

System Analytics
Agents: System analysts, business analysts, Social scientists;
Moves : Requirements engineering, system design, coding, prototype testing, erection, installation, testing, commissioning
Emerging technologies: Innovate a set of emerging technologies based on social security. /* Refer to scope analytics, section 1 */
Social networking (secure access control, private encrypted message communication, private publishing of image, video, data streaming)
Social security :
Poverty control of refugees and migrants /* Refer chapter 1*/
Safety against war, act of terrorism, crime, bioterrorism and natural disaster
/* Refer chapter 2.
Technologies for education and financial security
Healthcare, ageing population, higher public expectations : Health insurance system, retirement planning & pension system,
Technological transition, inequalities and discrimination, new risks, shocks and extreme events: Strategic risk analytics;
Employment of young workforce, labour markets and digital economy, protection of migrant workforce : Human resource management system;
Prof. Nelson, Prof. Ronaldinho and Dr. Parker are exploring the system associated with the innovation of emerging social security technologies. Social networking is an emerging technology; popular social networking sites have several billion monthly and daily users. It is an online platform which is used to build social networks or social relationships based on similar personal or career interests, activities, backgrounds or real-life connections. Social networking services may have various types of format and number of features such as digital photo and video sharing, posting comments and online blogging. The technology is accessible through various types of popular information and communication tools, desktops, laptops, tablets and smart phones.
Social engineering is the psychological manipulation of people into performing actions or divulging confidential information through various ways such as vishing, phishing, smishing, impersonation, water holing, baiting and quid pro quo. It is essential to develop information security culture. Employee behavior can have a big impact on information security in organizations. Cultural concepts can help different segments of the organization work effectively or work against effectiveness towards information security within an organization. It is an interesting agenda to explore the relationship between organizational culture and information security culture. It is possible to develop information security culture through pre- evaluation, strategic planning, operative planning, implementation and post- evaluation.