Deep Analytics: Technologies for Humanity, AI & Security by Sumit Chakraborty, Suryashis Chakraborty, Kusumita - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

2. SYSTEM

System Analytics

Agents: System analysts, business analysts, Social scientists;

Moves : Requirements engineering, system design, coding, prototype testing, erection, installation, testing, commissioning

Emerging technologies: Innovate a set of emerging technologies based on social security. /* Refer to scope analytics, section 1 */

img116.png Social networking (secure access control, private encrypted message communication, private publishing of image, video, data streaming)

img116.png Social security :

    • Child security: Technologies related to sports and games
      • Indoor games (toys, caroms, ludos, table tennis, chess)
      • Outdoor games (football, cricket, hockey, volleyball, basketball, rugby, tennis, badminton, baseball, cycling, athletics)
      • Yoga and physical exercises (Tools used in gymnasiums and health fitness clubs)
      • Meditation
      • Social media , webmail, e-chat;
    • Women’s empowerment : social media;
    • Gender equality : social media;
    • Safety of senior citizen : mechatronics, mechanical, old age home;
    • Religious and cultural security : Broadcast communication of divine religious and cultural rituals and activities at temples, mosques, churches etc. using virtual reality technology;
    • Peace : Defense, CCTVs, Webcams, Drones for surveillance operation by police force, army, fire brigade and disaster management workforce;
    • Justice : AI and logic based automated legal system, case based reasoning, digital governance;
    • Partnership : strategic alliance, collaborative intelligence;
    • Job security : decent work, workplace safety, HR information system;
    • regulatory compliance through strong institutions : Regtech analytics

img116.png Poverty control of refugees and migrants /* Refer chapter 1*/

img116.png Safety against war, act of terrorism, crime, bioterrorism and natural disaster

/* Refer chapter 2.

img116.png Technologies for education and financial security

img116.png Healthcare, ageing population, higher public expectations : Health insurance system, retirement planning & pension system,

img116.png Technological transition, inequalities and discrimination, new risks, shocks and extreme events: Strategic risk analytics;

img116.png Employment of young workforce, labour markets and digital economy, protection of migrant workforce : Human resource management system;

 

Prof. Nelson, Prof. Ronaldinho and Dr. Parker are exploring the system associated with the innovation of emerging social security technologies. Social networking is an emerging technology; popular social networking sites have several billion monthly and daily users. It is an online platform which is used to build social networks or social relationships based on similar personal or career interests, activities, backgrounds or real-life connections. Social networking services may have various types of format and number of features such as digital photo and video sharing, posting comments and online blogging. The technology is accessible through various types of popular information and communication tools, desktops, laptops, tablets and smart phones.

Social engineering is the psychological manipulation of people into performing actions or divulging confidential information through various ways such as vishing, phishing, smishing, impersonation, water holing, baiting and quid pro quo. It is essential to develop information security culture. Employee behavior can have a big impact on information security in organizations. Cultural concepts can help different segments of the organization work effectively or work against effectiveness towards information security within an organization. It is an interesting agenda to explore the relationship between organizational culture and information security culture. It is possible to develop information security culture through pre- evaluation, strategic planning, operative planning, implementation and post- evaluation.