  {"id":19901,"date":"2016-11-18T17:20:15","date_gmt":"2016-11-18T22:20:15","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/"},"modified":"2016-11-18T17:24:25","modified_gmt":"2016-11-18T22:24:25","slug":"cocoon-home-security-made-simple","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/","title":{"rendered":"Cocoon: Home security made simple"},"content":{"rendered":"<p>Cocoon\u2019s business model is simple: utilising the latest advances in sensors and cameras to make your home as safe and snug as a bug in a rug.<\/p>\n<p>Cocoon differentiates itself by using not only motion sensors and cameras like other security companies, but also detecting sounds and vibrations \u2014 including low-frequency signals inaudible to humans(1). And one step further, they are using machine learning to understand the noises that are usual and those that may signify a break-in.<\/p>\n<p>The operating model is built on the premise that every home has a unique sound fingerprint. According to Cocoon co-founder and head of software John Berthels(2): \u201cthis may include lorries rumbling by, the central heating switching itself on and off or a pet moving around. The devices gradually build up a picture of what is \u201cnormal\u201d for each house.<\/p>\n<p>If noises deviate from the established patterns \u2014 a back door being forced open or a window breaking \u2014 the device will send an alert to the users\u2019 smartphone, prompting them to check their home on a live video link, set off a high-pitched alarm or call the police.\u201d<\/p>\n<p>However data protection and security pose obvious risks. As with any data sent over the Internet, there is risk of interception and data leakage(3). While the business and operating models described above are geared towards utilising technology and making your home safer, such remote access to property would also be of great use to malicious third parties.<\/p>\n<p>For one, there is risk of camera access being taken over and used to spy on homeowners even when they believe the cameras are switched off. Ditto for motion and sound sensors. Even with privacy laws galore, which rule out eavesdropping on private property, such information can still be used indirectly and profitably. And yet, Cocoon\u2019s target customers are likely to be people who value their privacy highly. Further, as consumers become reliant on security features connected to the Internet, this\u00a0opens doors to third parties being able to hack into them\u00a0remotely leaving no physical trace and the homeowner none the wiser until it is too late.<\/p>\n<p>Privacy and security are critical(4) and Cocoon is taking some steps in this direction. Cocoon processes video and audio on the actual device and only sends encrypted data to secure cloud services if an alert is triggered or each time you check in. This misses the point however that so long as a device is connected to the Internet it is subject to malicious attacks regardless or whether it is sending over data or not. A\u00a0solution would be to create a virtual firewall(5) that protects all Internet connections leaving the house, just like\u00a0a brick wall that protects the physical space inside.<\/p>\n<p>With the Internet of Things gaining traction, i.e. ultimate connectivity of all devices in the household(6), it would be critical for Cocoon to remain connected with any other security related apps, such as garage door controls, ventilation and window controls etc. These are not integrated as yet. The key challenges here would be compatibility of programming language (7) and higher security risks that interconnectivity inevitably brings.<\/p>\n<p>Overall, Cocoon is a small step in the direction of integrated remote home security. However it is an important building block and precedent upon which further household interconnectedness can be built. Cocoon allows us to do something we\u2019d not been able to do in the past &#8211; have a crystal ball and see, hear and act across walls and distances. Our ancestors could only have marvelled at this\u2026<\/p>\n<p>613 words<\/p>\n<p>(1) https:\/\/cocoon.life\/how_us \u00a0(as of Nov. 2016)<\/p>\n<p>(2) Financial Times, \u201cArtificial intelligence moves from sci-fi to daily life\u201d (Nov. 2016)<\/p>\n<p>(3) McKinsey Global Institute, \u201cThe Internet of Things: Five critical questions\u201d (Aug. 2015)<\/p>\n<p>(4)\u00a0M. Porter and J. Heppelmann, \u201cHow smart, connected products are transforming competition,\u201d 性视界 Business Review (Nov. 2014)<\/p>\n<p>(5) US-CERT Publications, \u201cUnderstanding Firewall, 2009<\/p>\n<p>(6) McKinsey Quarterly, \u201cThe Internet of Things\u201d (Mar. 2010)<\/p>\n<p>(7)\u00a0The Economist, \u201cThe language of the internet of things\u201d (Sep. 2014)<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Making your home as safe and snug as a bug in a rug<\/p>\n","protected":false},"author":2413,"featured_media":19993,"comment_status":"open","ping_status":"closed","template":"","categories":[2785,2019,2312],"class_list":["post-19901","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-home-security","category-internet-of-things","category-privacy"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cocoon: Home security made simple - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cocoon: Home security made simple - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Making your home as safe and snug as a bug in a rug\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-18T22:24:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-17.23.25.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2486\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/\",\"name\":\"Cocoon: Home security made simple - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Screen-Shot-2016-11-18-at-17.23.25.png\",\"datePublished\":\"2016-11-18T22:20:15+00:00\",\"dateModified\":\"2016-11-18T22:24:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Screen-Shot-2016-11-18-at-17.23.25.png\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Screen-Shot-2016-11-18-at-17.23.25.png\",\"width\":2486,\"height\":1068},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/cocoon-home-security-made-simple\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cocoon: Home security made simple\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cocoon: Home security made simple - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/","og_locale":"en_US","og_type":"article","og_title":"Cocoon: Home security made simple - Technology and Operations Management","og_description":"Making your home as safe and snug as a bug in a rug","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/","og_site_name":"Technology and Operations Management","article_modified_time":"2016-11-18T22:24:25+00:00","og_image":[{"width":2486,"height":1068,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-17.23.25.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/","name":"Cocoon: Home security made simple - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-17.23.25.png","datePublished":"2016-11-18T22:20:15+00:00","dateModified":"2016-11-18T22:24:25+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-17.23.25.png","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-17.23.25.png","width":2486,"height":1068},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/cocoon-home-security-made-simple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Cocoon: Home security made simple"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/19901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/2413"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=19901"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/19901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/19993"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=19901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=19901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}