SlideShare a Scribd company logo
1 of 29
Download to read offline
IoT: the dream
and the nightmare…
Kate Carruthers #eIoT2015
Slides are online:
http://www.slideshare.net/carruthk
Oct-2015 © 2015 Kate Carruthers 2
Oct-2015 © 2015 Kate Carruthers 3
IoT is part of the
digital
transformation of
business, the
economy, and
society
Oct-2015 © 2015 Kate Carruthers 4
Industrial
revolution
Digital
revolution
IoT
revolution
Industrial
internet. Rise of
networked
industry.
Convergence of
industrial, digital,
analytics, &
connectivity.
Distributed
information and
communication
networks. Rise of
networked economy
powered by apps.
Harnessing
machines to drive
economies of scale.
Shift away from
agriculture based
economies.
Oct-2015 © 2015 Kate Carruthers 5
Source: Matt Turck, Internet of Things Landscape (Version 3.0), http://www.slideshare.net/mjft01/internet-of-things-42280078/1
Source: IOT Philippines Inc.
http://www.iotphils.com/solutions/smart-home/
Oct-2015 © 2015 Kate Carruthers 6
Oct-2015 © 2015 Kate Carruthers 7
Source: http://blog.csiro.au/a-much-smarter-watch-how-our-flexible-batteries-and-electrified-fabrics-can-improve-wearables/
Oct-2015 © 2015 Kate Carruthers 8
“The real role of wearables
that no one talks about is all
these smart things around
you have no idea what’s
happening with you…”
- Hosain Rahman, CEO Jawbone
Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
Oct-2015 © 2015 Kate Carruthers 9
“I always use the example of,
no matter how smart my
thermostat is, it has no idea if
I’m hot or cold.”
- Hosain Rahman, CEO Jawbone
Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
Oct-2015 © 2015 Kate Carruthers 10
Robyn Lewis
founder and CEO
VisitVineyards.com
Thin film write-protected
NFC that enables post sale
communication between
seller & customer about the
product
Oct-2015 © 2015 Kate Carruthers 11
Source: GE 2013 http://gelookahead.economist.com/infograph/industrial-internet-the-power-of-1-2/
Oct-2015 © 2015 Kate Carruthers 12
Source: http://gelookahead.economist.com/infograph/the-industrial-internet-oil-and-gas/
Oct-2015 © 2015 Kate Carruthers 13Source: Industrial Internet: Pushing the Boundaries of Minds and Machines, Evans, Peter and Annunziata, Marco, GE, 2012, p. 10
Oct-2015 © 2015 Kate Carruthers 14
Source: A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Jay Lee, Behrad Bagheri, Hung-An Kao, 2015,
http://www.sciencedirect.com/science/article/pii/S221384631400025X
Cisco says US$14 trillion IoE value
• asset utilization (reduced costs) of $2.5 trillion
• employee productivity (greater labor
efficiencies) of $2.5 trillion
• supply chain and logistics (eliminating waste)
of $2.7 trillion
• customer experience (addition of more
customers) of $3.7 trillion
• innovation (reducing time to market) of $3.0
trillion
Oct-2015 © 2015 Kate Carruthers 15
Source: CISCO White paper: Embracing the Internet of Everything for your Share of $14 trillion, 2013
Oct-2015 © 2015 Kate Carruthers 16
Source: Greenberg, A., Hackers Remotely Kill a Jeep on the Highway—With Me in It, Wired , July 2015 http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Source: http://readwrite.com/2014/04/30/connected-home-hackers-stop-yelling-at-babies-foscam#feed=/tag/internet-of-things&awesm=~oEe6yipkTkz40o
Oct-2015 © 2015 Kate Carruthers 17
Last August, a hacker infiltrated a wireless camera owned by the Gilbert family, living in
Houston, Texas. The stranger took control of the unit and used it to scream obscenities
at a two-year-old toddler. Fortunately, the hearing-impaired child didn’t have her
cochlear implant turned on at the time, otherwise she would have heard the stranger
yelling, “Wake up Allyson, you little slut!”
Oct-2015 © 2015 Kate Carruthers 18
Oct-2015 © 2015 Kate Carruthers 19
Bloomberg, Data Breaches in the US, at 4 Sep 2014
Oct-2015 © 2015 Kate Carruthers 20
• 3rd party HVAC
firm attack
vector
• Security
software
disabled
• PCI DSS didn’t
save them
Oct-2015 © 2015 Kate Carruthers 21
Bloomberg, Oct 2014
JP Morgan
• Sarbanes-Oxley Act (SOX)
• Payment Card Industry Data Security
Standard (PCI DSS)
• Gramm-Leach-Bliley Act (GLB) Act
• Electronic Fund Transfer Act, Regulation E
(EFTA)
• Free and Secure Trade Program (FAST)
• Fair and Accurate Credit Transaction Act
(FACTA), including Red Flags Rule
• Federal Rules of Civil Procedure (FRCP)
Oct-2015 © 2015 Kate Carruthers 22
Oct-2015 © 2015 Kate Carruthers 23
“How do consumers know
that the products and
services are protected”
David Kleidermacher, Blackberry CSO
Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-
business-model-changes-panel-says/article/448668/
Oct-2015 © 2015 Kate Carruthers 24
Miller Newton, CEO of PKWare:
“there's not a lot of
authentication on the IoT.
It is easy to impersonate”
Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-
business-model-changes-panel-says/article/448668/
Oct-2015 © 2015 Kate Carruthers 25
Source: CCTV Botnet In Our Own Back Yard, Ofer Gayer, Or Wilder, Igal Zeifman, Incapsula blog 2015, https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html
CCTV Botnet at the local mall
Oct-2015 © 2015 Kate Carruthers 26
“Business models will have
to change. We used to build
them [products], ship them and
forget about them until we had
to service them,”
“We've moved to a new world
where we have to ship and
remember.” Source: John Ellis, Ellis & Associates, IoT security forcing business model changes, panel says, Oct 2015
http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/
Oct-2015 © 2015 Kate Carruthers 27
“Targeted Intrusions By
Nation-State Actors Pose A
Major Cyber Threat Going
Into 2015”
Source: Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015, Amanda Vicinanzo, 02/12/2015, Homeland Security Today,
http://www.hstoday.us/single-article/targeted-intrusions-by-nation-state-actors-pose-a-major-cyber-threat-going-into-2015/1f96ee7a4b2867f1b1511387660bb4b8.html
Oct-2015 © 2015 Kate Carruthers 28
Security
Privacy
Geopolitics
Oct-2015 © 2015 Kate Carruthers 29
Thank you
Kate Carruthers
UNSW Australia
k.carruthers@unsw.edu.au
@kcarruthers
http://www.slideshare.net/carruthk

More Related Content

More from Kate Carruthers

More from Kate Carruthers (20)

Info Sec, AI, and Ethics
Info Sec, AI, and EthicsInfo Sec, AI, and Ethics
Info Sec, AI, and Ethics
 
Internet of Things and Governance
Internet of Things and GovernanceInternet of Things and Governance
Internet of Things and Governance
 
Digital Marketing and your startup
Digital Marketing and your startupDigital Marketing and your startup
Digital Marketing and your startup
 
Data at the centre of a complex world
Data at the centre of a complex world Data at the centre of a complex world
Data at the centre of a complex world
 
Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018Data & Digital Ethics - CDAO Conference Sydney 2018
Data & Digital Ethics - CDAO Conference Sydney 2018
 
Data Governance - a work in progress
Data Governance - a work in progressData Governance - a work in progress
Data Governance - a work in progress
 
Future proof your career
Future proof your career  Future proof your career
Future proof your career
 
Data & Digital Ethics: some thoughts
Data & Digital Ethics: some thoughts Data & Digital Ethics: some thoughts
Data & Digital Ethics: some thoughts
 
Implementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a UniversityImplementing Data Governance & ISMS in a University
Implementing Data Governance & ISMS in a University
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
Social media: balancing risk and control
Social media: balancing risk and controlSocial media: balancing risk and control
Social media: balancing risk and control
 
Building the sharing economy
Building the sharing economy Building the sharing economy
Building the sharing economy
 
Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013Hardware is Hard - Products are Hard Melbourne 2013
Hardware is Hard - Products are Hard Melbourne 2013
 
Social and technology trends for banking
Social and technology trends for bankingSocial and technology trends for banking
Social and technology trends for banking
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Crowdfunding
CrowdfundingCrowdfunding
Crowdfunding
 
Your blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blogYour blog your brand - tips on getting started with your blog
Your blog your brand - tips on getting started with your blog
 
Social media for social good 2012
Social media for social good 2012Social media for social good 2012
Social media for social good 2012
 
Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012Whats the big idea with social media media140-2012
Whats the big idea with social media media140-2012
 
Failing in the right direction
Failing in the right directionFailing in the right direction
Failing in the right direction
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Internet of Things - the dream and the nightmare

  • 1. IoT: the dream and the nightmare… Kate Carruthers #eIoT2015
  • 3. Oct-2015 © 2015 Kate Carruthers 3 IoT is part of the digital transformation of business, the economy, and society
  • 4. Oct-2015 © 2015 Kate Carruthers 4 Industrial revolution Digital revolution IoT revolution Industrial internet. Rise of networked industry. Convergence of industrial, digital, analytics, & connectivity. Distributed information and communication networks. Rise of networked economy powered by apps. Harnessing machines to drive economies of scale. Shift away from agriculture based economies.
  • 5. Oct-2015 © 2015 Kate Carruthers 5 Source: Matt Turck, Internet of Things Landscape (Version 3.0), http://www.slideshare.net/mjft01/internet-of-things-42280078/1
  • 6. Source: IOT Philippines Inc. http://www.iotphils.com/solutions/smart-home/ Oct-2015 © 2015 Kate Carruthers 6
  • 7. Oct-2015 © 2015 Kate Carruthers 7 Source: http://blog.csiro.au/a-much-smarter-watch-how-our-flexible-batteries-and-electrified-fabrics-can-improve-wearables/
  • 8. Oct-2015 © 2015 Kate Carruthers 8 “The real role of wearables that no one talks about is all these smart things around you have no idea what’s happening with you…” - Hosain Rahman, CEO Jawbone Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
  • 9. Oct-2015 © 2015 Kate Carruthers 9 “I always use the example of, no matter how smart my thermostat is, it has no idea if I’m hot or cold.” - Hosain Rahman, CEO Jawbone Source: 'Ingestibles' could become the new wearables faster than you think, Alicia Marie Tan, Mashable, Oct 2015, http://mashable.com/2015/10/14/jawbone-ingestibles/#RqDiEDnH3Sql
  • 10. Oct-2015 © 2015 Kate Carruthers 10 Robyn Lewis founder and CEO VisitVineyards.com Thin film write-protected NFC that enables post sale communication between seller & customer about the product
  • 11. Oct-2015 © 2015 Kate Carruthers 11 Source: GE 2013 http://gelookahead.economist.com/infograph/industrial-internet-the-power-of-1-2/
  • 12. Oct-2015 © 2015 Kate Carruthers 12 Source: http://gelookahead.economist.com/infograph/the-industrial-internet-oil-and-gas/
  • 13. Oct-2015 © 2015 Kate Carruthers 13Source: Industrial Internet: Pushing the Boundaries of Minds and Machines, Evans, Peter and Annunziata, Marco, GE, 2012, p. 10
  • 14. Oct-2015 © 2015 Kate Carruthers 14 Source: A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Jay Lee, Behrad Bagheri, Hung-An Kao, 2015, http://www.sciencedirect.com/science/article/pii/S221384631400025X
  • 15. Cisco says US$14 trillion IoE value • asset utilization (reduced costs) of $2.5 trillion • employee productivity (greater labor efficiencies) of $2.5 trillion • supply chain and logistics (eliminating waste) of $2.7 trillion • customer experience (addition of more customers) of $3.7 trillion • innovation (reducing time to market) of $3.0 trillion Oct-2015 © 2015 Kate Carruthers 15 Source: CISCO White paper: Embracing the Internet of Everything for your Share of $14 trillion, 2013
  • 16. Oct-2015 © 2015 Kate Carruthers 16 Source: Greenberg, A., Hackers Remotely Kill a Jeep on the Highway—With Me in It, Wired , July 2015 http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  • 17. Source: http://readwrite.com/2014/04/30/connected-home-hackers-stop-yelling-at-babies-foscam#feed=/tag/internet-of-things&awesm=~oEe6yipkTkz40o Oct-2015 © 2015 Kate Carruthers 17 Last August, a hacker infiltrated a wireless camera owned by the Gilbert family, living in Houston, Texas. The stranger took control of the unit and used it to scream obscenities at a two-year-old toddler. Fortunately, the hearing-impaired child didn’t have her cochlear implant turned on at the time, otherwise she would have heard the stranger yelling, “Wake up Allyson, you little slut!”
  • 18. Oct-2015 © 2015 Kate Carruthers 18
  • 19. Oct-2015 © 2015 Kate Carruthers 19 Bloomberg, Data Breaches in the US, at 4 Sep 2014
  • 20. Oct-2015 © 2015 Kate Carruthers 20 • 3rd party HVAC firm attack vector • Security software disabled • PCI DSS didn’t save them
  • 21. Oct-2015 © 2015 Kate Carruthers 21 Bloomberg, Oct 2014
  • 22. JP Morgan • Sarbanes-Oxley Act (SOX) • Payment Card Industry Data Security Standard (PCI DSS) • Gramm-Leach-Bliley Act (GLB) Act • Electronic Fund Transfer Act, Regulation E (EFTA) • Free and Secure Trade Program (FAST) • Fair and Accurate Credit Transaction Act (FACTA), including Red Flags Rule • Federal Rules of Civil Procedure (FRCP) Oct-2015 © 2015 Kate Carruthers 22
  • 23. Oct-2015 © 2015 Kate Carruthers 23 “How do consumers know that the products and services are protected” David Kleidermacher, Blackberry CSO Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing- business-model-changes-panel-says/article/448668/
  • 24. Oct-2015 © 2015 Kate Carruthers 24 Miller Newton, CEO of PKWare: “there's not a lot of authentication on the IoT. It is easy to impersonate” Source: IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing- business-model-changes-panel-says/article/448668/
  • 25. Oct-2015 © 2015 Kate Carruthers 25 Source: CCTV Botnet In Our Own Back Yard, Ofer Gayer, Or Wilder, Igal Zeifman, Incapsula blog 2015, https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html CCTV Botnet at the local mall
  • 26. Oct-2015 © 2015 Kate Carruthers 26 “Business models will have to change. We used to build them [products], ship them and forget about them until we had to service them,” “We've moved to a new world where we have to ship and remember.” Source: John Ellis, Ellis & Associates, IoT security forcing business model changes, panel says, Oct 2015 http://www.scmagazine.com/iot-security-forcing-business-model-changes-panel-says/article/448668/
  • 27. Oct-2015 © 2015 Kate Carruthers 27 “Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015” Source: Targeted Intrusions By Nation-State Actors Pose A Major Cyber Threat Going Into 2015, Amanda Vicinanzo, 02/12/2015, Homeland Security Today, http://www.hstoday.us/single-article/targeted-intrusions-by-nation-state-actors-pose-a-major-cyber-threat-going-into-2015/1f96ee7a4b2867f1b1511387660bb4b8.html
  • 28. Oct-2015 © 2015 Kate Carruthers 28 Security Privacy Geopolitics
  • 29. Oct-2015 © 2015 Kate Carruthers 29 Thank you Kate Carruthers UNSW Australia k.carruthers@unsw.edu.au @kcarruthers http://www.slideshare.net/carruthk