

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Critical services and manufacturing companies must be aware of the evolution of cybersecurity and understand the threats that exist today and may emerge in the near future. This will enhance the safety of systems, protect intellectual property, and key data. Robust safeguards for critical services offer tangible protection against massive losses and build consumer confidence in the services provided by the system
Ideally, these protections should be incorporated in the design of a new system. Where it is not practical or cost-effective to replace legacy systems, additional enhancements may be warranted to strengthen protection against current and emerging threats.
Critical services and manufacturing have risen from the eighth to the second most targeted industry by cyber attackers, trailing only finance and insurance. This represents a 300% increase in a single year, according to the 2021 Global Threat Intelligence Report (GTIR).
In one example, Colonial Pipeline, the United States’ largest pipeline system for refined oil products, paid a reported US$ 5 million ransom to hackers in 2021 after an attack on its IT (Information Technology) network had forced it to shut down its entire pipeline, causing major disruptions to gas delivery.
An estimated 62% of Malaysian organisations have detected an increase in cyber data breaches during a workplace shift, with 25% or more alerts on cyber threats since the pandemic began. In July 2021, the Malaysian Employers Federation was hit by a ransomware attack involving encrypted accounting data. Its servers were down for three days. Months later, a hacker targeted a Penang-based web hosting company, disrupting its virtual private server and Windows hosting services, demanding US$ 900,000 in cryptocurrency as ransom.
Ransomware does far more than merely infect and corrupt files and devices. When ransomware gains access to a device or database, typically by masquerading as a suspicious file or link, it encrypts critical data and makes it inaccessible to anyone who does not have the correct key. The hacker will demand an exorbitant ransom for the key and failure to pay within the time limit usually results in the data being destroyed or made public.
This can have disastrous consequences, such as a serious breach for critical services and manufacturing organisations, where operations will be halted, and trade secrets will be exposed, resulting in a significant loss. Moreover, clients’ personal and private data, including banking details, physical and electronic contact details may then be exploited by the hackers and their criminal associates to directly target clients.
Accelerating the deployment of security tools with dual defence strategies to ensure reliable backup and recovery will ensure that common cyber threats will not significantly disrupt the critical services and manufacturing supply chain. An effective backup strategy is currently considered the best line of defence against ransomware attacks.
As the risk of ransomware and related attacks increases, the additional effort and investment required to protect an IT system become increasingly justified; it is no longer a ‘nice-to-have’ but is likely to become a mandated requirement for critical infrastructure.
The OpenGovLive! Virtual Breakfast Insight on 24 March 2022 aimed to provide insights and practical solutions that enable critical services and manufacturing organisations to maximise their data capability through comprehensive, centralised and efficient data protection and more cost-effective and secure data-driven processes.
Staying secure in a rapidly changing world


Kicking off the session, Mohit explains how rapidly the world has changed, “We do not need a bullet to cripple the economy.”
Cybersecurity-based attacks are all it takes to acquire data and infiltrate organisations. For Mohit, the playing field is not level because the bad actors are evolving their techniques quickly and intelligently – they are persistent and relentless, driven by profit (or ideological) motives and not bound by rules or geography.
Organisations need to look at not only fortifying their infrastructure but their whole supply chain infrastructure. “Security is how organisations can keep their lights on.”
“You will get hit. Everyone will get hit,” Mohit believes. “The question is, what is your recovery strategy what is your backup plan?”
With remote working in the picture, employees have become the weakest links and point of entry for attacks. From a Singapore perspective, Mohit asserts, the number of hits has multiplied.
Closing his address, he urges delegates to partner with the experts instead of doing everything in-house. “Let the experts help to keep your glass full,” Mohit encourages. “It not only allows the best systems and infrastructure to be put in place but also frees up the organisation’s staff to concentrate on the business and focus on driving growth.”
Approaches to security in the manufacturing industry


Rajiv Arora, Global Head of IT Global Hub, Siemens spoke next on the strategies and approaches that can be taken in organisations.
“Now is the time to implement security. Do it now and do it right,” Rajiv opens.
He observes that the ground has shifted and there are more considerations in the cybersecurity landscape:
- Changing geopolitical context
- A more complex and connected supply chain
- Changing customer needs are changing
- Maintaining a competitive advantage
- Intensifying revenue
- Lack of human talent and resource
Rajiv shared five pillars to digital transformation:
- Decipher the ambition: Ambitions need to be driven by optimisation and transformation
- Structure the transformation: There is a need to set up a proper structure for cybersecurity and backup
- Co-Create the roadmap: Work with your team to co-create the baseline of the roadmap
- Execute and control the implementation: Organisations need to be aware of the weakest link in every transformation and ensure that cybersecurity is an integral part of the implementation
- Incubate and ramp up the operation: After having the baseline, organisations will then be able to look at scaling the operations.
As for the digital transformation approach, Rajiv shared the 4E Model:


- Engage – Proactively engage with the business to co-own and co-create digital solutions
- Idea sourcing: collecting ideas for improvements in processes that deliver business benefits using IT enhancements or radically new Digital Solutions
- Communities: Communities are set up and engaged using a formal approach to generate new ideas, prioritise demands, upgrade and keep solutions sustainable.
- Campaigns: To encourage a change of mindset and adopt new ways of making.
- Elevate – Elevating the customer’s digital experience and partner with businesses for Digital Solutions and support the development of new business models
- Innovation: Leverage Emerging Technologies to innovate and enhance business model, develop, and expand Digital portfolio.
- Business Impact: Collaborate with business in prioritising, commercialising, and executing the digital solutions/products and creating Business Impact -Value for customers.
- Enterprise Governance: An enterprise governance model that promotes transparency and exchange of digitalisation outcomes between the Siemens business and IT; Metrics and KPIs to evaluate business outcomes.
- Enable – A secure infrastructure that is always on, always available and everywhere, as the backbone to ensuring readiness for Digitalisation
- Monitor: “Run IT.” Monitor IT to ensure services are readily available by consistent monitoring Business-As-Usual (BAU) KPIs.
- Optimise: Provide an agile Infrastructure, by optimisation of services with available technologies.
- Modernise: Transform into a modern IT infrastructure by leveraging on a diversity of options in technologies, partners, and solutions.
- Empower – Create and foster a Digital Culture and Mindset using a knowledge-based ecosystem
- Digi Training: Digi Training to address learning needs of employees, leaders
- Digital Champions: Digi Champions to evangelise digitalisation topics in the organisation
- Info Pool: Info Pool of digital technologies and partners –Success Stories and Use Cases
- Agile: Agile and Design Thinking as the new way of working for employees and leaders
Having imparted practical tips towards approaching digital transformation, Rajiv shared his belief that in Industry 4.0, there is a need for organisations to be on a cloud platform. It can help to enhance operations and ensure more secure backups. Security is paramount, Rajiv says, and organisations need to prepare themselves for the imminent and inevitable attack.
Fireside chat
In the next session Mohit engaged in an in-depth conversation with Goh Chee Hoh, Managing Director, Malaysia & Nascent Countries, Trend Micro and Tay Chia Chia, Country Director – Malaysia, Brunei & Emerging Countries, Veeam. Mohit invited the guests to share their opinions on the outlook of digital transformation from their perspective.


Chee Hoh believes that COVID-19 accelerated digital transformation and that some specific trends have emerged.
- Increase in remote users – tore down the security control to the user
- Different priorities between OT and IT
- SaaS (Software as a Service) and cloud will overtake on-prem solutions
Chia Chia, on the other hand, observes that there are two levels of manufacturing in Malaysia – the MNCs and the locally-driven mid-tier to big firms. She observes that while manufacturing companies have the luxury to put proper plans in place – a complete framework for recovery and cybersecurity –local manufacturing companies, however, must devise their strategy from scratch. Apart from that, moving workloads to the cloud is another observable trend.
Mohit feels that when the pandemic first broke out, organisations were quick to adopt band-aid technology, but now that the dust has settled, it is time to look into the security and infrastructure.
When asked about considerations that industry leaders, Chee Hoh believes that there are several key aspects that organisations need to consider:
- Legacy systems leading to security vulnerability
- Lack of priority in applying patches. Hackers can capitalise on these vulnerabilities and attack through the supply chain where organisations are giving access.
- Vulnerabilities from working from home
- Cloud and zero-trust
Chee Hoh acknowledges that cloud offers the agility and speed, but at the same time, security needs to keep up. That said, he agrees that the journey to cloud is inevitable and organisations must ensure that their infrastructure can support it.


Chia Chia stresses the need to build a framework for recovery. In the past people could afford a reactive approach, concentrating on the ability to restore. That is, however, no longer enough for the needs of the present – organisations must adopt a proactive mindset. Smaller organisations without the luxury of proper frameworks need to look for expertise to co-build their framework.
In the current scenario, “back up is the insurance,” Mohit asserts.
Chee Hoh agrees that threats are on the rise and evolving and that there is a need to back up. He differentiates between the traditional and modern threats of ransomware
Traditional: One-attack to many but less destructive
Modern: Targeted, research-based and intended to create multiple damages.
From experience, he knows that there is no silver bullet when it comes to security; organisations need to invest in solutions that anticipate breaches. “You will be hit and you need to reduce impact.”
In terms of practical advice, Chia Chia highlights that strategy can change, which is why organisations must select cybersecurity and backup solutions that are scalable and allow change from time to time.
Veeam can offer protection across all platforms (on-prem, single or multi-cloud). In the closing remarks, she emphasises that Veeam is not limited by the technology that organisations choose.
Power Talk
Looking to explore the rapidly emerging threat of ransomware, Mohit debated the strategies to combat ransomware with the following panellists:


Dr Tan Puay Siew, Division Director, Manufacturing, System Division SIMTech, A*STAR, Myat Min, Section Manager, Manufacturing, Control Tower SIMTech, A*STAR, Sage Khor, Pre-Sales Manager, Malaysia, Trend Micro and Tay Teck Sze, System Engineering Manager, SEAK, Veeam
Sage points out that as people improved on their security and data protection strategy, threat actors are also improving. Echoing Chee Hoh’s earlier point about modern ransomware having launched more targeted attacks, he opines that it is now about identifying the techniques and tactics that threat actors are launching.
To mitigate that, Teck Sze suggests planning out a framework and preventing threat attacks by securing the backup infrastructure and assets. He notes that ransomware has evolved – instead of going to the assets, they attack the last line of defence – the backup data.
Mohit remarks that organisations need to know what their SOPs are like when faced with an attack.
Agreeing, Dr Tan highlights the importance of segregating the corporate network from the IoT (Internet of things) network to secure corporate data. Apart from that, she also recommends securing hardware.
Myat Min added to the list of practical tips by suggesting restricting access from IT and OT and putting in place a firewall. He echoed an earlier point that human errors in the production line are areas of vulnerability.
To mitigate modern-day attacks, Sage urges delegates to invest in security platforms with complete visibility of IT and OT, as well as the attack surface.
Mohit asserts that security is not an option but an investment. Organisations will be hit, and the attention needs to be on disaster recovery.


Teck Sze concurs with Mohit and agrees that this is an area that organisations need to pay enough attention to. He shares that many of his customers are moving towards a hybrid model and are leveraging cloud for disaster recovery. He suggests looking for partners who have the capability to cover disaster recovery.
From her observations, Dr Tan notes that the most vulnerable groups are SMEs. Many SMEs in Singapore do not have dedicated IT teams and outsource such services to vendors, including backups. For these SMEs, there are vulnerabilities in securing their OT environment, and with partners, they can achieve some level of security.
For Teck Sze, cyber recovery is something that everyone in the organisation needs to be familiar with. Only with a full understanding of the recovery process can data recovery be executed.
In terms of protection, Sage emphasised the importance of multi-factor authentication. “Most attacks start with credential issues,” Sage opines. “Apart from that, it is imperative that organisations continuously maintain IT hygiene and patch management.”
Next, he suggests uncovering shadow IT surface and any unused credentials that can be used for attacks. Finally, he asserts that employees are the weakest links and that organisations need to build up the awareness of employees.
In closing, Mohit re-emphasises the necessity of security. It is not an expense or an option but a non-negotiable. Protection is what will enable organisations to drive at full speed and emerge unscathed from any potential crashes.
Interactive Discussions
After the informative presentations, delegates participated in interactive discussions facilitated by polling questions. This activity is designed to provide live-audience interaction, promote engagement, hear real-life experiences, and facilitate discussions that impart professional learning and development for participants.


In the first poll, delegates were asked about the cybersecurity framework that their organisation had or plan to adopt. Almost two-thirds (63%) use The International Standards Organisation (ISO) frameworks ISO/IEC 27001 and 27002. Other delegates use The Center of Internet Security Critical Security Controls (CIS) (11%) or the US National Institute of Standards and Technology (NIST) Framework (5%). The remainder (21%) use other standards.
It is common that people, Sage points out, will have multiple standards that they adhere to because practising the framework is not easy. At the end of the day, it is a point of reference.
Mohit concurred and highlighted that these frameworks offer a base and starting point for organisations to approach security.
The next question asked the delegates their thoughts on whether organisations can implement the same IT Security Strategy into Operational Technology (OT) environment. An overwhelming majority (83%) believe that it needs a different security approach. The remaining delegates were either not sure (11%) or of the view that organisations can just plug and play (6%)
Chee Hoh stressed that the technology needs to fit the environment, which means that a different implementation is required. Teck Sze added that there are differences in the IT and OT environment – IT environment deals with structured data protection, whereas OT deals with unstructured data protection.
Sage acknowledges that while it is difficult to patch on the OT environment, organisations need to develop a virtual patching strategy for IT and OT environments. He suggests doing segmentation of the OT environment and Veeam will be able to assist in controlling the command.
Inquiring about delegates’ first concern for security operations for their organisation, half (50%) were concerned with a cyber security skills shortage. The others found it difficult to determine an actual attack from the noise (25%), advance & zero-day attacks (13%), automate response (6%) and actionable threat intelligence (6%)


Mohit remarks that the world is seeing shortages in data scientists and security experts, to which Rajiv concurred. He added that people working in the cybersecurity space need to learn and adapt quickly because it is always changing.
Sage pointed out that automation in the field of security is a big topic. The crucial question to ask is where automation is applied. For him, automation on detection is necessary for organisations to have complete visibility. Automation in response, however, depends on the environment and priorities, which requires a proper playbook.
The next poll was to determine if delegates have a Security Information and Event Management (SIEM) solution in place. Most of the delegates (43%) are either currently in the plan or have a SIEM solution. The remaining delegates do not have a solution in place (19%).
Chee Hoh asserts that collecting data is important but being able to act on it and have good event management is even more important. “The weakest link is the human,” he believes. “Having the right information of what and where the weak links are important.”
On that note, Dr Tan advises people to secure the end devices of users. Mohit adds that the Bring Your Own Device norm has become a point of vulnerability. Teck Sze reiterated the importance of training employees to be knowledgeable about security and bad habits.
In the next poll, delegates were asked how they manage CRITICAL software vulnerability for both IT and Operational Technology (OT). Over a third (38%) either close all possible attack surfaces or rely on their existing security solutions to prevent the attack (33%). The rest of the delegates patch it immediately (19%) or take other action (10%).
In response to the results, Chee Hoh notes that every organisation faces about 20 vulnerabilities each day, making it difficult to patch. Instead, he suggests virtual shielding in front of the vulnerability, an added layer to protect the vulnerability rather than patch it.
Teck Sze echoed Chee Hoh’s view that vulnerabilities abound. He pointed out that resources to fix vulnerabilities also depend on risk factors – vendors are usually there to fix the higher risk vulnerabilities.
In the final poll, delegates were asked to rate the level of readiness of their organisation to a ransomware attack. An overwhelming majority (95%) feel well prepared but are not sure if their organisation can withstand an infiltration. The remaining 5% feel well-prepared and believe that there is no room for infiltration.
Chee Hoh is of the view that no one can be totally prepared because new malware is created every day. “It is ever-evolving,” he claims. “Visibility is important because that allows people to assess areas that are compromised.”
Rajiv agreed that we are prepared but not for tomorrow.
At the end of the day, Dr Tan opines, “Organisations can only prepare as much as they can, and as much as they know – it’s not possible to know what is enough!”
Chee Hoh suggests organising drills for employees to test their responses and customise courses from there. Apart from that, he also emphasised the criticality of education for the board of directors so that the higher management is aware of security needs.
Conclusion
Mohit thanked everyone, including the speakers and participants, for their enthusiastic participation in the session. He wholeheartedly agrees with Chee Hoh’s point about changing the culture and mindsets of higher management. Mohit encouraged delegates to take their management on the journey of understanding security without them knowing it.
Now is the time to work on securing your organisations, Mohit believes. Organisations must get started immediately, and not only when their organisation is hit.
In closing, he encouraged delegates to reach out to the experts and the partners should they have queries about how they can get started on this journey.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Launched in 2019, CrowdTaskSG aims to harness the collective intelligence of Singaporeans to provide government agencies with useful insights into national issues and addresses the prevalent notion that citizens’ voices are often overlooked. The platform serves as a bridge between citizens and agencies, offering a centralised platform for citizens to share their thoughts and ideas.
The initiative operates on the premise that Singaporeans can have an active and meaningful role in co-creation, collaboration and crowdsourcing, rather than being passive recipients of government schemes and services.
Citizens have a range of ways to participate, including surveys, polls and questionnaires focused on government policies and issues. In addition, they can take part in testing prototypes for new government websites, providing feedback on areas that require improvement and assisting with translation requests.
This diverse set of options aims to cater to various interests and expertise levels, making it easier for citizens to engage with the platform in a meaningful way. By doing so, CrowdTaskSG endeavours to foster greater interaction and participation from citizens, while also providing agencies with a more comprehensive understanding of public sentiment on various issues.
To broaden the scope of citizen participation, the CrowdTaskSG team is actively exploring additional tasks that can be performed through the platform. The team collaborates with other agencies to identify opportunities to optimise the platform for a wider range of crowdsourcing initiatives.
GovTech method to better engage citizens
The CrowdTaskSG team has been inspired by the widespread popularity of the mobile game Pokemon Go, which employs GPS technology to allow players to discover real-world locations, capture virtual creatures and engage with other players.
Gamification was the secret ingredient that propelled the success of Pokemon Go, as it transformed the simple act of walking into a social experience. The game tracks users’ daily steps and incentivises movement by rewarding them with new monsters.
What made Pokemon Go’s success truly remarkable was not only how quickly it became a worldwide phenomenon, but also how it motivated people to participate in physical activity – a pursuit that many individuals were previously averse to. The CrowdTaskSG team was intrigued by this philosophy and wondered whether a similar approach could be adopted to foster the development of a smart nation.
Undoubtedly, many Singaporeans possess a wealth of skills, ideas and feedback that could support Singapore’s transition towards becoming a smart nation. However, they may lack the motivation to engage in these activities.
CrowdTaskSG bridges the gap between citizens and agencies by integrating gamification elements to make the engagement process more enjoyable and rewarding. Through these efforts, they aim to create a more interactive and captivating platform that inspires citizens to take an active role in shaping national policies and improving their personal well-being.
By incorporating gaming elements, CrowdTaskSG takes completing surveys or tasks on the platform to a whole new level of fun – making mundane tasks far more enjoyable and rewarding. Users can earn experience points to level up and virtual coins for NETS QR purchases after completing a task.
The team has adopted simple gamification concepts to ensure that they appeal to individuals of all ages. To make the platform user-friendly and accessible to all, the team has designed a clean and straightforward user interface that minimises distractions and enhances accessibility.
As a product that is designed to prioritise citizen engagement, the CrowdTaskSG team places great importance on delivering a seamless user experience. In addition to collecting feedback and suggestions through the platform, the team frequently conducts user interviews with CrowdTaskSG users to gain insights into evolving user needs and identify areas for improvement.
The CrowdTaskSG team is committed to carefully considering the needs of government agencies as well as user feedback to continuously add new features and improvements to the platform. After the user interviews and testing sessions, the team works consistently on making the platform easier to use and making sure that information and instructions are clear and easy to understand.
The team recently introduced a Leaderboard feature in their referral campaign, which led to a 10% surge in user participation. They also revamped the reward system, making it more convenient for citizens to redeem their virtual coins.
CrowdTaskSG offers government agencies a cost-effective solution as they can currently utilise the portal free of charge. It is a user-friendly, self-service platform that not only enables government employees to submit tasks easily but also allows them to review responses with the built-in data visualiser.
The platform uses MyInfo verification to ensure that all participants are genuine, and its screener function simplifies the process of reaching specific groups of people for government agencies.
The platform has received positive feedback, with many users citing how it has facilitated fast and efficient communication with participants. This is particularly advantageous for User Experience (UX) and Design Thinking teams, who rely heavily on user testing and feedback throughout their design process.
The technology infrastructure that CrowdTaskSG uses has also been employed to develop the SG Translate Together (SGTT) web portal, which is a distinct product from CrowdTaskSG. This has enabled the Ministry of Communications and Information to collaborate with the public to gather translation data through crowdsourcing.
The data collected is utilised to enhance and train SG Translate, the Machine Translation Engine, resulting in more translations that cater to local needs. Additionally, SGTT provides translation resources and a form platform to engage with the local translation community.
The CrowdTaskSG team places a high priority on ensuring that the onboarding process for new users is easy and seamless when developing a product that is intended for widespread use. Therefore, deciding between a mobile application or a web-based application was a crucial consideration for the CrowdTaskSG team when they began the project.
There were several reasons why a mobile-responsive web platform was ultimately chosen for CrowdTaskSG:
- Because there are more steps to go through, downloading a mobile application to answer a survey is a huge barrier for new users. If it is a web-based platform, new users can log in by scanning a QR code, which is a quick touch-and-go.
- As a result of the pandemic, most Singaporeans are now accustomed to scanning QR codes to open websites in a browser, which became one of the onboarding workflows.
- Having a web-based platform enabled to reach users not only on mobile phones but also on desktop computers and even fixed kiosks in the form of touch-screen TVs and tablets when agencies conduct road shows and engage citizens.
To ensure that CrowdTaskSG could be accessed on various screen sizes, including desktops, mobile phones, tablets, and TVs, the team put a great deal of thought into the design of their components to maintain a consistent user experience across all platforms.
TypeScript is the main programming language used by the CrowdTaskSG team, and React is used for the front end, while NodeJS is used for the back end. Using a single language across the stack makes it easier for developers to switch between frontend and backend development with minimal contextual overhead.
A robust audit trail is crucial for a mass-market application as it helps developers quickly identify and resolve technical issues that users might encounter. Moreover, regular performance testing ensures that the application can handle high volumes of traffic and load spikes that may coincide with marketing efforts. By doing so, the team can avoid any performance issues that might lead to a poor user experience and ultimately impact the success of the application.
Constantly being wary of malicious activities is a common challenge with gamification in crowdsourcing platforms. Users could be inclined to cheat the system by submitting tasks multiple times or completing unassigned tasks to gain an advantage in their pursuit of rewards. While not a technical challenge, it is burdensome.
To prevent such behaviour, measures have been put in place to ensure that task submissions on CrowdTaskSG are unchanged or idempotent; submitting the same task multiple times does not benefit the user nor are they rewarded for completing tasks that are not assigned to them.
Nonetheless, security is of paramount importance for the CrowdTaskSG team as they are deploying a government product. Hence, every major release undergoes professional vulnerability assessments and penetration testing before distribution.
In addition to these pre-release tests, the team conducts monthly risk assessments using open-source scans and other risk surveillance tools. The team also has a surveillance bot that monitors traffic and potential attacks in real-time to ensure that any suspicious or unusual activities are promptly investigated.
About the team
For a diverse team to function effectively, a strong product vision and shared goals that inspire collective buy-in are crucial, beyond just support and resources. Creating a culture that embraces and celebrates diversity is essential in acknowledging that each individual brings unique perspectives and expertise to the table.
This recognition helps ensure that every team member can make meaningful contributions to the various domains. Support and resources can be generated from within the team if the right culture and communication are in place.
CrowdTaskSG’s work methodology is heavily influenced by GovTech’s Agile, Bold, and Collaborative values. The team convenes every two weeks for “retrospectives,” during which they discuss the previous sprint and exchange fresh concepts regarding the product and their work approach. To capture spontaneous ideas, they also maintain idea boards to jot down any potentially useful insights for future reference.
Regular and open communication is important and members talk to each other often (at least once a day). The team values a “no-blame” culture, which creates a safe space for members to express their thoughts and concerns.
Trust is a cornerstone of the team’s work culture, with everyone aware that they are working together for the best of the product. The team takes a collaborative approach to problem-solving, with all domain leads gathering to discuss various perspectives before arriving at decisions and working through problems quickly and efficiently.
The CrowdTaskSG team proactively helps each other to overcome any obstacles that may impede their progress. A conducive culture and effective communication facilitate this internal support system, enabling team members to assist one another in achieving their shared goals.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Pemerintah Singapura meluncurkan CrowdTaskSG pada 2019. Sesuai namanya, CrowdTaskSG memang ditujukan agar pemerintah bisa lebih melibatkan partisipasi warga untuk menyelesaikan masalah nasional dan pembangunan di Singapura, sehingga kontribusi dan masukan dari warga bisa digunakan sebagai dasar penentuan keputusan dan tindak lanjut lembaga pemerintah.
Inisiatif ini meluncur dengan premis bahwa warga Singapura bisa memainkan peran aktif dalam pemerintahan. Mereka tidak hanya sebagai pemain pasif yang menerima skema dan layanan pemerintah. Namun, warga bisa berkreasi bersama, berkolaborasi, dan menjadi sumber informasi bagi pemerintah.
Inisiatif ini meluncur sebagai respons atas pendapat yang umum beredar kalau pemerintah Singapura kurang memerhatikan aspirasi warga. Oleh karena itu, CrowdTaskSG diciptakan untuk menjembatani kesenjangan antara warga dan lembaga pemerintahan. Lewat platform ini, pemerintah menyediakan satu platform terintegrasi untuk berbagi pendapat dan ide.
Hal ini diwujudkan dengan memberi kesempatan bagi warga untuk berkontribusi dalam survei, jajak pendapat, atau kuesioner tentang kebijakan dan masalah pemerintah lewat CrowdTaskSG. Selain itu, warga juga bisa melakukan tugas seperti menguji prototipe fitur atau produk baru di situs web pemerintah, memberi umpan balik tentang wilayah kerja yang perlu peningkatan, dan ikut terlibat untuk kebutuhan penerjemahan. Sebab, Singapura biasanya perlu menyosialisasikan kebijakan pemerintah dalam empat bahasa, Inggris, Melayu, Mandarin dan Tamil.
Tim CrowdTaskSG terus berupaya meningkatkan minat warga untuk berkontribusi aktif di platform ini. Mereka juga terus mengeksplorasi tugas-tugas bersama (crowd task) lain yang bisa diintegrasikan di platform ini. Untuk itu, tim CrowdTaskSG kerap menjalin komunikasi dan kolaborasi dengan instansi lain untuk mempelajari dan menggali ide bagaimana platform ini bisa lebih dioptimalkan untuk mendukung berbagai inisiatif crowdsourcing.
Gamification untuk menarik partisipasi warga
Sejak pertama meluncur, GovTech sudah menyertakan gamification pada platform ini. Mereka terinspirasi untuk memasukkan faktor permainan dalam platform ini lantaran terinspirasi oleh kepopuleran gim Pokemon GO.
Pokemon GO adalah gim berbasis lokasi dan augmented reality. Lewat gim ini, pemain diajak untuk menangkap dan mengumpulkan berbagai monster unik khas Pokemon. Memanfaatkan GPS di perangkat pengguna, mereka harus menjelajah ke tempat-tempat berbeda untuk menemukan berbagai monster langka itu. Monster Pokemon yang terkumpul bisa dilatih dan dipertarungkan. Gim ini sekaligus menghitung jumlah langkah yang dilakukan dalam sehari untuk menangkap monster-monster itu.
Kesuksesan Pokemon GO berhasil mengangkat gim ini menjadi fenomena dunia. Menariknya, gamification permainan itu berhasil menarik orang untuk keluar rumah dan lebih aktif melakukan kegiatan fisik. Hal yang kian jarang dilakukan di kehidupan modern sebelum popularitas gim ini meledak.
Resep rahasianya tentu terletak pada gamification yang berhasil dieksekusi dengan baik oleh pembuat permainan ini. Pokemon Go sukses mengubah kegiatan berjalan keluar rumah yang menjemukan menjadi kegiatan sosialisasi yang menyenangkan.
“Hal inilah yang membuat kami berpikir apakah kita bisa memanfaatkan cara yang sama untuk membantu membangun misi Smart Nation di Singapura,” jelas tim pengembang CrowdTaskSG dalam wawancara dengan OpenGovAsia.
Lewat CrowdTaskSG, tim ingin memberi ruang bagi talenta-talenta terbaik Singapura untuk memberikan kontribusi mewujudkan Smart Nation. Sebab, mereka percaya banyak warga Singapura yang memiliki potensi, ide, dan masukan berharga untuk membantu membangun negara. Namun, talenta itu tersiakan karena kurang difasilitasi oleh platform yang tepat dan kurangnya motivasi untuk ambil bagian.
Tim CrowdTaskSG berharap dengan berbagai gamification yang dihadirkan bisa menjembatani kebutuhan pemerintah dan keinginan warga untuk berkontribusi. Mereka pun ingin membuat proses kontribusi itu menjadi sesuatu yang menyenangkan.
Tim mengintegrasikan gamification ke dalam berbagai tugas yang ada di CrowdTaskSG. Misal, ketika warga membantu menyelesaikan survei atau tugas tertentu, mereka akan mendapat poin untuk naik level. Adopsi leaderboard ini diklaim berhasil meningkatkan pertumbuhan pengguna hingga 10 persen.
Mereka juga bisa mendapat koin virtual yang bisa digunakan berbelanja lewat NETS QR (jejaring pembayaran elektronik menggunakan kode QR di Singapura). Sejauh ini, tim sudah mengadopsi konsep gamification sederhana yang cocok untuk semua umur.
Sebagai layanan self-service, tiap instansi pemerintah di Singapura bisa membuat tugas atau survey yang mereka perlukan di CrowdTaskSG. Tim berpendapat mereka mendapat repons positif dari instansi pemerintahan yang memakai platform ini. Sebab, mereka mendapat cara yang efisien dan cepat untuk mendapat umpan balik warga.
“CrowdTaskSG sangat berguna untuk tim pengalaman pengguna (User Experience/ UX) dan tim Design Thinking yang ingin mengetes pengguna dan mendapat tanggapan mendalam dalam proses desain mereka,” jelas tim lagi.
Selain itu, CrowdtaskSG Tech Stack juga dimanfaatkan untuk membuat dan menyempurnakan situs SG Translate Together (SGTT). Lewat portal ini, Kementerian Komunikasi dan Informatika Singapura bisa berkolaborasi dengan warga untuk melakukan translasi data. Data ini lantas digunakan untuk melatih dan memperbaiki kemampuan SG Translate, the Machine Translation Engine, agar hasil terjemahan terasa lebih lokal. SGTT menyediakan sumber daya translasi dan forum sebagai tempat bersosialisasi komunitas para penerjemah.
Untuk membuat platform ini menarik dan berguna bagi pengguna, CrowdTaskSG aktif mencari umpan balik dan saran pengguna.
“Kami kerap melakukan wawancara pengguna untuk memahami kebutuhan mereka dan bagaimana meningkatkan kenyamanan mereka. Kami juga menjaga agar antarmuka layanan kami tetap bersih dan sederhana untuk mengurangi distraksi dan kemudahan pemahaman pengguna.”
Untuk menjaga keamanan, platform ini menggunakan verifikasi pengguna. Sementara bagi instansi pemerintahan yang ingin menggunakan platform ini, mereka bisa memanfaatkan fitur pemindaian untuk mendapat responden yang tepat.
Ketika berbicara pengembangan CrowdTaskSG ke depan, tim berkomitmen untuk senantiasa menerima umpan balik pengguna, baik warga atau instansi pemerintah, untuk terus memperbaiki layanan mereka dengan fitur baru.
Teknis pengembangan CrowdTaskSG
Tim CrowdTaskSG membagikan sejumlah tips ketika membuat layanan yang akan diakses secara massal. Menurut mereka, hal utama yang harus dipertimbangkan adalah kemudahan akses pengguna. Dengan pertimbangan itu, mereka membangun CrowdTaskSG sebagai situs web yang mobile-responsive agar bisa digunakan oleh pengguna yang menggunakan berbagai perangkat, baik ponsel maupun desktop.
“Jika dibuat sebagai aplikasi mobile, akan menambah kesulitan pengguna yang ingin berpartisipasi. Mereka mesti mengunduh aplikasi itu terlebih dahulu. Hal ini bisa menjadi penghalang besar bagi warga untuk berpartisipasi. Dengan membuat , pengguna baru cukup memindai kode QR, login, dan bisa langsung berpartisipasi.”
Untuk bahasa pemrograman, mereka menggunakan TypeScript, dengan frontend berjalan menggunakan React dan backend menggunakan NodeJS. “Memiliki bahasa yang sama di seluruh stack membantu pengembang kami beralih dengan cepat ketika mengembangkan frontend dan backend dengan sedikit contextual overhead.”
Untuk mempercepat respons ketika pengguna manghadapi kendala teknis, tim CrowdTaskSG menyarankan perlu dilakukan audit yang kuat agar bisa segera dilakukan identifikasi masalah. Mereka juga melakukan pengujian secara rutin untuk memastikan aplikasi mampu menampung ketika terjadi lonjakan lalu lintas.
Meski gamification dipercaya bisa meningkatkan interaksi warga, namun kendalanya adalah bagaimana cara mengatasi kecurangan. Sebab, ada saja warga yang ingin mencurangi sistem dengan mengirimkan tugas berkali-kali atau menyelesaikan tugas yang tidak ditujukan kepada mereka demi mengejar hadiah.
Untuk mengatasi hal ini, tim memastikan tugas yang dibagikan di CrowdTaskSG bersifat idempotent. Artinya, warga hanya bisa mengirim tugas sekali. Jika lebih dari itu, maka tidak akan berpengaruh pada peringkat atau nilai pengguna. Selain itu, mereka juga melakukan pemeriksaan validasi secara ekstensif untuk memastikan pengguna tidak diberi imbalan untuk melakukan tugas yang tidak ditugaskan kepada mereka.
Terkait dengan masalah keamanan, tim memastikan melakukan serangkaian ujian penetrasi dan menilai potensi kerentanan pada setiap perilisan besar. Selain uji pra-rilis, setiap bulan mereka juga menilai risiko keamanan melalui pemindaian open source dan alat pengawasan risiko lain. Tim juga memiliki bot untuk melacak lalu lintas dan potensi serangan secara real-time untuk memastikan penyelidikan tepat waktu terhadap aktivitas yang mencurigakan atau tidak biasa.
Membangun tim kreatif
Tim CrowdTaskSG dilatih untuk tak takut berinovasi. “Tim kami berpedoman pada nilai-nilai organisasi kami untuk menjadi Gesit, Berani, dan Kolaboratif. Kami melakukan dengan cepat, menguji dengan cepat, dan gagal dengan cepat.”
Mereka juga melakukan retrospektif per dua minggu sebagai momen untuk mengevaluasi hasil Sprint sebelumnya dan berbagi ide baru. Ide-ide ini tidak terbatas pada produk yang tengah dikembangkan tapi juga cara bekerja. Mereka juga memiliki papan ide yang akan menampung ide semua anggota tim yang mungkin bisa berguna di masa depan.
Selain itu, mereka menjalin komunikasi yang terbuka dengan tim dan berusaha mengadopsi budaya tanpa menyalahkan. Dengan demikian, mereka bisa memupuk ruang aman bagi anggota tim untuk berbagi pemikiran dan keprihatinan secara terbuka. Mereka juga menanamkan pola pikir untuk mengutamakan kepentingan pengembangan produk dalam cara kerja mereka.
Bekerja dengan tim yang berbeda latar belakang, tim CrowdTaskSG mengutamakan kebersamaan dan mengumpulkan perspektif dari berbagai sisi lewat diskusi yang cepat dan efektif. Selain itu, memiliki visi dan tujuan produk yang kuat juga mempersatukan tim yang berbeda latar belakang ini.
Mereka juga mengutamakan budaya yang saling merangkul dan merayakan keberagaman, karena anggota tim sadar mereka semua memang menyumbang perspektif dan keahlian yang berbeda ke dalam tim. Budaya gotong royong untuk menyelesaikan masalah satu sama lain juga dilakukan agar proyek yang tengah dikerjakan bisa bergerak maju.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Passwords alone are no longer sufficient to protect users’ online accounts as cyberattacks become more frequent and advanced, hence, multi-factor authentication (MFA) is necessary to reduce the risk of unauthorised access to online accounts.
There are different types of MFA that use what the user has and who the user is. SMS-based Authentication, Biometrics Authentication, and Application-based Authentication are the most common types.
When a user turns on SMS-based authentication, they register a mobile number that is linked to their account. Most SMS-based OTPs are only good for a certain amount of time, usually 3 minutes, after which they can’t be used again.
When a user intends to log in to their account, the system produces an OTP and sends it to the registered phone number via SMS. The system then checks the OTP, and if they match, it lets the person into their account.
When a user turns on biometric authentication, they will have to enrol their biometric data into the system by capturing and storing their unique physical or behavioural traits in a digital format. This information can come from things like fingerprint scans, facial recognition, iris recognition, voice recognition, and more.
Besides, when a user attempts to log in to their account, their biometric data is used to verify the user’s identity by comparing the data to a list of existing users whose biometric data has been registered in the system. The user is granted access if the biometric data matches.
Similarly, when a user enables 2FA with an authenticator app on their account, they will typically be asked to scan a QR code or enter a secret key provided by the service into their authenticator app.
Once the secret key is entered, the authenticator app generates a unique OTP using an algorithm such as Time-based One-Time Password (TOTP) or HMAC-based One-Time Password (HOTP) that is valid for a specific time window, typically 30 seconds, before changing. To generate the OTP, the algorithm considers the secret key known only to the user and the app, as well as the current time.
After their regular password has been validated, the user will be prompted to enter the OTP generated by their authenticator app when attempting to log in to their account. The service will then compare the user’s input to that generated by the authenticator app. If the OTPs match, the user is granted account access.
Likewise, SMS-based 2FA works by texting an OTP to a user’s mobile phone. To complete the authentication process, the user must enter this OTP into the online service. While SMS-based 2FA provides an additional authentication method, it is not as secure as authenticator apps or biometrics because SMS can be compromised:
- SIM Swapping: Threat actors can use this technique to acquire phone numbers via data leaks, public records, or social engineering, then bribe or trick a service provider employee into porting the number to a duplicate SIM card under their control. This gives them the ability to intercept users’ SMS verification OTPs and gain unauthorised access to associated online accounts.
- SMS Phishing: Using SMS Phishing (Smishing), threat actors can intercept users’ SMS messages and steal verification OTP to gain access to their various online accounts.
Thus, authenticator apps and biometrics offer a higher level of security compared to other authentication methods like SMS-based 2FA. Users are advised to practice good cyber hygiene by using a strong password and selecting the most secure 2FA method to protect their online accounts.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Anto Satriyo Nugroho, Head of PR at KAKS BRIN, believes that AI technology can be highly beneficial for measuring and interpreting external data. This, in turn, can facilitate the extraction of valuable insights and aid in achieving specific objectives.
Over the past few years, there has been an increasing global interest in the field of AI technology. With ongoing developments in the field, AI is becoming increasingly versatile and can now be deployed in many more areas and industries. From healthcare and transportation to finance and education, the potential applications of AI are seemingly limitless.
According to Anto, the impact of AI on society is inevitable and will likely bring about significant changes in the nature of available jobs. As a result, there will be a growing need for the workforce to better prepare themselves to adapt to these changes. He recommends that Indonesia take steps to prepare for the impact of AI technology.
This growing trend has resulted in a rising demand for skilled AI professionals and experts in the country, underscoring the need for Indonesia to continue investing in AI research and development to remain competitive in the global marketplace.
Given that humans remain at the centre of the equation, he stressed the importance of diligence, continuous learning, and research to foster innovation and facilitate ongoing growth.
Many research labs in academia and private industry are now creating AI software. One of these AI is the subject of study at the National Research and Innovation Agency’s (BRIN) Research Centre for Artificial Intelligence and Cyber Security (PR KAKS). ITB, UGM, Jenderal Soedirman University, UPI, and others have all collaborated with PR KAKS BRIN on various research projects.
With more investment, Indonesia can position itself to take advantage of the opportunities that arise from the increasing use of AI technology while mitigating any potential negative effects. Anto recommended that anybody interested in learning more about AI connect with the Indonesian Artificial Intelligence Society (IAIS), a group of AI enthusiasts, and the Indonesian Association for Pattern Recognition (INAPR).
Artificial intelligence’s strengths lie in its ability to retain and relay information, which gives it an edge over human memory. Artificial intelligence (AI) has various uses and advantages. Some of them include assisting individuals with impairments in communicating and saving time. Anto recognises that AI could be applied in a wide variety of contexts, from learning new tasks and solving problems to listening to information and making plans.
Anto cited several examples of simple AI activities, such as translation, navigation, fingerprint identification for digital forensics to identify victims of accidents and crimes, and the use of mathematical methods to solve arithmetic problems.
However, he also acknowledged that the accuracy of AI-powered devices can vary widely, making them unsuitable for certain applications, such as map suggestions.
It should be noted that in certain instances, the accuracy of AI can be quite high. For instance, in Japan, electronic manufacturers have collaborated with experts in the field of handwriting recognition to develop a system that can accurately identify an individual’s handwritten numerals from 0 to 9 on facsimiles, with an accuracy rate of approximately 99%.
The Indonesian government has implemented regulations from the Ministry of Home Affairs and Disdukcapil that mandate a maximum error rate of 3% for AI-powered systems analysing electronic KTPs in the country.
Anto provided insight into the extent of AI development in Indonesia and the country has made significant progress in this area, with various industries and sectors already adopting AI-based solutions to optimise their operations and enhance their productivity.
AI has been utilised in the healthcare industry to detect the emergence of new diseases and epidemics worldwide. At the urging of Indonesia’s National Research and Innovation Agency, the country’s leaders have resolved to prepare for the possibility of a pandemic by creating the resources it would need to respond effectively.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Singapore has grown into one of the world’s most advanced economies in just five decades, actively updating pro-business policies to keep pace with global advancements. As a highly open economy dependent on international trade, the Southeast Asian economic powerhouse is frequently regarded as a bellwether of world growth.
Robust investment in the tech sector has aided the country’s development. According to the Global Data Foreign Direct Investment (FDI) Projects Database, Singapore was the leading destination in the Association of Southeast Asian Nations (ASEAN) bloc for foreign investment in manufacturing, software and IT services in 2022. Semiconductors accounted for more than half of FDI, with 142 projects worth $8.2 billion in the first six months last year.
The country is continuing its efforts to be at the forefront of developing and adopting cutting-edge technology. Singapore launched the Smart Nation initiative in 2014 with one overarching goal: to support the development of people and businesses in an increasingly digital landscape. The initiative leverages developments in digital technologies to create seamless, tech-driven experiences.
Collaboration with businesses is critical to achieving the city-state’s goals. Enterprises with AI and data analytics capabilities, cybersecurity, immersive media, and the Internet of Things will be central to Singapore’s Smart Nation digital transformation.
Regulation, infrastructure, and people
Its commitment to development built on solid policies has allowed Singapore to grow into a regional – and now an increasingly global hub – for economic activity. And with a 60-year legacy, the Singapore Economic Development Board (EDB) is one of the drivers of this national transformation.
EDB has an established reputation for fostering economic vibrancy and relevance by attracting corporate or individual investors to use Singapore as a launchpad for their business ambitions in Asia and globally. The city-state has become a favoured location for major technology companies to establish their global or regional headquarters.
Jacqueline believes that one of the key factors contributing to Singapore’s success is its pro-business regulatory environment. The nation’s commitment to the rule of law ensures stability and predictability, which is highly attractive to businesses.
“Regulation in Singapore is extremely progressive and pushes the envelope. Tech companies are looking for a place that has facilitative regulation that allows data, for example, to flow and be analysed easily. Singapore does not have specific rules related to data residency. We want to be a data hub and a place where data analytics can be done without much hindrance. We have also set up frameworks to both facilitate the development and use of AI and are thinking of ways in which to think about governance and ethical use of AI,” Jacqueline explains.
Additionally, Singapore’s robust infrastructure and talented workforce are crucial elements that support the nation’s continued growth and prosperity.
Infrastructure is critical for any country aspiring to become a tech-empowered powerhouse. Renowned for its excellent infrastructure and connectivity, Singapore is a top choice for companies looking for a reliable base. As a result, the city-state has emerged as a hub for submarine cables and data centres, with the widespread availability of high-speed wireless broadband access, including 5G and 4G networks.
The Singapore Government also promotes experimentation and innovation by establishing regulatory sandboxes to test new and innovative initiatives and technologies. These sandboxes allow for experimentation in a live environment, with guardrails to protect the public.
“We’ve got sandboxes in various areas. And one of the more famous ones is in fintech. For example, the Monetary Authority of Singapore has set up a sandbox for FinTech innovation over several years, resulting in some interesting developments and ventures that have gone on to do big things,” Jaqueline shares.
Leading technology companies offer exciting projects and the right scale to attract software developers, UI/UX designers, machine learning experts, and IoT specialists.
To attract talent and help companies build their A-team here, Singapore has introduced various employment passes and made the application process smoother and more transparent.
“If you’ve got enough of a base of people doing big and interesting things, they attract other people who want to learn from them and take part in that journey. Cutting-edge projects can come from big tech companies or MNCs but we’re very proud to say that some of the tech startups we incubate are also working on interesting things,” says Jaqueline.
Southeast Asia is emerging as a digital innovation and startup hub for the world, given the region’s population of approximately 650 million, most of whom are under 35 years old. This demographic, combined with the region’s economic growth and increasing technology adoption, creates a conducive environment for digital innovation and startups to thrive.
As a result, Southeast Asia is attracting significant interest from investors and entrepreneurs worldwide, making it a hotspot for digital innovation and startups. However, with competing countries in the region, Singapore needs to ensure that it remains an attractive destination for top-tier talent by fostering an environment that supports innovation and growth.
Jacqueline and her team are also championing advanced manufacturing, which already has exciting developments in robotics and IoT. There are also interesting innovations in various technological fields, such as AI, cybersecurity, Web 3, and fintech. These areas present new opportunities for Singapore to remain at the forefront of technological innovation and attract top talent and leading technology companies.
“Another big emerging area for Southeast Asia is SaaS. There will be a lot of cloud computing solutions adoption and exciting developments in B2B SaaS over the next decade, says Jacqueline, adding that she is convinced there will be growth in this area amid the current slowdown in the global economy. Even though the tech sector globally is facing some current headwinds, its long-term prospects remain strong. Previous market corrections have also shown that some of the best and strongest companies emerge from within a down cycle.
With its conducive environment for digital innovation and startup growth, Singapore is well-positioned to take advantage of these developments and emerge as a leader in these emerging technological fields.
Technological advancements create exciting opportunities for small businesses. The availability of top talent, a supportive regulatory environment, and access to funding make Singapore an attractive destination for companies looking to capitalise on tech innovation and achieve long-term success.
LKYGBPC to refine the business
Jacqueline has been involved with the Lee Kuan Yew Global Business Plan Competition (LKYGBPC) as a judge for some years. Her involvement with the competition demonstrates her commitment to fostering entrepreneurship and supporting the growth of startups in Singapore and beyond.
The LKYGBPC provides aspiring entrepreneurs and startups a platform to showcase their innovative ideas and gain exposure to investors, mentors, and industry experts.
She has been impressed by the high quality of submissions – from startups to post-revenue companies to businesses with fully-fledged minimum viable products evaluated in the marketplace. They reveal a level of maturity in terms of having a solid business plan and demonstrating a use case in real life, including finding a market for their product.
The competition provides an excellent opportunity for entrepreneurs and startups to refine and improve their business concepts and gain exposure to investors and industry experts who can provide valuable advice and support.
“It’s a great opportunity to get feedback from judges. And if you win, it’s a great opportunity for you to market your startup, your concept and your product,” she states emphatically.
In Southeast Asia, many issues need to be addressed, which present significant potential for entrepreneurship and innovation. Jacqueline believes that entrepreneurs should focus on developing products and services that solve real-world problems. By creating solutions to these problems, entrepreneurs can contribute to the digital economy in the region and have a positive impact on society.
Jacqueline’s emphasis on problem-solving highlights the importance of creating products and services that have a tangible impact on people’s lives. Entrepreneurs can create solutions that benefit society and drive sustainable growth and development.
“There are many problems to solve – digital payments, wealth management, asset management and investment insurance,” Jaqueline acknowledges. “Moreover, there is much potential in the sustainability space, particularly in carbon services, monitoring, verification, and reporting for carbon credits. With the Southeast Asia region’s growing focus on sustainability, entrepreneurs can develop innovative solutions to help address the pressing environmental challenges facing the world today.”
Jacqueline encourages more women to participate in the tech industry, knowing there is ample opportunity for them to contribute to both the engineering and non-engineering aspects of technology. As a prominent woman in tech herself, she recognises the value of diversity in the industry and the need to increase the representation of women in technology-related fields.
“Tech is everywhere. And that requires a whole range of skill sets. There’s a common misperception that tech means you need to be a software developer or a machine learning expert. If you’re interested in hardcore engineering, there are many places for you to be and very good job prospects, but tech is now a sort of broader concept. Tech needs soft skills,” she elaborates.
Jacqueline’s perspective highlights the value of diverse backgrounds and skill sets in the technology industry. At the top of the field, she says, quite a few CEOs come from non-engineering backgrounds, having studied History, Anthropology, English language and Literature.
This shows that doing well in the sector is not limited to individuals with just one type of educational background or expertise. There are many opportunities for people with different experiences and abilities to contribute to the growth and success of tech companies.
In addition, advanced technology like quantum and AI has far-reaching implications and requires technical skills and a broader understanding of governance, regulations, ethics, and other related areas. Jacqueline’s background in social science – she used to be an economist – has lent to her belief that it is essential to have individuals with diverse backgrounds and skill sets working together to ensure that these technologies are developed and used responsibly and ethically.
While technical expertise is crucial, the inclusion of social science and humanities backgrounds can provide a deeper understanding of the impact and implications of technology on society. It is essential to have a diverse and inclusive workforce that represents different backgrounds and experiences to drive inclusive and comprehensive innovation and success.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The objective of the Singapore Global Enterprises (SGE) initiative is to transform a new generation of promising Singaporean businesses into global market leaders.
While maintaining a strong presence in Singapore, these SGEs will have a substantial global footprint and market presence, a robust supply chain, and market leadership in innovation and product segments. This will result in substantial economic advantages and employment opportunities for Singapore and its citizens.
The SGE initiative expands on the flagship Scale-Up initiative. It will use existing schemes and programmes, as well as create new ones, to provide targeted and tailored assistance to selected companies with ambitious growth plans in certain areas.
Increasing the companies’ capabilities in key areas such as digitalisation, sustainability, internationalisation, and growth financing, as well as assisting them in expanding and anchoring core business activities in Singapore.
Businesses can invest in cutting-edge digital technologies and tools to boost operational efficiency, customer engagement, and data analytics. They can also use digital marketing strategies to increase their reach and online presence. They can also use automation and artificial intelligence (AI) to improve business processes and decision-making abilities.
Other areas that can be scaled up include enabling companies to develop and deepen a strong talent pool for the future through the Singapore Global Executive Programme (SGEP) and building sustained innovation capabilities through the establishment of in-house R&D centres, allowing innovation to be developed as a core competitive strategy.
Besides, it expedites companies’ global expansion to grow their market networks and international footprint, as well as diversify their supply chain. To amplify this effect, EnterpriseSG will launch a new Scale-Up X programme, which will include a variety of targeted capability development support, one of which will be on Investment & Initial Public Offering (IPO) Readiness, which will strengthen companies’ capabilities to tap public and private markets for growth capital to help them scale up.
Additionally, as part of the Enterprise Sustainability Programme (ESP), EnterpriseSG and its partners are launching new courses for businesses on decarbonisation and sustainable finance. The courses will begin in April 2023.
Along with the new courses, EnterpriseSG is collaborating with three new partners to provide additional ESP Foundational Courses. Since their inception in January 2022, the Foundational Courses have benefited nearly 400 participants.
According to Geoffrey Yeo, Assistant Chief Executive Officer (Sustainability and Enterprise Finance), EnterpriseSG, participants of their first series of foundational courses have provided positive feedback that the courses have helped to provide a structured framework to view sustainability as a business strategy and how it is relevant for their business.
They hope that the additional foundational courses will help more businesses bridge the knowledge gap and kickstart their sustainability journey. They have also seen an increase in the number of companies eager to delve deeper into specific areas such as decarbonisation and sustainable finance. The new thematic courses on these two topics will provide businesses with a better understanding of how to decarbonise their operations and access sustainable finance to propel their businesses forward.
In addition to the ESP courses, EnterpriseSG will create thematic and sectoral sustainability playbooks to help businesses understand sector-specific opportunities and key sustainability topics like decarbonisation and sustainability reporting.
EnterpriseSG will create a one-stop website to house resources and information on whole-of-government support measures to make it easier for businesses to access sustainability information and resources. Companies interested in embarking on sustainability projects such as strategy and product development, resource optimisation, and standard adoption can also take advantage of the Enterprise Development Grant, which has been extended until 31 March 2026.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The PANRB Ministry of State Apparatus Empowerment and Bureaucratic Reform in coordination with The Ministry of Communication and Information Technology has developed the Public Services Portal. The portal serves as a unified online hub for public services.
This portal’s development has progressed to enhance the outcomes of IT security assessment and usability testing. The public will soon be able to use the site and apps that combine several public services with a single login, eliminating the need to maintain separate accounts for each.
The service’s app has been submitted to the mobile application store but is still under maintenance after their feedback. The Public Service Portal will be demonstrated for use after the fixes. The Public Service Portal will be available to the general public in April and May.
“The Public Service Portal provides information to the public regarding the rights obtained and the obligations that must be fulfilled,” said Deputy for Public Services of the Ministry of PANRB Diah Natalisa in the Focus Group Discussion (FGD) Synergy of Portal Development Public Service, in South Jakarta.
The Electronic Based Government System is bolstered by creating a Public Service Portal (SPBE). The Public Service Portal was designed with the community in mind, with the individual as a supporting character. Diah highlighted that in a citizen-centric setting, there are two services available.
An individual’s age, location, income, gender, level of education, and health status are just a few examples of the demographic factors that the public service portal considers when making personalisation suggestions in the doorway. The second type of service is predicated on a system of rights and duties.
Aligning with the National SPBE Team, which is based on Presidential Regulation no. 132/2022 about SPBE Architecture, the Public Service Portal’s service integration strategy has been refocused. The Presidential Decree includes several strategic measures, such as online SIM issuing, social aid, and education integration.
Moreover, the Draft Presidential Instruction on the Acceleration of the Implementation of the SPBE Architecture expands the locus through which integration is meant to be understood. The public service site has been updated to include cross-border services. The second quarter of the future is expected to concentrate on integrating transportation services, whether air, land, or sea.
We also welcome the Ministry of Transportation as the service owner that will be incorporated shortly,” Diah mentioned. The goal of the hybrid FGD meeting is to get a consensus on which services should be integrated first and how government service portals should be built and improved.
To avoid the concept of “one innovation, one application,” a single sign-in site is in keeping with the digital transformation strategy of PANRB Minister Abdullah Azwar Anas. The general public or businesses using the service do not need to go through unnecessary hoops like downloading several apps, making multiple accounts, or entering the same information more than once.
Anas claimed that SPBE was essential to improving how well the government served its citizens. Access to government services may be sped up and made more convenient with technology and digitalisation. Anas stated that, between 2020 and 2022, 10,799 complaints were lodged over the government’s digital services. “Among the complaints are protests from locals,” Anas explained. “Yesterday, they filled in the data in the prior application; today, another application from a related industry was entered; and today, they were told to fill in the data again.”
Future consolidation of digital services will be driven by population information. The Digital Public Service Mall (MPP) is the first to implement the concept of a “single sign-on” that eliminates the need for users to create different accounts and download various programmes.