Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Insurers turn to big data to help identify risks

18/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtqvmdevmjavzmlszsjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Insurance companies are increasingly turning to "big data" from satellites, social media and even cigarette sales at gas stations to help identify risks and build up customer profiles.

Insurers and reinsurers hope that real-time analysis of data about personal behavior will enable them to project damage claims and fine-tune prices to fit the risk being covered, and also help them spot fraud.

Troves of data are being collected via the technology phenomenon known as the Internet of Things, where cheap, network-connected sensor devices are embedded in all manner of industrial equipment, transport vehicles, appliances in the home and even the health monitors and smartwatches that consumers have begun to wear on their wrists.

Hamilton Re Ltd., a new Bermuda-based reinsurer, hopes that heavy data-crunching technology will give it an advantage over rivals and boost its bottom line.

"If we do it successfully, we ought to be able to deliver our products at lower cost with an improved loss ratio," said Bob Deutsch, chief strategy officer for the group.

"In underwriting, you have a better ability to plot whether you've got a concentration of risk in certain aspects of tornado alley," Mr. Deutsch told Reuters on the sidelines of the annual conference of the reinsurance industry in Monte Carlo, Monaco, this week.

Insurers have long struggled with flawed information on policy and claims forms, according to Maurice Tulloch, CEO of U.K. and Ireland General Insurance at Aviva P.L.C., which has about 500 professionals working on data analytics.

"Of the data we get back, a third of it is generally incorrect," Mr. Tulloch told the conference, referring to traditional data collection.

Information from satellites, medical data from fitness devices, social media activity, construction plans, rainfall, storm drain systems, energy efficiency, and cameras monitoring road surfaces can all be put to use by insurance companies.

The growing mountains of data available for analysis could raise knotty privacy questions, although, for the most part, the data the insurance industry is looking to pore over is aggregate data about collective behaviors rather than information that can be linked back to individuals. 

This article has been extracted from http://www.businessinsurance.com/, please click on this link to read the article in full http://www.businessinsurance.com/article/20140917/NEWS04/140919868?tags=|306|81|335

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...