Many countries across the globe commended for their eradication or containment of the Coronavirus, now have new fears of facing a potential ‘second’ or even ‘third wave’ of the virus with new outbreaks and clusters starting to appear in different parts of their nation.
In Australia, it has seen many successful attempts to stop the spread of Coronavirus, like in Melbourne, Victoria where they had strict restrictions in place for 111 days and now has recorded no new cases of Covid-19 or deaths in 17 days. New concerns have been raised about a potential outbreak in South Australia, that numbers could rise quickly in a matter of days.
International flights into South Australia have been suspended for this week, gyms will close and there will be a cap of 100 people at pubs, clubs and restaurants as the state moves to tackle a growing cluster of Covid-19 cases for the first time since April.
The premier announced the restrictions on Monday after the state reported 17 cases of Covid-19 connected to an outbreak from a quarantine hotel for returned travellers, a similar situation to what had happened previously in
South Korea reported more than 200 new coronavirus cases for the third consecutive day on Monday, as the government considered tightening social distancing to prevent recurring outbreaks from offices, medical facilities and small gatherings.
The Korea Disease Control and Prevention Agency announced the cases as the highest since early September.
The new cases are the most South Korea has seen in more than two months and concern health officials because they are coming from various small clusters, from workplaces to cafes to social gatherings, making them more difficult to trace.
Technology to prevent spread, mitigate risk and lessent the impact
Technology cannot prevent the onset of the pandemics; however, it can help prevent the spread, educate, warn, and empower those on the ground to be aware of the situation, and noticeably lessen the impact.
Technologies like mobile, cloud, analytics, robotics, AI and ML have made it possible to test several innovative approaches to the pandemic response.
Technology can be used to combine health data with travel data, to build a monitoring system and provide real-time alerts. For example, sending automatic alerts to individuals if they have travelled to the infected vicinity and details of their nearest clinic or test centre.
AI-based data analytics and predictive modelling are enabling governments and industry to understand more aboutthe virus. By using AI platforms, it has become easier to gain new insights or approaches on how to address the COVID-19 outbreak better.
Thermal scanners and other similar infrared body temperature measuring devices have become essential at immigration, airports, hotels, hospitals, train stations, shops, and other public places. These technologies can measure body temperature from a distance and are effective in pinpointing individuals who may need further investigation.
Outbreak Management Technology Solutions on one platform
Liberty & Passage developed by Access Anywhere, a total outbreak management system, combines cutting edge technologies all on one platform and can be used across various sectors including airports, cruise lines, immigration, and tourism boards. It also provides a useful tool for all industries to restart their business.
Liberty & Passage, using AI and ML, has been designed to help provide relevant timely information and build the confidence required to restart free movement between countries and continents, giving travellers when crossing borders and authority’s confidence when processing foreign visitors at customs.
Liberty & Passage an outbreak management solution for individuals, organisations, and the entire travel industry.
The Liberty Universe is for the entire population with Liberty Open designed for everyone to manage their personal risk, Liberty Corporate for organisations to ensure a safe return to work, and Liberty Passage for travel and the reopening of borders. Everyone gains from the vast insights the system provides to be able to go about their normal lives whilst keeping as safe as possible against this phenomenal threat.
By joining the three pillars together, ‘the whole becomes greater than the sum of the parts’ giving the general public, employees, and travellers more liberty to move with confidence and a smarter understanding of their risk exposure using cutting edge technology.
Innovation in technology is helping to manage the pandemic and better equip countries when dealing with the current public health emergency and for future public health emergencies. Outbreak management systems will be the key in building confidence, mitigating risk and enhancing safety in everyday life. For more information on how the Liberty Solution works – please visit www.libertyandpassage.com
The Counter Ransomware Task Force (CRTF), which was formed to bring together Singapore Government agencies from various domains to strengthen Singapore’s counter-ransomware efforts, has issued its report.
Singapore’s efforts to promote a resilient and secure cyber environment, both domestically and internationally, to combat the rising ransomware threat are guided by the recommendations in the CRTF report.
According to David Koh, Commissioner of Cybersecurity, Chief Executive of CSA and Chairman of the CRTF, ransomware poses a threat to both businesses and individuals. Economically, socially, and even in terms of national security, it can be detrimental. Both internationally and across domains, ransomware is a problem.
“It requires us to collaborate and draw on our knowledge in a variety of fields, including cybersecurity, law enforcement, and financial supervision. It also necessitates that we work with like-minded international partners to identify a common problem and develop solutions,” David explains.
He exhorts businesses and individuals to contribute as well, strengthening the nation’s overall defence against the ransomware scourge.
Cybercriminals use malicious software known as ransomware. When ransomware infects a computer or network, it either locks the system or encrypts the data on it. For the release of the data, cybercriminals demand ransom money from their victims.
A vigilant eye and security software are advised to prevent ransomware infection. Following an infection, malware victims have three options: either they can pay the ransom, attempt to remove the malware, or restart the device.
Extortion Trojans frequently employ the Remote Desktop Protocol, phishing emails, and software vulnerabilities as their attack vectors. Therefore, a ransomware attack can target both people and businesses.
The ransomware threat has significantly increased in scope and effect, and it is now a pressing issue for nations all over the world, including Singapore.
The fact that attackers operate internationally to elude justice makes it a global issue. Ransomware has created a criminal ecosystem that offers criminal services ranging from unauthorised access to targeted networks to money laundering services, all fed by illicit financial gains.
Singapore must approach the ransomware issue as a cross-border and cross-domain problem if it is to effectively combat the ransomware threat.
Other nations should adopt comparable domestic measures to coordinate their financial regulatory, law enforcement, and cybersecurity agencies to combat the ransomware issue and promote international cooperation.
Three significant results were the culmination of the CRTF’s work. For government agencies to collaborate and create anti-ransomware solutions, they first developed a comprehensive understanding of the ransomware kill chain.
Second, it examined Singapore’s stance on paying ransom to cybercriminals. Third, for the government to effectively combat ransomware, the CRTF suggested the following policies, operational plans, and capabilities under four main headings:
Pillar 1: Enhances the security of potential targets (such as government institutions, critical infrastructure, and commercial organisations, especially small and medium-sized businesses) to make it more difficult for ransomware attackers to carry out successful attacks.
Pillar 2: To lower the reward for ransomware attacks, disrupt the ransomware business model.
Pillar 3: To prevent ransomware attack victims from feeling pressured to pay the ransom, which feeds the ransomware industry, support recovery.
Pillar 4: Assemble a coordinated international strategy to combat ransomware by cooperating with international partners. Singapore should concentrate on and support efforts to promote international cooperation in three areas that have been identified by the CRTF: law enforcement, anti-money laundering measures, and discouraging ransom payments.
The appropriate government agencies will take the recommendations of the CRTF under consideration for additional research and action.
The Ministry of Information and Communications (MIC) announced it would roll out Internet advertising management measures at a conference in Hanoi earlier this week. Participants at the event discussed how advertising in cyberspace has become the norm. Domestic and foreign firms choose it because it is easier to access customers and it offers flexible costs and larger reach. However, the limited management of ads poses potential risks to the safety of brands, the Ministry has said.
According to a press release by MIC, ad agents affirmed that without the cooperation of cross-border platforms in modifying algorithms to filter and censor content, ad violations will remain rampant. The Ministry will penalise agents and brands that cooperate with platforms that do not fall in line with MIC regulations. On the other hand, the Ministry will support ads on domestic and foreign digital platforms that comply with domestic laws, MIC’s Deputy Minister, Nguyen Thanh Lam, noted. This will protect brands and build a healthy, safe, and fair ad business environment.
The Ministry will also increase inspection and clampdown on violations of Internet ads activities, he said. Cross-border ad firms that fail to comply with Vietnam’s laws will not be allowed to operate in the country. MIC has also generated a Whitelist consisting of licensed e-newspapers, magazines, general information websites, and social media. Other websites, registered accounts, and information channels are also in the pipeline for the list, the release said. The list will be publicised on the portals of the Ministry and Authority of Broadcasting and Electronic Information. Ad service providers, agents, and brands were also urged to use the list for their work.
Nearly 80% of the population in Vietnam are digital consumers, as OpenGov Asia reported earlier in October. Over the past year, the average contribution of e-commerce to total retail has continued to grow at 15%. Higher than growth in India (10%) and China (4%), with an online-to-total retail share of 6%. Now that the world is in the post-pandemic stage, regional consumers are prioritising an integrated shopping experience, combining online and in-person services. During the ‘discovery’ phase of their shopping, 84% of Vietnamese shoppers use the Internet to browse and find items. This is a period when they use more platforms than ever before, with the dominance of the e-commerce market accounting for 51% of online spending.
At the same time, social networking sites account for nearly half of online discoveries, including images (16%), social media videos (22%), and related tools such as messaging (9%). These tools were paramount channels for 44% of survey respondents. Consumers’ openness to interaction and experimentation has also led to behavioural changes, with 64% of respondents saying they have interacted with a business account in the past year. As customers seek more engagement, the content creation economy is able to grow exponentially.
In the context of digital consumption, Vietnamese users switch brands more often and increase the number of platforms they use to find a better value, with 22% of online orders made on various e-commerce platforms. The number of online platforms Vietnamese consumers use has doubled from 8 in 2021 to 16 in 2022. Therefore, it is important to put in place proper ad regulations as Internet usage grows.
The Cyberspace Administration of China (CAC) announced a new certification for personal information protection and implementation. The office has decided to implement such certification to enhance its information protection capabilities and to promote the rational processing of personal information.
The certification implementation follows the Personal Information Protection Certification Implementation Rules. The implementation rules clarify that personal information processors must comply with the requirements of GB/T 35273 Information Security Technology Personal Information Security Specifications. The rules outline requirements for on-site audits, the evaluation and approval of certification results, post-certification supervision and certification time limits.
Organisations engaged in personal information protection certification work need approvals to carry out activities. The regulation applies to every personal information processor that carries out private information collection, storage, use, processing, transmission, provision, disclosure, deletion and cross-border processing activities.
The State Administration for Market Regulation and the State Internet Information Office decided to implement personal Information protection certification. The step is relevant to provisions of the Personal Information Protection Law of the People’s Republic of China (‘PIPL’). The body requires the Specifications for Security Certification of Cross-Border Processing of Personal Information for cross-border personal information processing.
The latest versions of the standards include technical verification, on-site audit, and post-certification supervision. In addition, the certification body shall clarify the requirements for certification entrustment materials, including but not limited to the basic materials of the certification client, the certification power of attorney, and relevant certification documents.
To get certified, an organisation must submit certification entrustment materials according to the certification body’s requirements and the certification body shall give timely feedback on whether it is accepted after reviewing the materials.
The materials are then used for determining the certification plan, including the type and quantity of personal information, the scope of personal information processing activities, information on technical verification institutions, etc., before notifying the organisation seeking certification.
The CAC stated certification is valid for three years. An organisation must submit a certification commission within six months before the expiration of the validity period. The certification body shall adopt the method of post-certification supervision and reissue new certificates to those that meet the certification requirements.
Violations, cheating, and other behaviours that seriously affect the implementation of the certification on the certification client or personal information processor will cancel the certificate. Therefore, certification bodies shall adopt appropriate methods to implement post-certification supervision to ensure that certified personal information processors continue to meet certification requirements. The certification body comprehensively evaluates the post-certification surveillance conclusions and other relevant information. If the evaluation is passed, the certification certificate can continue to be maintained.
The organisation shall actively cooperate with the certification activities. During the validity period of the certification certificate. If the name and registered address of the certified personal information processor, or the certification requirements, certification scope, etc., change, the certification principal shall submit a change entrustment to the certification body.
When changes happen, the certification body must evaluate the change in entrustment materials. The result will determine whether the body can approve the change. If technical verification or on-site audit is required, the body shall conduct technical and on-site audits before the change is approved.
When a certified personal information processor no longer meets the certification requirements, the certification body will promptly suspend or revoke the certification certificate. The certification principal can apply for the suspension and cancellation of the certification certificate within the validity period of the certification certificate.
Officially launched on 29 November 2022, the ANU School of Cybernetics provides unrivalled teaching and research that pioneers a new approach to engineering and technology design. School Director, ANU Distinguished Professor Genevieve Bell, noted that the School nurtures and trains a new generation of critical thinkers and practitioners who can navigate an increasingly complex world and who are committed to ensuring safe, sustainable, and responsible technology futures.
She said the new School’s leadership is working hard to help transform the way society engages with technology. Their aim is to help ensure that everyone can participate in building the future. And they are working to find new ways to think about and talk about the role of technology in our lives. The ANU School of Cybernetics is dedicated to helping lead and enrich this vital conversation.
The School and its curriculum draw on the rich history of cybernetics globally and reimagine it for the 21st-century challenges. The goal is to make sure major societal transformations can be successfully navigated.
The ANU School of Cybernetics offers the Master of Applied Cybernetics, a PhD program that recruits students as a cohort, and a series of microlearning experiences for organisations, communities, and individuals.
The School’s research program investigates how emerging cyber-physical, technological systems – such as robotics, digital voice assistants, and autonomous systems – operate across a range of settings and sectors including the creative industries, marine sciences, agriculture, and climate change research.
Distinguished Professor Bell said another key focus of the School was examining who is building and managing our AI-enabled future. There is a need to develop the ability to respond quickly to changing situations and complex systems and many, diverse voices must be involved in making those decisions and building new knowledge, she said.
The last few years have shown that better stories about the future need to be told; stories that are more equitable, fair, and just, and that, equally, more work needs to be present to make those stories not just possible but true.
To help launch the School, an inaugural curated exhibition featuring more than 100 historical and contemporary pieces is on display until 2 December in the award-winning Birch Building on the ANU campus.
From the world’s first computer graphics, animations, special effects, and electronic music, Australian Cybernetic: a point through time explores 50 years of technology and creativity in computing that have influenced the technology, cinema, gaming, and television we know today.
The collection of interactive, immersive, and provocative creations also includes an Emmy Award-winning virtual reality film; an acclaimed installation examining the resources, human labour, and algorithmic processing of a virtual assistant technology system; and a kinetic sculpture named ‘Albert’ that has been delighting audiences for 54 years, among many other displays.
The cybernetic futures lead at the School said the exhibition speaks firmly to the School’s approach of observing the past to help shape a course for the role of technologies in today’s world. He noted that for the first time, historic, contemporary, and conceptual cybernetic works are being brought together in a unique exhibition. People are invited to take a tour through time and learn about the history of technology and art and how this contributed to cybernetics and the multimedia, tech and music enjoyed today.
A report published by CSIRO, Australia’s national science agency, has detailed the successful trial of a new sensor-based platform with the potential to better support older Australians to live in their own home longer. The report, titled DACS: Smarter Safer Homes to Support Older People Living in Their Own Homes Through Enhanced Care Model, is based on findings of research to trial the Smarter Safer Homes (SSH) sensor-based platform. Developed by CSIRO, SSH was the first consumer-driven smart home technology in the world to help people live independently in their homes.
The CEO of CSIRO’s Australian e-Health Research Centre noted that trials found statistically significant evidence that older people living with SSH showed their social care-related quality of life decrease was 10 times less than the control group who experienced usual care. He said that the outcomes of the trial reveal that SSH technology is beneficial in ensuring older people can live independently in their homes for longer.
Service providers, family members and other caregivers can check a data dashboard that reveals patterns in an older person’s behaviour. Any changes in the patterns may indicate a need for action. For example, if mobility patterns change, this may suggest a fall or injury, prompting a check-in.
A co-author of the report stated that this technology in the hands of Australia’s aged care workforce will benefit older people who are living at home and receiving community care services.
The platform is perfect for connecting families living apart, as people often are these days. For example, there is a family member in Brisbane, another in Adelaide and an ageing parent living in a rural town. SSH would help the family to support their parent from a distance. In addition to community aged care support, the technology could allow the parent to stay in their home for longer if they wish. This technology takes the guesswork away from the question of a user’s family’s well-being when they are not around, she said.
Participants in the trial said they loved the safety and comfort SSH gave to them and their family, while service providers commented on the usefulness of quantitative information about a client’s functional independence over time. The platform comprises ambient sensors that collect data from the physical environment within the home and use artificial intelligence to turn that data into relevant information.
The platform includes a sensor-based in-home monitoring system (data collection), a cloud computing server (data analyses), and a client module (data presentation) with a tablet app, a family portal, and a service provider portal. The SSH platform was an output of consultations with aged care service providers who contributed to its initial design.
The Dementia and Aged Care Services (DACS) trial of the SSH platform commenced in 2019 and involved 195 participants who tested the sensors in their homes. The SSH algorithm has been licensed and commercialised by a Sydney-based provider of data analytics, machine learning and artificial intelligence technologies and deployed with numerous aged care providers in acute and post-acute care facilities.
The global smart home market size was US$86.48 billion in 2020. The market is expected to grow from US$99.89 billion in 2021 to US$380.52 billion in 2028, growing at a CAGR of 21.1% during the 2021-2028 period.
An increasing number of internet users, the growing disposable income of consumers in developing economies, the rising importance of home monitoring in remote areas, and the growing demand for low-carbon emission and energy-saving-oriented solutions are projected to drive the market capabilities.
With the introduction of its Kooha Version 2.0 during the recently held 2022 National Science and Technology Week celebration, the Department of Science and Technology-Advanced Science and Technology Institute (DOST-ASTI) showered photo enthusiasts with helpful tips on interactive smartphone photography.
Kooha is a photo-sharing app derived from the Filipino word “kuha,” which means “to take.” It capitalises on the Philippines’ status as “the selfie capital of the world,” with thousands of photographs shared on various social media platforms every day.
With the help of the camera app Kooha, users may take pictures that go beyond simple snapshots. Multiple sensors are embedded into mobile devices; Kooha uses these sensor data while users snap pictures and embeds them in the image.
Users will be able to quickly learn the location where the photo was shot, the background noise when they shoot a selfie, the network provider’s signal strength, the device battery level, camera settings, environment sensor data, motion sensor, and more. All the photographs captured by the app are shared on Kooha Community. Users’ photos become more than just images when they post them to the community; they become contributions.
When the sensor data from the images is combined with the large pool of sensor data from other users, the data becomes societally important. The data can assist data scientists in generating insights and fresh knowledge that can be used by decision-makers across the country. Kooha is a free app that can be downloaded from Google Play.
According to the DOST-ASTI, Kooha uses the built-in sensors of a mobile device to gather real-time data like sound level, temperature, and humidity and embeds it into a snapshot, making it particularly valuable in research operations across industries thanks to the fresh knowledge it produces.
It added that even more useful Kooha features include the ability to contribute images to the community section, rate shared photos based on “awards” from other users, map the locations of pinned photos, and unlock “badges” by completing specific “achievements.”
As a useful tool application, Kooha reflects the reality that science and the arts may collaborate effectively to produce meaningful results. In addition, the DOST- ASTI’s Quality Management System (QMS) was recertified in accordance with the ISO 9001:2015 standard.
Director of DOST-ASTI Franz A. de Leon stated that the ISO recertification demonstrates the DOST-ASTI’s dedication to continuously enhance its operations and assure successful service delivery – bringing science and technology closer to the people.
He added that their partners and stakeholders can be confident that the institute will constantly offer high-quality products and services because they adhere to the quality policy of developing relevant, timely, and impactful ICT- and electronics-based innovations.
The ISO certificate was the result of the DOST-ASTI management and staff’s collaborative efforts to expand its technologies and ensure the smooth execution of its mandate and functions. Reviewing and improving processes is critical to achieving the agency’s purpose of contributing to the achievement of national development priorities and the growth of Philippine firms through the provision of creative solutions centred on ICT and electronics technology.
This is DOST-ASTI’s second recertification since transitioning to the ISO 9001:2015 standard in 2018. Subject to regular surveillance assessments, the certificate is valid until November 2025.
Two tech companies operating within Hong Kong’s Smart Government Innovation Lab announced the roll-out of solutions that are now ready to be acquired by companies and institutions.
Solution I – AI Autonomous Disinfection Robot
The solution, called Bubble Fish, is a disinfection robot that can effectively purify the air and precisely eliminate the coronavirus as well as a variety of common epidemic bacteria. It is equipped with a precise radar for automatic navigation and obstacle avoidance, based on the construction and data communication.
Robots can connect through a phone application, realise the transparency of work data (this includes disinfection logs, machine states, etc.), database storage, and remote control the robot. With this system, users can manage and trace the current and previous disinfection work in a closed loop.
The solution was developed to be applied across the areas of City Management, Commerce and Industry, Development, Education, Employment and Labour, Environment, Housing, Recreation and Culture, Social Welfare as well as Transport.
The solution employs the latest in Artificial Intelligence (AI).
The disinfection robot can be set to schedule and after the disinfection tasks are finished, the robot will be returned to the charger automatically. In this way, disinfection tasks can be conducted when the user needs them and the robot can be operational for 24 hours. Employing the disinfection robot can reduce the costs of janitor head counts and a janitor can be shifted to other cleaning tasks. Thus, productivity, efficiency and cleanliness would be increased.
Solution II – Certificate Creation and Authentication Management System
The second solution is a Certificate Creation and Authentication Management System. The process of certificate-making and issuance consists of the following pain points:
- Certificate issued by the institution
Traditionally, when issuing certificates, it is necessary to first design the content. This includes the trademark and certificate, which is usually handed over to the designer. After the design is completed, it is handed over to the printing factory to set the quantity and generate inventory. More certificate types will generate more inventory. To print the inventory certificate, the applicant’s name, date, and certificate number must be entered. Then, this is sent to the applicant via mail or self-pickup.
This process results in the wastage of paper, film, time, and money. The process of third-party verification inquiry and certificate re-issuance also requires labour to ensure that the certificates of institutions and brands will not be plagiarised.
- Certificate applicant
For most courses, exams, and activities it is very unlikely the certificate will be received on the same day. For lost documents, an applicant will need to file for a reissue, and store all previous certificates.
- Third-party verification
If the authenticity of the certificate cannot be identified, it needs to be checked with the issuing authority, and the result cannot be known immediately.
Thus, aimed at addressing these three pain points, the company has developed a set of clear, convenient, and practical ideas. This innovative approach can make the three aspects more coordinated. The following are the key points of change in the eCertApp:
- Certificate Management System
This application streamlines issuance, verification, storage and sharing. Each certificate is independently coded, and the block certificate has a fast authentication function. It can also convert old paper certificates into smart certificates, systematically archive them, reduce workload, and change the global traditional paper certificate issuance and verification ecology.
- Certificate collector
The company’s certificate platform cooperates with mobile applications. Through this, users can apply for and receive certificates issued by multiple institutions, store them permanently, never lose the certificates, facilitate management, and share them with people who may be interested at any time.
- Third-party Verifier
A QR code is assigned for code scanning and NFC authentication for quick authentication. All certificate codes are unique, and it takes less than a second to check the authenticity of the certificate, the background of the organisation’s registration and contact information.
This two-dimensional code is a non-contact way of using quick response code, while two-dimensional code (QR Code) and NFC use “near field communication” tags and radio frequency technology to implant chips into products without damaging their appearance. The encryption program can read the authenticity of the product and transfer it to the product owner.
The solution was developed to be applied across the areas of City Management, Development, Education, Employment and Labour, Environment, Health, Infrastructure, Law, and Security as well as Recreation and Culture.
The solution employs the latest in Blockchain, Cloud Computing and Mobile Technologies.
The Platform has a wide range of uses. In addition to certificates, it can also be used for certification documents, recommendation letters, membership cards, certificates with expiration dates, including product repair and warranty certificates, product certificates, ownership transfers and the app will update users when an expiration date is reached.
The platform can set up and open multiple branches and administrators and can manage certificates for each branch worldwide. Moreover, all future and currently issued certificates and design templates can be managed through an at-a-glance dashboard.