party Security Provisions-By Country
  • 7. Third-Party Security Provisions-By Adoption Category
  • 8. Third-Party Security Provisions-By Country
  • 9. Third-Party Security Provisions-By Adoption Category
  • 10. Legal Disclaimer

9. APPENDIX

  • 1. Profile of Respondents-Overall
  • 2. Age Profile of Respondents within Adoption Categories
  • 3. Age and Dwelling Profile of Adopters
  • 4. Age Profile of Respondents within Dwelling Types
  • 5. Profile of US Respondents
  • 6. Profile of US Respondents (continued)
  • 7. Profile of US Respondents (continued)
  • 8. Profile of Canada Respondents
  • 9. Profile of Canada Respondents (continued)
  • 10. Profile of Canada Respondents (continued)

10. THE FROST & SULLIVAN STORY

  • 1. The Frost & Sullivan Story
  • 2. Value Proposition: Future of Your Company & Career
  • 3. Global Perspective
  • 4. Industry Convergence
  • 5. 360° Research Perspective
  • 6. Implementation Excellence
  • 7. Our Blue Ocean Strategy
Back to Top