Features on Demand: Difference between revisions
Clippytron (talk | contribs) m Fixed reference |
Clippytron (talk | contribs) m Fixed minor consistency issues |
||
Line 4: | Line 4: | ||
'''Features on Demand''' is built on top of the general On-Demand business model, which allows consumers to order a product or service conveniently, and receive it quickly.<ref>{{Cite web |last=Jasani |first=Mahil |date=15 Jul 2025 |title=On Demand Business Model: The Ultimate Guide |url=https://www.apurple.co/insights/on-demand-business-model/#:~:text=What%20is%20the,key%20examples%20are%2C |access-date=25 Aug 2025 |website=aPurple}}</ref> Generally, FoD adds upon this by allowing consumers to add or later remove an additional feature or function whenever needed within a product they already own without human contact, allowing more customization and personalization. However, FoD is sometimes paired with a pay-per-use or subscription model, which charges the consumer to continue to have the feature or function activated. | '''Features on Demand''' is built on top of the general On-Demand business model, which allows consumers to order a product or service conveniently, and receive it quickly.<ref>{{Cite web |last=Jasani |first=Mahil |date=15 Jul 2025 |title=On Demand Business Model: The Ultimate Guide |url=https://www.apurple.co/insights/on-demand-business-model/#:~:text=What%20is%20the,key%20examples%20are%2C |access-date=25 Aug 2025 |website=aPurple}}</ref> Generally, FoD adds upon this by allowing consumers to add or later remove an additional feature or function whenever needed within a product they already own without human contact, allowing more customization and personalization. However, FoD is sometimes paired with a pay-per-use or subscription model, which charges the consumer to continue to have the feature or function activated. | ||
In the | In the Automotive industry, FoD is typically used with subscriptions. While FoD can be related to Over-The-Air (OTA) updates, OTA is used to update a vehicle's software wirelessly, while FoD uses OTA to enable or disable a feature or function after a subscription or fee is paid.<ref>{{Cite web |date=20 Jun 2022 |title=What is FOD? |url=https://autovista24.autovistagroup.com/news/what-is-an-automotive-feature-on-demand/#:~:text=While%20closely%20linked,used%2Dvehicles%20market. |access-date=25 Aug 2025 |website=Autovista24}}</ref> | ||
In a more software related environment, FoD is related to [[Software as a service|Software as a Service(SaaS)]], which often allows FoD to even function. | In a more software related environment, FoD is related to [[Software as a service|Software as a Service (SaaS)]], which often allows FoD to even function. | ||
==Why it can be a problem== | ==Why it can be a problem== | ||
Line 17: | Line 17: | ||
===Potential Security Risk=== | ===Potential Security Risk=== | ||
The implementation of FoD will require internet-access for the necessary software to function. However, this can open more areas of attack for cybercriminals if not handled correctly, for example: a connected car could experience a Denial of Service attack, which can manipulate the engine and car locks.<ref>{{Cite web |title=Cybersecurity Challenges in the Automotive Industry |url=https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/#:~:text=In%20a%202014%20study%2C%20researchers,found%20in%20their%20connected%20vehicles. |access-date=25 Aug 2025 |website=Security Compass}}</ref> | The implementation of FoD will require internet-access through SaaS for the necessary software to function. However, this can open more areas of attack for cybercriminals if not handled correctly, for example: a connected car could experience a Denial of Service attack, which can manipulate the engine and car locks.<ref>{{Cite web |title=Cybersecurity Challenges in the Automotive Industry |url=https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/#:~:text=In%20a%202014%20study%2C%20researchers,found%20in%20their%20connected%20vehicles. |access-date=25 Aug 2025 |website=Security Compass}}</ref> | ||
==Examples== | ==Examples== |