To protect trust in the 4IR, we need to become experts in distrust
Trust will keep the digital transformation on track Image: Anemone123 on Pixabay
- Digital transformation is built and thrives on data - but trust in the way data is handled is decreasing.
- Business leaders must take responsibility for building trust among all stakeholders.
- Trust is reinforced by transparency and active participation in data sharing across industries and organizations.
The vast majority of technologies, processes, and assumptions underlying the innovations that will lead to a more prosperous future rely on the use and flow of data. More and more information must be exchanged between the various actors in ever-growing ecosystems in order for the economy to continue to function. At the same time, however, the threats caused by cyberattacks or the misuse of data are increasing – and pose a threat to entire ecosystems. Even more important than the huge economic damage, however, is the erosion of trust: the most valuable asset of modern societies and economies for the digital transformation.
Trust facilitates the processes that keep the ecosystem and its various relationships running. For these data streams to keep on flowing and be put to best use, many actors need to take responsibility for (re-)building trust. To do so, they need to focus on one of the most important pillars of trust: cybersecurity. By developing a clear strategy around cybersecurity and data use, it will be possible to continuously build and renew the trustworthiness of ecosystems as a whole.
Building trust has always been a fundamental imperative for any organization. This need, as well as the associated responsibility for fostering the mechanisms that promote trust, will grow more challenging as the scope of digital transformation extends . Edelman’s 2019 Trust Barometer – a survey of more than 33,000 respondents from around the world – showed that trust, especially as it relates to new technology, continues to erode significantly.
This widespread erosion of trust is as alarming as the potential of data to improve business and benefit society is enormous. Procter and Gamble, for example, is using real-time production and logistics data to make for more efficient production lines and lower its carbon footprint. Siemens gas turbines generate on average 30 gigabytes of operating data daily; smart evaluation of this data can determine when turbines require servicing, resulting in less downtime for customers. In public transport, massive data sets from sensors are used to support predictive analytics that will, in the future, ensure close to 100% reliable rail transport. These promising applications can improve many aspects of our lives and yield the benefits expected if we can trust the system enough (and the people responsible for building and running it) to share the data that systems thrive on.
This is why every organization and its stakeholders (innovators, business leaders and users) must understand how to achieve and maintain a high level of trustworthiness. Effective trust-building requires clear ownership from those at the highest level, who must define a trust strategy and set overall priorities. A team of IT and cybersecurity professionals should define a comprehensive set of measures to continuously work on the organization’s trustworthiness. From external ratings to standards and shared practices, such measures will define what trust means in practice and what it is to be trusted. To this end, such teams will need to probe the depths of distrust to pre-empt harmful activity and become defenders of trust by understanding the risks to trustworthiness, such as lack of privacy or irresponsible data-sharing.
Such “expertise”, while important, must be balanced with the potential opportunities that arise through data exchange. An important risk to innovation, for example, could be data hoarding – because hidden data cannot be used for data-based business models or applications of any kind. One solution to this risk could be to clearly understand how to classify different levels of information, facilitated by regular training. Technical solutions would then include secured communication channels and a central logging and reporting service to gather and deliver operational and security data across the organization.
This applies not only within individual organizations but across entire industries, where distrust threatens much-needed data sharing between companies. Again, effective and transparent cybersecurity measures as well as collaboration play an important role. To assure others of their organizational security, thereby demonstrating trustworthiness, businesses need to assume greater responsibility for their own cybersecurity. Collaborative new ways of meeting this challenge across industries and geographies would mitigate this risk.
Collaboration can be achieved on various levels and by various means. One credible way is by actively participating in, not merely passively using, information-sharing and analysis centres (ISACs). ISACs and the closely related information-sharing and analysis organizations (ISAO) gather and share information on cyberthreats, but they need commitment from companies to function optimally. Business leaders must recognize the importance of building trust and create a culture in which information-sharing is accepted and encouraged. Other options for collaboration include the World Economic Forum’s Platform for Shaping the Future of Cybersecurity and Digital Trust or initiatives like the Global Cybersecurity Alliance or Charter of Trust.
Defenders of trust must then go beyond collaboration, and beyond technical expertise in distrust, to understand the relationship between security, transparency, responsibility and trust. Good security is the foundational element of trust - but ultimately, to build a viable system of trustful relationships, other aspects of trust need to be incorporated, including transparency and accountability. These values have to underpin any system aiming to foster the long-term, sustainable trust that supports the life-improving and transformative aspects of data-based business models.
Don't miss any update on this topic
Create a free account and access your personalized content collection with our latest publications and analyses.
License and Republishing
World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.
The views expressed in this article are those of the author alone and not the World Economic Forum.
Stay up to date:
The New Data Economy
Forum Stories newsletter
Bringing you weekly curated insights and analysis on the global issues that matter.
More on CybersecuritySee all
Kate Whiting
December 12, 2024