While there is no silver bullet solution that can take on all of these, a company that has authentically addressed and explored solutions to these issues can lay claim to a powerful source of competitive advantage. Given the multi-part nature of the trust gap, the solutions are hard to find, which means that there is hope for sustainability of the advantage if a company can bring a holistic solution together. Which brings us to the next question:
What are the components of a digital trust solution?
The different components to assembling a solution include — deploying technology; reconfiguring business operations and modifying user behaviors; setting standards, policies and regulations; turning to professionals who can bring the components together to create a digital trust product that serves the need of the user. Consider these below.
Deploying Technologies
There are many technological options to turn to depending on the area of need. For example, to address the identity issue, there are several authentication technologies, from digital ID systems to biometrics or token and password-based authentication. Even within any of these, there are ongoing innovations. Biometrics is particularly rich with potential: from allowing access to devices and financial transactions to operating cars; you can make payments with a smile or a wave, while grab-and-go stores dispense with check-out lines altogether combining biometrics with sensors, computer vision and deep learning.
Other, versatile technologies cut across many needs. AI can interrogate vast amounts of data, validating it and finding gaps, fakes and inconsistencies. Quantum computing, still early in its development, can run such analytics even faster. The blockchain can maintain trustworthy records of transactions while its use of distributed ledgers limits the impact of a single attack.
Some needs can benefit from multiple technologies directed towards them. Behavioral analytics can help with identifying the primary sources of cyber vulnerability, while homomorphic encryption allows users to work with encrypted data without first decrypting it.
Technology, however, can cut both ways—by building digital trust, but also by potentially undermining it. AI can be used for cyber-attacks at scale or producing deepfake videos. Biometrics and other ID systems run the risk of being used for surveillance with potential for grave mistakes and privacy violations. When automated systems fail some %age of the time, the outcomes could be disastrous. Blockchain based systems can be used for illegal activities or for speculative. To make it a reliable ally, technology needs to be paired with other components of the trust toolbox.
Reconfiguring Business Operations and Modifying User Behaviors
Changes in the ways in which businesses operate and users behave are key to closing the digital trust gap. Of course, technologies can enable these changes. For example, data analytics can trace usage patterns or access requests and flag anomalies. They can also be used to gauge whether software is being updated on users’ computers and spot vulnerabilities. These can be used to send reminders and nudges and cyber hygiene recommendations, e.g. educating users to recognize suspicious communications, setting strong passwords, installing antivirus software, and network firewalls, where feasible. Users also need to be educated in checking sources for news stories or social media posts and contextualizing information. With employees working from home, there will be greater stress on corporate cybersecurity controls. The need for users to modify their behaviors and cyber hygiene routines is even greater.
For their part, users can play an important role in advocating for their rights and shaping public policy. They can call out violations of privacy and data misuse, spot and resist the spread of harmful content or play a part in calling out instances of corporate and state overreach. The constant engagement of users push both policymakers and industry decision makers towards formulating standards, policies and regulations that are essential to close the trust gap.
Standards, Policies and Regulations
Technological and behavioral interventions need broader frameworks within which to operate. Industry standards set the tone and harmonize expectations. Some regulators have taken the lead and have created a foundation upon which other policies can be built; for example, the General Data Protection Regulation from the EU, especially Article 5(1)(a), which states that personal data must be “processed lawfully, fairly and in a transparent manner in relation to the data subject,” makes a clear connection between law and transparency and fairness. More policies are in development. For example, there the ITI Policy Principles for Enabling Transparency of AI Systems regulations as well as the recently released Blueprint for an AI Bill of Rights, from the White House to “guide the design, development, and deployment of artificial intelligence (AI) and other automated systems so that they protect the rights of the American public.”
More generally, the deployment of standards, policies and regulations will need coordination between government and industry. We may even find certain countries and regions taking the lead on this. Currently, the frameworks are inconsistent and in different stages of development depending on where on is in the world. While the EU has been a leader, the US is beginning to enact laws often on a state-by-state basis, many of which are likely to be decided in courts. China has created its own walled garden with tight controls over the digital sector. Other major countries, such as India, have instituted rules for content moderation and its approach to data protection and user privacy is still incomplete.
Some countries can act as role models or hubs for digital trust, or key aspects of it. Estonia, for example, a leader in digital public services, or New Zealand, which aims to be a leader in digital public services and fostering a startup economy, have already declared a willingness to take on this mantle; they were founding members of a leading digital governments club, which intends to share best practices with others. Singapore, which operates a trusted digital environment, is eager to be a nodal player in digital trust. It is already a hub for financial services and Asia-Pacific business, shipping and aviation and is positioning to be a leader in this space as well; it recently launched a digital center for excellence to study and establish best practices in digital trust.
Digital Trust Fiduciaries
As we consider the various components that must be integrated to help close the digital trust gap and the varied needs of different users — whether they are individuals or enterprises — there is a need for service professionals who can understand user needs and assemble an integrative customized solution. These “digital trust fiduciaries” don’t exist as yet, but are sorely needed and there is a market for them. Their job will be to offer digital trust as a product or service, designed around the user’s needs. This cadre of professionals would, ideally, be certified and regulated, much like doctors and financial advisors. This industry would be separate from the de facto guarantors of digital trust today, i.e. the digital industry comprising platforms, fintechs, e-commerce and other tech companies with whom the users interact for their digital needs. This professional class can grow from within the current IT, cybersecurity and management consulting industry or they arise as a greenfield development. The type of professional is likely to vary depending on the type of user — individual users or an enterprise — and the kind of enterprise, large or small who is the client for the service.
There is no doubt there is a burgeoning market associated with closing the trust gap. A recent analysis from SGTech, Singapore’s technology industry association, estimates that the digital trust market potential to hit $537 billion by 2027. That said, our original source of inspiration, Ken Arrow, also observed that “Unfortunately this (trust) is not a commodity which can be bought very easily. If you have to buy it, you already have some doubts about what you have bought.” While this new industry’s time has come, but it must proceed very carefully to make sure that we build trust in digital trust solutions. That will not be easy, but with the industry in a lull, the time is right, which is why the work must begin now.