

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The data breach at the Office of Personnel Management (OPM) discovered in April 2015 should not only be a wake-up call for OPM, but also for agencies across the U.S. federal government. The OPM computer systems were infiltrated four months before the breach was officially detected, and the compromised data included personnel records of 21.5 million current and former federal employees.
Detailed records of two million security background investigations were also exposed, and digital images of 5.6 million government employee fingerprints were taken. The immediate response from the White House was a 30-day sprint intended to raise federal cybersecurity to an acceptable baseline.
It mandated a handful of concrete actions and best practices including scanning systems and logs for Department of Homeland Security (DHS) threat indicators, patch critical vulnerabilities without delay, tighten privileged access management policies and enforcement and accelerate the use of multi-factor authentication.
These are good steps that should be a part of every agency’s cybersecurity program. But they are too focused on short-term results that do not adequately address decades of unmanaged and outdated systems, the accelerated adoption of new technologies and modern assets, or the challenges of a rapidly evolving threat landscape.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Indonesia’s National Consumer Protection Agency (BPKN) is committed to protecting consumers’ interests and ensuring Indonesia’s banking sector’s integrity. In light of the increasing threats posed by cyber-attacks, BPKN recognises the significance of robust security measures, particularly for financial institutions like BSI operating in the realm of Islamic banking.
Mufti Mubarak, the Deputy Head of BPKN, said that the agency is committed to ensuring boosting cybersecurity further. He emphasised that the agency will diligently monitor all cyber incidents until they are resolved.
By asserting its commitment to comprehensive cyber security, BSI demonstrates its dedication to protecting its customers’ confidential information, financial transactions, and the overall integrity of its banking operations. BPKN’s guarantee instils confidence in BSI’s customers and the general public, assuring them that BSI has taken significant measures to fortify its cyber defences.
As technology advances, cybercriminals continue evolving tactics, making it crucial for financial institutions to remain vigilant and proactive in countering potential threats. BPKN’s unwavering vigilance and commitment to overseeing this matter ensures that cyber-attacks targeting BSI will be swiftly addressed and resolved.
The report stated that Indonesia’s cybersecurity index score was 38.96 out of 100 in 2022. This figure places Indonesia as the third lowest among G20 countries. On a global scale, Indonesia ranks 83rd out of 160 countries on the list mentioned in the report. Enhancing cyber security requires significant support and collaboration from relevant stakeholders.
This support is evidenced by the National Cyber and Crypto Agency (BSSN) and the Indonesian ICT Association are recently actively engaged in cybersecurity initiatives. They coordinated a seminar to educate and create awareness about cyber security. The workshop’s objective is to enhance public understanding of the significance of cyber security in the digital era.
The field of cybersecurity has long been confronted with various challenges. In order to establish a strong and resilient cyber security framework, it is crucial for all stakeholders, including the private sector and the government, to collaborate and foster more effective models that can proactively anticipate and mitigate future cyber attacks, which often transpire unpredictably.
Furthermore, the government, through Presidential Regulation Number 53 of 2017 concerning the National Cyber and Crypto Agency (BSSN), and its amendment, Presidential Regulation Number 133 of 2017, established the BSSN. The agency is responsible for effectively and efficiently implementing cybersecurity by utilising, developing, and consolidating all elements related to national cybersecurity.
BPKN’s dedication to upholding the highest standards of cybersecurity is a testament to its role as a consumer protection agency, safeguarding the rights and interests of individuals who entrust their financial well-being to institutions like BSI.
BSSN formulates the Indonesian Cyber Security Strategy as a shared reference for all stakeholders involved in national cyber security. This strategy is a framework for acquiring and developing cybersecurity policies within their respective institutions.
Their commitment to diligently resolving this case demonstrates their tireless efforts and dedication to addressing the emerging challenges posed by the rapidly evolving digital landscape. By proactively tackling these challenges head-on, they strive to foster a resilient and secure banking ecosystem that safeguards the interests of all stakeholders involved.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Graduates of the Information Technology Programme at the Hong Kong Institute of Vocational Education (IVE) have created a system that uses artificial intelligence (AI) technology to evaluate emotional distress and depression levels, as well as associated risks, by analysing various factors such as the caller’s voice, emotions, and keywords.
Currently, various government departments and social welfare organisations offer mental health helplines and online support services. The “AI Early Depression Screening System” has been specifically developed for individuals seeking emotional assistance and the dedicated counselling volunteers who assist them.
For instance, within this system, counselling volunteers from the organisation can engage in online sessions with those seeking help through the platform. They can access the medical records and past conversation logs of the help-seekers.


As the online conversation begins, the system automatically analyses the caller’s speech tone, voice, and content to gain insights into their emotions. Additionally, the system provides a real-time transcription of the caller’s voice, enabling the identification of specific words used during the conversation.
To train the AI system and analyse the conversation content, the team used the depression research lexicon created by Stanford University, which consists of over 2,000 depression-related keywords. For instance, instances have been observed where single mothers repeatedly use the keyword “useless” to describe themselves. In such cases, the system records the frequency of usage and analyses its association with other words, allowing an estimation to be made that the help seeker may be experiencing emotional distress.
Once the conversation is concluded, the system performs an initial assessment of the social worker’s risk of depression or emotional distress. It displays keywords associated with depression and potential causes of the condition. Additionally, it automatically identifies words related to substance abuse, alcohol, gambling, and self-harm as part of assessing the potential suicidal tendencies of the help-seekers. In conclusion, the system offers mental health guidance and suicide prevention advice while generating reports for further analysis and follow-up by professionals.
A senior lecturer at the Department of Information Technology at IVE (Tsing Yi) and the project’s guiding authority, highlights the convenience and user-friendly nature of the integrated online consultation and intelligent analysis system. The system effectively presents counselling conversation data, aiding in preliminary screening and serving as a reference tool for professional counselling or medical staff. However, he emphasised that the diagnosis and treatment of mental health conditions still require the professional judgment of healthcare and counselling teams.
It is suggested that this system is suitable for mental health institutions, hospitals, clinics, and even insurance companies. The continuation of conversations regularly is encouraged to enable the system to gather more data, thereby improving the accuracy of its analysis. Currently, the system exclusively supports English, but the next objective is to optimise it to accommodate additional languages such as Cantonese and Mandarin.
The system has garnered significant recognition and achievements through participation in various competitions in China and Hong Kong.
IVE’s IT Discipline has developed a comprehensive range of programmes to equip learners with the necessary knowledge and skills to thrive in the fast-paced and ever-evolving career landscape. These programmes cover various domains within the field of Information and Communications Technology (ICT) as well as Multimedia and Entertainment Technology (MET). By offering a wide array of courses, the IT Discipline aims to ensure that learners stay up-to-date with the latest advancements and acquire the relevant expertise required in these dynamic industries.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Researchers at MIT McMaster University have identified a new antibiotic that can dispatch a type of bacteria responsible for many drug-resistant infections using an algorithm based on machine learning.
If the drug is formulated for patient usage, it could potentially aid in combating Acinetobacter baumannii, a bacterial species commonly present in healthcare facilities and associated with severe infections such as pneumonia, meningitis, and other critical ailments. Furthermore, this microorganism is a primary cause of infections among injured military personnel in Iraq and Afghanistan back then.
Jonathan Stokes, a former MIT postdoc who is now an Assistant Professor of Biochemistry and Biomedical Sciences at McMaster University, explained, “Acinetobacter has the ability to persist on hospital doorknobs and equipment for extended durations, and it can acquire antibiotic resistance genes from its surroundings. It is increasingly prevalent to encounter A. baumannii strains that resist nearly all available antibiotics.”
The scientists employed a machine-learning model to examine approximately 7,000 potential drug compounds and identify the new medication. The model was trained to assess whether a chemical compound could effectively hinder the growth of A. baumannii.
James Collins, the Termeer Professor of Medical Engineering and Science at MIT’s Institute for Medical Engineering and Science (IMES) and Department of Biological Engineering, said, “This discovery further reinforces the notion that AI has the potential to greatly accelerate and expand our quest for innovative antibiotics. I am thrilled that this research demonstrates the utility of AI in addressing challenging pathogens like A. baumannii.”
During the initial experiment, the researchers educated a machine-learning algorithm to recognise chemical compositions with the potential to impede the growth of E. coli. Employing this algorithm, they screened over 100 million compounds and discovered a molecule called halicin. Their investigations demonstrated that halicin could eliminate not only E. coli but various other bacterial strains that resist conventional treatment methods.
To gather training data for their computational model, the researchers initially exposed A. baumannii cultivated in a laboratory dish to approximately 7,500 distinct chemical compounds to identify those capable of impeding the microbe’s growth. Subsequently, they input the structure of each molecule into the model while providing information regarding whether each structure could inhibit bacterial growth. It enabled the algorithm to grasp the chemical characteristics associated with growth inhibition.
Once the model was trained, the researchers employed it to analyse a set of 6,680 compounds, which had not been previously encountered by the model. This analysis selected several hundred top candidate compounds within less than two hours. Among these candidates, the researchers handpicked 240 for experimental laboratory testing, focusing on compounds possessing distinct structures from existing antibiotics or molecules within the training data.
From the test’s results, the researchers discovered nine antibiotics, one of which exhibited exceptional potency. Interestingly, this particular compound, initially investigated as a potential treatment for diabetes, showcased remarkable efficacy in eliminating A. baumannii while having no impact on other bacterial species such as Pseudomonas aeruginosa, Staphylococcus aureus, and carbapenem-resistant Enterobacteriaceae.
The ability of this antibiotic to exhibit a narrow-spectrum killing effect is a highly desirable characteristic as it reduces the risk of bacteria swiftly developing resistance to the drug. Additionally, this attribute offers the advantage of potentially sparing beneficial bacteria in the human gut, which play a crucial role in suppressing opportunistic infections like Clostridium difficile.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
A seminar aimed at providing IT Security knowledge to public health groups, schools, and government sectors was inaugurated by Mr Siraphop Maneerat, Manager of Central Region Sales and Operations at the National Telecommunication Public Company Limited (NT), and Mr Sanae Kamphaeng, Telecommunications Officer of Prachuap Khiri Khan Province.
The objective of this seminar is to equip IT officers from government agencies, schools, and local government organisations in the province with the necessary knowledge and understanding to safeguard data and mitigate cyber threats.
NT is prepared to offer a range of services and provide guidance in developing plans and budgets to prevent cyber-attack risks that could significantly impact organisational operations and management.
As the National Cyber Security Agency (NCSA) reported, Thailand witnessed a significant surge in cybersecurity threats, from 135 incidents in 2021 to over 772 incidents in 2022. The majority of these incidents involved data breaches, particularly through educational and public sector websites.
According to Mr Sanae, a Prachuap Khiri Khan Province Telecommunications representative, many organisations often neglect the regular maintenance of database security and lack proper protocols for handling cyber threats. In such cases, they require dedicated professionals to manage their systems, as threats continuously evolve, and new vulnerabilities emerge.
The Thai government has been concerned regarding the effectiveness of their organisation’s security protocols in mitigating data leaks. They acknowledge that insufficient personnel can result in significant damage. Seeing this, Thai government legislation, namely the Personal Data Protection Act (PDPA) and some Thai enterprises, passed the Cybersecurity Act in 2019.
The Cybersecurity Act aims to establish legal protections and measures to safeguard cyberspace security. One significant aspect of this act is implementing a cybersecurity risk assessment plan to prevent and address cybersecurity threats that could potentially jeopardise national security and public welfare. These threats encompass the economy, healthcare, international relations, and other governmental functions. The act aims to ensure the stability and integrity of these areas in the face of cybersecurity challenges.
Additionally, the Cybersecurity Act gives the Thai government the authority to monitor and access digital data if it determines that cyber threats pose a risk to the critical digital infrastructure of the country. Private organisations operating in sectors such as national security, financial services, and public services are obligated to provide the names and contact details of key stakeholders who own, use, or possess computer systems, comply with the code of conduct and cybersecurity standards as mandated by law, conduct comprehensive risk assessments, and notify stakeholders about any incidents involving cyber threats.
Basic protection needs to be improved in the current digital landscape, where online threats come in various forms. A comprehensive defence system is crucial. This law and issue is truly new for Thailand itself, so NT allows institutions or even individuals to dig for information regarding cyber security further. “Interested agencies can reach out to the National Telecommunication Company for inquiries and guidance regarding IT Security services,” said Sanae.
Thailand is more serious about bolstering its cybersecurity systems to create a safe environment in a digital era. Supporting this, NT has introduced IT Security services to provide system and equipment security for government and private sector agencies.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Due to the Internet’s rapid expansion, software has permeated a wide range of industries, including entertainment, social interaction, education, health care, banking, transportation, logistics, and security. It has also become a crucial tool and infrastructure in people’s lives and workplaces.
The software sector in China has grown substantially in recent years, with ongoing advances in fundamental technologies and an average annual growth rate of 16% on an industrial scale. The support of software is essential to the growth of the Internet.
Numerous infrastructures, websites, applications, and services depend heavily on software. As the backbone and engine of Internet applications, software not only supports industry development but also the technological advancement of the Internet.
People are starting to pay more attention to software security problems, even though software products meet basic functional needs. Software security affects not only how people make a living, but also the security of national assets and national defence.
The “Key Information Infrastructure Security Protection Requirements” recently became legal in the nation. This is a big deal for the country’s information security building, social growth, and business operations.
Reports cited that information security needs to be better protected and stopped from happening in the first place. This is an important basis and guarantees for building cyber power. Software security is important for the network security of the whole society, the safety of people’s lives and property, the growth of industry, and the running of businesses. Software security problems have become something that manufacturers, development teams, and users all care about.
With this, the China Academy of Information and Communications Technology Taier Terminal Laboratory started researching software security topics in October 2022, and in May 2023 it was held at the Internet Society of China to support the development of the industry’s security capabilities and the orderly growth of the network security sector.
“Technical Specifications for Evaluation of Software Security Development Capabilities” and “Methods for Testing and Evaluation of Software Code Self-development Rate” are two group standards that were requested and approved.
The nation invites relevant units or individuals and industry experts who are concerned with the advancement of software security, the quality of software products, and the high-quality development of the software industry to take part in the development of the two group standards, improve the calibre of domestic software products together, and support the high-quality advancement of key information infrastructure.
In today’s digital landscape, software security requirements are critical. They provide a framework for enterprises to build and maintain secure software practices, safeguarding essential data, systems, and infrastructure against a variety of attacks and vulnerabilities.
One important component of software security standards is their involvement in cyber threat mitigation. Organisations can discover and mitigate any vulnerabilities in their software systems by following to recognised standards. This preventive approach decreases the likelihood of successful cyber-attacks, data breaches, and unauthorised access to critical information.
Another critical topic addressed by software security standards is compliance with regulatory obligations. Many industries and sectors have distinct data protection and privacy legislation and mandates.
Following these guidelines ensures that organisations meet their legal commitments and avoid potential penalties or legal ramifications. Compliance also assures clients that their personal information is handled safely.
Implementing software security standards also aids in the development of consumer trust and the enhancement of an organisation’s reputation. Customers are becoming increasingly concerned about the security practices of the firms with which they deal in an era when data breaches and security events are common.
Organisations may demonstrate their commitment to preserving customer data and privacy by adhering to recognised standards and promoting trust and loyalty.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
As a dynamic and ever-evolving global domain, cyberspace presents numerous challenges and opportunities. In order to effectively navigate and excel in this complex digital landscape, United States Cyber Command (CYBERCOM) adopts a proactive approach, constantly seeking to remain persistently engaged, agile, and ready.
Leveraging world-class talent and forging strategic partnerships, CYBERCOM harnesses the collective expertise to deliver a decisive global warfighting advantage to the joint force and our valued allies and partners. By embracing innovation, fostering collaboration, and staying at the forefront of technological advancements, CYBERCOM aims to establish itself as a formidable force, shaping cyberspace operations’ future and safeguarding nations’ interests in an increasingly interconnected world.
Gen Paul, Commander of U.S. Cyber Command, said, “Strategic competition has fundamentally changed the character of warfare, from acute threats, pacing challenges, mis/disinformation and advancements in artificial intelligence and machine learning, our adversaries continue to challenge international norms and laws.”
CYBERCOM, recognising the significance of collaboration and innovation, has devised an approach to foster engagement and problem-solving with various stakeholders. One of the key initiatives in this regard is the challenge problem set, which catalyses productive conversations and collaborative efforts between CYBERCOM and its partners, as well as the science and technology communities at large.
This problem set is carefully structured into six distinct categories, each encompassing specialised expertise and skill sets that align with external commercial and academic research, development, and product portfolios.
To facilitate accessibility and dissemination, the Command Challenge Problem Set can be found on the CYBERCOM Portal, specifically on the “Technical Outreach Division” page within the comprehensive “Partnerships and Outreach” section. This dedicated section serves as a valuable resource for interested individuals and organisations seeking to explore the challenge problem set and actively contribute to the pursuit of solutions to intricate and multifaceted problems within cyberspace.
By making this document readily available and easily accessible within the “Resources Section” of the CYBERCOM Portal, the command actively encourages the exchange of ideas, expertise, and collaborative efforts, thereby fostering a vibrant ecosystem of innovation and problem-solving in the realm of cybersecurity.
Emphasising the importance of partnerships and outreach, CYBERCOM strives to leverage the collective wisdom and in of a diverse range of stakeholders, reinforcing its commitment to staying at the forefront of technological advancements and ensuring the continued security and resilience of critical networks and information infrastructure.
In its efforts to expand collaboration and forge stronger alliances, CYBERCOM has actively pursued partnerships beyond the industry sector. The engagements with industry partners can be anticipated to increase significantly. However, CYBERCOM’s scope of collaboration also extends to other entities within the Department of Defence.
This includes fostering relationships with organisations like the Defence Advanced Research Projects Agency (DARPA), the Defence Innovation Unit (DIU), and the recently established Chief Digital and AI Office. By forming these strategic partnerships, CYBERCOM aims to tap into a broader network of expertise and resources, enhancing its capabilities and staying at the forefront of technological advancements in the realm of cybersecurity and artificial intelligence.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Indian Computer Emergency Response Team (CERT-In) has released an advisory regarding the security concerns associated with applications utilising AI language technology. According to CERT-In, which operates under the Ministry of Electronics and Information Technology, AI language-based models are gaining significant recognition and generating discussions due to their beneficial impact. However, these models can also be exploited by malicious actors to target individuals and organisations.
AI language-based applications are being utilised to comprehend, analyse and categorise the context of cyber security. They are also employed in reviewing security events and logs to interpret malicious codes and malware samples. Other potential uses include vulnerability scanning, translating security code between different languages or converting code into natural languages, conducting security audits of codes, performing Vulnerability Assessment and Penetration Testing (VAPT), and integrating the applications with Security Operations Centers (SOC) and Security Information and Event Management (SIEM) systems for monitoring, reviewing, and generating alerts.
However, AI-based applications can also be used by threat actors to conduct various malicious activities. For example, users can use the tools to write malicious codes, exploit vulnerabilities, conduct scanning, and perform privilege escalation and lateral movement to create malware or ransomware specifically designed for a targeted system.
These tools can generate output in the form of text as written by a human. Users can ask for promotional emails, shopping notifications or software updates in their native language and get a well-crafted response in English. It can aid in the creation of fake websites and web pages to host and distribute malware to users through malicious links or attachments using the domain like AI-based applications.
Furthermore, users can develop fake applications impersonating AI-based applications. Cybercriminals could use AI language models to scrape information from the internet, such as articles, websites, news, and posts and potentially take personally identifiable information without explicit consent from the owners.
CERT-In has recommended several advisory measures to mitigate adversarial threats associated with AI applications. These measures include:
- Educating developers and users about the risks and threats involved in interacting with AI language models.
- Verifying domains and URLs that impersonate AI language-based applications to prevent falling victim to phishing or other malicious activities.
- Implementing appropriate controls to safeguard the security and privacy of data used.
- Ensuring that the generated text is not exploited for illegal or unethical purposes.
- Employing content filtering and moderation techniques within organisations to prevent the dissemination of malicious links, inappropriate content, or harmful information.
- Conducting regular security audits and assessments to identify and address vulnerabilities in the systems.
- Monitoring user interactions with AI language-based applications for any suspicious or malicious activity.
- Establishing an incident response plan and defining a set of activities to be followed in case of a security incident.
As AI becomes more widespread, governments around the world are increasingly interested in regulations to protect users. Recently, the Indian Institute of Technology, Madras established the Centre for Responsible Artificial Intelligence (CeRAI). As OpenGov Asia reported, it is a multidisciplinary research centre dedicated to promoting ethical and accountable advancements in AI-powered solutions for practical applications.
CeRAI will offer sector-specific recommendations and guidelines to policymakers. Drawing from its research outputs, the centre will also contribute to the formulation of tailored recommendations and guidelines that address the unique requirements of various sectors. Additionally, CeRAI will provide stakeholders with essential toolkits to support ethical and responsible management and monitoring of AI systems during their development and deployment stages. These resources will assist in promoting best practices and ensuring that AI technologies are used in a responsible and accountable manner.