{"id":4904,"date":"2019-05-07T13:13:00","date_gmt":"2019-05-07T13:13:00","guid":{"rendered":"https:\/\/plumconsulting.co.uk\/plum-insight-the-economics-of-consumer-internet-of-things-security\/"},"modified":"2019-11-07T10:24:57","modified_gmt":"2019-11-07T10:24:57","slug":"plum-insight-the-economics-of-consumer-internet-of-things-security","status":"publish","type":"post","link":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/","title":{"rendered":"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9"},"content":{"rendered":"<p>Postes de t\u00e9l\u00e9vision et thermostats intelligents, \u00e9lectrom\u00e9nager connect\u00e9&#8230; Les applications de l\u2019Internet des Objets se r\u00e9pandent dans les foyers. Pourtant, ces appareils connect\u00e9s comportent souvent de s\u00e9rieuses failles de s\u00e9curit\u00e9 qui les rendent vuln\u00e9rables face aux cybermenaces.<\/p>\n<p>Si ces lacunes s\u2019expliquent en partie par des raisons techniques, la v\u00e9ritable cause du probl\u00e8me est d\u2019ordre \u00e9conomique, avec pour principaux facteurs une asym\u00e9trie d\u2019informations ainsi que la pr\u00e9sence d\u2019incitations contradictoires et d\u2019une vari\u00e9t\u00e9 d\u2019externalit\u00e9s et de biais comportementaux.<\/p>\n<p>Le pr\u00e9sent document, qui s\u2019appuie sur un rapport r\u00e9cent r\u00e9alis\u00e9 pour l\u2019association Internet Society, analyse ces facteurs \u00e9conomiques et propose des mesures de rem\u00e9diation.<\/p>\n<p>Nous esp\u00e9rons ainsi am\u00e9liorer la s\u00e9curit\u00e9 \u00e0 la fois des appareils et de l\u2019Internet en g\u00e9n\u00e9ral.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Postes de t\u00e9l\u00e9vision et thermostats intelligents, \u00e9lectrom\u00e9nager connect\u00e9&#8230; Les applications de l\u2019Internet des Objets se r\u00e9pandent dans les foyers. Pourtant, ces appareils connect\u00e9s comportent souvent de s\u00e9rieuses failles de s\u00e9curit\u00e9 qui les rendent vuln\u00e9rables face aux cybermenaces. Si ces lacunes s\u2019expliquent en partie par des raisons techniques, la v\u00e9ritable cause du probl\u00e8me est d\u2019ordre \u00e9conomique,<a href=\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[161,163],"tags":[],"class_list":["post-4904","post","type-post","status-publish","format-standard","hentry","category-technologie-et-infrastructure","category-plateformes-numeriques"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9 - Plum Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9 - Plum Consulting\" \/>\n<meta property=\"og:description\" content=\"Postes de t\u00e9l\u00e9vision et thermostats intelligents, \u00e9lectrom\u00e9nager connect\u00e9&#8230; Les applications de l\u2019Internet des Objets se r\u00e9pandent dans les foyers. Pourtant, ces appareils connect\u00e9s comportent souvent de s\u00e9rieuses failles de s\u00e9curit\u00e9 qui les rendent vuln\u00e9rables face aux cybermenaces. Si ces lacunes s\u2019expliquent en partie par des raisons techniques, la v\u00e9ritable cause du probl\u00e8me est d\u2019ordre \u00e9conomique,[...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Plum Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-07T13:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-07T10:24:57+00:00\" \/>\n<meta name=\"author\" content=\"Sam Wood\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@plumconsulting\" \/>\n<meta name=\"twitter:site\" content=\"@plumconsulting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Wood\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\"},\"author\":{\"name\":\"Sam Wood\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/d9ae2d5a9e083659d01ed3f5d07df539\"},\"headline\":\"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9\",\"datePublished\":\"2019-05-07T13:13:00+00:00\",\"dateModified\":\"2019-11-07T10:24:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\"},\"wordCount\":159,\"articleSection\":[\"Technologie et infrastructure\",\"Plateformes num\u00e9riques\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\",\"url\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\",\"name\":\"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9 - Plum Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/#website\"},\"datePublished\":\"2019-05-07T13:13:00+00:00\",\"dateModified\":\"2019-11-07T10:24:57+00:00\",\"author\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/d9ae2d5a9e083659d01ed3f5d07df539\"},\"breadcrumb\":{\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/plumconsulting.co.uk\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#website\",\"url\":\"https:\/\/plumconsulting.co.uk\/\",\"name\":\"Plum Consulting\",\"description\":\"We offer strategy, policy and regulatory advice on telecommunications, spectrum, online and media issues.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/plumconsulting.co.uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/d9ae2d5a9e083659d01ed3f5d07df539\",\"name\":\"Sam Wood\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a85f8a8ff88def34cdc77c921caec409592b619ad3e6dce1a3973e4b30910085?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a85f8a8ff88def34cdc77c921caec409592b619ad3e6dce1a3973e4b30910085?s=96&d=mm&r=g\",\"caption\":\"Sam Wood\"},\"url\":\"https:\/\/plumconsulting.co.uk\/fr\/author\/sam-wood\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9 - Plum Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/","og_locale":"fr_FR","og_type":"article","og_title":"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9 - Plum Consulting","og_description":"Postes de t\u00e9l\u00e9vision et thermostats intelligents, \u00e9lectrom\u00e9nager connect\u00e9&#8230; Les applications de l\u2019Internet des Objets se r\u00e9pandent dans les foyers. Pourtant, ces appareils connect\u00e9s comportent souvent de s\u00e9rieuses failles de s\u00e9curit\u00e9 qui les rendent vuln\u00e9rables face aux cybermenaces. Si ces lacunes s\u2019expliquent en partie par des raisons techniques, la v\u00e9ritable cause du probl\u00e8me est d\u2019ordre \u00e9conomique,[...]","og_url":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/","og_site_name":"Plum Consulting","article_published_time":"2019-05-07T13:13:00+00:00","article_modified_time":"2019-11-07T10:24:57+00:00","author":"Sam Wood","twitter_card":"summary_large_image","twitter_creator":"@plumconsulting","twitter_site":"@plumconsulting","twitter_misc":{"Written by":"Sam Wood","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/#article","isPartOf":{"@id":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/"},"author":{"name":"Sam Wood","@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/d9ae2d5a9e083659d01ed3f5d07df539"},"headline":"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9","datePublished":"2019-05-07T13:13:00+00:00","dateModified":"2019-11-07T10:24:57+00:00","mainEntityOfPage":{"@id":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/"},"wordCount":159,"articleSection":["Technologie et infrastructure","Plateformes num\u00e9riques"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/","url":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/","name":"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9 - Plum Consulting","isPartOf":{"@id":"https:\/\/plumconsulting.co.uk\/#website"},"datePublished":"2019-05-07T13:13:00+00:00","dateModified":"2019-11-07T10:24:57+00:00","author":{"@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/d9ae2d5a9e083659d01ed3f5d07df539"},"breadcrumb":{"@id":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/plumconsulting.co.uk\/fr\/plum-insight-the-economics-of-consumer-internet-of-things-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/plumconsulting.co.uk\/fr\/"},{"@type":"ListItem","position":2,"name":"Internet des Objets grand public : l\u2019\u00e9conomie de la s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/plumconsulting.co.uk\/#website","url":"https:\/\/plumconsulting.co.uk\/","name":"Plum Consulting","description":"We offer strategy, policy and regulatory advice on telecommunications, spectrum, online and media issues.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/plumconsulting.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/d9ae2d5a9e083659d01ed3f5d07df539","name":"Sam Wood","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/plumconsulting.co.uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a85f8a8ff88def34cdc77c921caec409592b619ad3e6dce1a3973e4b30910085?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a85f8a8ff88def34cdc77c921caec409592b619ad3e6dce1a3973e4b30910085?s=96&d=mm&r=g","caption":"Sam Wood"},"url":"https:\/\/plumconsulting.co.uk\/fr\/author\/sam-wood\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts\/4904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/comments?post=4904"}],"version-history":[{"count":2,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts\/4904\/revisions"}],"predecessor-version":[{"id":5149,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/posts\/4904\/revisions\/5149"}],"wp:attachment":[{"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/media?parent=4904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/categories?post=4904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plumconsulting.co.uk\/fr\/wp-json\/wp\/v2\/tags?post=4904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}