News

05:44 PM
Connect Directly
RSS
E-Mail
50%
50%

Public Mistrust A Roadblock to Technology Acceptance

I promised myself that I wouldn't mention any New York Times articles in my next few blog entries -- not after mentioning the newspaper twice in recent posts -- but I couldn't help myself last week, after coming across an article headlined

I promised myself that I wouldn't mention any New York Times articles in my next few blog entries -- not after mentioning the newspaper twice in recent posts -- but I couldn't help myself last week, after coming across an article headlined "Insurance Fears Lead Many to Shun DNA Tests."According to the article, some people are avoiding DNA tests that could indicate genetic predispositions to certain health problems because they fear that it could affect their health insurance coverage - under a form of "genetic discrimination"

from the New York Times:

Such discrimination appears to be rare; even proponents of federal legislation that would outlaw it can cite few examples of it. But thousands of people accustomed to a health insurance system in which known risks carry financial penalties are drawing their own conclusions about how a genetic predisposition to disease is likely to be regarded.

As a result, the ability to more effectively prevent and treat genetic disease is faltering even as the means to identify risks people are born with are improving.

While the implications of this news has obvious implications for health insurers, I wonder if, in a way, this strange phenomenon could foreshadow what lies ahead for other parts of the insurance industry.

In late 2007, I had a conversation with Chad Hersh, a senior analyst in Celent's insurance practice. We discussed what the future of insurance technology could entail, such as increased and continued use of predictive analytics and mobile technologies. When it came time to discuss the slightly more distant future, the conversation shifted to "smart dust," which Hersh described as tiny sensors, built into a home or building, that communicate with one another to monitor things like the structural soundness of a property and communicate that info to a property owner or insurer.

The practical application of such a technology is obvious. Maybe we could anticipate bridge or building collapses. Perhaps we could identify if a given property was more susceptible to wind damage than another. In a similar way, GPS devices could monitor driving habits -- giving the general public (and, of course, underwriters) a better idea of how safe a specific driver is.

The key though, will be how the general public perceives these advances. Some will no doubt embrace these technologies and view them as an opportunity for reduced insurance rates, not to mention safer building and roads. However, I expect -- based on the distrust many in the public have for insurers -- more could view these advancements as invasions of privacy: one more way for those no-good carriers to justify a rate increase.

If this recent DNA-related news has taught us anything, it's that consumers are wary of the new technologies that insurers will use - even those that can make a direct positive impact on their overall well-being.

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
All Videos
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Cartoon Archive
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Back Issues | Must Reads
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.
FULL SCHEDULE | ARCHIVED SHOWS