Premium Content

Access "The trust advantage: How to win at big data"

The-trust-advantage-How-to-win-at-big-data-(1384170168_504).JPG

Sponsored by ComputerWeekly.com

BCG projects that the value created through digital identity could be: €1 trillion in Europe by 2020, or roughly 8% of the combined GDP of the EU-27. For European businesses and governments, the use of personal data will deliver an annual benefit of €330 billion by 2020—bringing growth to an otherwise stagnant economy. An increase in newly available data on consumers will meaningfully shift market shares. But without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste. BCG estimates that two-thirds of the total value potential stands to be lost if companies / organisations fail to establish a trusted flow of personal data This report from Boston Consulting Group, based on surveys of 10,000 people, takes the temperature on how consumers around the world are feeling about the collection and use of personal data. Looking at how this varies by country, generation, and by industry, and also at how significant the gains can be for companies if they successfully build the consumer's trust in gathering and use of data.  Access >>>

Table of contents

  • The Landscape of Trust
  • What's At Stake
  • Engaging Consumers

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Computer Weekly buyer's guide to endpoint security
    BG_0714_endpoint_security.jpg
    E-Handbook

    In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...

  • Social Engineering in IT Security
    Social-Engineering-in-IT Security.jpg
    E-Handbook

    This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...

  • Gartner: Digital transformation: How to survive the information crisis
    Gartner-SurviveInformationCrisis.jpg
    E-Handbook

    It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...