http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/top.gif

Summer 2014 Issue 46

 

Special Focus |  Policy and Legislation |  e-Government |  e-Commerce |  e-Society |  e-Security |  ICT Development

 


Contact Us: unpan-ap@sass.org.cn

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/Special-Focus.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif GLOBAL: How E-commerce Is Taking Over the World

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: Government Reinforces ICT Modernisation Reforms

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif CANADA: 10 Security Concerns for the Public Cloud - Russinovich

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDONESIA: Mayor Reveals Plans for Highly Mobile and Open Smart City

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDIA: The e-Commerce Revolution

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: E-Government Key to Good Governance

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif PHILIPPINES: Government Reveals ICT Priorities: Health IT, White Space, Cloud

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif RUSSIA: Mulling a Digital Iron Curtain

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SINGAPORE: Education Minister Shares 4 Principles on ICT Use in Education

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: 7 Ways to Innovate Government IT

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/Policy_.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif EU Parliament Backs Data Protection Rules

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Dutch Govt Opens Consultation on Proposed Regulation

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Russia Mulls a Digital Iron Curtain

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif UK Set to Continue Its Filibuster of EU General Data Protection Regulation

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Ukraine Steps Up Information Security Policy

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif LATIN AMERICA: OECD Sees Deficiencies in Latest Telecom Bill in Mexico

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NORTH AMERICA: How Canada Plans to Fuel Its Economy with Data

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Canada: Digital Privacy Act Will Require Firms to Report Data Breaches

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Industry Minister Unveils Canada’s Digital Economy Strategy in Waterloo

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: House-Passed IT Reform Bill Expands Single CIO Mandate to DoD

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif House Passes Federal Data Center Efficiency Bill

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Netflix Wants to Expand Federal Rules on Internet Speeds

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Senate Passes Bill Demanding Uniform Coding for Agencies' Spending Data

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Lawmakers Want Pentagon to Clarify Cloud Security Standards

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif OMB Plans Digital Service to Improve IT Delivery

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Data Sovereignty Laws Hamper International Crime Investigations: AFP

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Regulates Online Advertising for User Security

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Beijing Mulls Big Data

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China to Establish National Base Station

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif JAPAN: National Cybersecurity Certification Planned

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: Court Rules Midnight Ban on Online Games Constitutional

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Mobile Carriers Face Tougher Public Notice Rules

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDONESIA: Mayor Reveals Plans for Highly Mobile and Open Smart City

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif MALAYSIA: Government Prioritises E-Government, E-Learning and Healthcare IT in 2020 Vision

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif PHILIPPINES: Agency CIO Updates on Anti-Corruption Financial Management Information System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif City in the Philippines Prioritises IT Investment for Citizen Services, Government Efficiency & Revenue Generation

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif The Philippine Government Reveals ICT Priorities: Health IT, White Space, Cloud

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SINGAPORE: Government Enhances WiFi Network and Will Double Hotspots by 2015

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Government Sets Up Digital Inclusion Fund as It Prepares to Be a Smart Nation

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Education Minister Shares 4 Principles on ICT Use in Education

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Programme to Train Data Protection Officers

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDIA: Government Plan to Connect Rural India with Bharat Broadband by End-2013 Moves Beyond Deadlines

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif India's IT Act Is 'Ill-suited' to Deal with Social Media: Global Network Initiative

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Indian IT Laws Unfit for Social Media

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AZERBAIJAN: Developing Rules for Electronic Recording of Employment Contracts

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan to Create Electronic Fund for State Standards

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif KAZAKHSTAN: Communication and Information Agency Created

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: ACCC Releases Safety Guide for Online Business

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australia’s Digital Privacy Laws ‘Lag Other Countries’

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Ludlam’s Return Signals Strong Green IT Policy

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australia Government Urges Digital-By-Default, Cloud-First & Big Data Strategies

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australian Government Reinforces ICT Modernisation Reforms

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australia Plans Whole-of-Government Open Source Cloud-Based Content Management System

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Government.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ARABIAN STATES: The United Arab Emirates - A Rising Star in E-Government

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif EUROPE: Italian Unions Urge PM to Accelerate Broadband Deployment

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NORTH AMERICA: Canada - Ontario Fails at Its Own Open Government Strategy Once Again

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Facebook Releases Government Data Request Stats

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Athabasca University’s CIO Explains Why IT Governance Is a Must-do

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: Government Transparency Means All-ish Data All the Time

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif 7 Ways to Innovate Government IT

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif White House Seeks Feedback on Big Data and Privacy

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Industry Perspective - Open Data Is a Civil Right

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S. Government to Give Up Key Internet Powers

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Big Data, Big Challenges

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Apps Make Government Wallets Transparent

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif What Government Can Do to Attract Top IT Talent

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif 7 Things to Know About the White House Big Data Report

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Tracking Corrupt Politicians Gets Easier with New Data Platform

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif White House Directives Emphasize IT Effectiveness

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Innovative Technologies to Help County Governments Improve Service Delivery

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif CHINA: Government Microblogs Highlight Interaction with Public

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Official Micro Blogs Remain Active

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif JAPAN: Govt to Standardize Farm-Related IT Data

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Japan Establishes Cyber Defence Unit

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: Telecom Ministry Urges Adoption of Smartphone Anti-Theft Feature

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Lim Jae-Hong: E-Government Key to Good Governance

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Govt to Develop Long-Range Ship Identification System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif South Korea Train 14 Nigerian Public Officers on E-Government

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDONESIA: Promoting Government Transparency with Social Media

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Indonesia Capital City Government and Google to Monitor Civil Servants’ Performance

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif PHILIPPINES: To Spend 13.38 Mln USD for Anti-Corruption IT System 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Philippine Government Gives Donor Agencies Access to Transparency Portal’s Content Management System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif The Philippines Government Promotes Open Government with National Citizen Engagement Portal

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SINGAPORE: Police to Improve Engagement on Facebook

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore and Oman Agree to Deliver Innovative E-Government Services for Labour Market

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif THAILAND: City Mayor Reveals How Facebook Is Used for Crisis Communications and Flood Management

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif How India's E-Government Plans to Support 22 Official Languages

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif E-governance: 1.3 Lakh Fake Pensioners Weeded Out in State

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif From e-Governance to m-Governance: The Way Forward

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Big Data from IoT May Pose Challenges for Data Centers

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif E-Governance Projects to Be Speeded Up in Government Departments

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Leap in UP in E-Governance: Driving Licenses Will Be Provided Through Online Applications

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan and Afghanistan Discuss E-Government Formation Cooperation

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif E-Documents in Azerbaijan Can Now Be Signed Online

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijani Servicemen to Hold Discussions with German IT Experts

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: 4 Lessons from Mobile Government and Open Data Project

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Comms Dept to Shed Up to 25 Percent of Workforce

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Budget Cuts Will Force Government IT Staff Rethink on Role

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NEW ZEALAND: Website for Justice Data Launched

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Zealand Government Opens Up Geographic Data Online

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Zealand Government to Modernise Unified Portal with Faster Online Access and Responsive Design

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Zealand Reinforces Open Government Roadmap

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Commerce.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NORTH AMERICA: Canadian Mobile App Industry Continues to Grow - Study

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Half of Canadian Businesses Lacking in Mobile Apps, Survey Finds

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Windows XP: The Final Shutdown

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Canadian Businesses Ahead in Mobile, Accenture Study Finds

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: Google, Facebook, Amazon Warn FCC Rules Pose 'Grave Threat to the Internet

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Open Data: Embracing 21st Century Economic Development in California

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Bitcoin Website Exchange Offline

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Digital Music Market to Grow $9 Billion Worldwide This Year

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Global Mobile Wallet Market: Reports and Intelligence

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif How E-commerce Is Taking Over the World

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif How Reputations Are Won and Lost in Modern Information Markets

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Frost & Sullivan Study: Mobile Collaborative Market in Asia-Pacific to Grow

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif CHINA: Internet Group Buying Service Ends

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Over 80% of Chinese Families Shopped Online Last Year

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Lenovo Succumbs to Patent Troll in USD100 Million Deal

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif JD.com Signs Chinese Retail Store Deals for O2O Development

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif JD.com Jumps into Chinese Virtual Communications Sector

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Survey: Chinese Lead in Online Shopping

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Baidu Launches Mobile Payment Platform

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Tencent Breaks Off Online Literature Service into Independent Business Unit

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Baidu Officially Opens Big Data Engine

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Best Days Ahead for China's Internet Firms

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China's First Mobile Virtual Operator Launches Business

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Aliyun's Beijing Cloud Computing Data Center Opens for Business

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Chinese E-Commerce Giant Provides Subsidies for Exporters

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Mobile to Offer Cheaper 4G Network Service

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Mobile Internet Business Booming in China

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif JAPAN: E-Commerce Giant Rakuten Halts Whale Meat Sales

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Online Retailers Looking for a Change in the Sales Tax System Before They Raise White Flag

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: Int'l Trade Association to Support Service Sector Growth in 2014

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ICT Ministry Under Audit for Alleged Business Favors to Google: Sources

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif S. Korea's Smartphone Sales Promising from Global Boom: Analysts

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif S. Korea's ICT Exports Rise 8.9 Pct in March

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif S. Korea Fifth Largest Supplier of High-Tech Goods to U.S.: Report

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif South Korea’s ACRC Partners with IBM on Cloud-Based Mainframe

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif South Korea’s Online PC Game Market Is Growing — But Dislodging Its Biggest Players Is Impossible

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDONESIA: Telcos, Lenders Urged to Strengthen E-Banking Services

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif PHILIPPINES: Government and IBM Launches Disaster Management Operations Centre

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Google and Singapore Government to Grow Analytics Talent

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Government Improves Ease of Doing Business with Revamped Web Site

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif VIETNAM: Mobile Phone Exports on the Rise

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Bandwidth Revoked from Telcos

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Vietnam Government and Microsoft to Collaborate on Cloud

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Online Banking Services in Vietnam Remain Safe: Central Bank

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Electronics Sector in Need of Support

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Programme Aims to Create E-Commerce Payment System

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Report: Indian E-Commerce to Become $8 Billion Industry

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif E-commerce in India to Touch $60 Billion by 2023

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif eTailing India Announces First e-Commerce Industry Awards

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Consulting Loses to E-Commerce at B-schools

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Flipkart: India e-Commerce Could Hit $70B by 2020

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Introducing Our New E-Mail Newsletter, 'E-Commerce Insider'

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif India’s e-Commerce Revolution

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Semantics and Definitions; Klevu Turns E-commerce Search Fields Smarter

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Gap and Myntra May Partner for E-Commerce Biz in India

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Indian Govt Rejects Sports Retailer Decathlon’s Proposal to Sell Goods Online

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Online Retail Swells to $12.6 bn, with One Million Traders

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Indian e-Commerce Boom Produces Acceptable Casualties

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif PE, VC Investors Warm Up to Indian e-Commerce

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif The e-Commerce Revolution

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif eBay Aims to Create the World's Largest Trader Base in India

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SRI LANKA: Mulling Japanese E-Commerce Giant for First Trials

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AZERBAIJAN: Investment Volume by Mobile Operator in Country’s ICT Announced

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan’s E-Commerce Market Grows by over a Third

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan's Largest Bank Introduces Online Loan Payment Service

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijani Ministry Obliges Mobile Operators to Solve Traffic Exchange Problem

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Another Favorable Offer from Azercell for Mobile E-Signature Users

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: Mobile Wallets to Overtake Physical Wallets by 2021 - CBA

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Mobile Broadband Boosts Economy by Billions: ACMA

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australian Businesses Reach for the Clouds to Improve Efficiency

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NEW ZEALAND: Mobile Phone Plans Rate Well Across OECD Countries

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NZ Businesses Paying Bills in Record Time

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Society.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif EUROPE: Netherlands Creates National Response Network

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NORTH AMERICA: Canada - How Stephen Harper’s Use of Social Media Blurs the Lines, Online

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: The Intelligence Community's Big-data Problem

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Los Angeles Wants High-Speed Internet for Everyone in City

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif White House Website Helps Veterans Find Jobs

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Using Technoloy to Transform the Health Care Industry

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif The Role of ICT in Building Smart Cities – Infrastructure

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Concise Analysis of the International ICT Market in the Education Sector

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Smart Homes in Asia-Pacific--A CEO's 360-Degree Perspective

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Achieving Improved Energy Efficiency with Green Data Centres

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Action Needed to Protect Telco Infrastructure from Climate Change

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Asia Dominates Wi-Fi Hotspots, ABI Says

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif CHINA: Cell Phone Users Boost Mobile Internet Traffic

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China's Mobile Internet Consumption to Surge

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Social Media Messaging Causes China Mobile's First Annual Profit Drop

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ChinaNetCenter Net Profit Up 129% in 2013

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Focus: Guizhou Emerges as China's Big Data Center

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Chinese Government Will Invest CNY20 Billion to Promote IPv6

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif JAPAN: Govt. to Screen Online Babysitting Services

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Japan Schools Look to Teach Online Morals, Safety

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: Customs Service to Establish Combined Info System on Travel Records

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Mobile Banking Users Top 50 Mln

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Medical Insurance Info Goes Online

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDONESIA: Capital City Prioritises Big Data and Open Government for Public Safety and Transport

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Indonesia, Australia Government & World Bank Release New Disaster Mapping Software

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif PHILIPPINES: Government to Use Sensors for Disaster Early-Warning

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SINGAPORE: Health Centre Recognised for Paperless Medical Records System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Police Emergency Call Centre Is Twitter-Enabled

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif How Singapore Government Is Using Data Analytics to Improve Social Services

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Infocomm Development Authority Helps Elderly Pick Up E-Health Tools

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Police to Launch Geo-Tagged Emergency Notification System on Mobile App

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Tertiary Students Participate in Social Innovation with Interactive Portals and Mobile Apps

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Tertiary Institution Partners Industry to Enhance Digital Learning

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Government Invests US$54mil in Intelligent Bus Management System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Government Uses Big Data Analytics to Optimise Transport Management

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif THAILAND: City Mayor Reveals How Facebook & Technology Help in Flood Management

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Thailand Government Consolidates Mobile Services with New App Centre

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Thailand Government Launches Mobile App to Enhance Road Safety

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Thailand Smart Country Project Brings Efficient E-Services to Citizens and Civil Servants

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDIA: E-access to Four Wakf Board Certificates

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Innovative Fully Integrated Cloud Based e-Health Centre Launched in Hyderabad

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif India’s First e-Kisaan Tablet for Farmers Launched

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif National Launch of Post Office Savings Bank ATM and Core Banking-postal Life Insurance

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Biocon Launches e-Healthcare Programme in Odisha

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif E-Aadhaar to Be Used as Proof

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Reliance Jio to Use Viom Towers for 4G Services

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Going Digital

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AZERBAIJAN: Mobile Operator Nar Mobile to Create Internship Platform for Students

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Growth of Cloud Technology Usage Recorded in Azerbaijan

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Bakcell Launches SMS Notification Tool for Emergency Situations

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan Expands List of E-Service Types

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Mobile Operator Prepares to Launch Cable Television in Azerbaijan

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Baku Enhances Parking Control System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif E-Signature Tariffs Decrease in Azerbaijan

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif UZBEKISTAN: Mobile Operators Can Switch to Eight Digit Numbers

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Uzbekistan Increases Requirements for Internet Providers and Internet Cafes

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: Government Urges Transparency in Citizen Data Privacy Handling

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australian Government Mobile Service Centres to Help Drought-Hit Farmers

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australian Health Department Upgrades Online Application System for Over-the-Counter Medicine

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Australia Government Launches E-Learning Programme to Support Mental Health of Veterans

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ICT Skills Shortage, What Shortage?

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ‘Digital Revolution’ Driving Rise in ICT Jobs Demand

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Slipping Australian Education Under Threat from Reduced ICT Spending

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NEW ZEALAND: Statistics Launches 2013 Census Maps

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Zealand Health IT System Upgrades Search for Quicker Patient Data Access

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Online Service to Identify Blocked Phones Launched

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ICT Candidate Market Dries Up as Professionals Seek Lucrative Contracts

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Security.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif EUROPE: U.K. - Government Launches Cyber Security Certification for Businesses

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NORTH AMERICA: Canada - 10 Security Concerns for the Public Cloud - Russinovich

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Canadians Confident, Concerned About Cyber Attacks: Study

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Malware from Spying on Governments Now Used in Cybercrime, Sophos Says 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Canada's Electronic Spy Agency Uncovers Wrongdoing, Ethics Breaches

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Majority of Cyber Attacks Coming from Legitimate Sites - Report

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: Cybersecurity Gets a Boost from the National Guard

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Survey - IT Pros Not Concerned About NSA Spying

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif RSA 2014 - Can the Government Earn Back the Public’s Trust in the Cyberfight?

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Snowden - Proposed NSA Reforms Vindicate My Data Leaks

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Big Data Google-style Comes Under Attack

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Pentagon Chief Says US Cyberspace Force to Expand Further

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Pentagon to Triple Cyber Staff to Thwart Attacks

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Cyberattacks: Too Much How, Not Enough Why

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif DHS Prepares Overhaul of Internal Security Operations

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Data Protection in Internet of Things Era

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif The U.S. Government: Paying to Undermine Internet Security, Not to Fix It

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Improving IT Security by Implementing Better Governance

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif National Day of Civic Hacking Widens Reach in Second Year

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Defense Authorization Bill Boosts Cybersecurity

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Medical Informatics World Conference Debuts New Track on Information Security and Privacy

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif What Heartbleed Teaches Governments About Cybersecurity

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Exclusive: PBOC Highlights Virtual Payment Risks

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Military to Tighten Cyberspace Security

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Overseas Attacks on Chinese Cyberspace Rising

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Tech Entrepreneur Lands Internet Privacy Startup in Hong Kong

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Vows Joint Efforts on Securing Cyberspace

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Hacking into Computers Drops as Nation Beefs Up Protection

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Alibaba Throws Money at Internet Privacy

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Drop Cold War Mentality on China's Cyber Security

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Beijing's Public Security Bureau Forms Internet Security Alliance

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Japan, Lithuania to Share Cyberattack Info

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Japan Holds First Broad Cybersecurity Drill, Frets Over Olympics Risks

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SDF Cyberdefense to Use ‘Decoy’ Sensors

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Recent Online Exposures Reveal Lack of Awareness of Terrorism Risk

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Gov't Looks to Mobilize SDF to Defend Nuclear Plants from Cyber-Attacks

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif EU, Japan to Start Cyber-Security Dialogue

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Fujitsu Cuts Response Time to Cyberattacks by 97%

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Japanese-Israel Defense Accords Cover Cyber Security Cooperation Against China, North Korea and Iran

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Ruling Parties to Establish Cybersecurity Headquarters

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Japan Govt Prepares to Deal with Issue of Cybersecurity

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: Telecom Ministry to Crack Down on Pirate Phones

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif S. Korea, U.S. Agree to Expand Joint R&D into Cyber Security, Disaster Management

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SINGAPORE: Government Tightened Mobile Prepaid SIM Cards Regulation to Prevent Criminal Use

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Government to Get Cyber Security Lab by NEC and Sypris

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Singapore Government Focuses on Big Data, Open Data, Cloud & Security

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif VIETNAM: Government and Microsoft Sign Cybersecurity Deals

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif VN Faces High Risk of Cyber Attacks

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDIA: Cyber Criminals Using Malware That Act as Sleeper Cells

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AZERBAIJAN: Preparing for Major Protection of Aznet Network

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Users of Azerbaijani State-Owned ISP Suffer Hacker Attack

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Security of Websites Satisfactory in Azerbaijan

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan’s Telecommunication Infrastructure to Be Thoroughly Checked

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan Develops Encryption Software for Protecting E-Documents

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif KAZAKHSTAN: State Security Service Created

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: Government Launches National Ballistics System for Police to Target Firearm Crime

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NEW ZEALAND: Cyber Security Tsars Lay Down Rules for Network Operators

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Some Facts About Net Neutrality

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/ICT_.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif EUROPE: Spain Pledges EUR 98 Mln to ICT Development

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NORTH AMERICA: IT in Canada’s Post-secondary System Key to Economic Impact

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif U.S.: How IT Jobs Have Changed in 15 Years

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif San Francisco Is the Best City for Open Data

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif 4 Key Trends That Every CIO Should Watch

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif FCC Seeks $13.5 Million for IT Modernization

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Industry Perspective - Keeping IT (Procurement) Simple

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif IT Testing for 2020 Count Running Behind

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Pentagon Looks to Build a Bridge Between Military, Intelligence IT Consolidation Efforts

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Senate Appropriators Signal Support for IT Reform

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif The World Wide Web Turns 25 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Global Network Builders Emerge

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Global m-Education Market 2014-2018: Advancements in ICT Have Resulted in the Emergence of Virtual Classrooms

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Research and Markets: Global Telecom and ICT Augmented Reality Subscription

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif OneAsia First in Asia to Deploy Software-Defined Networking Solution in Data Centre

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif China Now Has Over 250,000 4G Base Stations

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Big Data Reveals Trend of Chinese Auto Market

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SOUTH KOREA: Gov't to Invest 4.9 Tln Won in ICT in 2014

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Technical Competency of S. Korean SMEs Lags World's Best: Poll

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Telecom Ministry to Allocate 2.5ghz Spectrum in Second Half

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Gov't to Inject 50 Bln Won into loT Industry

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif KT to Invest 4.5 Tln Won to Tap 'Giga Internet'

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Nigeria, North Korea Sign Co-operation Agreement on ICT, Education

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDONESIA: Deploys Advanced Disaster Monitoring System

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif How Big Data and GIS Will Plan a Livable Singapore

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif BANGLADESH: Internet for Empowerment

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif WB Funded ICT Project to Create Huge Employment

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif IT Outsourcing – Emerging Forex Earner

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif BD Could Be Mighty Player in Global IT: Mozena

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Govt Picks 160 Youngsters in 1st Batch to Develop as IT Leaders

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif INDIA: Government IT Spending to Reach $6.4 Bn

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Internet of Things to Accelerate Supply Chains

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SRI LANKA: IT/BPM Achievements Shortlisted for Global Outsourcing Award

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AZERBAIJAN: ICT Sector’s Revenues Rise by over 11%

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan to Invest About $ 4 Billion in ICT Sector

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan to Attract Consultant to Assess Prospects for ICT Development

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif ICT Sector Share in Azerbaijan's GDP to Reach 9% by 2020

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif Azerbaijan, Japan Sign Intergovernmental Agreement on Cooperation in ICT

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif UZBEKISTAN: Mobile Communication Penetration Level Exceeds 64 Percent

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif AUSTRALIA: IT Industry Facing a ‘Digital Leadership Vacuum’

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif SMEs to Be Part of Australia’s Cloud Revolution: Turnbull

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif NEW ZEALAND: Hi-Tech Awards Finalists Show Wellington Is the High Tech Capital

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/dot.gif New Zealand’s Largest City Drives Open Data Release to Host First Civic Hackathon

 

 

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/Special-Focus.gif

 

 

 

 

GLOBAL: How E-commerce Is Taking Over the World

 

The internet has been responsible for changing the way we go about many of the tasks in our day-to-day lives. Not least it has changed the way we shop. Customer experience specialist Baynote has released a new infographic map showing the growth of e-commerce across the world. Interesting highlights include the fact that in the US e-commerce is growing at four times the rate of retail and in China it grew by 51 percent in 2013. India's e-commerce market is expected to increase from $13 billion in 2013 to between $50 and $70 billion by 2020.

 

The graphic also highlights the hotspot cities that play host to major players in the e-commerce world. Seattle, home of Amazon, for example accounts for more that $61 billion in online sales. However, this is dwarfed by Hangzhou in China, home to the Alibaba site which manages more transactions than Amazon and eBay combined. Another interesting trend is that 60 percent of E-commerce shoppers now use social network sites and tools in order to interact with brands showing that our online lives aren't neatly pigeon-holed. Click on the image below to view the full size map and see how e-commerce is spreading across the globe.

From http://betanews.com/ 04/18/2014

TOP↑

 

 

AUSTRALIA: Government Reinforces ICT Modernisation Reforms

 

The Australian Government has weighed in with full support for key technology platforms driving the business of government. These include a broader adoption of cloud computing, big data, and digital platforms through to 2017. The administration’s just-released Report of the National Commission of Audit May 2014 canvasses a digital cloud first approach to whole-of-government IT procurement. Among the recommendations, this report, delivered by an influential National Commission of Audit, requires agencies to be proactive about digital and cloud-first operations. With a focus on cost-savings, and large-scale cut-backs in Canberra, the commission acknowledge the role of technology to deliver wide-spread savings, while reducing duplication, and streamlining services.

 

Cloud-first policy

Despite the rhetoric of cloud adoption, the commission notes the Commonwealth remains slow to adopt cloud computing. “A reliance on bespoke, legacy systems, concerns about security and privacy of placing public data in the cloud, and general risk-aversion all impede progress.” Drawing on the banking sector, the commission notes a “cloud-first” policy can initially target low-risk, generic ICT services. Over three to five years, this may progressively reduce ICT costs, as cloud computing becomes a “default option.” The commission proposes the Department of Finance establish a whole-of-government cloud computing provider panel. This panel is designed to confirm the viability, capability, and costs of using large-scale cloud computing providers. The focus is ensuring that access to cloud service providers remains competitive, viable, and offers appropriate levels of security.

 

Big data

The Commonwealth holds large amounts of data. But this information is not being used to its best effect. “Some agencies collect data in the natural course of their operations and tend to focus more on collection, rather than analysis and wider use. The government’s massive data repository is often rarely connected, has duplicates, varies in quality, and is not supported by consistent standards. “The value of data holding to the whole-of-government is rarely articulated.” Moreover, there is little, or no effort to fully examine data holdings, or assess the value of existing data. Agencies can prepare plans that make better use of data, and source innovation from outside government. The government’s Data.Gov portal holds just 3,164 datasets. This compares with 10,000 datasets in the UK, and around 200,000 datasets in the US. Despite this showpiece, there is insufficient access to public data, including disability, aged care, job seekers, and the socially-disadvantaged.

 

The Australian Public Service needs to improve its capacity for data analytics. This involves analysing large datasets, in real-time, and being able to share insights, identify anomalies, and allocate resources, as and where needed. With a renewed focus on big data, planners need to identify and prioritise projects, spanning key service delivery bodies. These include the Department of Human Services, Australian Taxation Office, and the Department of Immigration and Border Protection.

 

Digital by-default

Like the UK, the Australian government may support a “digital strategy by default.” This strategy can be supported, more aggressively, under the auspices of the Department of Human Services’ MyGov on-line offering. This portal offers access to information from Medicare, Centrelink, child support, health, veterans’ allowances, and disability insurance. But boosting access to digital services involves a more “ambitious strategy.” The administration plans to ensure that every interaction, occurring more than 50,000 times a year, will be done on-line by 2017. Government correspondence is also expected to be available digitally, over the next four years. Australia’s slow uptake of “digital government” is attributed to fragmented arrangements involving multiple agencies, and a policy disconnect. The commission proposes that core expertise be consolidated, under a single team. This can be led by a chief digital officer, a role more likely filled by a private sector leader, with the nous to deliver digital transformation programmes.

From http://www.futuregov.asia 05/02/2014

TOP↑

 

 

CANADA: 10 Security Concerns for the Public Cloud - Russinovich

 

SAN FRANCISCO – It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a lot of questions around the public cloud – ones that not everyone is asking. For Mark Russinovich, technical fellow of Microsoft Corp.’s Windows Azure cloud platform group, the public cloud has helped businesses grow, but there are still many concerns for data security and privacy. He pulled together a list of 10 different concerns that security professionals should consider when putting their organizations’ data into the public cloud. “We’ve coined a name for this – ‘cloud critical’ bugs,” said Russinovich, speaking from a session at the RSA conference in San Francisco on Thursday. “The cloud is at a much higher risk of exploitation, because there’s a lot of diverse data from businesses and industries.”

 

Here’s a roundup counting down 10 concerns he has with the public cloud.

10. Shared technology vulnerabilities

For Russinovich, one of the difficulties of the public cloud is that everyone using it has shared technology vulnerabilities. If a breach of the cloud were to happen, that would look bad for every cloud vendor. “We’d be notifying people, cleaning up, and bringing things back online,” he said. “But to customers, it’d be a big public cloud fail.” For one thing, there’s no firewall attached to the public cloud, and there’s a huge variety of data in the public cloud up for grabs, if hackers were to gain access to it. Luckily, however, the public cloud is better at responding to threats, since most businesses recognize how risky it would be to fail to defend it. Businesses need to be aware they can’t wait for patches if they know about a vulnerability – instead, they need to automate software deployment, ensure they have strong detection tools for breaches, and be determined to preserve their customers’ trust.

 

9. Insufficient due diligence

There’s a lot of talk nowadays about shadow IT, where employees come up with their own IT solutions and bring them to work. One of the most popular of these is the cloud. Russinovich said he’d even like to coin a phrase for it – like the bring-your-own-device trend, or BYOD, he’d name it BYOIT – bring-your-own-IT. What IT departments need to do is to help their organizations’ employees with implementing the cloud and ensure they’re complying with security best practices, he added.

 

8. Abuse of cloud services

While having a public cloud can be helpful, businesses run the risk of attackers taking it over and using it as a malware platform, or becoming botmasters taking advantage of trusted IP addresses. The public cloud can also be used as storage for illegal content, like copyrighted content being stored through Pirate Bay, or inappropriate content like pornography, Russinovich added. And increasingly, security professionals might see people using the public cloud to mine Bitcoin.

 

7. Malicious insiders

When hiring employees who will be able to access data within the organization, there’s always the danger they may walk away with sensitive data, Russinovich said. He put up a picture of former National Security Agency contractor Edward Snowden on his presentation slide. “It’s a real risk, better understood by third-party audits,” he said. Ways to mitigate this risk include doing employee background checks, as well as security controls on what data each employee can access.

 

6. Denial of service (DOS)

Whether this happens through an attack – like a distributed denial of service (DDoS), or through an outage, customers don’t really care, Russinovich said. What they do care about is whether cloud providers are responsible. For example, in August 2011, a lightning storm brought down the clouds for Amazon and Microsoft in Dublin, Ireland. While that was an equipment failure, neither Amazon and Microsoft should have let that happen, Russinovich said. That’s why it’s important for cloud providers to mitigate the chance of DOS by ensuring non-public applications are isolated from the Internet, and by setting up location-specific clouds. That way, if one cloud goes down, another can take over, he added.

 

5. Insecure interfaces and application programming interfaces (APIs)

As the public cloud is still so new, a lot of APIs will crop up – and not all of them are particularly secure. Organizations need to ensure their APIs use strong cryptography, for example, Russinovich said.

 

4. Account hijacking and service traffic hijacking

It’s been said time and time again, but organizations need to ensure their employees’ accounts are using strong passwords. While it’s not a problem unique to the public cloud, there’s a lot of data at stake, Russinovich said. He added IT administrators need to turn off any unused endpoints, and that they need to ensure their employees are trained to avoid opening strange attachments or clicking on suspicious links.

 

3. Data loss

Whether this happens because someone accidentally deletes or modifies data so it can’t be accessed, or if an attacker steals it or uses ransomware to encrypt it until he or she is sent a sum of money, this is definitely a problem for the public cloud, Russinovich said. And of course, there’s always the chance an organization could lose data through a natural disaster – for example, a flood or hurricane destroying its servers. Russinovich says companies should mitigate this danger by setting up backups, as well as geo-redundant storage. There’s also the practice of deleted resource tombstoning – by ensuring it’s possible to recover deleted data by removing a tombstone, organizations can return data to their customers. “This is something we’ve learned through painful lessons,” Russinovich said.

 

2. Data breaches

While this appears to be a very general heading, Russinovich said it’s an important one. “Data is at the heart of the matter. The data is the company. If there’s no data, there’s no company,” he said. “It’s the most important asset, so there’s the highest risk of loss.” For example, if an attacker gains access to data’s physical media – for example, a disc holding the data – that’s a problem. A fix might be to encrypt that data and to set up extensive physical controls, like a strict rule not to allow any employees to take data out of a data centre. Or, an organization might make a rule saying any discs that are no longer used should be crushed by a disc-destroying machine. At Microsoft Azure, no data is allowed to leave the building, and the company also uses third-party certifications like FedRamp to ensure its employees are handling the data properly.

 

4. Self-awareness

In giving his presentation at the RSA conference, Russinovich asked the audience whether they could hazard a guess to his final concern on the public cloud. No one could, but he said as the public cloud grows more and more sophisticated, the data in that cloud may take over and we may stop focusing on what we need to do to secure it. “This is new technology. We’re learning as we go,” he said.

From http://www.itbusiness.ca/ 02/27/2014

TOP↑

 

 

INDONESIA: Mayor Reveals Plans for Highly Mobile and Open Smart City

 

In an exclusive interview with FutureGov, Danny Pomanto, Mayor of Makassar, Indonesia’s sixth most populous city with 1.5 million residents, described his plans for a highly mobile and connected smart city. Mobility and open data form the foundation of Pomanto’s plan for this city. “Mobile applications will provide real-time data that helps residents plan their day and improve ease of communicating and transacting with businesses and government agencies.” He described how he envisions the future Makassar City to be: “Using my mobile phone, I can check road and traffic conditions so I can plan the best route to my desired destination. An application shows me real-time availability of parking lots nearby. If I need to pay taxes, I can do it anywhere through mobile banking.” Makassar City has the highest economic growth rate of 9.88 per cent, compared to the national average of 6.1 per cent. According to statistics from Telcos, Makassa’s internet penetration rate is higher than that of Jakarta, and is the second highest in Indonesia, after Palembang.

 

To prepare city residents for mobile and online services, Pomanto is working on setting up free wifi in public spaces. During his campaign for mayorship, he was known as ‘Son of Makassar Alley’, because one of his priorities is to ensure the inclusion of commoners living in the alleys. And part of this goal includes providing digital accessibility to these people. “I want everyone to have access to internet, even people who live in the alleys,” he added. More surveillance cameras will be put up around the city to improve safety and traffic management. “We now have CCTV cameras set up at five corridors. This will increase to 100 corridors in the near future.” Pomanto will also be leveraging ICT to transform how the city government of 18,000 employees will be managed. He was inspired after seeing ‘Flightradar24’, a flight tracker providing real-time information about thousands of aircraft around the world. “If we can use technology to provide oversight on our employees, tracking our activities and operation, I am certain we can improve our efficiency and solve more problems,” he said. The City will soon launch e-payment systems that enable businesses to easily pay all types of taxes and fees. Pomanto expects the roll-out to increase tax revenue by 200

From http://www.futuregov.asia/ 04/03/2014

TOP↑

 

 

 

INDIA: The e-Commerce Revolution

 

One of the things that really separate us as humans from the high primates is that we’re great tool builders and we learn and execute fast, hence are acknowledged as the crown of creation. We have seen this happening for long that we don’t settle but keep improving and innovating for convenience. There has always been a strong wave of revolution in existing models to try and make them better for our convenience. Take for example e-commerce, when it started in India a lot of us were skeptical about the concept due to various reasons like internet, devices and shopping online. But few strong visionaries have changed our buying habits and most of us by now would have experienced shopping online. India’s e-commerce business jumped by more than 80 per cent in 2013 and the momentum is likely to continue for at least the next five-six years. Catching the trends early experts who were running big retail businesses as specialty stores now have e-stores and have started competing with the big players in the e-commerce race.

 

By June 2014, India will have 243 million internet users, at which point of time, it is expected to overtake the US as the second largest internet base in the world, the I-Cube 2013 report, released by the internet and mobile association of India (IAMAI) and IMRB International said. At present, China leads with more than 300 million internet users while the US has an estimated 207 million internet users. All of this is great and will surly take e-commerce business to heights beyond imagination. But here is the catch, smartphone penetration and growing internet penetration on mobile in India is touching unexpected heights YoY. Now since the consumer is on mobile and trained, his demands and expectations have increased. Today, consumers want to know the best of products, offers and services in and around their location right now and not wait for something to be delivered after 24 hours (best case). Big players like Google, Facebook and others are moving their attention to mobile and location is a testimony around this and makes it a global movement and the next big revolution to what out for in near future.

 

There is a common saying about the Indian retail consumers’ mentality, “can’t touch, won’t buy”. In L-commerce the experience is totally magical, for instance you saw a t-shirt, which you wanted in your vicinity, you could immediately visit there and check for great discount and get a guarantee of return and refund. Nothing can replace this experience. In an environment that is getting better every year we would witness the big location-based commerce (l-commerce) revolution soon and local merchants will start competing with the big brands in e-commerce. L-commerce refers to the localisation of products and services through mobile commerce and context aware computing technologies. L-commerce revolves around five key service areas: Location: determining the basic position of a person or a thing; Navigation: plotting a route from one location to another; Tracking: monitoring the movement of a person or a thing; Mapping: creating maps of specific geographical locations; Timing: Determining the precise time at a specific location.

 

E-commerce is publishing best products with great offers and is a one way communication, but l-commerce is a personal two way communication and the merchant would treat you with velvet gloves to ensure he gets a long-term customer. L-commerce has, in a way, revolutionised the industry, benefitting both — the consumers and merchants. With the entry of e-tailing, malls, supermarkets and grocery stores have seen a decline in the number of annual footfalls. This has drastically affected the revenues of these stores as they mostly have only physical presence. The larger players are a huge threat to these smaller players. With the five key service areas of l-commerce, it is proving to be a great platform that will help in the revival of this number. The location aware technology is proving a be an innovatory technology by providing real-time offers and deals that consumers can avail of in a vicinity closest to them. By using location aware technology, user’s location can be identified to provide the most relevant offers and deals in a category the user is looking for. The categories can range from apparel, entertainment, mobile devises to food, health and beauty.

 

Another added advantage of this revolution is that it has caught the attention of the unorganised markets as well. Local stores have seen the potential business it can bring if they publish their offers and deals online. This technology is undoubtedly helping merchants to promote their offers and discounts to drive consumers in their stores, which otherwise went undiscovered. In the early days, it was only the organised market that was getting accounted for. But with l-commerce and location aware technology, the unorganised market is also being recognised and will soon have a revenue number being put on this market.

From http://www.mydigitalfc.com/ 04/14/2014

TOP↑

 

 

SOUTH KOREA: E-Government Key to Good Governance

 

With Korea’s advanced information technology, its know-how in e-government services could provide a key tool for developing countries to help achieve good governance and effective public administration, the head of the U.N. Project Office on Governance said.  “E-government is one of the best paths to good governance that the humans have found so far, playing a key role in achieving a wide array of domestic and global policy objectives,” UNPOG director Lim Jae-hong said in a recent interview with The Korea Herald.  The organization was set up in 2006 as a subsidiary of the U.N. Department of Economic and Social Affairs with the principal aim of assisting member states to improve their governance capacity for 10 years. Its work is financed by an annual $1 million trust fund run by Seoul’s Ministry of Security and Public Administration.  In recent years, the idea of e-governance has emerged across the UNPOG’s three pillars of activities ― research and policy development, capacity development, and communication and outreach ― with Korea being a good example as a vibrant democracy and IT powerhouse, according to its director.

 

Its concept, he noted, also embraces the eight key components of good governance laid out by the U.N. Economic and Social Commission for Asia and the Pacific: accountable, transparent, responsive, equitable and inclusive, effective and efficient, follows the rule of law, participatory and consensus-oriented. Lim pinned high hopes on President Park Geun-hye’s vision for “Government 3.0,” which calls for broader public access to state data and participation in the decision-making process, increased transparency and greater interagency cooperation. The initiative followed the “e-Korea Vision 2006,” a third edition of the four-year national “informatization” plan unveiled in 2002. The package included building ICT capacity and industry, promoting e-commerce, upgrading the legal system and stepping up international cooperation.

 

“I think Korea’s public administration system has advanced very much along the lines of technological development, making more information available and expanding communications with citizens,” he said. “The ‘Government 3.0’ drive will help Seoul maintain its leading position in the e-government field as it basically seeks to create new values through open data, information sharing and communications.” A former ambassador to Thailand and Sri Lanka, Lim took the helm of the UNPOG last October shortly after retiring from the Foreign Ministry. During his 35-year diplomatic career, he assumed various posts related to the U.N. and the development issue, including chief of planning and coordination, minister-counselor at the mission to the U.N. in New York, and director for human rights and social affairs. He is gearing up for three major projects this year: the annual U.N. Public Service Awards, an international e-government forum and the launch of the biennial U.N. e-Government Survey in which Korea topped the list over the last four years.

 

The awards mark the most prestigious international recognition of excellence in public service, officials say. This year’s ceremony will take place on June 23 in Ilsan, Gyeonggi Province, as the centerpiece of a four-day public service forum organized by the UNPOG and New York-based DESA. The two agencies launched the e-government forum in Seoul in 2012 to boost the understanding on the concept around the world. The yearly event will be held in Kazakhstan in October. With the office’s 10-year term nearing its end, Lim is stepping up efforts to turn it into a permanent organization with greater financial capabilities and a bigger workforce so that it can help more developing countries beyond the Asia-Pacific.  “It will not be a wise decision to give up on the investment that we have made throughout the past decade ― governance is an idea that will dominate the 21st century, not a waning industry or a thing of the past,” the director added.  “I’m hoping that the UNPOG will be able to assist those in need such as least developed, post-conflict or landlocked countries, expanding its foray into Africa, the Middle East and Latin America.”

From http://theinsidekorea.com 04/27/2014

TOP↑

 

 

PHILIPPINES: Government Reveals ICT Priorities: Health IT, White Space, Cloud

 

In an exclusive interview with FutureGov, Louis Casambre, Under Secretary & Executive Director, ICT Office, Department of Science and Technology (DOST), The Philippines reveals the key priorities and challenges for this year.

 

Health Services

“Our focus has always been on ICT projects that impact and benefit multiple agencies,” said Casambre, whose team is working with the Department of Health (DOH) on getting the systems interoperable. “The challenge we are facing now now is that many systems are operating independently. Data is stored in separate silos. The Health Information Exchange Layer project will provide the shared services layer by creating a common API across systems,” he said.

 

Local Government

Electronic Local Government Units (eLGU) is another key initiative this year. “While many local government units see the value of e-government, they may not have the financial and human resources needed to implement certain systems,” explained Casambre. The national government is investing in cloud services so that local government units can benefit from the latest technology resources without having to invest in expensive infrastructure.

 

TV White space

According to Casambre, the technology that presents the greatest opportunity for DOST is TV White Space. In a recent survey, the Department of Education (DepEd) found that 83 per cent of schools are situated in areas without an internet service provider. “This figure gives a good picture of the actual connectivity rate across the country. How will citizens benefit from all the great ICT-enabled public services if they don’t even have access to the internet? We are working with the DepEd, DOH, Department of Social Welfare on leveraging TV White Space to deliver public services,” he added. The Philippine government is creating a regulatory environment so that the infrastructure can be deployed by the private sector. TV White Space has proven to be effective for enabling communications during disaster recovery. [Casambre speaks on the benefits on white space in another recent interview here.]

 

Shared services

iGovPhil, a whole-of-government initiative, is one of DOST’s flagship projects to provide citizens with a secured digital signature so that they can communicate and transact with multiple agencies without having to register for each online service. “There will be four basic registries: citizens, companies, land and transportation. The common registry will allow systems across different government departments to interconnect,” he commented.

 

Capacity Building

The Philippine leadership is actively pushing for the civil service to adopt technology and deliver more ICT-enabled citizen services. “Over the next three years, the Government will be investing in 250,000 laptops for civil servants, including teachers. There are plans to roll out cloud-based thin client devices to replace PCs in government offices and training programmes to build up the skills of government employees,” Casambre concluded.

From http://www.futuregov.asia/ 04/29/2014

TOP↑

 

RUSSIA: Mulling a Digital Iron Curtain

 

An impossibly cute creature from a 1966 Soviet book and cartoon has recently found himself on the periphery of discussions about the Kremlin's growing ambitions to exercise greater control over domestic Internet use. In late April, a member of Russia's upper house of parliament proposed creating a purely domestic Internet—inaccessible from abroad with the exception, perhaps, of members of a Russian-led Customs Union—that would be named after a furry character called Cheburashka. And while the senator, Maksim Kavdzharadze, later clarified that his proposal would only apply to scientific information, the use of Cheburashka as a symbol for the Kremlin's efforts to create a more "sovereign" Internet is apt. The beast in Eduard Uspensky's story, who is theretofore unaware of humans, winds up in a crate of oranges and must adjust to a new reality after tumbling out in a Moscow shop. In Russia, it is unclear how users will react to the new reality being created around an Internet that was once widely free. In April, the State Duma passed legislation that would require non-Russian tech companies to store all domestic data within Russia for at least six months. And Kommersant, a well-regarded newspaper, reported that a commission set up by Russian President Vladimir Putin is recommending a system that would allow the government to filter and access all content passing through Russian servers.

 

It is still unclear whether major companies like Google and Facebook will agree to the expensive task of placing servers and data-storage centers inside Russia—or if Moscow will follow through with blocking access to the sites if they do not. Whatever he decides to do, Putin is representative of an accelerated push by autocratic leaders worldwide to reign in the unwieldy Internet space. But doing so once populations have already experienced the value and convenience of open access can be difficult. Here's a look below at some case studies of web censorship—ranging from the most extreme version of a truly "sovereign" web to one of evolving ad-hoc efforts to chip away at Internet freedom. All of these censorship regimes exist with varying degrees of coerced self-censorship brought about by threats of punishment for posting content deemed immoral or harmful to the state. Users and companies are aware that their online activity may be monitored at any time and themselves become players in creating a censorship environment.

 

North Korea's 'Walled Garden'

Operating as a nationwide intranet, a truly sovereign system can only be accessed from within the state. The one standout "success" in this complete censorship regime is North Korea's Kwangmyong (Bright) network. There is little information about the network because few people outside the so-called "hermit kingdom" have been able to access it. But according to a report by the AP news agency, the system contains up to 5,500 websites that are mostly associated with universities and government-run entities. This type of network is one that can really only work in places where there is a virtual blockade on information from the outside world, such as North Korea or Cuba, which has a similar system. This type of domestic intranet environment is also difficult to establish in all but the most oppressive societies because experience with the free-wheeling way the Internet works already exists.

 

China's Great Firewall

China's "Golden Shield" project, which blocks and filters content deemed harmful by the ruling Communist Party, has been largely successful because the government decided early on that the Internet was something that needed to be controlled. As Internet use grew rapidly in the first decade of the 21st century, homegrown sites that accepted the authorities' censorship rules—and assisted in blocking content—became the norm. While Western companies have struggled to or refused to adapt to the rules governing content-filtering, domestic companies like Baidu, the country's largest search engine, have thrived. Chinese users wishing to access blocked sites can use proxies, which provide access to third-party servers to avoid censors, but because the web already caters to the domestic audiences, most users will not go through the effort of doing so.

 

Iran's 'Halal' Network

Iran's censorship of the Internet increased markedly following disputed elections in 2009 that saw thousands of anti-government protesters flood the streets of Tehran. Access to Western sites like Twitter, Facebook, and YouTube were cut off and, in 2011, Iran began work on a "halal" network that would exist only within the country. The plan, according to one minister, was that users would only be able to access content that maintained the appropriate "ethical and moral level." Although Tehran says it's still working on this intranet, three years later the country continues to rely on censors to blacklist and filter websites deemed threatening to the Islamic republic. Creating an entirely new system without an already existing infrastructure, like in China, has proven to be difficult. And many users still manage to access Western social networking sites through proxies.

 

The Evolving Turkish Model

Turkish Prime Minister Recep Tayyip Erdogan has been in an ongoing battle against the "dark forces" of the Internet since anti-government protests swept the country last June. He went on the attack in early 2014 when secret audio recordings were posted online that appeared to incriminate his family in corruption. His government ordered Twitter and YouTube blocked in March. Despite a court order to reverse Erdogan's edict, YouTube is reportedly still inaccessible. Erdogan has viewed the recent success of his party in municipal elections as a mandate to continue the Internet crackdown. Turkey's spy agency was given increased power to access users' data and Internet Service Providers (ISPs) have begun to use technology similar to that being used in China to scan and log online activity.

 

At first glance, Russia might seem an appropriate candidate for a Chinese-style firewall. Homegrown Russian sites like the Yandex search engine and Vkontakte, a social network, have larger shares of the Russian market than their Western competitors. But these same companies owe some of their success to foreign practices and investment. Yandex is registered in the Netherlands and is traded on the NASDAQ stock exchange in New York. VKontakte's founder fled Russia in April after he said he was forced into giving up his shares in the company to figures close to the Kremlin. Leaders at both companies have complained about the new Internet legislation in Russia potentially harming their businesses. Up until now, Russia has largely targeted individual websites and bloggers, like opposition figure Aleksei Navalny, with shutdowns or punishments. But it seems clear the Kremlin wants to do more. Although a "sovereign Internet" may be the Kremlin's ideal, a layered approach—similar to that seen in Turkey—where Internet freedoms are slowly stripped away, may be the most likely scenario.

From http://www.nextgov.com/ 05/09/2014

TOP↑

 

 

SINGAPORE: Education Minister Shares 4 Principles on ICT Use in Education

 

The Ministry of Education in Singapore is now preparing for the fourth Education Master Plan. According to Heng Swee Keat, Minister for Education, education must equip students with the necessary competencies to race with and not race against technology. Heng laid down four key principles that he thinks will guide the Ministry moving forward.

 

1. Stay Focused

The Ministry will be focused on its commitment to a student-centric and values-driven education, and ICT can help them do this better. “By staying focused on our goal to bring out the best in every child, we will use technology to transform learning in every school and every student, enabling them to develop strong fundamentals for life-long learning,” he said. To ensure that all schools and students benefit from ICT-enabled learning, the Ministry is currently developing an online Student Learning Space to provide all students access to quality digital teaching and learning resources. The Ministry is also focused on cyber wellness among students. “We cannot assume that just because our children can handle technology, they know how to use technology responsibly. There is no roadmap for the digital world. We need to give every student a compass and to help them develop navigation skills.”

 

2. Stay Curious

Heng urged educators to innovate and experiment new ways of teaching and learning using technology. He believes that ICT can enable personalise learning, he said: “This is an important aspect of our student-centric education. The ultimate goal is customised learning and differentiated teaching for every child.” New technologies may also improve the way assessment is done, such as diagnosing a student’s mastery of concepts, or recommending the most useful digital resources.

 

3. Stay Grounded

While ICT promises a world of possibilities, Heng emphasised the importance of sound pedagogical content knowledge. “A good technological tool placed in the hands of a skilful teacher can breathe life into lessons, and lessons into life. Our teachers must be grounded in strong pedagogy and have the knowledge to use ICT meaningfully and appropriately,” he added. During the last Master Plan, the Ministry has trained about 1,400 ICT mentors, who were instrumental in driving ground-up initiatives. Lessons were shared on an online platform called The ICT Connection, so best practices can be accessed by the wider community.

 

4. Stay Together

“From parents to industry partners, we need to involve the wider community. Together, we can play an active role to bring out the best in each child in every school, at every stage, whatever their starting point,” said Heng. The Ministry will be working more closely with the industry players, tertiary education and other key stakeholders to develop a conducive environment to groom young talents.

From http://www.futuregov.asia/ 04/10/2014

TOP↑

 

U.S.: 7 Ways to Innovate Government IT

 

Seven ingredients to tip the balance toward innovation in your organization. At the risk of stating the obvious, the average government CIO isn’t able to spend much time dreaming up new projects. “Keeping the lights on” or “putting out fires,” whatever business-speak you prefer, tends to dominate the CIO’s work schedule. This point was driven home yet again in a recent NASCIO survey: A third of respondents said they spend up to 90 percent of their time simply keeping the lights on. More than 40 percent said they spend as much as 75 percent of their time on such tasks. On the other hand, half of respondents said they spend one-quarter of their time or less on innovation, and almost 30 percent said they spend just 5 percent or less of their time on innovation-related tasks. Carving out time to pursue innovation is not a new workplace challenge, nor is it unique to government. Phil McKinney, a former CTO of HP’s Personal Systems Group and author of Beyond the Obvious: Killer Questions that Spark Game-Changing Innovation, suspects that most private-sector companies also are struggling to find a balance between daily operational tasks and innovation. “Innovation needles to zero in most organizations,” McKinney said bluntly. Still, government CIOs say the pressure to innovate is rising and expectations are increasing. More citizens are tech conscious and more public leaders realize that technology is a pathway for improving service and reducing costs. CIOs now must somehow find a way to focus on innovation. Finding a balance isn’t easy, but some government CIOs have found practical ways to fit innovation into their own schedule and within the culture of the office they manage. Here are seven common-sense imperatives for driving innovation in the government enterprise.

 

1. Be Specific About Innovation

Innovation has become so common in business lexicon that one could argue that the word has lost meaning and become too much of a catch-all. Everybody wants to be an innovator, but most don’t spell out what it means. A definition can help ensure expectations are kept in check and help avoid a “shoot for the stars” mentality that all innovation is possible — even though resources are always limited. A definition also can help measure time spent on innovation. “Innovation in government isn’t necessarily you sitting there producing brand-new products that are new to the market. Innovation could be the conversations you have, the type of initiatives you push, your approach to solve the same old problems. That, in and of itself, can be strategic and innovative,” said Adel Ebeid, Philadelphia’s chief innovation officer. Innovation also is a matter of perspective. Los Angeles CTO Steve Reneker said that when he talks to elected officials about innovation, they might think first about a mobile app or a new website. But the IT department is looking foremost at what it takes to manage and maintain the city efficiently — both are needed types of innovation. Definitions of innovation can vary widely, but Bryan Sivak, CTO of the U.S. Department of Health and Human Services, calls it “a direct result of the freedom to experiment.” If you define it that way, Sivak says he spends much of his time on innovation. Most public-sector organizations aren’t spending time and resources on innovation because they don’t value experimentation or are risk averse, he said.

 

2. Prepare for Failure and Embrace It

Nine out of 10 innovation efforts will end in failure, McKinney said. That may sound like a deal breaker, but failure is an unavoidable byproduct of innovation. On the bright side, failure actually can be a learning moment that leads to a later success, McKinney said. Make sure to review the lessons learned when a project crashes and burns. McKinney recently saw a ski industry CEO describe his biggest failure to a crowd of 500 company managers. The CEO said it wasn’t a career killer and that failed innovation doesn’t have to be deadly. Of course, failure isn’t perceived as an acceptable outcome for most government CIOs who face outsized public expectations and rising pressure from the executive suite and elected leaders. When a new IT system fails, the CIO and other staff can be fired because “wasting” taxpayers’ money is intolerable. Colorado CIO Kristin Russell said today’s CIO must have a courageous mindset in order to survive and thrive. Blame comes with the position. Being transparent and bringing as many people in as possible early in an innovation-related project can help. “When we’re doing something risky, I let people know this may fail — even to legislators, stakeholders, the state cabinet. And you remind them of that through the process,” Russell said.

 

3. Carve Out a Little Personal Time

A short burst of brainstorming can sometimes be as productive as a formal, department-level meeting. Each week Russell tries to set aside two hours on her work calendar so she can get out of the office to research something she doesn’t know about — and the topic isn’t necessarily related to technology. She uses the time to think about strategy and innovation. “Every time I do this it’s amazing. I walk away with 20 different ideas we could go and do. It’s hard to carve out that time and pull myself from the desk, but every time I do, I gain something and I bring it back to the organization,” Russell said. Reneker makes time to visit the numerous websites that report on government and technology news. Web browsing can be a time waste, but Reneker’s focus is simple: He looks for creative ideas from other cities and counties that might align with an existing project request from an L.A. council member or executive sponsor. That allows him to work on innovation while also fulfilling the wants and expectations of elected leaders and his bosses. Government likely will never have the luxury of Google’s “80/20” rule, which allows the company’s employees to use 20 percent of their work time on personal work projects. But there’s no harm in letting your employees take a few minutes to explore what others are doing in the innovation space.

 

4. Consider a Name Change and an Innovation Office

Perhaps the job title of chief information officer is becoming counterproductive to the innovation agenda. The CIO’s responsibilities are much broader and diverse than 20 years ago, when the main charge truly was only to keep the computer systems running. The position was in the back office. That isn’t the case anymore, of course. “I believe the title of CIO should be abolished,” Sivak said. Sivak thinks it’s time to call the CIO the “commodity infrastructure officer” and then put that person on the organizational chart beneath a “chief digital officer,” who would tackle the innovation activities that many CIOs are responsible for today. The beginnings of this shakeup could already be under way in cities like Philadelphia that have named a dedicated innovation officer and an innovation management unit tasked with ensuring there are always fresh ideas in the pipeline. Splitting off innovation workers from the IT department may or may not be worth considering. Philadelphia’s innovation team is part of the Office of Innovation and Technology, which also oversees bread-and-butter IT functions like communications and infrastructure. Reneker said leveraging existing resources within the organization has its own benefits. “When you create an innovation organization, the technology you need to deploy for that level of innovation — a mobile app or enhanced website — all might require different tools. To have an expectation that an innovation group can learn it all and be an expert in everything isn’t really a reality,” Reneker said.

 

5. You Can’t Innovate Alone

Innovation doesn’t happen in a vacuum, nor does it happen when going it alone. You can say innovation is important, but if you don’t embed it in your workplace culture among your staff, innovation will never get traction. Culture can be built up over time, but it must be a core attribute. When McKinney coaches and mentors chief executives, he asks them how much time they truly spend on innovation. “Don’t think that you’re sitting in a room and some guy who is leading your innovation comes in to present to you — don’t think that satisfies your innovation program,” McKinney said. You must make innovation a valued skill set among employees and hire people who, in turn, are willing to work on innovation-related activities. Not everyone’s cut out to work on open-ended projects that may fail. Sivak said the good news is that more people than you might expect are enthusiastic about innovation. Ebeid advises making careful hires when vacancies arise on the CIO’s top management team. Take the opportunity to redefine the job role and include an innovation component. If you replace positions with people who aren’t dedicated to the innovation agenda, then you have little chance of getting meaningful work done. “My agenda as CIO is not to innovate,” said Ebeid. “My job is to nurture an innovation ecosystem made up of the right individuals, the right ideation process, and constantly keeping the conversation in the forefront, always about community engagement, civic innovation, smarter government, all while delivering it for a lower unit cost.”

 

6. Put Innovation on Paper (or in an Email)

Assembling a list of innovation projects that are planned or in progress and sending it to staff and other stakeholders seems like a no-brainer, but the CIOs who do this say it makes them more effective. In Los Angeles, Reneker maintains a list of the top 25 IT projects that is sent monthly to department heads, elected officials and lead staff. About half of the projects on the list are related to operations and maintenance, and the other half are innovation projects. Many of the listed projects don’t have dedicated resources attached to them, and the list makes it clear that they’ll be done as time permits. Mixing the two types of projects is good for the IT staff’s morale because they aren’t boxed in to working on only operations and maintenance, which can become routine. “It entices existing staff to learn and innovate, and allows the CIO to manage all these projects and requests and try to get those that have the biggest bang for the buck, both politically and from a cost-savings perspective,” Reneker said. Colorado also emphasizes communication. A monthly email called “I Have an Idea” is sent to front-line staff so they can share their suggestions. If an idea results in cost savings, the staff person who originated it might get a bonus. Russell assigns ideas that can be feasibly implemented to an executive sponsor, which keeps them on track.

 

7. Think Big & Small

Some governments expect their CIO to be a visionary who generates grand ideas. That’s a commendable and necessary function for any organization, but sometimes small steps can accumulate into big results. “Everybody thinks innovation means a huge breakthrough, but you can get just as much value derived from a little innovation — doing what you do today and doing it better,” said McKinney. He advises organizations to find a few incremental innovations and do them successfully. It may not be wise to go for a grand slam home run. In fact, most organizations figure out that about 75 percent of ideas that are generated will be incremental improvements, McKinney said. Another consideration is how much the innovation project should be publicized as it’s being developed. Although many governments are committed to transparency, keeping the idea in-house can help avoid bad press and the blame game, especially if the project does not come to fruition. Remember, most innovative ideas fail. If possible, give a team permission to operate in stealth mode on small projects, McKinney said. “As soon as it gets visibility, the antibodies tend to come out and attack the idea,” he said.

From http://www.govtech.com/ 03/03/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/Policy_.gif

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

 

EU Parliament Backs Data Protection Rules

 

Legislation will prevent transfer of user data outside Europe without prior notification, authorisation. The European Parliament on Wednesday overwhelmingly backed the European Commission's revised Data Protection Directive, which governs the use and movement of personal data. The next step will see the proposals debated by the Council of Ministers at a meeting scheduled for June. "The message the European Parliament is sending is unequivocal: this reform is a necessity, and now it is irreversible. Europe's directly elected parliamentarians have listened to European citizens and European businesses and, with this vote, have made clear that we need a uniform and strong European data protection law," said European justice commissioner Viviane Reding, in a statement. The reforms aim to establish a single pan-European law in a bid to simplify the regulatory landscape. The directive will give citizens the right to be forgotten, meaning companies that hold information on a person without a legitimate reason must, upon request, delete said information. It will also give people the means to transfer their data between service providers.

 

Companies will also require explicit consent, rather than assumed consent, to process an individual's personal data. In addition, if a firm wishes to transfer a customer's data outside the EU, it must first obtain authorisation from a national data protection authority and inform the person concerned. "Strong data protection rules must be Europe's trade mark. Following the U.S. data spying scandals, data protection is more than ever a competitive advantage," Reding said. Companies that fall foul of the Data Protection Directive – regardless of whether they are based in Europe or elsewhere – can be fined up to 5% of their global annual turnover if they fail to comply. "It will be important to ensure that the fines are not disproportionate for small businesses, such as the flourishing tech start-ups on which European policymakers are relying to boost the EU's economy," said Ovum regulation analyst Luca Schiavoni, in a research note. "A phased introduction, or a more detailed differentiation in the set of fines, will be necessary in this respect," he said.

From http://www.totaltele.com/ 03/12/2014

 

TOP↑

 

 

Dutch Govt Opens Consultation on Proposed Regulation

 

The Dutch ministry of economic affairs has taken a number of ongoing projects and bundled them into one bill. The bill provides end users with more power in cases of network failures and lowers switching thresholds for SMEs and small entrepreneurships. Temporary broadcasting licenses would become available and the overall safety of broadcasting masts better secured. The 'Bundled" Telecommunications Act will be open to consultation until 7 May and then move on to Parliament.

From http://www.telecompaper.com/ 03/27/2014

TOP↑

 

 

Russia Mulls a Digital Iron Curtain

 

An impossibly cute creature from a 1966 Soviet book and cartoon has recently found himself on the periphery of discussions about the Kremlin's growing ambitions to exercise greater control over domestic Internet use. In late April, a member of Russia's upper house of parliament proposed creating a purely domestic Internet—inaccessible from abroad with the exception, perhaps, of members of a Russian-led Customs Union—that would be named after a furry character called Cheburashka. And while the senator, Maksim Kavdzharadze, later clarified that his proposal would only apply to scientific information, the use of Cheburashka as a symbol for the Kremlin's efforts to create a more "sovereign" Internet is apt. The beast in Eduard Uspensky's story, who is theretofore unaware of humans, winds up in a crate of oranges and must adjust to a new reality after tumbling out in a Moscow shop. In Russia, it is unclear how users will react to the new reality being created around an Internet that was once widely free. In April, the State Duma passed legislation that would require non-Russian tech companies to store all domestic data within Russia for at least six months. And Kommersant, a well-regarded newspaper, reported that a commission set up by Russian President Vladimir Putin is recommending a system that would allow the government to filter and access all content passing through Russian servers.

 

It is still unclear whether major companies like Google and Facebook will agree to the expensive task of placing servers and data-storage centers inside Russia—or if Moscow will follow through with blocking access to the sites if they do not. Whatever he decides to do, Putin is representative of an accelerated push by autocratic leaders worldwide to reign in the unwieldy Internet space. But doing so once populations have already experienced the value and convenience of open access can be difficult. Here's a look below at some case studies of web censorship—ranging from the most extreme version of a truly "sovereign" web to one of evolving ad-hoc efforts to chip away at Internet freedom. All of these censorship regimes exist with varying degrees of coerced self-censorship brought about by threats of punishment for posting content deemed immoral or harmful to the state. Users and companies are aware that their online activity may be monitored at any time and themselves become players in creating a censorship environment.

 

North Korea's 'Walled Garden'

Operating as a nationwide intranet, a truly sovereign system can only be accessed from within the state. The one standout "success" in this complete censorship regime is North Korea's Kwangmyong (Bright) network. There is little information about the network because few people outside the so-called "hermit kingdom" have been able to access it. But according to a report by the AP news agency, the system contains up to 5,500 websites that are mostly associated with universities and government-run entities. This type of network is one that can really only work in places where there is a virtual blockade on information from the outside world, such as North Korea or Cuba, which has a similar system. This type of domestic intranet environment is also difficult to establish in all but the most oppressive societies because experience with the free-wheeling way the Internet works already exists.

 

China's Great Firewall

China's "Golden Shield" project, which blocks and filters content deemed harmful by the ruling Communist Party, has been largely successful because the government decided early on that the Internet was something that needed to be controlled. As Internet use grew rapidly in the first decade of the 21st century, homegrown sites that accepted the authorities' censorship rules—and assisted in blocking content—became the norm. While Western companies have struggled to or refused to adapt to the rules governing content-filtering, domestic companies like Baidu, the country's largest search engine, have thrived. Chinese users wishing to access blocked sites can use proxies, which provide access to third-party servers to avoid censors, but because the web already caters to the domestic audiences, most users will not go through the effort of doing so.

 

Iran's 'Halal' Network

Iran's censorship of the Internet increased markedly following disputed elections in 2009 that saw thousands of anti-government protesters flood the streets of Tehran. Access to Western sites like Twitter, Facebook, and YouTube were cut off and, in 2011, Iran began work on a "halal" network that would exist only within the country. The plan, according to one minister, was that users would only be able to access content that maintained the appropriate "ethical and moral level." Although Tehran says it's still working on this intranet, three years later the country continues to rely on censors to blacklist and filter websites deemed threatening to the Islamic republic. Creating an entirely new system without an already existing infrastructure, like in China, has proven to be difficult. And many users still manage to access Western social networking sites through proxies.

 

The Evolving Turkish Model

Turkish Prime Minister Recep Tayyip Erdogan has been in an ongoing battle against the "dark forces" of the Internet since anti-government protests swept the country last June. He went on the attack in early 2014 when secret audio recordings were posted online that appeared to incriminate his family in corruption. His government ordered Twitter and YouTube blocked in March. Despite a court order to reverse Erdogan's edict, YouTube is reportedly still inaccessible. Erdogan has viewed the recent success of his party in municipal elections as a mandate to continue the Internet crackdown. Turkey's spy agency was given increased power to access users' data and Internet Service Providers (ISPs) have begun to use technology similar to that being used in China to scan and log online activity.

 

At first glance, Russia might seem an appropriate candidate for a Chinese-style firewall. Homegrown Russian sites like the Yandex search engine and Vkontakte, a social network, have larger shares of the Russian market than their Western competitors. But these same companies owe some of their success to foreign practices and investment. Yandex is registered in the Netherlands and is traded on the NASDAQ stock exchange in New York. VKontakte's founder fled Russia in April after he said he was forced into giving up his shares in the company to figures close to the Kremlin. Leaders at both companies have complained about the new Internet legislation in Russia potentially harming their businesses. Up until now, Russia has largely targeted individual websites and bloggers, like opposition figure Aleksei Navalny, with shutdowns or punishments. But it seems clear the Kremlin wants to do more. Although a "sovereign Internet" may be the Kremlin's ideal, a layered approach—similar to that seen in Turkey—where Internet freedoms are slowly stripped away, may be the most likely scenario.

From http://www.nextgov.com/ 05/09/2014

TOP↑

 

UK Set to Continue Its Filibuster of EU General Data Protection Regulation

 

European Union Justice and Home Affairs ministers will meet in Brussels this week. Top of the agenda will be discussions on reforming EU data protection rules. Viviane Reding (justice commissioner) and Cecilia Malmstr?m (home affairs commissioner) will represent the European Commission; Theresa May (home secretary) and Chris Grayling (justice minister) will represent the UK. A memo released Friday by the EC makes it clear that the GDPR, although currently struggling, remains a high priority. EC vice-president Viviane Reding said, "I am confident we will be able to build on the momentum injected into the negotiations by the Greek Presidency at the last informal Council meeting in January. Seeing the latest progress, I will continue working with Ministers for an adoption of the data protection reform before the end of this year." The memo sets out the Commission's position. "The Commission fully supports the Greek Presidency in achieving swift progress on the reform, in line with the commitment of European heads of state and government to adopt the new data protection legislation in a 'timely' fashion and in any event before 2015."

 

It is clear that although the December blow caused by Hubert Legal, head of legal services for the European Council, has scuppered Reding's hopes for formal adoption before the European elections in May, she does not consider it a fatal blow. Her aim is still get the GDPR adopted before the end of this year. But the UK has always been a critic of the new data protection proposals. In May 2013, the UK data protection regulator, Information Commissioner Christopher Graham, published a report claiming that the GDPR will cost British business millions of pounds – a claim rejected by Viviane Reding. Last Thursday, Theresa May made a written ministerial statement outlining her view of this week's council meeting. It includes, "The UK continues to believe that this proposal is far from ready for a general agreement, and that no such agreement can occur until the text as a whole has been approved. The proposal remains burdensome on both public and private sector organizations and the Government would not want to see inflexible rules on transfers outside the European economic area which do not reflect the realities of the modern, interconnected world."

 

She makes it clear that the UK will continue to work against the current GDPR proposals that have been largely agreed by the rest of Europe. But in adding reservations on data transfers 'which do not reflect the realities of the modern, interconnected world,' she also makes it clear that Britain would oppose any separate suspension of the existing safe harbor arrangement with the US. A call for 'immediate suspension' of safe harbor will be voted on by the full European Parliament, as part of a report prepared by the Civil Liberties, Justice and Home Affairs Committee (LIBE), on 12 March.

From http://www.infosecurity-magazine.com/ 03/03/2014

TOP↑

 

Ukraine Steps Up Information Security Policy

 

The Ukrainian government plans to prepare a strategy on information security in the next month, reports Cnews.ru. This includes steps towards the launch of a national secure OS and anti-virus software. The actions were initiated by a decree from Alexander Turchinov, the acting Ukrainian President. The government is also preparing a draft policy on responses to eventual information security aggression from other countries.

From http://www.telecompaper.com/ 05/05/2014

TOP↑

 

LATIN AMERICA: OECD Sees Deficiencies in Latest Telecom Bill in Mexico

 

The Organization for Economic Co-operation and Development (OECD) issued an analysis of the secondary telecommunications legislation in Mexico, judging it as having "serious deficiencies." The OECD points out that the bill currently under debate would introduce market regulations it described as too restrictive and which would make it difficult for the Federal Telecommunications Institute (IFT) to analyze market conditions and issue regulations. The report also said that the penalties that the bill establishes for telecommunications companies that the IFT has ruled to be monopolies are not internally consistent. The OECD also said that consumer protection has historically been a problem in Mexico's telecommunications sector and the new legislation doesn't take any steps to define how the IFT will cooperate with the Federal Economic Competition Commission (Cofece) and the Federal Consumer Protection Agency (Profeco).

From http://www.telecompaper.com/ 04/17/2014

TOP↑

 

NORTH AMERICA: How Canada Plans to Fuel Its Economy with Data

 

The Canadian government committed $3 million this month to funding a new Open Data Institute charged with finding, compiling and standardizing government and private sector data that companies, entrepreneurs and academics can use as the raw material for new products and services. The investment, which was matched by an additional $3 million from the private and nonprofit sectors, comes amid a global push to release as much raw data as possible in machine-readable formats. The consulting firm McKinsey & Company estimates that opening up data in just seven sectors could add more than $3 trillion annually to the global economy. Canada’s Open Data Institute is being managed by the Canadian Digital Media Network, a quasi-governmental organization that receives public and private funding and is focused on commercializing Canadian digital technology. Nextgov spoke recently with CDMN’s managing director Kevin Tuer about his organization’s plans for the institute, what open data can do for Canadian businesses and citizens and open data’s international potential. The interview below is edited for length and clarity.

 

You’re obviously in the very early stages now, but what are your plans for the Open Data Institute?

Like many other countries, Canada is sitting on a lot of data. There’s a lot of public data and publicly-funded data, but, for the most part, it’s not well known that that data’s available. In many cases, the data that is available may not be machine readable or easy to access and in the end there’s just barrier after barrier to actually creating economic benefit out of this data. What the Open Data Institute is proposing to do is to remove a number of those barriers and get this data into the hands of academic, of entrepreneurs and of business so they can capitalize on what I consider very much a natural resource. A lot of our work will be creating awareness that the data is available and removing those barriers. We’ll be setting standards, developing tools to facilitate access to that data and providing resources to help users of the data access and use it in the most appropriate manner. It will take a lot of expertise and a lot of knowledge but it starts with access. We want to put this data in the hands of people who can make economic benefit out of it.

 

Where is most of that data now?

There’s lots of data out there but there are no standards around it. Some governments have websites that make this data available, but some of it is in PDF format and what do you do with that? You can read it and that’s about it. We’ve found since the announcement that we got funding for this that there are a lot of initiatives going on out there but they’re all very siloed. Even where we’re sitting here in the Waterloo region of Canada, surrounding cities have already started coming to us saying ‘we’ve got data here and we want to get it out there.’ Part of what we see the Open Data Institute being is that go-to repository, that one stop shop for everything data. We’ll work through all those standards so it doesn’t matter if the data comes from Statistics Canada, from Environment Canada, from Health Canada, from wherever. The way you access it, the data format and the resources to help you access it will be the same. We also see the opportunity to expand beyond government data to private sector data as well.

 

What are some of the siloed initiatives you’ve looked at?

The province of Ontario has something like 180 data sets. I didn’t know they had 180 data sets. I was contacted by an equine association that’s interested in documenting trails for horseback riding that could also be used for hiking and snowmobiling. Recently I read an article about a Canadian gold company that has all this private sector data, terabytes worth of data, on geological surveys. The company opened that data up to the world and said ‘help us use this data to find where the gold reserves are and we’ll pay you a handsome fee.’ These are just some examples. So imagine if you could bring a concerted effort to this what kind of outcome you could create.

 

What kind of roadblocks are you facing?

As with any national effort, the big challenge is taking that leadership position and bringing champions on board so people can see this common vision and buy into it. That will be the single most difficult thing. I have no doubt that once the data is available in machine-readable format that companies and entrepreneurs and academics and student will do great things with it. But it’s going to take some time and effort to get there. We’ll discover the specific barriers once we start building the consortium from those living in the trenches of open data.

 

What are the go-to examples of economic benefit coming from open Canadian data at this point?

There’s weather data of course. That’s potentially lifesaving and valuable to Canada as a whole. There are also startups that are taking information from hospital trips and analyzing that data to project wait times in emergency rooms. With that information you may find that instead of going to your local hospital you’d stand a better chance of getting into an ER by driving an hour to a different hospital. There’s a company in town that was started based on that, and that’s a good example of a product that could benefit citizens as a whole.

 

What sectors do you expect Canadian open data to most benefit in the future?

We’ve looked at things like intelligent transportation systems, being able to map traffic flow and things of that sort. Anything that creates those sorts of efficiencies would obviously be interesting. The weather network seems to have done pretty well with Environment Canada data. But there are hundreds if not thousands of data sets out there that others will find new and interesting and value-added ways to use. From our perspective, this is uncharted territory. Our job is to make sure the landscape is as amenable to exploration as possible. The U.S.’s open data repository Data.gov is managed from within government whereas Canada’s Open Data Institute is being managed by this public-private partnership.

 

What’s the reasoning behind the Canadian approach?

This is hypothetical, so take it for what it’s worth. But the CDMN is a private-public funded organization. We’re funded by the government and also heavily funded through the private sector and I think the government sees our relationship with businesses and industry as being very enviable. I think they believe we can connect with that demographic easier and more effectively than they can alone. So having us lead this initiative from a market-driven perspective outside of government is very appealing to them. We’ve already established a national network for commercialization and innovation to tap into resources from around the country. So we already have some experience and some knowledge about building national consensus. But it’s taken us five years to get to where we are today and we’re just starting to hit our stride. So it’s going to take some time, but we can leverage the knowledge we’ve already amassed and apply it to the Open Data Institute.

 

Do you see the potential for national governments to cooperate on an international open data repository or on open data standards?

There is an opportunity for that, I think. But there would have to be a clear value proposition for doing it. Within national borders you can reason that you’re opening this data up for the good of the country and to create economic benefit for the country. When you extend that internationally, to be honest, that value proposition isn’t as immediately obvious. There’s a part of me that says there is a role for creating international standards. We’ve seen that happen in a lot of industries. The most obvious example is telecom. You can travel around the world and use your cellphone and there’s obviously a good value proposition for that. I’m sure there’s a value proposition out there for doing that for open data for international engagement but that’s yet to be seen. I think we need to be careful about understanding what that value proposition is but ready to act on it if it makes sense.

 

Do you see the Open Data Institute continuing after its current round of funding, which will last for three years?

Will that mean more government and private sector funding or a different funding model? For organizations like CDMN and the Open Data Institute, our greatest success is that we disappear. That would mean that we’ve enabled and catalyzed the industry sufficiently that these things happen on their own and we’re not needed as an intermediary anymore. I don't see that happening in three years for open data and I can’t speculate on how long it would take. But the idea is that we’re going to accelerate that pace and if we’re finding the kind of outcomes the government invested in us to do I can’t see them not continuing to fund us. There’s also a lot of value for the private sector in this, so we’ll be looking for a lot of private sector engagement as well.

From http://www.nextgov.com/ 02/27/2014

TOP↑

 

 

Canada: Digital Privacy Act Will Require Firms to Report Data Breaches

 

In the slew of announcements from the Digital Canada 150 strategy today, measures to protect privacy weren’t forgotten – while details about updates to privacy legislation were scant, it was made clear the government will pursue a new requirement that firms report data breaches to the Privacy Commissioner of Canada. Speaking from Waterloo, Ont. on Friday, Industry Minister James Moore said he would be in the House of Commons next week to unveil new legislation called the Digital Privacy Act. The act is designed to be an update to the Personal Information Protection and Electronic Documents Act (PIPEDA), he said. After referencing the recent Target data breach, Moore gave one clue about what to expect in next week’s legislation. “What we will put in place in this legislation is a mandate that firms that have this private personal information, if there’s any data breach, they can’t sit on it, they have to immediately inform those customers,” he said. “They have to tell them about the mitigation taking place to protect the information and they have to inform the privacy commissioner.”

 

Moore added the Office of the Privacy Commissioner of Canada would be getting new powers and responsibilities to protect Canadians’ privacy online. Though he did not outline exactly how the privacy commissioner’s role would change, he indicated the Digital Privacy Act wouldn’t dramatically change the office’s role. A private member’s bill previously brought to the House of Commons “went too far in my view in providing prosecutorial powers to the privacy commissioner. This one doesn’t do that,” he said. “It provides new tools, but it still provides the ombudsman role for the privacy commissioner.” In an emailed statement, a spokesperson for the privacy commissioner said the office was also still waiting on more information. “What we can tell you at this point is that we are encouraged by this morning’s announcement and look forward to seeing the details. For some time now, our Office has been saying that PIPEDA needs to be updated to better protect the privacy rights of Canadians and ensure consumer trust in the digital economy,” the email read, adding the law needs to be modernized for stronger powers for enforcement, as well as a mandatory policy getting companies to report data breaches when they occur.

 

What remains to be seen is the exact wording of the legislation for both data breach reporting and the privacy commissioner’s role, said John Lawford, executive director of the Public Interest Advocacy Centre (PIAC). “It’s not very clear. Aside from vaguely defined enforcement powers, we don’t know how it will translate,” he said. “During the question and answer part after, Moore did say the [privacy] commissioner can’t be proactive, and won’t be an inquisitor … But the wording is all important.” Like the privacy commissioner’s office, one thing PIAC is hoping for is a policy where businesses must inform the privacy commissioner if they’ve suffered a data breach. Right now, that’s a voluntary action – but PIAC wants the privacy commissioner to be able to fine businesses if they fail to say anything. Still, for a strategy that was four years in the making, the lack of detail was disappointing for David Christopher, communications manager of OpenMedia.ca. Nor was he optimistic about the kind of new powers the privacy commissioner would be receiving. “He seemed to downplay the prospect of giving the privacy commissioner extra powers,” Christopher said. “It seems like that’s not going to be beefed up the way it needs to be.”

From http://www.itbusiness.ca/ 04/04/2014

TOP↑

 

Industry Minister Unveils Canada’s Digital Economy Strategy in Waterloo

 

Industry Minister James Moore unveiled a long-awaited national digital economy strategy at Waterloo-based OpenText Corp this morning in an announcement that was live-streamed online. The plan, dubbed Digital Canada 150, will include 39 new initiatives towards a more connected Canada, according to Industry Canada. A wide-ranging plan that touches upon several aspects of parliamentary law-making around technology regulation and support, the plan is built on five pillars. That covers: connecting Canadians, protecting Canadians, economic opportunities, digital government, and Canadian content. The plan follows an online consultation exercise that took place over three months in 2010. It aims to have 98 per cent of Canadians given the opportunity to access to providers offering high-speed Internet connections at 5 megabits per second, confidence their online transactions are secure and privacy is protected, and hold wireless telecommunications companies to capped roaming rates or else face penalties.

 

Telecommunications and rural broadband

Funding to the tune of $305 million will expand the 5 mbps Internet connections to 280,000 rural households. Those households will be gaining access to high-speed Internet for the first time, Moore says. The government is capping roaming fees in order to boost competition, Moore says. This will prevent wireless providers from charing other companies more than they charge their own customers for mobile voice, data and text services while outside of Canada’s borders. “We’re not looking forward to greater consolidation and concentration of Canada’s wireless services,” he said. “We have an obligation and a responsibility as a government to inspire more competition.” Industry Canada will go ahead with its plan to auction the 2500 megahertz band spectrum in April 2015. But will also implement a “use it or lose it” policy for all companies that hold wireless spectrum licences, meaning it can’t be hoarded without being put to use for a service benefitting Canadians.

 

New privacy legislation coming

Moore says he will introduce new legislation in parliament next week, a bill called the Digital Privacy Act. It will update the Personal Information Protection and Electronic Documents Act (PIPEDA). “This is an update to the PIPEDA legislation that’s already on the books and updating it for the digital age,” Moore said. “This will give the Privacy Commissioner new powers to protect Canadians as they venture online.” The Privacy Commissioner will remain in an ombudsman role but will have some new tools to use to enforce privacy laws. The new law will require organizations to notify the Privacy Commissioner when they experience a data breach, Moore said. He used the example of his 75-year-old father doing some online shopping with his iPhone to demonstrate how fraud could discourage online shopping.

 

Related

CASL - Canada's Anti Spam Legislation Government unveils final anti-spam regulations, dates “It only takes one horrible experience to learn about his information to be stolen or credit card information to be stolen to scare him away from that for good,” he says. Also new are anti-moneylaundering and anti-terrorist financing regulations for virtual currencies. An enhancement to the Financial Transactions and Reports Analysis Centre of Canada.

 

Digital economy investments and policy

The Business Development Bank of Canada (BDC) will earmark $200 million to support technology adoptions for SMBs under the digital strategy. It will also have an additional $300 million available for venture capital to invest in companies in the information and communications technology sector. In addition, the Canada Accelerator and Incubator Program will increase to $100 million to help digital entrepreneurs. Moore also touched upon recent international negotiations around updating intellectual property laws in the digital age. “In the world of patent trolls and IP thieves and everything else, we have to make sure that when someone patents an idea, it’s not just applicable in Kitchener/Waterloo or in Ontario, or in Canada, but across the world,” Moore said. “This is a global digital economy, therefore our laws have to be updated.”

 

Modernizing the federal government

To build upon the government’s open data strategy, it will create an Open Data Institute. The government will begin by testing prototypes developed by private sector players to provide new data products and services to the marketplace. Many of those first projects may be based upon the Canadian Open Data Experience appathon that say 900 developers creating apps based on open data from the government. “Wer’e going to be modernizing the government of Canada internally, to finally catch up to the 21st centrally,” Moore said. “Why are we building our digital Canada government infrastructure for a $300 laptop instead of for the $1,000 smartphone?” As part of that effort, the government’s 60 different email systems, 300 data centres, and 3,000 electronic networks will be merged and streamlined.

 

Canadian content in a digital world

A partnership with Historica Canada will see the creation of new new “Heritage Minutes” short films on key events in Canadian history every year until 2017. Historica’s digital archive The Memory Project will also be expanded, documenting the involvement of Canada in several wars during the 20th century. “It’s a sad stat but it’s an important one, in only four of Canada’s 13 provinces and territories is it required to take a Canadian history class to graduate from high school,” Moore said. “We need to make sure all of our institutions are sharing Canadian history so we can build and grow and share from each other.”

From http://www.itbusiness.ca/ 04/04/2014

TOP↑

 

 

U.S.: House-Passed IT Reform Bill Expands Single CIO Mandate to DoD

 

The version of the Federal Information Technology Acquisition Reform Act that passed the House on Tuesday contains a handful of revisions from the version passed out of committee in 2013. Most importantly, the law’s mandate that all agencies employ a single official with the title chief information officer and the authority to manage that agency’s IT budget has been expanded to include the Defense Department, which was previously exempted. The revised bill also pares back a proposal for a governmentwide collaboration center that would assist agencies with especially complicated technology contracts. Under the House-passed legislation the center would only be funded as a three-year pilot. The law also clarifies that agencies aren’t required to consult with the collaboration center or with separate agency-based centers with expertise in a particular type of technology contract if they don’t want to. Changes to the bill were made on a bipartisan basis by the IT Reform Act’s Republican and Democratic cosponsors and aimed at raising the likelihood the bill would pass both the House and the Senate, Rep. Darrell Issa, R-Calif., said while introducing the bill on Tuesday.

 

Issa, who chairs the House Oversight and Government Reform Committee, co-sponsored the bill with Rep. Gerry Connolly, D-Va., who is ranking member on the committee’s government operations panel. The Senate version of the reform act, known as the Federal Information Technology Savings, Accountability, and Transparency Act, is awaiting action in the Senate Homeland Security and Governmental Affairs Committee. That bill would also mandate a single CIO for each federal agency but it would only give those CIOs budget authority for commercial, off-the-shelf items and require that they play a major role in budget decisions about other IT purchases. Those differences will have to be ironed out in a House-Senate conference if the Senate bill is passed. Auditors’ reports have routinely shown a large portion of the government’s $80 billion annual IT bill is lost to bureaucratic inefficiency. Congressional interest in addressing the problem spiked significantly, though, after the high profile failures of HealthCare.gov, the Obama administration’s federal health insurance marketplace, during its first two months online. The Senate legislation is sponsored by Sens. Tom Udall, D-N.M., Jerry Moran, R-Kan., and Mike Johanns, R-Neb. It was introduced in December, about two months after the HealthCare.gov launch.

From http://www.nextgov.com/ 02/26/2014

TOP↑

 

 

House Passes Federal Data Center Efficiency Bill

 

A bipartisan energy conservation bill easily passed by the House this week includes provisions to put federal data centers on a path to operating more efficiently. The measure, which the House passed 375-36 on March 5, would require the Office of Management and Budget, the EPA and the Department of Energy to lead the development of standards for measuring data center performance, including adopting more advanced energy metering and power management tools, and optimizing the use of data centers so money and energy aren’t wasted powering and cooling underutilized systems. The bill, sponsored by West Virginia Republican David McKinley, also would require OMB to set a performance goal for agencies to evaluate their success in acquiring and using energy efficient IT, with the CIO Council charged with setting best practices for achieving the goals.

 

Under the bill, OMB would be required to update a 2007 report that is used as a baseline for energy efficiency. Additionally, the bill would create an open data project on federal IT energy use, to allow for businesses and innovators to come up with their own solutions for the problems of data center efficiency. The data center provisions were introduced in February as a stand-alone measure by Rep. Anna Eshoo (D-Calif.). That bill was folded into the broader package of four measures that the House passed March 5. "My legislation will save the federal government energy and money by requiring the use of energy-efficient and energy-saving technologies, specifically in federal data centers," Eshoo said in a statement, citing an estimate by the American Council for an Energy-Efficient Economy that pegs cost savings from federal data center efficiency at $1.64 billion over 15 years. Sen. Mark Udall (D-Colo.) introduced a version of the data center bill in the Senate last June, but it has seen no action.

From http://fcw.com/ 03/06/2014

TOP↑

 

Netflix Wants to Expand Federal Rules on Internet Speeds

 

Netflix is calling for new federal regulations to ensure it doesn't have to pay extra fees to deliver high-quality video streams to its customers. In a blog post Thursday, Netflix CEO Reed Hastings warned that without government intervention, negotiations between Web services and Internet providers over connection deals could result in the kinds of blackouts that already plague cable television. Last month, Netflix agreed to pay for direct access to Comcast's network. The agreement ensured smooth streaming for Comcast subscribers who watch Netflix, but it was the first time the Web video company had ever had to pay for such a direct connection deal. Hastings called the fee that Comcast demanded an "arbitrary tax." "If this kind of leverage is effective against Netflix, which is pretty large, imagine the plight of smaller services today and in the future," Hastings wrote in the blog post.

 

The Netflix chief executive urged the Federal Communications Commission to bar Internet providers from "charging a toll" for interconnection deals. The FCC enacted net neutrality rules in 2010 that require Internet providers to treat all Internet traffic equally, but the rules never covered interconnection deals like the one between Netflix and Comcast. The FCC is currently trying to rework its net neutrality rules after a federal court sided with Verizon in January and tossed out the old rules. Hastings argued that the FCC should expand the new rules to ensure that Web services have free access to Internet providers' networks. "The essence of net neutrality is that [Internet service providers] such as AT&T and Comcast don't restrict, influence or otherwise meddle with the choices consumers make," he said. "The traditional form of net neutrality which was recently overturned by a Verizon lawsuit is important, but insufficient."

 

In a statement, Comcast claimed it is a strong supporter of net neutrality but that the rules were never intended to deal with Internet connection deals. "Providers like Netflix have always paid for their interconnection to the Internet and have always had ample options to ensure that their customers receive an optimal performance through all ISPs at a fair price," David L. Cohen, Comcast's executive vice president, said in a statement. "We are happy that Comcast and Netflix were able to reach an amicable, market-based solution to our interconnection issues and believe that our agreement demonstrates the effectiveness of the market as a mechanism to deal with these matters.

From http://www.nextgov.com/ 03/21/2014

TOP↑

 

Senate Passes Bill Demanding Uniform Coding for Agencies' Spending Data

 

The Senate passed the Digital Accountability and Transparency Act on Thursday, raising the likelihood the spending transparency measure will become law. The DATA Act, sponsored by Sens. Mark Warner, D-Va., and Rob Portman, R-Ohio, would require agencies to use a uniform coding system for federal spending data so internal auditors and external watchdogs could easily compare how one agency is spending its money versus another. The bill would also force improvements to the federal spending transparency website USASpending.gov, making it easier for external watchdogs to track and compare how tax dollars are spent across federal agencies. A similar bill, sponsored by House Oversight and Government Reform Committee’s Chairman Darrell Issa, R-Calif., and ranking member Elijah Cummings, D-Md., passed the House in November. Warner described the Senate version of the bill in a press release as a bipartisan compromise draft crafted by sponsors and committee chairs in both chambers. “Our taxpayers deserve to know how their federal funds are spent -- dollar for dollar -- and it is the government’s obligation to share that information in a clear and accessible way,” Warner said following the bill’s passage.

 

The White House suggested rolling back some of the DATA Act’s transparency language in a document leaked in January, including by removing a requirement that agencies publish spending information using common data standards. Instead the White House suggested agencies use open data practices. That would have ensured spending information was publicly available but not that it was consistent across agencies. The White House version would also have required agencies to report information quarterly rather than monthly and would have put the White House’s Office of Management and Budget in charge of implementing the new law rather than the Treasury Department. The suggested changes were criticized by transparency groups, and Warner said he would not water down the bill. Issa said the bill as it is lays the foundation for a digital revolution in how we govern. “Without accurate, timely, program by program spending data, we will never be able to truly track federal spending, which is the only way we can address the massive amount of waste and fraud in government,” Issa said in a statement. “I applaud the Senate’s action today, and I will work with my House colleagues to send this bipartisan, bicameral compromise to the president’s desk.”

From http://www.nextgov.com/ 04/10/2014

TOP↑

Lawmakers Want Pentagon to Clarify Cloud Security Standards

 

Two House members are proposing legislation they say would ease the way for cloud computing vendors to sell services to the Defense Department. The Defense Cloud Security Act would require department officials to set clearer security requirements for cloud storage and other cloud services “and give vendors an opportunity to meet those standards,” said an aide to Rep. Niki Tsongas, D-Mass. Tsongas and Rep. Derek Kilmer, D-Wash., are expected to introduce the legislation April 28. Although the Defense Department already buys cloud services from a number of private vendors, Tsongas and Kilmer say that more companies could be providing more cloud services if the military had clearer security requirements. For vendors, the military represents a large and potentially lucrative market for cloud storage and applications. And for the Defense Department, the cloud represents a way to reduce the cost of owning and operating its own servers and software. “Storing benign information on internal DOD servers is an increasingly large expense, particularly given the widespread availability of secure, fast, reliable, and affordable storage services utilized in the private sector,” said Tsongas aide Katie Enos. Cloud data storage by commercial sector vendors already enables other federal agencies to store data at a fraction of the cost of operating their own physical data centers, she said.

 

“The point of this legislation is to ensure that the Department of Defense establishes its security requirements for cloud storage in a timely fashion, and to give vendors the opportunity to meet those standards,” said Enos said. “Without established standards, vendors are not able to determine whether or not they can meet DOD’s requirements to provide cloud services.” Among cloud vendors, there’s a perception that the Defense Department has not moved quickly enough to establish security standards that will enable more use of the cloud, said Charlie Benway, director of the Advanced Cyber Security Center in Boston. Besides prodding the Pentagon to set cloud security standards, the Defense Cloud Security Act would also require the department to study best practices in cloud computing in both the private and public sectors and determine which the military should adopt; and study commercial cloud computing technologies that the military might use to meet security requirements and save money.

 

“It’s important for the DOD to fully embrace innovative technologies the private sector can provide,” Kilmer said in a statement. Despite the difficulties some cloud vendors have encountered, four so far have managed to satisfy DOD security requirements and win contracts. In March, for example, Amazon Web Services received the go-ahead to provide cloud services for unclassified information to the military services and civilian defense agencies. To satisfy the military’s security requirements, Amazon had to meet standards set by the Federal Risk and Authorization Management Program, known as FedRAMP, and then meet additional security requirements set by the Pentagon. It’s those additional standards that remain unclear to many vendors, a congressional aide said. The Defense Cloud Security Act would require the Pentagon to clarify the requirements.

From http://www.nextgov.com/ 04/25/2014

TOP↑

 

OMB Plans Digital Service to Improve IT Delivery

 

Federal CIO Steven VanRoekel wants to formalize the process of bringing in outside experts to work on complex IT projects. The Office of Management and Budget is looking for funds to operate a 25-person technology shop inside the office of Federal CIO Steven VanRoekel, with an eye to developing common platforms, moving agency development and acquisition to the agile model, and overseeing critical, public-facing IT projects. If the budget request is approved, this Digital Service project will include tech professionals serving in government for two- to four-year rotations on a full-time basis, possibly supplemented with private sector professionals scrubbing in on a project basis for a month at a time, VanRoekel told reporters after a hearing of the Senate Homeland Security and Governmental Affairs Committee that focused on IT acquisition. "We've talked to some leading, cutting edge private-sector companies about establishing programs where their sabbatical program could support a rotation in government," VanRoekel said.

 

Currently, OMB is running a pilot program to scope out the Digital Service model. While VanRoekel didn’t share specifics on agencies and programs, he said that so far four private-sector professionals have come in to work with agencies to analyze projects and make recommendations about how to improve performance. If the funding comes through, the Digital Services team will be tasked with looking at the highest priority items in the federal IT portfolio, some as they are in mid-stream and some as they are being drawn up. He cited the 2020 Census and a planned Social Security Administration modernization as the kind of projects that might benefit from an advance look by the Digital Service team. The new PortfolioStat guidance from OMB issued earlier this week asks agencies to identify their highest priority projects. "By bringing this team in to work with the agencies proactively to do a deep engagement, it'll all be about figuring out where they are in-flight and then applying recommendations to identify where are the gaps, what are the approaches they're doing that maybe aren't compatible with getting the results we want to see, and what do we do to address that, and then hold them accountable with regular check-ins," VanRoekel said. "This isn't taking over. It's not rescuing these efforts. It's really about working side by side-with-them," he added.

 

In his testimony before the Senate committee, VanRoekel said the Digital Services team will work in conjunction with 18F, the design and development squad being launched as a kind of government start-up inside the General Services Administration. The move comes as congressional overseers and the Government Accountability Office press for more checks on IT spending, better management of projects, and a shift to a more iterative, agile development style. Much of the impetus for IT reform has come from the very public failure of HealthCare.gov when it launched in October 2013, but committee Chairman Tom Carper (D-Del.) is just as concerned about everyday IT spending. "Most struggling IT projects do not get the type of response -- or media attention -- that we saw with HealthCare.gov, with a team of experts rushing in to set things straight. Rather, what typically happens is we continue to sink more money into these programs as they sputter along," he said. The GAO released a report, timed to coincide with the hearing, that said key federal agencies aren't following through on OMB policies dating back to 2010 to develop IT in increments, with major projects delivering on new capabilities every six months. According to the GAO review of five agencies, the Departments of Defense, Homeland Security, Transportation, Health and Human Services, and Veterans Affairs, only the VA has requirements in place and a system to enforce compliance.

 

Dave Powner, the GAO's Director for IT Management, also noted OMB's plan to move TechStat -- the meetings convened to investigate what is going wrong with projects that are behind schedule or over budget -- to the agency level, and away from OMB. According to Powner, only two projects received the TechStat treatment by OMB in fiscal 2013. While he supports empowering agency CIOs to conduct TechStat, Powner said, "We strongly think that OMB should hold TechStat sessions on a selected basis for troubled projects, or projects that are top national priorities." Carper announced that the Federal Data Center Consolidation Act, which would enshrine the OMB policies on closing and combining data centers into federal law, had won committee approval and would be brought to the Senate floor for expedited consideration within a few weeks.

 

However, another Senate IT reform bill to that would give agency CIOs some measure of control over agency-wide IT budgets, has yet to come up for a hearing or vote in the committee. A source in the Senate said the sponsors were meeting with the committee to talk about the bill, but there was no firm date set for a hearing. The administration continues to oppose a related reform bill that passed the House called the Federal IT Acquisition Reform Act. VanRoekel is concerned that it focuses on existing policy rather than looking to the future. "It says a lot of really good stuff [but] it doesn't do a lot of things," VanRoekel told reporters. To improve IT delivery, you have to look outside the "IT swim lane," he said. "It's got to be about the acquisition people, companies working with government, all the things we have in play there need to be considered. I think the legislation doesn't take us all the way we need to go."

From http://fcw.com/ 05/08/2014

TOP↑

Data Sovereignty Laws Hamper International Crime Investigations: AFP

 

International cyber crime police work is being hampered by data sovereignty laws, according to Australian Federal Police's national manager of high tech crime operations, Tim Morris. Speaking at CeBIT in Sydney this week, assistant commissioner Morris said the old idea of where soil is attached to a server "is not going to serve us well into the future", as it slows down the process of obtaining information during investigations. For example, he said that because a cloud server, which could contain data from overseas countries, is "attached to a bit of soil in California" this officially means that the data is held in the United States. "For law enforcers, this means a long and convoluted process of what we call mutual legal assistance requests. These take months to process and there is no way they can keep up with a contemporary investigation that we face today," said Morris.

 

Another challenge facing the AFP is what Morris called attribution. Without attribution back to an online source, he said that cyber crime investigations can't be successful because the AFP and other agencies need to prove the source of the crime to build a successful prosecution case. "That's why [police] agencies talk about the importance of metadata," he said. Metadata is 'data about data' such as the non-image-related information stored when people snap a photo on a digital camera. "Without metadata, successful investigations can never be conducted. In our inter-connected world, if it is a rape, kidnapping or online child exploitation, without attribution back to a source it is almost impossible to get a conviction," he said. Morris conceded that this is a "controversial area" because of people's concerns about privacy. "All I can offer is the policeman's realistic perspective and that is that many investigations won't be worth taking on."

From http://news.idg.no/ 05/09/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

 

China Regulates Online Advertising for User Security

 

Industrial standards for China's Internet advertising went into effect on Saturday as concerns rise over users' information security.The standards, created by the China Internet Association, require that the collection, use, transfer and sharing of user information should stick to mutual agreements and abide by laws and regulations.Websites are required to make clear to users when they are collecting and using information and notify users in a timely manner for privacy protection. Sensitive information can only be collected after agreement by users, according to the standards.The association said that, unlike traditional advertising, online advertisers can target special groups of users based on their online behaviors, which can be recorded and analyzed, stirring privacy concerns.Mainstream Internet companies, advertising firms, and third-party companies have also participated in creating the standards, according to the association.

From http://www.news.cn/ 03/15/2014

TOP↑

 

Beijing Mulls Big Data

 

The Beijing municipal government is considering building a big data platform to integrate data from various institutions and academies.Such data from government institutions, scientific research academies and industrial organizations will be integrated and made accessible to the public, according to a statement released by the Beijing Municipal Science and Technology Commission (BMST) on Thursday."Every year, a lot of scientific data in medical and clinic research, traffic and finance is released, while scientific academies roll out many technical achievements and data on new products and technology," said Yan Aoshuang, director of the BMST.Data is scattered across various platforms and archived without development and utilization, Yan said.The platform will help Internet companies explore the economic and social values of big data, and a number of such companies like retailer Beijing Jingdong, IBaidu and Yonyou Software will benefit, Yan said.Wang Xiao, general manager of big data at Jingdong, said e-commerce companies can use of such data to analyze consumption and reduce outsourcing risks.The building of the platform will boost the big data industry in Beijing, said Gu Haijun, vice president of IZP Technologies Co., Ltd.

From http://news.xinhuanet.com/ 04/11/2014

TOP↑

 

 

China to Establish National Base Station

 

China's telecom industry is set to restructure its infrastructure networks and build a "super" national base station, as initiated by three of China's major telecom operators.China Telecom, China Unicom and China Mobile will hold the shares of the new company (the national base station) with a registered capital of more than 10 billion yuan, according to Caijing.com.A source with China Telecom told the website that the new company will be in charge of building new base stations, telecom towers and tunnels in the first stage. Telecom operators will rent the national base station afterwards -- instead of building their own.China's telecom industry is in the early stages of the 4G era and the national base station company will expand very fast. China Mobile plans to build 500,000 4G base stations by the end of the year, which will all be part of the new firm.The article said once the operators integrate the infrastructure networks, the new firm will save them more costs to launch 4G networks.

From http://www.news.cn/ 04/30/2014

TOP↑

 

JAPAN: National Cybersecurity Certification Planned

 

The government will create a national licensing system to certify the expertise, knowledge and skills of information security specialists, probably in fiscal 2016, sources said Monday. In response to the rising threat of cyber-attacks targeting private companies, the government is aiming to develop greater human resources with expertise in cybersecurity. The government expects that the licensing system will lead to improved measures against information leakage in a wide range of sectors, including electric power, gas and other infrastructural domains as well as hospitals, education, academic research and financial institutions. Cyber-attacks in recent years have targeted not only administrative bodies but also the infrastructure essential for daily living. The 2012 London Olympics faced at least 160 million attempted cyber-attacks. The attacks included attempts to take down systems related to the organizing committee, and attempts to illegally access the system. It is highly likely that Japan will be targeted by cyber-attacks ahead of and during the 2020 Tokyo Olympics and Paralympics.

 

It is thus an urgent task to foster human resources with expert knowledge on information security. The new national licensing system is tentatively being called the information security management examination. The government expects the exam will be held twice a year, with about 20,000 test takers each time, 30 percent to 40 percent of whom are expected to pass The Economy, Trade and Industry Ministry will administer the new system and consider the appropriate difficulty level for the exam during fiscal 2014. The ministry will use know-how from the private sector to draft exam questions over the course of roughly one year. Questions might cover how to take appropriate measures to deal with virus attacks on company smartphones, or how to respond when a company’s website is brought down by cyber-attacks. In light of the fact that cyber-attack methods continue to grow more sophisticated over time, those who receive certification will be required to keep pace, and the government expects that the license will require periodic renewal.

 

According to the ministry, there are about 265,000 engineers engaged in work related to cybersecurity in Japan—a figure they say is 80,000 short of the number needed— and around 160,000 of these professionals lack sufficient knowledge or skills to combat cyber-attacks. Although there already exists a national licensing system called the Information Technology Passport Examination, which tests basic knowledge concerning information technologies in general, there is no license system specialized for information security.  Information security refers to measures and actions to secure safety in cyberspace by preventing illegitimate access, data thefts, computer virus infection and other attacks. As of fiscal 2012, the number of detected cyber-attacks against Japanese government entities was about 1.08 million. Experts have said that it is necessary for the whole of the nation to adopt appropriate cybersecurity measures.

From http://the-japan-news.com 05/12/2014

TOP↑

 

SOUTH KOREA: Court Rules Midnight Ban on Online Games Constitutional

 

The Constitutional Court ruled Thursday that a law limiting children's access to online computer games after midnight is constitutional. In the ruling against a group of teenagers who enjoy online games, their parents and gaming firms, the court said the law has the "justifiable" purpose of protecting minors from Internet game addiction and "a proper means" to implement this aim.

From http://english.yonhapnews.co.kr 04/24/2014

TOP↑

 

Mobile Carriers Face Tougher Public Notice Rules

 

The government's recent revision to the Telecommunications Law forcing mobile carriers to publicize notices on mobile phone subsidies is expected to help chill competition. The Korea Communications Commission (KCC) and the Ministry of Science, ICT and Future Planning (MSIP) announced the revision which will become effective in October. The KCC, the nation's telecommunications watchdog, said it would enforce an upper limit on subsidies given by mobile carriers to 270,000 won. The KCC expects this will help regulate mobile carriers, which habitually violate subsidy regulations. However, companies have different positions on subsidies, which significantly affect their business. The nation's three mobile carriers ― SK telecom, KT and LG Uplus ― have a respective 50 percent, 30 percent and 20 percent market share. Market insiders say that SK and KT may not agree to raising the upper limit of subsidies because this might cause them to lose subscribers to LG, while LG could welcome the measure.

The companies declined to comment on the issue, saying they are not allowed to talk about the details and will accept the KCC's decision, whatever it may be. KCC officials and industry analysts also point out that the law will help stabilize the mobile phone market by easing the intense competition between the carriers. "If market competition is overheated, mobile carriers can stop attracting customers away from each other," KCC official Jang Dae-ho said by telephone. "The revised law can regulate the market better than in the past." "Expanding the regulation, which used to focus on mobile carriers, to cell phone makers and dealers can help ease the competition," said IBK Securities analyst Kim Jang-won. The MSIP said that it will support the bill, which will allow the KCC to order mobile carriers to stop illegal acts such as giving excessive subsidies to customers. Under the new law, mobile carriers will be required to submit monthly reports to the KCC and the MSIP, including information on cell phones' original prices and subsidies.

From http://www.koreatimes.co.kr 05/25/2014

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

INDONESIA: Mayor Reveals Plans for Highly Mobile and Open Smart City

 

In an exclusive interview with FutureGov, Danny Pomanto, Mayor of Makassar, Indonesia’s sixth most populous city with 1.5 million residents, described his plans for a highly mobile and connected smart city. Mobility and open data form the foundation of Pomanto’s plan for this city. “Mobile applications will provide real-time data that helps residents plan their day and improve ease of communicating and transacting with businesses and government agencies.” He described how he envisions the future Makassar City to be: “Using my mobile phone, I can check road and traffic conditions so I can plan the best route to my desired destination. An application shows me real-time availability of parking lots nearby. If I need to pay taxes, I can do it anywhere through mobile banking.” Makassar City has the highest economic growth rate of 9.88 per cent, compared to the national average of 6.1 per cent. According to statistics from Telcos, Makassa’s internet penetration rate is higher than that of Jakarta, and is the second highest in Indonesia, after Palembang.

 

To prepare city residents for mobile and online services, Pomanto is working on setting up free wifi in public spaces. During his campaign for mayorship, he was known as ‘Son of Makassar Alley’, because one of his priorities is to ensure the inclusion of commoners living in the alleys. And part of this goal includes providing digital accessibility to these people. “I want everyone to have access to internet, even people who live in the alleys,” he added. More surveillance cameras will be put up around the city to improve safety and traffic management. “We now have CCTV cameras set up at five corridors. This will increase to 100 corridors in the near future.” Pomanto will also be leveraging ICT to transform how the city government of 18,000 employees will be managed. He was inspired after seeing ‘Flightradar24’, a flight tracker providing real-time information about thousands of aircraft around the world. “If we can use technology to provide oversight on our employees, tracking our activities and operation, I am certain we can improve our efficiency and solve more problems,” he said. The City will soon launch e-payment systems that enable businesses to easily pay all types of taxes and fees. Pomanto expects the roll-out to increase tax revenue by 200

From http://www.futuregov.asia/ 04/03/2014

TOP↑

 

MALAYSIA: Government Prioritises E-Government, E-Learning and Healthcare IT in 2020 Vision

 

Malaysia’s Performance Management and Delivery Unit under the Prime Minister’s Department has highlighted deeper use of IT in government, education and healthcare in its 2013 Annual Report of the Economic Transformation Programme.

 

E-Government

In 2014, it aims to have 80 per cent of government services online and encourage the use of online services such as the myGovernment Portal. In the long run, all public-facing government services will be migrated online with the goal of “zero face-to-face interactions” by 2020, stated the report. It also targets to have a paperless government by replacing paper archives with digital ones. The Government will look into trends around cloud computing, Big Data analytics and cybersecurity.

 

Healthcare IT

The Malaysian Government plans to provide all healthcare facilities, patients and insurance companies with a single platform for expedient information-sharing to help improve the quality of healthcare in the country by 2020. The 1Gov*Net platform will allow healthcare providers to access applications that will increase their productivity while lowering costs and errors. The Government will also explore new models of adopting technologies at a lower cost of rollout to support the planned transformation of the Ministry of Health.

 

E-Learning

The Government looks to establish a “common knowledge platform for students and professionals to enhance teaching methods”. By 2020 it aims to have all 6 million students attending government primary and secondary schools in the country to be connected to high-speed internet through the 1BestariNet programme. The focus for 2014 will be to ensure quality delivery of internet access to schools and increase education content in the virtual learning environment provided by the Government. This will be supplemented by virtual training of teacher across all connected schools. Minister of Communication and Multimedia, Dato’ Sri Ahmad Shabery Cheek, highlighted that upgrades to broadband speed are a key enabler in reaching these goals. “We will work together with the respective ministries to explore ways on how ICT can further support Government service delivery and private sector efficiency, towards achieving the nation’s 2020 aspirations,” he added.

From http://www.futuregov.asia/ 05/15/2014

TOP↑

 

PHILIPPINES: Agency CIO Updates on Anti-Corruption Financial Management Information System

 

The Philippine Government Department of Budget and Management (DBM) has released PHP600 million (US$20 million) more for the Government Integrated Financial Management Information System (GIFMIS). The system will embed transparency in day-to-day operation of government, said Richard Moya, DBM Undersecretary and CIO. GIFMIS will link financial processes together and facilitate their automated management. DBM Secretary, Florencio Abad, described it as one of the keystones in the Government’s larger plan for fiscal transparency and accountability. “Because it’s web-based and updated in real-time, all data in the system is easily tracked to ensure the integrity of our public financial management processes,” he continued “Our drive to ensure transparency and accountability in financial processes will depend largely on our ability to come up with a seamlessly integrated IT system. It’s an urgent governance requirement that we’re quickly addressing head-on,” Moya added. As part of the Philippine Government Financial Transaction Digitisation project aimed at minimising corruption in public finance management, the tender for GIFMIS was released in August last year. “When budgeting, accounting and auditing are accomplished faster, we’re also in a position to serve the citizens better,” Abad concluded.

From http://www.futuregov.asia/ 03/26/2014

TOP↑

 

City in the Philippines Prioritises IT Investment for Citizen Services, Government Efficiency & Revenue Generation

 

Investing in technology to enhance citizen services, government efficiency and revenue generation is high on the list of priorities, Mayor Oscar Moreno of Cagayan de Oro City told FutureGov. Cagayan de Oro City, with a population of 163,676, is the hub of Northern Mindanao (also known as Region 10), which is the fastest out of six regions in Mindanao. Its growth rate is higher than the national average. According to Moreno who assumed office last June, his focus is for Cagayan de Oro City to play a leadership role in Region 10, and ensure that the region’s growth is sustained and accelerated. “Other regions besides Northern Mindanao are all catching up. With the continued growth, we aspire that Mindanao will be a bigger contributor to the growth of The Philippines and the wider ASEAN region,” he said. “Technology upgrading is certainly on my agenda, with a goal to improve government services and efficiency and for revenue generation. If we want to achieve more for our people, technology is the key,” Moreno added.

 

The City is looking to invest in technology that can improve information sharing, enable easier planning and optimise government processes. “There has been some investment in the past, but they were done in bits and pieces. I want to catch up now and have an integrated approach. We want to leverage IT in every possible area, starting first in real estate management, treasury, as well as accounting and budgeting,” he noted. One of the challenges faced by his team is in making the growth inclusive. “Everyone in the community should benefit from the City’s growth. Currently, the biggest difficulty is in resettlement.” Moreno previously served as Governor of Misamis Oriental for three terms where he achieved success in resettling informal settlers. He aims to bring that same success to Cagayan de Oro City. Moreno has an eight point agenda, he coined ‘PRIMEHAT’:

•Poverty alleviation, Peace and Order

•Revenue generation and Resettlement

•Infrastructure

•Metropolisation

•Environment and Education

•Hospital and Health services

•Agricultural productivity

•Tourism, Traffic and Transportation

 

Cagayan de Oro City is the first local government unit in the Philippines to apply the Electronic Commerce Act which allows business transactions with the city hall to be made via internet. It is also ranked the top most competitive emergent cities by the National Competitiveness Council in 2009.

From http://www.futuregov.asia/ 04/04/2014

TOP↑

 

The Philippine Government Reveals ICT Priorities: Health IT, White Space, Cloud

 

In an exclusive interview with FutureGov, Louis Casambre, Under Secretary & Executive Director, ICT Office, Department of Science and Technology (DOST), The Philippines reveals the key priorities and challenges for this year.

 

Health Services

“Our focus has always been on ICT projects that impact and benefit multiple agencies,” said Casambre, whose team is working with the Department of Health (DOH) on getting the systems interoperable. “The challenge we are facing now now is that many systems are operating independently. Data is stored in separate silos. The Health Information Exchange Layer project will provide the shared services layer by creating a common API across systems,” he said.

 

Local Government

Electronic Local Government Units (eLGU) is another key initiative this year. “While many local government units see the value of e-government, they may not have the financial and human resources needed to implement certain systems,” explained Casambre. The national government is investing in cloud services so that local government units can benefit from the latest technology resources without having to invest in expensive infrastructure.

 

TV White space

According to Casambre, the technology that presents the greatest opportunity for DOST is TV White Space. In a recent survey, the Department of Education (DepEd) found that 83 per cent of schools are situated in areas without an internet service provider. “This figure gives a good picture of the actual connectivity rate across the country. How will citizens benefit from all the great ICT-enabled public services if they don’t even have access to the internet? We are working with the DepEd, DOH, Department of Social Welfare on leveraging TV White Space to deliver public services,” he added. The Philippine government is creating a regulatory environment so that the infrastructure can be deployed by the private sector. TV White Space has proven to be effective for enabling communications during disaster recovery. [Casambre speaks on the benefits on white space in another recent interview here.]

 

Shared services

iGovPhil, a whole-of-government initiative, is one of DOST’s flagship projects to provide citizens with a secured digital signature so that they can communicate and transact with multiple agencies without having to register for each online service. “There will be four basic registries: citizens, companies, land and transportation. The common registry will allow systems across different government departments to interconnect,” he commented.

 

Capacity Building

The Philippine leadership is actively pushing for the civil service to adopt technology and deliver more ICT-enabled citizen services. “Over the next three years, the Government will be investing in 250,000 laptops for civil servants, including teachers. There are plans to roll out cloud-based thin client devices to replace PCs in government offices and training programmes to build up the skills of government employees,” Casambre concluded.

From http://www.futuregov.asia/ 04/29/2014

TOP↑

 

SINGAPORE: Government Enhances WiFi Network and Will Double Hotspots by 2015

 

Singapore residents and tourists can now enjoy easier access to WiFi hotspots with a new automatic login feature which started on 1 April. The new enhancement is part of ongoing efforts by the Infocomm Development Authority of Singapore (IDA) to improve the user experience of Wireless@SG, a free public Wi-Fi service that offers Internet access speeds of up to 2Mbps. Dubbed EAP-SIM, this new SIM card-based login feature offers users an ‘always on’ experience by allowing them to automatically connect to any Wireless@SG hotspot using a supported device with a local SIM card. This means new and existing users of Wireless@SG no longer need to sign up for the service or enter any credentials to access the Internet at any Wireless@SG hotspot. Wireless@SG users can easily configure their supported mobile devices to make use of this new login feature by following the connection guide available from the IDA web site.

 

Visitors in Singapore will benefit from the improvements, too. From June 2014, visitors can register for a free account at any Wireless@SG hotspot and receive their login details through SMS messages sent to their foreign mobile numbers. Alternatively, visitors can buy a local prepaid SIM card from M1 and StarHub to log on to Wireless@SG via the new SIM-based login feature. This will enhance the travel experience of smartphone-toting visitors, who are increasingly using their devices as travel guides to discover new sights and find their way around Singapore. Speaking at the launch of the Next Phase of Wireless@SG, Dr Yaacob Ibrahim, Minister for Communications and Information, said: “These enhancements are timely. The pervasive cellular network and presence of Wi-Fi hotspots have paved the way for service providers to roll out location-based and context-driven services to consumers and businesses.” To support the expected growth in demand for free public Wi-Fi services, the IDA, with the support of Wireless@SG operators and venue owners, will roll out more hotspots progressively.

 

By 2015, the IDA will double the total number of hotspots to 10,000. This will be further doubled to 20,000 by 2016. Khoong Hock Yun, IDA Assistant Chief Executive, Infrastructure and Services Development Group, said: “Singaporeans have become increasingly Internet savvy and at ease with the mobile lifestyle. Since the launch of Wireless@SG in 2006, usage of the service has increased six-fold, and now stands at nearly 32 hours per user per month”. “The new SIM card-based login feature will provide easy access to Wireless@SG and increase usage of wireless services among consumers. In addition, small and medium sized enterprises (SMEs) can tap on Wireless@SG to support their IT needs and improve productivity through business applications offered by Wireless@SG operators,” he added. From June 2014, enterprises can look forward to standardised business applications such as data analytics and targeted advertising solutions from Wireless@SG operators that ride on the same public-facing Wireless@SG network. Such standard IT solutions can be rolled out quickly and at a lower cost. Khoong said: “This will help Singapore companies become more competitive, while providing more free Wireless@SG hotspots for the public”. SMEs that are keen to offer Wireless@SG services at their premises can apply for a one-time subsidy capped at $2,400 from IDA to offset the cost of wireless equipment. IDA will provide more details on how SMEs can apply for the subsidy at a later date.

From http://www.futuregov.asia/ 04/03/2014

TOP↑

 

Singapore Government Sets Up Digital Inclusion Fund as It Prepares to Be a Smart Nation

 

The Singapore government will set up a S$8 million (US$6.3 million) Digital Inclusion (DI) Fund to raise the adoption of infocomm for low-income households, and encourage social innovations to help voluntary welfare organisations better manage the well-being of their beneficiaries with relevant technology, announced Dr Yaacob Ibrahim (pictured), Minister for Communications and Information. “The Internet today is increasingly becoming a utility for individuals, households and organisations. The Government has been stepping up its efforts at digital inclusion to ensure that no segment of the community is excluded from the benefits that the internet can bring – for example, access to information and e-services,” he said. The Government’s existing programmes include the NEU PC Plus Programme, Silvercomm Initiative and Infocomm Accessibility Centre reach out to students from low-income families, senior citizens and persons with disabilities respectively. The DI Fund will help individuals and households level up and enjoy the benefits that come with advancements in digital technology as Singapore prepares to wire up as a Smart Nation. For example, targeted households will benefit from home internet access to surf for information and perform digital voice calls.

From http://www.futuregov.asia/ 04/04/2014

TOP↑

Singapore Education Minister Shares 4 Principles on ICT Use in Education

 

The Ministry of Education in Singapore is now preparing for the fourth Education Master Plan. According to Heng Swee Keat, Minister for Education, education must equip students with the necessary competencies to race with and not race against technology. Heng laid down four key principles that he thinks will guide the Ministry moving forward.

 

1. Stay Focused

The Ministry will be focused on its commitment to a student-centric and values-driven education, and ICT can help them do this better. “By staying focused on our goal to bring out the best in every child, we will use technology to transform learning in every school and every student, enabling them to develop strong fundamentals for life-long learning,” he said. To ensure that all schools and students benefit from ICT-enabled learning, the Ministry is currently developing an online Student Learning Space to provide all students access to quality digital teaching and learning resources. The Ministry is also focused on cyber wellness among students. “We cannot assume that just because our children can handle technology, they know how to use technology responsibly. There is no roadmap for the digital world. We need to give every student a compass and to help them develop navigation skills.”

 

2. Stay Curious

Heng urged educators to innovate and experiment new ways of teaching and learning using technology. He believes that ICT can enable personalise learning, he said: “This is an important aspect of our student-centric education. The ultimate goal is customised learning and differentiated teaching for every child.” New technologies may also improve the way assessment is done, such as diagnosing a student’s mastery of concepts, or recommending the most useful digital resources.

 

3. Stay Grounded

While ICT promises a world of possibilities, Heng emphasised the importance of sound pedagogical content knowledge. “A good technological tool placed in the hands of a skilful teacher can breathe life into lessons, and lessons into life. Our teachers must be grounded in strong pedagogy and have the knowledge to use ICT meaningfully and appropriately,” he added. During the last Master Plan, the Ministry has trained about 1,400 ICT mentors, who were instrumental in driving ground-up initiatives. Lessons were shared on an online platform called The ICT Connection, so best practices can be accessed by the wider community.

 

4. Stay Together

“From parents to industry partners, we need to involve the wider community. Together, we can play an active role to bring out the best in each child in every school, at every stage, whatever their starting point,” said Heng. The Ministry will be working more closely with the industry players, tertiary education and other key stakeholders to develop a conducive environment to groom young talents.

From http://www.futuregov.asia/ 04/10/2014

TOP↑

 

New Programme to Train Data Protection Officers

 

SINGAPORE: The National Trades Union Congress' e2i (Employment and Employability Institute) and Straits Interactive on Thursday launched a training programme for data protection officers (DPO). In a joint statement, they said the objective of the programme is to equip companies with the competencies to approach and manage data and privacy protection, and policies. As part of the Personal Data Protection Act (PDPA), which will be enforced on 2 July, all organisations are required to designate one or more individuals to be responsible for ensuring that the organisation complies with this Act. Gilbert Tan, CEO of e2i, said: "The introduction of the Personal Data Protection Act has implications on the way companies do business and how they market to customers. "Companies, especially SMEs, will need skilled PMEs to take on the role of DPO so as to implement and comply with the PDPA. "To meet this industry need, we partnered Straits Interactive to deliver a hands-on training programme that allows prospective DPOs to quickly acquire new competencies by using a practical approach and borrowing from best practices." Straits Interactive is a company which provides personal data protection and Do Not Call (DNC) Registry solutions. The four-module training programme is open to SMEs to send their local workers who will be appointed as a DPO, or who have been designated to help their companies comply with the Act. The DPO training programme, which costs S$4,999, will receive 50 per cent funding from e2i. 

From http://www.channelnewsasia.com/ 05/15/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

INDIA: Government Plan to Connect Rural India with Bharat Broadband by End-2013 Moves Beyond Deadlines

 

NEW DELHI: If India is to study, transact, consume, shop and read on electronic devices, it needs universal and last-mile connectivity. Even as several private players do their thing, in their own patches, the one government project that aims to connect all of India down to its villages, Bharat Broadband, remains a case of missed deadlines. What was supposed to have been in place by end-2013 has moved little beyond pilots — fibre being laid in just 40 development blocks covering 800 panchayats. The Rs 20,000-crore project, started in 2011, planned to lay down fibre in 250,000 panchayats , providing Internet connectivity to 600,000 villages and deliver services like education, healthcare, egovernance and e-commerce online. A despondent N Ravi Shanker, chairman and MD of Bharat Broadband, is hesitant to give yet another deadline. When pressed, he says, "Depending on work starting (laying fibre), end of 2015 should see complete rollout. And then, adds a qualifier: "A clear picture will emerge in the next three months" , the reference ostensibly to the next government at the Centre. Bharat Broadband obtained permission from all but one state (Tamil Nadu) and union territory (Lakshadweep) to lay fibre in the ground. "Now, it's incumbent on the three PSUs to work within the existing schedule of rates (rates fixed by government). These have not been revised, leading to delays," says Shanker.

 

The three PSUs are BSNL, RailTel and Power Grid Corporation, which are the main shareholders of Bharat Broadband and which are laying the fibre. Bharat Broadband is the best way to take Internet to India's 1.2 billion people — its 100 mbps capacity optic fibre cables will be the backbone for mobile networks carrying 2G and 3G services. "There are synergies between wireless networks and optic fibre network for broadband proliferation. Last-mile access will be wireless," says Shanker. Subho Ray, president of the Internet and Mobile Association of India (IAMAI ), an industry grouping, is concerned by the trickledown effect of the delay in the Bharat Broadband rollout. "The government has a target of 600 million Internet users by 2020 and half of them will come from rural areas . Here, Bharat Broadband is vital to create the e-infrastructure," he explains. "The problem is, for such a hitech area, we have 100-year-old laws that govern digging and permission to lay fibre, leading to delays." So far, Internet services have largely been an urban phenomenon. According to IAMAI data, of the 213 million Internet users as on December 2013, 70% were in urban areas. Of this, about half of them accessed the Internet on mobile devices, but only 20 million did it on speedy 3G connections. That's partly because of the limited rollout of 3G and the higher cost of 3G-enabled smartphones (upwards of Rs 6,000).

 

Bharat Broadband, with its pan-India spread, is capable of increasing both usage and speed at a significant pace. "The next five years should see the completely converged network along with affordable devices and cheaper access," says Shanker. Demand for services is driving the growth of the Internet. "The benefits the more savvy users are able to get — like, apply for passports online, pay bills, buy tickets without standing in long queues — will trickle to other areas and boost Internet growth in the country," says Asheesh Raina, principal analyst, Gartner, a research firm. Raina says this is not just true of urban areas; it's also true in rural areas. "For long, we have been talking about how fishermen from Kerala benefit by using phones," he adds. "Now, this trend has migrated up north, with sugarcane farmers from Uttar Pradesh using smartphones to access markets and tie up logistics to transport produce from fields to factories." That creates the pull factor. There's also a push factor. Facilitating such shift in usage are handset makers and telecom operators. Handset makers are launching more smartphones and dropping price points. Nokia, for instance, has launched 19 devices in its affordable Asha series in the last two years. Similarly , local handset maker Karbonn has brought 50 smartphones into the market in the last two years, at a price between Rs 3,500 and Rs 20,000.

 

The other push is coming from telecom operators, who are eyeing data as their next growth lever. "Data revenue for telcos is about 10% (of revenues) at present and will be 50% in the next three to five years," says Debdas Sen, leader, technology consulting, PricewaterhouseCoopers India. "That will come from higher mobile Internet use. Also, growth of e-governance and six new bank licences (which the central bank is expected to announce soon) will propel financial inclusion and mobile banking to remote areas, creating demand for newer Internet services, like mobile banking."

From http://articles.economictimes.indiatimes.com/ 03/18/2014

 

TOP↑

 

India's IT Act Is 'Ill-suited' to Deal with Social Media: Global Network Initiative

 

NEW DELHI: Information Technology Act of India, the world's second most populous country and behind only the US and China in Internet users, is "ill-suited" to deal with social media and user-generated content, a report by Global Network Initiative (GNI) said today.  The report, Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose, prepared by trade-related affairs consultancy Copenhagen Economics said that online platforms that support user-generated content can contribute about Rs 2.49 lakh crore to India's GDP by 2015. GNI -- a non-government organisation promoting Internet freedom and privacy rights -- has tech firms like Google, Facebook, Microsoft among its members including civil society groups (human rights and press freedom groups), investors and academics.  "India's Information Technology Act, hurriedly amended in 2008 and updated with rules for Internet intermediaries in 2011, is ill suited to deal with ICT innovations such as social media and user-generated content, with negative consequences for intermediaries and users alike," GNI Board Chair Jermyn Brooks said in the report. India is a country of particular importance to GNI. As the world's largest democracy, the country trails only the US and China in the number of Internet users, despite an Internet penetration rate of only 10 per cent, he added.

 

Hundreds of millions of Indians are on the verge of gaining Internet access, particularly via mobile devices, with huge opportunities for users as well as serious challenges. "India's robust tradition of freedom of expression and its dynamic ICT (information communication and technology) sector are threatened by anxieties around issues such as hate speech, political criticism, and obscene content," Brooks said.  The Information Technology Act, 2000 was amended by the Information Technology (Amendment) Act, 2008 and was enforced on October 27, 2009. It provides legal framework to address various types of cyber crimes and prescribes punishment.  In 2011, the government had notified the IT (Intermediary Guidelines) Rules 2011 under Section 79 of the Information Technology Act pertaining to liability of intermediaries.  It requires Intermediaries, which include national and international social networking sites, to observe due diligence while discharging their duties.  The intermediaries shall inform the users of computer resources not to host, display, upload, modify, publish, transmit, update or share any information that is harmful, objectionable, affect minors and unlawful in any way.  According to GNI's report, online platforms that support user-generated content can become an important part of India's Internet economy and contribute around Rs 2.49 lakh crore (USD 41 Billion) by 2015, in addition to the contribution of other elements of the Internet economy. "Two years from now their GDP contribution may increase to more than 1.3 per cent, provided that the current legal liability regime is improved," it added.

From http://economictimes.indiatimes.com/ 03/25/2014

TOP↑

 

Indian IT Laws Unfit for Social Media

 

The existing IT laws governing Internet companies in India are not fit to deal with innovations such as social media and user-generated content, says a recent report. The report titled: ‘Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose’ and brought out by the Global Network Initiative (GNI) Board states that the laws do not protect the right of users and stand in the way of the economic benefits that India can achieve through the Internet. According to the report first published in Business Line, the IT laws in Indian Internet companies create excesscosts for online intermediaries including search engines such as Google and social media platforms such as Facebook. These Internet intermediaries would have otherwise contributed more to the Indian economy. The report highlights the cases of companies such as MouthShut and Quikr, which have suffered due to the uncertain legal liability regime governing online intermediaries in India. Moreover the GNI report claims that the current legal regime in India under Section 79 of the Information Technology Act and the 2011 Intermediary Due Diligence Rules also does not offer adequate protection and legal certainty to online platforms with regard to when they would be held liable for user-generated content.

From http://www.cxotoday.com/ 03/26/2014

 

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

AZERBAIJAN: Developing Rules for Electronic Recording of Employment Contracts

 

New rules for recording labour contracts in the electronic information system were submitted by Azerbaijani Ministry of Labour and Social Protection of Population to the government for approval, according to a message from the ministry. Following the approval of these rules, the use of an electronic information system with the help of the 'electronic government' portal will start in Azerbaijan, according to the message. Development of software for the electronic recording system has already been completed. The system will include individual identification codes of employees. The launch of the new recording system, along with securing the employees' rights, will also prevent the cases of formal registration of labour contracts, when a copy of the signed contract is not given to the employee and is kept by the employer, the ministry said. Thus, the employed citizens will not have to provide the certificate of employment, wage and so on. Such information will be available in the new system for electronic registration of labour contracts.

From http://en.trend.az/ 03/13/2014

TOP↑

 

Azerbaijan to Create Electronic Fund for State Standards

 

Issues regarding standardization, metrology and patent were discussed at a meeting of the Caspian European Club (CEIBC) held in Baku on April 9 with participation of Ramiz Hasanov, Chairman of Azerbaijani State Committee for Standardization, Metrology and Patent. Information about the state committee was presented to the CEIBC member companies during the meeting. Ramiz Hasanov said the state committee is carrying out its standardization-related work through created technical committees. The state committee is also attracting relevant services of government agencies to more effectively work out standards. "It would be easy to have all world standards translated into Azerbaijani and deploy them in Azerbaijan. We are conducting stage by stage introduction and taking the market requirements into account," he added. Hasanov also said that a twinning project, covering 24 months is currently underway. The project is aimed at improvement of the legislation in the field of standardization. "The option of creating an electronic file of standards is currently being considered," the chairman of the state committee stressed. He said that Azerbaijani President Ilham Aliyev declared 2014 the Year of Industry. Speaking about the development of the industrial sector, Hasanov emphasized that a technical committee, based on Sumgayit Technologies Park, was created in March. Standards, to be introduced in the near future, have been defined thanks to this work. Apart from this, a technical committee engaged in petrochemistry was created jointly with SOCAR.

 

In general, based on international standards, the state committee plans to adopt about 300 standards in Azerbaijan this year. A new service has also been created in the field of metrology. Thanks to this service, the most modern laboratory of the South Caucasus was created in Azerbaijan last year jointly with the Agency for Nuclear Energy. The national standard base is also planned to be modernized this year, the head of the committee added. Speaking about the accreditation, Hasanov stressed that the new law about accreditation has already been prepared and submitted to the parliament of Azerbaijan for consideration. The draft bill has passed through two readings and is expected to be adopted within two months. Hasanov also said the state committee is conducting an active work concerning industrial property - the patents. The work in this direction is carried out with corresponding structures of the UN. He stressed that the certification in Azerbaijan is carried out in accordance with international standards. The state committee has so far accredited 30 companies in this sphere. Hasanov also touched upon the introduction of Euro-4 standard in Azerbaijan starting from April 1. "Since there is a small difference between Euro-4 and Euro-3, the head of state decided to introduce Euro-4 standards in Azerbaijan", he said. Due to the introduction of new standards, today Azerbaijan imports Premium-95 petrol that fully meets Euro-4 and Euro-5 standards. Addressing the session, Telman Aliyev, the President and CEO of the CEIBC spoke about the forthcoming 1st International Caspian Energy Forum-2014, to be held in Baku on April 23. Telman Aliyev said the forum will have a one-day agenda consisting of two parts. The first part will cover the development of the oil and gas, energy and environmental sectors.

 

Thematic forums, Caspian European Financial Forum, Caspian European IT Forum, Caspian European Industry Forum and Caspian European Infrastructure Forum, will be held within the framework of the section dedicated to the development of the non-oil sector. He also said CEIBC was established in June 2002 in association with Caspian Energy International Media Group and under intensive support of largest oil and gas companies operating in the Caspian-Black Sea region. Ilham Aliyev, President of Azerbaijan, has been the chairman of CEIBC. Telman Aliyev said the CEIBC has promoted attraction of oil sector revenues into development of the non-oil sector since its establishment. CEIBC is operating in 50 countries worldwide, carrying out an active work in maintenance of the dialogue between government agencies and the private sector. Following the meeting Ramiz Hasanov, Chairman of the State Committee for Standardization, Metrology and Patent of Azerbaijan, was presented CEIBC honorary membership certificate.

From http://en.trend.az/ 04/09/2014

TOP↑

KAZAKHSTAN: Communication and Information Agency Created

 

Kazakh President Nursultan Nazarbayev ordered creation of a Communication and Information Agency, the Kazakh presidency reported on March 7.  The measure is aimed at further improvement of the government system in Kazakhstan.  "I order to create a Communication and Information Agency of the Republic of Kazakhstan as a central executive body," the presidential decree said.  The Agency will control the sphere of communication, information, automation of public services and coordination of service centers, archives and documents.  Moreover the president restructured the Kazakh Culture and Information Ministry into the Culture Ministry.  Nursultan Nazarbayev also abolished Kazakh Information and Archives Committee under the Culture and Information Ministry and Communication and Automation Committee and Committee for Control over Automation of Public Services and Coordination of Public Service Centers under Transport and Communications Ministry.

From http://en.trend.az/ 03/07/2014

TOP↑

 

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

AUSTRALIA: ACCC Releases Safety Guide for Online Business

 

The ACCC has released a new publication with best practice tips for online sellers and marketplaces. It will also help consumers. The publication is called ‘A Guide for Business: Consumer Product Safety Online’. Australian Competition and Consumer Commission (ACCC) deputy Chair Dr Michael Schaper said the publication was needed because Australian consumers are increasingly looking to online stores to purchase consumer products. “But the online environment creates some unique product safety challenges and requirements that online suppliers need to be aware of,” he said. “For example, while a consumer can quickly and easily check the mandatory ingredients list of a cosmetic product while in-store, they are unable to do this online unless the list is clearly displayed with the product information. The ACCC is concerned that some online sellers, particularly those based overseas, may not be aware that all businesses supplying to Australian consumers have the same obligations under the Australian Consumer Law,” Dr Schaper said.

 

Businesses breach the law if they sell banned products, do not meet all requirements of mandatory product safety standards or fail in their obligations related to product liability, consumer guarantees and misleading and deceptive conduct. “Mandatory standards and bans are critical in preventing product-related deaths, injuries and illnesses. The ACCC regularly checks for non-compliant products being sold to Australian consumers, including via online stores,” Dr Schaper said. For example in 2013, ACCC surveillance identified two online businesses supplying banned small, high powered magnets to Australian consumers. Following negotiations with the ACCC, these suppliers stopped selling the magnets to Australians and conducted national product recalls. “Product recalls can be expensive for a business but the cost of a recall is not the only potential financial consequence to online businesses who supply unsafe products. Penalties can include infringement notices and the ACCC can seek court-imposed penalties of up to $1.1 million for serious breaches,” Dr Schaper said.

 

Compliance tips for online businesses include:

# clearly displaying warnings and product labelling

# using good quality product images

# providing clear product descriptions, including

# recommended usage

# age-grading for children’s products

# checking the requirements of Australian safety standards and bans prior to listing a product as available for sale.

 

“Businesses must remember that the Australian Consumer Law applies regardless of whether products are sold in a ‘bricks and mortar’ shop, in an online store or via an online marketplace, and regardless of where the seller is based, I encourage all online suppliers to download a copy of the free report,” Dr Schaper said

From http://www.itwire.com 03/21/2014

TOP↑

 

Australia’s Digital Privacy Laws ‘Lag Other Countries’

 

Australian digital privacy laws lag those of other countries, according to a leading academic who says legislation has struggled to keep pace with new technology allowing unprecedented levels of intrusion, surveillance of personal activities and communication of private information. Professor Barbara McDonald from the Sydney Law School, who is heading the Australian Law Reform Commission (ALRC) Inquiry into Serious Invasions of Privacy in the Digital Era, is to expand on her concerns and outline how other countries have met the privacy challenges posed by the digital age at a lecture tonight at the University of Sydney. “How can the law be one step ahead of emerging technology?” said Professor McDonald. “Australian law is lagging considerably behind other countries with which we share a common legal heritage and those that come under European Union law. Our common law does not provide an action for deliberate invasions of privacy. Legislation across the country is best described as a patchwork.”

 

Professor McDonald – who will tonight outline proposals for new laws to protect individuals from invasions of privacy in the digital age - says privacy issues arise from intrusions or surveillance by government, media or activist organisations or data mining by commercial entities. “At the individual level, there are concerns about things such as inappropriate use of social media for ‘revenge porn’, bullying and harassment, or simply surveillance by neighbours. “At the same time, the law must protect freedom of speech and the many other valuable public interests which often collide with an individual’s privacy.” In tonight’s Distinguished Speakers’ Program lecture, Professor McDonald will also announce the proposals in a new ALRC Discussion Paper. The ALRC will provide a final report to the Attorney-General in June.

From http://www.itwire.com 03/27/2014

TOP↑

 

Ludlam’s Return Signals Strong Green IT Policy

 

Counting in the Western Australian Senate Election rerun has confirmed that Greens Senator Scott Ludlam will remain in Parliament for another six years. That’s barring a double dissolution on other electoral anomalies. That’s good news for the IT and communications industries – whatever your politics it is undeniable that Ludlam’s knowledge of and passion for the industry is a benefit to the country, in a Parliament populated mostly by technological illiterates. Ludlam was in danger of losing his seat after the last Federal Election. The first count had him narrowly out, the second count narrowly in, until the Australian Electoral Commission’s bungling, and a subsequent court case, saw the whole state back to the ballot boxes. The count currently has the Liberal Party with two seats, and the Greens, Labor ad Palmer United with one seat each. The sixth is being disputed by Liberal and Labor and will most likely fall to the conservatives. Ludlam greatly increased the Green’s vote over the general election. His victory means he will continue to be a thorn in Malcolm Turnbull’s side, with his articulate and dynamic membership of the Senate Committee on the NBN. He is also a passionate advocate of digital rights, renewable energy, and education.

From http://www.itwire.com 04/08/2014

TOP↑

 

Australia Government Urges Digital-By-Default, Cloud-First & Big Data Strategies

 

The Australian Government has weighed in with full support for key technology platforms driving the business of government. These include a broader adoption of cloud computing, big data, and digital platforms through to 2017. The administration’s just-released Report of the National Commission of Audit May 2014 canvasses a digital cloud first approach to whole-of-government IT procurement. Among the recommendations, this report, delivered by an influential National Commission of Audit, requires agencies to be proactive about digital and cloud-first operations. With a focus on cost-savings, and large-scale cut-backs in Canberra, the commission acknowledge the role of technology to deliver wide-spread savings, while reducing duplication, and streamlining services.

 

Cloud-first policy

Despite the rhetoric of cloud adoption, the commission notes the Commonwealth remains slow to adopt cloud computing. “A reliance on bespoke, legacy systems, concerns about security and privacy of placing public data in the cloud, and general risk-aversion all impede progress.” Drawing on the banking sector, the commission notes a “cloud-first” policy can initially target low-risk, generic ICT services. Over three to five years, this may progressively reduce ICT costs, as cloud computing becomes a “default option.” The commission proposes the Department of Finance establish a whole-of-government cloud computing provider panel. This panel is designed to confirm the viability, capability, and costs of using large-scale cloud computing providers. The focus is ensuring that access to cloud service providers remains competitive, viable, and offers appropriate levels of security.

 

Big data

The Commonwealth holds large amounts of data. But this information is not being used to its best effect. “Some agencies collect data in the natural course of their operations and tend to focus more on collection, rather than analysis and wider use.” The government’s massive data repository is often rarely connected, has duplicates, varies in quality, and is not supported by consistent standards. “The value of data holding to the whole-of-government is rarely articulated.” Moreover, there is little, or no effort to fully examine data holdings, or assess the value of existing data. Agencies can prepare plans that make better use of data, and source innovation from outside government. The government’s Data.Gov portal holds just 3,164 datasets. This compares with 10,000 datasets in the UK, and around 200,000 datasets in the US. Despite this showpiece, there is insufficient access to public data, including disability, aged care, job seekers, and the socially-disadvantaged.

 

The Australian Public Service needs to improve its capacity for data analytics. This involves analysing large datasets, in real-time, and being able to share insights, identify anomalies, and allocate resources, as and where needed. With a renewed focus on big data, planners need to identify and prioritise projects, spanning key service delivery bodies. These include the Department of Human Services, Australian Taxation Office, and the Department of Immigration and Border Protection.

 

Digital by-default

Like the UK, the Australian government may support a “digital strategy by default.” This strategy can be supported, more aggressively, under the auspices of the Department of Human Services’ MyGov on-line offering. This portal offers access to information from Medicare, Centrelink, child support, health, veterans’ allowances, and disability insurance. But boosting access to digital services involves a more “ambitious strategy.” The administration plans to ensure that every interaction, occurring more than 50,000 times a year, will be done on-line by 2017. Government correspondence is also expected to be available digitally, over the next four years. Australia’s slow uptake of “digital government” is attributed to fragmented arrangements involving multiple agencies, and a policy disconnect. The commission proposes that core expertise be consolidated, under a single team. This can be led by a chief digital officer, a role more likely filled by a private sector leader, with the nous to deliver digital transformation programmes.

From http://www.futuregov.asia 05/02/2014

TOP↑

 

Australian Government Reinforces ICT Modernisation Reforms

 

The Australian Government has weighed in with full support for key technology platforms driving the business of government. These include a broader adoption of cloud computing, big data, and digital platforms through to 2017. The administration’s just-released Report of the National Commission of Audit May 2014 canvasses a digital cloud first approach to whole-of-government IT procurement. Among the recommendations, this report, delivered by an influential National Commission of Audit, requires agencies to be proactive about digital and cloud-first operations. With a focus on cost-savings, and large-scale cut-backs in Canberra, the commission acknowledge the role of technology to deliver wide-spread savings, while reducing duplication, and streamlining services.

 

Cloud-first policy

Despite the rhetoric of cloud adoption, the commission notes the Commonwealth remains slow to adopt cloud computing. “A reliance on bespoke, legacy systems, concerns about security and privacy of placing public data in the cloud, and general risk-aversion all impede progress.” Drawing on the banking sector, the commission notes a “cloud-first” policy can initially target low-risk, generic ICT services. Over three to five years, this may progressively reduce ICT costs, as cloud computing becomes a “default option.” The commission proposes the Department of Finance establish a whole-of-government cloud computing provider panel. This panel is designed to confirm the viability, capability, and costs of using large-scale cloud computing providers. The focus is ensuring that access to cloud service providers remains competitive, viable, and offers appropriate levels of security.

 

Big data

The Commonwealth holds large amounts of data. But this information is not being used to its best effect. “Some agencies collect data in the natural course of their operations and tend to focus more on collection, rather than analysis and wider use. The government’s massive data repository is often rarely connected, has duplicates, varies in quality, and is not supported by consistent standards. “The value of data holding to the whole-of-government is rarely articulated.” Moreover, there is little, or no effort to fully examine data holdings, or assess the value of existing data. Agencies can prepare plans that make better use of data, and source innovation from outside government. The government’s Data.Gov portal holds just 3,164 datasets. This compares with 10,000 datasets in the UK, and around 200,000 datasets in the US. Despite this showpiece, there is insufficient access to public data, including disability, aged care, job seekers, and the socially-disadvantaged.

 

The Australian Public Service needs to improve its capacity for data analytics. This involves analysing large datasets, in real-time, and being able to share insights, identify anomalies, and allocate resources, as and where needed. With a renewed focus on big data, planners need to identify and prioritise projects, spanning key service delivery bodies. These include the Department of Human Services, Australian Taxation Office, and the Department of Immigration and Border Protection.

 

Digital by-default

Like the UK, the Australian government may support a “digital strategy by default.” This strategy can be supported, more aggressively, under the auspices of the Department of Human Services’ MyGov on-line offering. This portal offers access to information from Medicare, Centrelink, child support, health, veterans’ allowances, and disability insurance. But boosting access to digital services involves a more “ambitious strategy.” The administration plans to ensure that every interaction, occurring more than 50,000 times a year, will be done on-line by 2017. Government correspondence is also expected to be available digitally, over the next four years. Australia’s slow uptake of “digital government” is attributed to fragmented arrangements involving multiple agencies, and a policy disconnect. The commission proposes that core expertise be consolidated, under a single team. This can be led by a chief digital officer, a role more likely filled by a private sector leader, with the nous to deliver digital transformation programmes.

From http://www.futuregov.asia 05/02/2014

TOP↑

 

Australia Plans Whole-of-Government Open Source Cloud-Based Content Management System

 

The Australian Government is planning a whole-of-government Content Management System (GovCMS) using open source Drupal software hosted on public cloud, Government Chief Technology Officer, John Sheridan announced. GovCMS will support more effective service delivery through the web channel and enable agencies to focus on higher-value activities that are more aligned with their core missions. Sheridan emphasised on the use of cloud services as an important step towards simplifying ICT, and eliminating duplicated and fragmented activities across agencies. The use of open source for GovCMS will enable sharing of code, modules and applications, and is expected to reduce development costs. “We expect all code and modules developed for use in the open source platform would be made freely available for all Government agencies (and the wider open source community) to freely utilise modules developed for the chosen open source platform,” states the draft Statement of Requirements as one of the objectives of GovCMS.

 

The system also looks to deliver cost savings to agencies as multiple government agencies use a common and scalable cloud-based platform to host websites. It also aims to reduce compliance costs for individual agencies and make it easier for agencies to comply with standards and policies in security, accessibility, privacy and digital design standards. The platform must be able to withstand “large scale and prolonged Distributed Denial of Service attacks” and must have a disaster recovery plan, adds the document. The Department of Finance aims to have GovCMS go live in September 2014. The feasibility study has found that between 182 and 437 government websites can be migrated to the GovCMS platform in four years.

From http://www.futuregov.asia 05/12/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Government.gif

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

ARABIAN STATES: The United Arab Emirates - A Rising Star in E-Government

 

How the small Middle Eastern country jumped from 49th to 28th in online service delivery should have state and local CIOs in the United States paying close attention. Some small countries have had outsized success with e-government. For years, Denmark, Estonia, the Netherlands, Singapore and South Korea have scored high on international rankings for online service delivery. But another small country from outside the digitally advanced regions of Europe and Asia has quietly yet quickly moved to the forefront of tech-savvy governments: In 2012, the United Nations ranked the United Arab Emirates (UAE) 28th in its global survey of e-government, up from 49th in 2010. It’s no small feat to advance 21 positions in just two years, and how this small Middle Eastern country on the Persian Gulf did that should have state and local CIOs paying close attention.

 

Once considered a backwater in the Middle East, the UAE today is highly developed. Dubai, one of the UAE’s seven states, hosts some of the world’s tallest and most impressive buildings. Governed by a Supreme Council made up of seven emirs who appoint a prime minister and cabinet, the UAE started down the e-government path in 2001 when it launched an electronic card to collect service fees. Since then, the kingdom of 9 million has continued to build its e-government reputation, which was solidified earlier this year when the tech giant Accenture placed it third in its annual roundup of leading digital governments. A lot of UAE’s success has to do with its management style. It’s taken an approach that states and their local partners might find interesting: Government departments in the UAE’s principalities can create any new online services they want, while the central authority focuses on building the common parts that all departments need, like payment and customer support. This hybrid approach results in standardization, best-practice sharing, cost savings and fast deployment.

 

Look at “Markabati,” a portal from the central authority that lets all UAE residents connect easily with every aspect of vehicle service in the public and private sector. Whether the need is car insurance, spare parts, customs and registration forms, or car rental, everything can be found and transacted through the portal. Or look at the country’s experiment with mobile technology. The UAE sees itself as moving from e-government to “m-government.” Home to one of the largest smartphone and mobile penetration rates in the world, the government announced earlier this year that it was setting up the Arab region’s first lab to test secure ways to offer residents mobile government services. This initiative is part of the UAE’s larger effort to make digital technology, networks and apps a central part of how it operates and interacts with citizens. By May 2015, the UAE hopes to have all government departments providing a one-stop store for apps and enabling all transactions through a single log-in. It will allow the public to deal with government departments using their smartphones “any time, any day of the year,” Dubai’s ruler Sheikh Mohammed bin Rashid Al Maktoum told Arabian Business.

 

The UAE backs up all of its e-government initiatives with serious money. IT spending is expected to grow nearly 13 percent from $716 million in 2013 to $808 million in 2014, according to the International Data Corp. All this investment and work is paying off in two ways. First, UAE views its public spending on e-government as another way to seed the field for private investment in the country’s growing technology sector. Second, it has led to one of the highest rates of customer satisfaction in the world for service delivery. There are certainly many differences between the UAE and the U.S., but we should admire the level of state and local cooperation there, and consider how we can replicate that here. (This story is part of Governing's annual International issue.)

(BY TOD NEWCOMBE)

From http://www.govtech.com/ 04/29/2014

TOP↑

 

EUROPE: Italian Unions Urge PM to Accelerate Broadband Deployment

 

The general secretaries of three of Italy's leading trade unions – Cgil, Cisl and Uil – have written to prime minister Matteo Renzi to call for an acceleration of the development of the country's broadband network "on which Italy's recovery depends". In the letter the unions urge Renzi to support the deployment of the next generation network through measures such as the recapitalisation of Telecom Italia and the intervention of the state-backed holding company Cassa Depositi e Prestiti (CDP). However, according to the unions, the spin-off of Telecom Italia's fixed network is not the way forward because it would be tantamount to "expropriating a property" from a private company, while the second possibility of leaving it all to the markets is equally unpalatable because "in practice this would mean giving a free reign to Telefonica." In this regard, the unions express their concern that Telefonica’s increased presence in Telecom Italia is “simply a financial operation rather than an industrial one” and that allowing Telefonica to effectively merge with Telecom Italia would create a highly indebted group unable to invest in new technologies which would be a disaster for Italy, potentially affecting 45,000 workers.

From http://www.telecompaper.com/ 03/28/2014

TOP↑

 

 

NORTH AMERICA: Canada - Ontario Fails at Its Own Open Government Strategy Once Again

 

The Government of Ontario has once again failed in its commitment to open government and open data. After patting itself on the back for opening an open data portal in 2012, the governmnet has done little to live up to that commitment and, in fact, is doubling down on releasing information in closed formats that are difficult to navigate and read. Under provincial law, the salary and position of every public sector employee earning more that $100,000 per year must be disclosed annually. The so-called sunshine list is a measure of accountability. Since it began being posted online, the list of government employees and their salaries has been posted in a series of closed HTML files and PDFs.

 

In the 2012 release, the list of employees included more than 70,000 records. To most governments in Canada, and in accordance with Ontario’s own OpenData strategy, that’s a simple spreadsheet posted to a website where interested parties can download and peruse the relevant information. But Ontario bureaucrats decided to post that information as raw text spread across 60 different web pages in 2012. That’s a 6. Followed by a 0. And they called it disclosure. Backlash from journalists and open data advocates rang loudly and this year was supposed to be different. The government evolved, leadership changed and the open data site expanded. But no dice.

 

Instead of being truly transparent and encouraging citizens to mine the data, the Ontario Ministry of Finance has posted the data across more than 60 different web pages. Alternatively, 14 different PDF files could be downloaded and converted manually. When asked why, a representative from the government told me: “It is possible to copy and paste the information from the HTML version on the website into an Excel spreadsheet.” Meanwhile, many of the names and salaries contain duplicate information and are poorly sorted to begin with. With incredible frequency, there are duplicate entries in the data which is published online, entries like this:

 

Algoma District School Board DUNSEATH JONATHAN Elementary Vice Principal $102,557.41 $413.46

Algoma District School Board DUNSEATH JONATHAN Elementary Vice Principal $102,557.41 $413.46

Algoma District School Board EDWARDS JANICE Elementary Vice Principal $102,557.32 $413.46

Algoma District School Board EDWARDS JANICE Elementary Vice Principal $102,557.32 $413.46

Algoma District School Board EVANS PETER Secondary Vice Principal $113,394.55 $413.46

Algoma District School Board EVANS PETER Secondary Vice Principal $113,394.55 $413.46

Algoma District School Board FORBES LAURIE Elementary Principal $115,790.28 $413.46

Algoma District School Board FORBES LAURIE Elementary Principal $115,790.28 $413.46

 

The Government of Ontario opened a new Open Data site in late 2012 that promised to increase government transparency by making key government data downloadable in machine-readable formats like spreadsheets and databases. Meanwhile, journalists are using automated computer programs to compile the data and strip away duplicate information anyway. Journalists are then posting this information online for all to see and use. Journalists are doing the rest of the job the government, which is mandated to provide the information, is simply too lazy or inept to do.

From http://o.canada.com/ 03/28/2014

TOP↑

 

Facebook Releases Government Data Request Stats

 

Facebook has revealed its second report revealing all of the crime-related information requests the social network receives from various governments around the world. In this latest report 174 requests were made for 217 user accounts with a 50 per cent success rate. Back in 2012, the Canadian government received 192 information requests related to 219 Facebook accounts. By law, Facebook was ordered to hand over information for 44 per cent of those requests. While the report doesn’t go into deep specifics, it’s nice to see a website, especially one that has suffered from security in the past, show a level of transparency. Looking at Canada in comparison to other developed countries, the numbers are relatively low. Although it’s important to point out that this list only consists of requests related to criminal offenses and not requests related to intelligence. In comparison the United States has 12,598 requests for 18,715 users with a 81.02 per cent approval rate. (The U.S. has a population that is about 10 times the size of Canada’s, though.)

From http://www.montrealgazette.com/ 04/14/2014

TOP↑

 

Athabasca University’s CIO Explains Why IT Governance Is a Must-do

 

To some CIOs, it may occasionally seem like the inmates are running the asylum with all the demands for greater device choice, unrestricted use of apps and so on. Without any kind of IT governance, however, the situation could be even worse. Good IT governance provides a common framework for making all kinds of technology investment decisions, from back-office and infrastructure to data in the cloud and beyond. At the recent CIO Association of Canada Peer Forum, we took an opportunity to talk to Mike Battistel at Athabasca University about why IT governance has emerged as his most important priority.

From http://www.itworldcanada.com/ 05/08/2014

TOP↑

 

U.S.: Government Transparency Means All-ish Data All the Time

 

Open data is a change in thinking and behavior as much as legislation. All-ish” may be better than all in. Remember the dot-com era excitement around digital government at the turn of the century? Speechwriters (and even a bill or two dropped in the legislative hopper) used the phrase “everything ‘e’ by 2003.” It rhymed and got at the important idea that e-government was more than an alternative service delivery mechanism. But defining the goal as everything turned out to be a mistake. It set the jurisdictions that used the phrase up for failure if even one thing was left offline. It also removed the need for prioritization. And it confused intent, which a fair reading suggests was to make e-government the default for public information and services. Fast-forward a decade to see that open data advocates and practitioners may have been prevented by circumstance from making the same mistake.

 

As Government Technology reported last fall, New York City committed itself anew to the nontrivial task of creating a public inventory of government-held information and releasing dozens of additional “high-value” data sets on a revamped open data portal. At the Sunlight Foundation, the nonpartisan government transparency group, Policy Analyst Rebecca Williams lauded the city as “the first U.S. government [to have] completed a comprehensive data set inventory.” Coining the term “all-ish,” her critique focuses on legislative limits that stop disclosure short of everything. New York state is on a parallel track, “bringing the people back into government …” as Gov. Andrew Cuomo describes it, through the state open data portal at data.ny.gov.

 

The New York experience became a model for Washington state, where the Legislature took up a bill this session to expand its open data portal and the organizational infrastructure behind it. Executive branch agencies complained about the cost and complexity of publishing their data, winning them a reprieve in amendments that would extend the compliance timelines — giving them 15 months, rather than 180 days to file a compliance plan — and giving them a potentially sweeping exemption around the preparation and publishing of data “which would impose undue financial, operative or administrative burden on the agency.” Does it include everything? No. Is it the new default? Yes. It’s a distinction with an important difference.

 

A year ago, the Obama administration issued an executive order “making open and machine-readable the new default for government information.” A bumper-sticker-length version of that same language — “Set the default to open” — is the cornerstone of Sunlight’s 32-point plan for sound and sustainable open data policy for government. Those five words define the goal, the tactic for getting there and a mindset for governing. The other 31 points boil down to four behaviors for those on this journey:

 

?Being purposeful enough to build on existing public disclosure laws (with exemptions continually tested for their contribution to the public interest) while safeguarding sensitive information; surface public information — including bulk data — online through a designated data portal;

?Being particular and peculiar enough to maintain a public, comprehensive list of all information holdings and processes to ensure data quality;

?Being confident enough to appoint an oversight authority (that may or not include you) and to knock down barriers to accessing and reusing information held by government;

?Being bold enough to mandate things that matter — the capture of specific new information, publishing metadata, use of open formats, setting ambitious timelines, use of electronic filing, and the use of and future reviews of the policy itself in light of ongoing changes in the “art of open.” There’s one more bit of good news that distinguishes this all-ish open data era from the earlier e-government era. There’s no year that I know that rhymes with “open.” Take that, speechwriters.

From http://www.govtech.com/ 02/25/2014

TOP↑

 

7 Ways to Innovate Government IT

 

Seven ingredients to tip the balance toward innovation in your organization. At the risk of stating the obvious, the average government CIO isn’t able to spend much time dreaming up new projects. “Keeping the lights on” or “putting out fires,” whatever business-speak you prefer, tends to dominate the CIO’s work schedule. This point was driven home yet again in a recent NASCIO survey: A third of respondents said they spend up to 90 percent of their time simply keeping the lights on. More than 40 percent said they spend as much as 75 percent of their time on such tasks. On the other hand, half of respondents said they spend one-quarter of their time or less on innovation, and almost 30 percent said they spend just 5 percent or less of their time on innovation-related tasks. Carving out time to pursue innovation is not a new workplace challenge, nor is it unique to government. Phil McKinney, a former CTO of HP’s Personal Systems Group and author of Beyond the Obvious: Killer Questions that Spark Game-Changing Innovation, suspects that most private-sector companies also are struggling to find a balance between daily operational tasks and innovation. “Innovation needles to zero in most organizations,” McKinney said bluntly. Still, government CIOs say the pressure to innovate is rising and expectations are increasing. More citizens are tech conscious and more public leaders realize that technology is a pathway for improving service and reducing costs. CIOs now must somehow find a way to focus on innovation. Finding a balance isn’t easy, but some government CIOs have found practical ways to fit innovation into their own schedule and within the culture of the office they manage. Here are seven common-sense imperatives for driving innovation in the government enterprise.

 

1. Be Specific About Innovation

Innovation has become so common in business lexicon that one could argue that the word has lost meaning and become too much of a catch-all. Everybody wants to be an innovator, but most don’t spell out what it means. A definition can help ensure expectations are kept in check and help avoid a “shoot for the stars” mentality that all innovation is possible — even though resources are always limited. A definition also can help measure time spent on innovation. “Innovation in government isn’t necessarily you sitting there producing brand-new products that are new to the market. Innovation could be the conversations you have, the type of initiatives you push, your approach to solve the same old problems. That, in and of itself, can be strategic and innovative,” said Adel Ebeid, Philadelphia’s chief innovation officer. Innovation also is a matter of perspective. Los Angeles CTO Steve Reneker said that when he talks to elected officials about innovation, they might think first about a mobile app or a new website. But the IT department is looking foremost at what it takes to manage and maintain the city efficiently — both are needed types of innovation. Definitions of innovation can vary widely, but Bryan Sivak, CTO of the U.S. Department of Health and Human Services, calls it “a direct result of the freedom to experiment.” If you define it that way, Sivak says he spends much of his time on innovation. Most public-sector organizations aren’t spending time and resources on innovation because they don’t value experimentation or are risk averse, he said.

 

2. Prepare for Failure and Embrace It

Nine out of 10 innovation efforts will end in failure, McKinney said. That may sound like a deal breaker, but failure is an unavoidable byproduct of innovation. On the bright side, failure actually can be a learning moment that leads to a later success, McKinney said. Make sure to review the lessons learned when a project crashes and burns. McKinney recently saw a ski industry CEO describe his biggest failure to a crowd of 500 company managers. The CEO said it wasn’t a career killer and that failed innovation doesn’t have to be deadly. Of course, failure isn’t perceived as an acceptable outcome for most government CIOs who face outsized public expectations and rising pressure from the executive suite and elected leaders. When a new IT system fails, the CIO and other staff can be fired because “wasting” taxpayers’ money is intolerable. Colorado CIO Kristin Russell said today’s CIO must have a courageous mindset in order to survive and thrive. Blame comes with the position. Being transparent and bringing as many people in as possible early in an innovation-related project can help. “When we’re doing something risky, I let people know this may fail — even to legislators, stakeholders, the state cabinet. And you remind them of that through the process,” Russell said.

 

3. Carve Out a Little Personal Time

A short burst of brainstorming can sometimes be as productive as a formal, department-level meeting. Each week Russell tries to set aside two hours on her work calendar so she can get out of the office to research something she doesn’t know about — and the topic isn’t necessarily related to technology. She uses the time to think about strategy and innovation. “Every time I do this it’s amazing. I walk away with 20 different ideas we could go and do. It’s hard to carve out that time and pull myself from the desk, but every time I do, I gain something and I bring it back to the organization,” Russell said. Reneker makes time to visit the numerous websites that report on government and technology news. Web browsing can be a time waste, but Reneker’s focus is simple: He looks for creative ideas from other cities and counties that might align with an existing project request from an L.A. council member or executive sponsor. That allows him to work on innovation while also fulfilling the wants and expectations of elected leaders and his bosses. Government likely will never have the luxury of Google’s “80/20” rule, which allows the company’s employees to use 20 percent of their work time on personal work projects. But there’s no harm in letting your employees take a few minutes to explore what others are doing in the innovation space.

 

4. Consider a Name Change and an Innovation Office

Perhaps the job title of chief information officer is becoming counterproductive to the innovation agenda. The CIO’s responsibilities are much broader and diverse than 20 years ago, when the main charge truly was only to keep the computer systems running. The position was in the back office. That isn’t the case anymore, of course. “I believe the title of CIO should be abolished,” Sivak said. Sivak thinks it’s time to call the CIO the “commodity infrastructure officer” and then put that person on the organizational chart beneath a “chief digital officer,” who would tackle the innovation activities that many CIOs are responsible for today. The beginnings of this shakeup could already be under way in cities like Philadelphia that have named a dedicated innovation officer and an innovation management unit tasked with ensuring there are always fresh ideas in the pipeline. Splitting off innovation workers from the IT department may or may not be worth considering. Philadelphia’s innovation team is part of the Office of Innovation and Technology, which also oversees bread-and-butter IT functions like communications and infrastructure. Reneker said leveraging existing resources within the organization has its own benefits. “When you create an innovation organization, the technology you need to deploy for that level of innovation — a mobile app or enhanced website — all might require different tools. To have an expectation that an innovation group can learn it all and be an expert in everything isn’t really a reality,” Reneker said.

 

5. You Can’t Innovate Alone

Innovation doesn’t happen in a vacuum, nor does it happen when going it alone. You can say innovation is important, but if you don’t embed it in your workplace culture among your staff, innovation will never get traction. Culture can be built up over time, but it must be a core attribute. When McKinney coaches and mentors chief executives, he asks them how much time they truly spend on innovation. “Don’t think that you’re sitting in a room and some guy who is leading your innovation comes in to present to you — don’t think that satisfies your innovation program,” McKinney said. You must make innovation a valued skill set among employees and hire people who, in turn, are willing to work on innovation-related activities. Not everyone’s cut out to work on open-ended projects that may fail. Sivak said the good news is that more people than you might expect are enthusiastic about innovation. Ebeid advises making careful hires when vacancies arise on the CIO’s top management team. Take the opportunity to redefine the job role and include an innovation component. If you replace positions with people who aren’t dedicated to the innovation agenda, then you have little chance of getting meaningful work done. “My agenda as CIO is not to innovate,” said Ebeid. “My job is to nurture an innovation ecosystem made up of the right individuals, the right ideation process, and constantly keeping the conversation in the forefront, always about community engagement, civic innovation, smarter government, all while delivering it for a lower unit cost.”

 

6. Put Innovation on Paper (or in an Email)

Assembling a list of innovation projects that are planned or in progress and sending it to staff and other stakeholders seems like a no-brainer, but the CIOs who do this say it makes them more effective. In Los Angeles, Reneker maintains a list of the top 25 IT projects that is sent monthly to department heads, elected officials and lead staff. About half of the projects on the list are related to operations and maintenance, and the other half are innovation projects. Many of the listed projects don’t have dedicated resources attached to them, and the list makes it clear that they’ll be done as time permits. Mixing the two types of projects is good for the IT staff’s morale because they aren’t boxed in to working on only operations and maintenance, which can become routine. “It entices existing staff to learn and innovate, and allows the CIO to manage all these projects and requests and try to get those that have the biggest bang for the buck, both politically and from a cost-savings perspective,” Reneker said. Colorado also emphasizes communication. A monthly email called “I Have an Idea” is sent to front-line staff so they can share their suggestions. If an idea results in cost savings, the staff person who originated it might get a bonus. Russell assigns ideas that can be feasibly implemented to an executive sponsor, which keeps them on track.

 

7. Think Big & Small

Some governments expect their CIO to be a visionary who generates grand ideas. That’s a commendable and necessary function for any organization, but sometimes small steps can accumulate into big results. “Everybody thinks innovation means a huge breakthrough, but you can get just as much value derived from a little innovation — doing what you do today and doing it better,” said McKinney. He advises organizations to find a few incremental innovations and do them successfully. It may not be wise to go for a grand slam home run. In fact, most organizations figure out that about 75 percent of ideas that are generated will be incremental improvements, McKinney said. Another consideration is how much the innovation project should be publicized as it’s being developed. Although many governments are committed to transparency, keeping the idea in-house can help avoid bad press and the blame game, especially if the project does not come to fruition. Remember, most innovative ideas fail. If possible, give a team permission to operate in stealth mode on small projects, McKinney said. “As soon as it gets visibility, the antibodies tend to come out and attack the idea,” he said.

From http://www.govtech.com/ 03/03/2014

TOP↑

 

White House Seeks Feedback on Big Data and Privacy

 

The White House’s Office of Science and Technology Policy is seeking public feedback on how the government can best protect citizen privacy as it and the private sector increasingly turn to big data analysis. The request for information posted on Thursday is part of a larger investigation of big data and privacy being led by White House Counselor John Podesta. Big data refers to data from sensors, video, Web, social media and other content that doesn’t fit neatly into a spreadsheet. A number of tools have been devised in recent years to draw insights from this “unstructured data,” that analysts say could transform how the government and the private sector gather information and manage their operations. Big data also has the power to pare back citizens’ privacy, however, as more information about their purchases, medical care, Web searches and social media posts becomes fodder for government and industry data analysts.

 

The RFI includes five questions for public input:

1.What are the public policy implications of the collection, storage, analysis, and use of big data? For example, do the current U.S. policy framework and privacy proposals for protecting consumer privacy and government use of data adequately address issues raised by big data analytics?

2.What types of uses of big data could measurably improve outcomes or productivity with further government action, funding, or research? What types of uses of big data raise the most public policy concerns? Are there specific sectors or types of uses that should receive more government and/or public attention?

3.What technological trends or key technologies will affect the collection, storage, analysis and use of big data? Are there particularly promising technologies or new practices for safeguarding privacy while enabling effective uses of big data?

4.How should the policy frameworks or regulations for handling big data differ between the government and the private sector? Please be specific as to the type of entity and type of use (e.g., law enforcement, government services, commercial, academic research, etc.).

5.What issues are raised by the use of big data across jurisdictions, such as the adequacy of current international laws, regulations, or norms?

The Office of Science and Technology Policy co-hosted an event focused on big data and privacy with the Massachusetts Institute of Technology on March 3. The office will host another event on March 17 at New York University titled The Social, Cultural, & Ethical Dimensions of Big Data, which will be streamed here.

From http://www.nextgov.com/ 03/06/2014

TOP↑

 

Industry Perspective - Open Data Is a Civil Right

 

There is a wealth of information housed in local governments that should be public by default to help fuel a new wave of civic participation. As Americans, we expect a certain standardization of basic services, infrastructure and laws -- no matter where we call home. When you live in Seattle and take a business trip to New York, the electric outlet in the hotel you’re staying in is always compatible with your computer charger. When you drive from San Francisco to Los Angeles, I-5 doesn’t all-of-a-sudden turn into a dirt country road because some cities won’t cover maintenance costs. If you take a 10-minute bus ride from Boston to the city of Cambridge, you know the money in your wallet is still considered legal tender.

 

But what if these expectations of consistency were not always a given? What if cities, counties and states had absolutely zero coordination when it came to basic services? This is what it is like for us in the open data movement. There are so many important applications and products that have been built by civic startups and concerned citizens. However, all too often these efforts are confided to city limits, and unavailable to anyone outside of them. It’s time to start reimagining the way cities function and how local governments operate. There is a wealth of information housed in local governments that should be public by default to help fuel a new wave of civic participation. 

 

Appallicious’ Neighborhood Score provides an overall health and sustainability score, block-by-block for every neighborhood in the city of San Francisco. The first time metrics have been applied to neighborhoods so we can judge how government allocates our resources, so we can better plan how to move forward. But, if you’re thinking about moving to Oakland, just a subway stop away from San Francisco and want to see the score for a neighborhood, our app can’t help you, because that city has yet to release the data sets we need. In Contra Costa County, there is the lifesaving PulsePoint app, which notifies smartphone users who are trained in CPR when someone nearby may be in need of help. This is an amazing app—for residents of Contra Costa County. But if someone in neighboring Alameda County needs CPR, the app, unfortunately, is completely useless.

 

Buildingeye visualizes planning and building permit data to allow users to see what projects are being proposed in their area or city. However, buildingeye is only available in a handful of places, simply because most cities have yet to make permits publicly available. Think about what this could do for the construction sector — an industry that has millions of jobs for Americans. Buildingeye also gives concerned citizens access to public documents like never before, so they can see what might be built in their cities or on their streets. Along with other open data advocates, I have been going from city-to-city, county-to-county and state-to-state, trying to get governments and departments to open up their massive amounts of valuable data. Each time one city, or one county, agrees to make their data publicly accessible, I can’t help but think it’s only a drop in the bucket. We need to think bigger. 

 

Every government, every agency and every department in the country that has already released this information to the public is a case study that points to the success of open data — and why every public entity should follow their lead. There needs to be a national referendum that instructs that all government data should be open and accessible to the public. Last May, President Obama issued an executive order requiring that going forward, any data generated by the federal government must be made available to the public in open, machine-readable formats. In the executive order, Obama stated that, “openness in government strengthens our democracy, promotes the delivery of efficient and effective services to the public, and contributes to economic growth.”

 

If this is truly the case, Washington has an obligation to compel local and state governments to release their data as well. Many have tried to spur this effort. California Lt. Gov. Gavin Newsom created the Citizenville Challenge to speed up adoption on the local level. The U.S. Conference of Mayors has also been vocal in promoting open data efforts. But none of these initiatives could have the same effect of a federal mandate. What I am proposing is no small feat, and it won’t happen overnight. But there should be a concerted effort by those in the technology industry, specifically civic startups, to call on Congress to draft legislation that would require every city in the country to make their data open, free and machine readable. Passing federal legislation will not be an easy task — but creating a “universal open data” law is possible. It would require little to no funding, and it is completely nonpartisan. It’s actually not a political issue at all; it is, for lack of a better word, and administrative issue.

 

Often good legislation is blocked because lawmakers and citizens are concerned about project funding. While there should be support to help cities and towns achieve the capability of opening their data, a lot of the time, they don’t need it. In 2009, the city and county of San Francisco opened up its data with zero dollars. Many other cities have done the same. There will be cities and municipalities that will need financial assistance to accomplish this. But it is worth it, and it will not require a significant investment for a substantial return. There are free online open data portals, like ckan, dkan and a new effort from Accela, CivicData.com, to centralize open data efforts. When the UK Government recently announced a 1.5 million investment to support open data initiatives, its Cabinet Office Minister said, “We know that it creates a more accountable, efficient and effective government. Open Data is a raw material for economic growth, supporting the creation of new markets, business and jobs and helping us compete in the global race.”

 

We should not fall behind these efforts. There is too much at stake for our citizens, not to mention our economy. A recent McKinsey report found that making open data has the potential to create $3 trillion in value worldwide. Former Speaker Tip O’Neil famously said, “all politics are local.” But we in the civic startup space believe all data is local. Data is reporting potholes in your neighborhood and identifying high crime areas in your communities. It’s seeing how many farmers’ markets there are in your town compared to liquor stores. Data helps predict which areas of a city are most at risk during a heat wave and other natural disasters. A federal open data law would give the raw material needed to create tools to improve the lives of all Americans, not just those who are lucky enough to live in a city that has released this information on its own.

 

It’s a different way of thinking about how a government operates and the relationship it has with its citizens. Open data gives the public an amazing opportunity to be more involved with governmental decisions. We can increase accountability and transparency, but most importantly we can revolutionize the way local residents communicate and work with their government. Access to this data is a civil right. If this is truly a government by, of and for the people, then its data needs to be available to all of us. By opening up this wealth of information, we will design a better government that takes advantage of the technology and skills of civic startups and innovative citizens.

 

Last year at CPAC (the Conservative Political Action Conference), Former Speaker New Gingrich called Lt. Gov. Newsom’s Citizenville, about the open data movement "the best single book on moving out of bureaucracy into a Tocquevillian society where you, the citizen, are empowered to solve your own problems.” In the book, the former San Francisco Mayor also praises Republican Minority Leader Eric Cantor and Congressman Darrell Issa for their work in empowering citizens. If a Democratic President, two of the staunchest conservatives in Congress, the architect of the 1994 “Republican Revolution” and a San Francisco liberal can all agree on the same issue, I would say an open data bill at the least deserves a debate in Congress. Who is with me?

From http://www.govtech.com/ 03/12/2014

TOP↑

 

U.S. Government to Give Up Key Internet Powers

 

Facing international pressure, the U.S. government has agreed to give up control over important technical aspects of the Internet. The Commerce Department will no longer oversee the Internet Corporation of Assigned Names and Numbers, a nonprofit group that manages the Internet's address system. Larry Strickling, the assistant secretary of Commerce for communications and information, said the "global Internet community" will have the final say over the database of names and addresses that allows computers around the world to communicate with each other. The Internet was invented in the United States, and the country has long maintained a central role. But as the Internet has grown, other countries have demanded a greater voice in its governance.

 

Edward Snowden's leaks about the National Security Agency's mass-surveillance programs have exacerbated resentment over the central role of the United States in managing the Internet. But officials argued the transition is not a response to the international controversy over NSA spying. Strickling said the U.S. oversight of the Internet's domain system was always meant to be temporary. "The timing is right to start the transition process," he said. "We look forward to ICANN convening stakeholders across the global Internet community to craft an appropriate transition plan." Fadi Chehadé, the president and CEO of ICANN, said he will work with governments, businesses, and nonprofits to establish a new system for managing the Internet's domain system. "All stakeholders deserve a voice in the management and governance of this global resource as equal partners," he said.

 

The U.S. government will continue its role until its current contract with ICANN expires in September 2015. Strickling said ICANN's proposal must meet certain criteria, including that it "maintain the openness of the Internet" and preserve security and stability. He insisted that foreign governments and intergovernmental groups will not gain new powers over the Internet. But some business groups are nervous about what the transition will mean. Daniel Castro, an analyst for the Information Technology and Innovation Foundation, a pro-business think tank, warned that giving up the traditional U.S. oversight role could result in "a splintered Internet that would stifle innovation, commerce, and the free flow and diversity of ideas that are bedrock tenets of world's biggest economic engine."

 

Bob Liodice, the CEO of the Association of National Advertisers, said he is "very disappointed" with the announcement. His group has battled with ICANN for several years over its plan to allow for thousands of new Web address endings beyond the traditional ".com" and ".org." "We saw the U.S. relax accountability with the recent domain name expansion," he said. "In a world without U.S. oversight, we worry that such issues will be further aggravated potentially causing significant economic concerns, consumer confusion and impairment to brand ownership." Sen. Jay Rockefeller, the Democratic chairman of the Senate Commerce Committee, has been a frequent critic of ICANN's decisions. But he said Friday that the announcement is consistent with U.S. efforts to ensure the Internet is free from government control. "Since 1998, the U.S. has been committed to transitioning management of the Internet's domain name system to an independent entity that reflects the broad diversity of the global Internet community," he said.

From http://www.nextgov.com/ 03/17/2014

TOP↑

 

Big Data, Big Challenges

 

It's no surprise to any of us by now: Big data is changing the way government operates. With the huge amounts of data that the public sector is collecting, managing and storing, agencies are devising strategies and approaches to utilize and create services geared to the public using this data. On Wednesday, nearly 80 government and industry employees gathered for a GovLoop in-person event focused on the Big Data Frontier (you can read our top 5 insights we took away about big data here). The panels and speakers shared experiences and insights from distinguished public sector and industry leaders, and discussed applicable case studies. While the crowd expressed excitement about the potentials of big data and the way some of their agencies are using it, there was also plenty of shared frustration. Just because big data is there doesn't mean everybody knows what to do with it -- or how to best use it. Wanting to address that, GovLoop asked several attendees to tell us their biggest challenges when it comes to big data. Read some of the interesting responses below.

 

"There's an aversion of federal agencies to leverage other organization's data and data of other efforts." "There are too many different softwares and data systems trying to interact."  "It's difficult to get executive leadership buy-in on big data. There's defensiveness." "Not sure how to answer the classic question: What's in it for me?" "Leadership doesn't support business needs for data collection or serving."  "There's a lack of organizational support, and we're not given the funds to support the system properly." "The government isn't yet prepared and educated enough when it comes to big data."  Regarding that last point: That's what we're here to change. If you want to learn more about big data, make sure to download our guide, Innovations that Matter: Examining the Big Data Frontier. And if you're dealing with big data challenges at your agency, share them with us below. After all, we learn more by acknowledging challenges and obstacles than by ignoring them. Let's come up with some answers together.

From http://www.govloop.com/ 03/27/2014

TOP↑

 

New Apps Make Government Wallets Transparent

 

While it may sound trite, “following the money” remains one of the best ways to pinpoint priorities in business or government. It was on this premise that Socrata, a Seattle-based cloud software company known for its open data offerings, unveiled a suite of financial transparency apps that can be used to publish and simplify spending data. The new lineup, launched this month, includes Socrata Open Budget and Socrata Open Spending, apps that deliver charts, graphs and tables to visualize complicated financial data for easy-to-read analysis. "When we talk about citizen engagement, it's really about allowing citizens to better understand how their governments are allocating their funds and appropriating the budget, and then how that money is being spent over time,” said Bill Glenn, Socrata’s vice president of marketing.

 

Interest for the financial transparency suite came from Socrata clients -- jurisdictions that reported a rising number of financial data requests. Primary drivers of the demand, he said, were residents, the media and government employees. “We found these customers really looking for a way to bring more financial transparency to budgets and spending in particular, to be able to make a better connection with their citizens and to drive better trust and engagement with citizens,” Glenn said. The Open Budget App features charts and visualizations generated directly from updated budget data, revealing details like money allocated for specific programs and departments. Citizens can also see funding going towards programs and projects in their own neighborhoods. A sibling to Open Budget, Open Spending depicts trends in government spending over time and by category. The app can provide graphics comparing spending across a large range of topics, down to check-level detail. It also enables users to browse government vendors and identify how much each has received for government projects and services.

 

While the financial suite is a first for Socrata, tools like this are becoming popular in government. As they enter the marketplace, Socrata’s additions will compete with similar government financial transparency apps such as the popular OpenGov platform, used by Los Angeles and more than 40 other jurisdictions. The suite will likewise compete against open source programs such as NYC Checkbook, free open source code developed by New York City to shed light on city spending, contracts and payroll information. The program was initially promoted as a way to spotlight and eliminate wasteful spending in New York City’s roughly $70 billion budget. Competition notwithstanding, Socrata’s integration of the financial suite into its established ecosystem of civic apps, platforms and support services will likely be a compelling draw for government decision-makers as the battle for open data app dominance continues. 

 

"As technology advances, I think government leaders and government staff members are going to turn to the use of apps to communicate highly complex information in much more understandable ways,” Glenn said. A future adopter of both of the budget and spending apps, Montgomery County, Md., was a catalyst for the suite. Victoria Lewis, project manager for the county’s open data platform dataMontgomery said the process began when county officials requested a custom finance app. "Once we saw people looking at these other open checkbook sites we felt the audience around us might be ready for something like that,” Lewis said, referring to county residents who would llikely embrace the technology.

 

A collaborative development process ensued as Socrata worked closely with the county’s technology and finance teams to understand budget and spending practices in addition to hearing resident feedback. When Socrata presented a concept of the two apps, Lewis said it “fit the bill.” “Unless you really know the budget, and how we compile the budget here, or unless you know how we spend money and what our terms are, the data sets would be really hard for the general resident to understand,” said Lewis. “These really common understandable ways to slice and dice this data are going to be the best part of this.” Yet, as plug-and-play as the apps are made to be, research and deliberation is ongoing at the county, which is why the apps have not yet been installed on their site. Lewis explained that not all county financial data can be made public -- exceptions include private financial data and data protected by HIPAA (Health Insurance Portability and Accountability Act).

 

"That's the large challenge our financial department has in trying to figure out what they're going to filter out,” Lewis said. "I think once we've completed this, and have a solution, we're going to learn a lot from it.” The filtering process is expected to occur relatively soon, she said. The budget app will launch sometime this spring, with the spending app following shortly thereafter. Best practices for launching the apps are being documented and the county will share this information with other interested jurisdictions. Socrata intends to add more transparency apps to the suite later in the quarter that will detail government contracts and revenues. The long-term hope for the suite, Glenn said, is for it to become a robust set of apps that benefit a variety of demographics beginning with the citizen and extending to academia, businesses, open data entrepreneurs, political activists, journalists and government employees themselves.

From http://www.govtech.com/ 04/10/2014

TOP↑

 

 

What Government Can Do to Attract Top IT Talent

 

Competing with the likes of Facebook and Google is tough, but it’s more crucial than ever. In the wake of a deadly fire, New York City officials set out to determine what buildings were most likely to burn. After an analysis determined that being in foreclosure and having been built before 1938 were among the factors strongly correlated with fire risk, the city used the data to prioritize inspections. Those inspections then yielded a 13-fold increase in the issuance of orders to vacate. Predictive analytics is just one of the ways technology can improve both government efficiency and the quality of public services. But to achieve these goals, governments must attract and retain top-notch technology talent, and as a 2013 report prepared by a consulting firm for the Ford and John D. and Katherine T. MacArthur foundations documents, that just isn't happening. For every success like New York's building inspections, there are stories such as the initial failure of HealthCare.gov and the more profound and lasting problems with several of the states' Affordable Care Act online health-insurance exchanges.

 

Among the causes that Freedman Consulting identifies for the severe public-sector technology talent shortage are non-competitive compensation, a lack of access to ground-breaking work and a government culture that often doesn't welcome potentially disruptive innovation. Government is also highly bureaucratic and risk-averse, thanks in part to the threat that elected officials might face punishment at the ballot box for any failures. To those with technology skills, on the other hand, entrepreneurs like Facebook's Mark Zuckerberg and Google's Sergey Brin are the heroes, and workers are more attracted to the kinds of innovative, open and creative environments that facilitate development of the next eBay or Tumblr. In 2008, just 1 percent of those with Ph.D.s in math or computer science worked in state or local government.

 

Governments must address the cultural problems that prevent them from recruiting and retaining technology talent, but there are other issues that have an impact. Since traditional public-sector pensions aren't portable, for example, they exacerbate the wage gap for those who might otherwise want to spend a few years in public service. Creating portable retirement systems would go far toward creating a class of technology professionals who rotate between the public and private sectors, as is the case in so many other fields. Connections between academia and the public sector also should be strengthened. Government technology professionals need not be public-policy experts, but new academic programs that include public policy basics would make it easier for technology graduates to work for government. Prior to graduation, more public-sector internships and fellowships would also make young people more aware of career options in government.

 

But strengthening the technology talent pipeline will require more than just making young people aware of public-sector options. To attract the talent it needs, government must take advantage of enhanced partnerships with academia to become more sophisticated and make the changes that would create an environment that is more welcoming to the tech-savvy. Currently, too many government officials don't even know what their technology needs are. Until more do, it will be impossible to create plausible public-sector career ladders to attract technology professionals. Governments are fairly limited in what they can do to address the gap between what they can pay and what those with much-needed technology skills can earn in the private sector. But there is much they can do to create a culture that is more tech-friendly. And culture can go a long way toward attracting the best and brightest to spend at least part of their careers working in government.

From http://www.govtech.com/ 04/21/2014

TOP↑

 

 

7 Things to Know About the White House Big Data Report

 

Big Data: Seizing Opportunities, Preserving Values focuses on how the public and private sectors can maximize the benefits of big data while minimizing its risks. A group of senior Obama administration officials delivered a report to the White House on May 1 examining how big data will transform the way we live and work, and how it will alter the relationships between government, citizens, businesses and consumers. The report, Big Data: Seizing Opportunities, Preserving Values, is the outcome of a 90-day study announced by President Obama in his Jan. 17, 2014 remarks on the review of signals intelligence. The effort was spearheaded by White House counselor John Podesta, who led a working group of senior administration officials in creating the report. The working group also engaged hundreds of stakeholders from industry, academia, civil society and the federal government through briefings at the White House. The report focuses on how the public and private sectors can maximize the benefits of big data while minimizing its risks. It also identifies opportunities for big data to grow the economy, improve health and education, and make the nation safer and more energy efficient. One section of the report focuses exclusively on public-sector management of data, including implications for health-care delivery, education, homeland security and law enforcement. Though a variety of observations and recommendations were presented, here are seven of the notable takeaways unearthed in the findings:

 

1. BIG DATA IS INEVITABLE

According to the report, “The big data revolution will take hold across the entire government, not merely in departments and agencies that already have missions involving science and technology.” The report projects that departments and agencies that have not historically made wide use of advanced data analytics have perhaps the most significant opportunity to harness big data to benefit the citizens they serve.

 

2. BIG DATA IS TRANSFORMATIONAL AT ALL LEVELS OF GOVERNMENT

The report underscored that the power of big data does not stop at the federal level, but will be equally transformational for states and municipalities, pointing to New York City’s Office of Data Analytics and Chicago’s SmartData project as examples of some of the most innovative uses of big data to improve service delivery.

 

3. PRIVACY NEEDS REFORMS

One action item identified by the report is reforming the Electronic Communications Privacy Act (ECPA), which drew support from a number of technology groups, including TechAmerica and the Information Technology Industry Council (ITI). “We are extremely pleased that the White House has chosen with this paper to back several reforms that the technology industry has been backing for years, namely creating a national data breach law and reforms to the Electronic Communications Privacy Act,” said Mike Hettinger, senior vice president for Federal Government Affairs and Public Sector for TechAmerica. ITI Vice President for Global Privacy Policy and General Counsel Yael Weinman echoed that sentiment. “We applaud that this report points to ECPA reform as a priority,” he said. “Reform is critical to address the concerns that Americans have about law enforcement having access to their online information. ITI will continue to advocate that this statute be updated to require law enforcement to obtain a warrant, without carve outs, to gain access to online content.”

 

4. A NEW ERA OF CUSTOMIZED LEARNING

While privacy safeguards were foundational in education, and especially with children, authors duly noted that big data could spell substantial breakthroughs in learning in future years. The ability to process and analyze large volumes of student data, they said, would lead to an increase in personalized teaching methods through network-enabled devices. This personalized learning experience will be seen at all levels of learning. Big data education is expected to be supported by the president’s ConnectED initiative, which will connect 99 percent of U.S. students to high-speed broadband and wireless internet within five years.

 

5. PREDICTIVE ANALYTICS IS NOT THE BE ALL, END ALL

The study advised that though predictive analytics is a valuable resource, it should not be a sole determinant to prove guilt; it must respect all rights and freedoms of citizens. As an essential requisite,  authors said big data analysis conducted by law enforcement should be isolated to criminal investigations and protect individual privacy and civil liberties — a task to require careful monitoring. “To prevent chilling effects to Constitutional rights of free speech and association, the public must be aware of the existence, operation and efficacy of such programs,” authors stated.

 

6. BIG DATA IS THE NEW NATIONAL RESOURCE

Similar to the way land wilderness was gradually acknowledged as a national resource, the report labeled the rise of big data as a national resource. As such, it was urged that data, like any other significant resource, should be protected through secure storage while simultaneously made readily available to the public, as it is deployed for economic prosperity and social good. As an application of this mindset, open data initiatives to release valuable data sets was encouraged. Data.gov, the national repository of federal data tools and resources, was highlighted as a vehicle to preserve and utilize big data.

 

7. BIG DATA REQUIRES INVESTMENT, RESOURCES

As the saying goes, you get something for something and nothing for nothing. This notion holds true for big data just like anything else, the report said. Departments and agencies were recommended to match data to resources in terms of staff, internal education efforts and financial investment. The Obama administration was told it should lead an effort to identify areas where big data analytics can provide the greatest impact to benefit Americans, and to encourage data scientists to develop social, ethical and policy knowledge. Areas where that showed promise for research included an investigation of data sources, de-identification and encryption, and data tools that can be used by consumers.

From http://www.govtech.com/ 05/02/2014

TOP↑

 

 

Tracking Corrupt Politicians Gets Easier with New Data Platform

 

Mass media is constantly criticized for its limited attention span. News comes and goes, coverage exists in short life cycles, and all too often, a story's context goes missing, along with its intended insight and accountability. However, a relatively new tool that confronts the issue is gaining momentum. The platform, designed by Chilean journalist Miguel Paz, is called Poderopedia — or Powerpedia, in a Spanish-to-English translation — and uses crowd-sourced journalism to show the links and conflicting interests of decision-makers. Funded by the Knight Foundation in June 2011 with $200,000 and launched in Chile during the fall of 2012, the platform was released for Venezuela earlier this month and will be released in Columbia later in May, according to a Poderopedia blog post. Beyond a simple catalogue of politicians and influencers, the platform highlights confirmed links to notable family members, friends, business interests, political affiliations, financial institutions, educational organizations, and government departments and agencies.

 

It illustrates these through an interactive diagram that looks much like a mind map with a photo of the public figure at its center, surrounded by icons of connected individuals and organizations. Additional features of the platform include a list of associated documents and a linked listing of sources. The move into both Venezuela and Columbia is likely to draw attention if the countries’ 2013 Corruption Perception Index is any indication. Created by Transparency International, an international anti-corruption organization, the index reports both countries suffer from a high degree of corruption, with Venezuela hit hardest out of all South and North American countries. “I knew from the beginning that turning Poderopedia into an international distributed platform operated by local journalism organizations should be a primary goal,” Paz said in the blog post. “Now we are paving the first miles of this road to internationalization.”

 

In Paz’s native home of Chile, the platform has been used by journalists for a variety of investigative reporting coverage and projects. It has red flagged a politician who’d attempted to defer legal punishment for his son, who was involved in a drunk driving collision that killed a pedestrian. And it has illustrated business interests and the political voting trails of politicians on sensitive national issues. “The platform is now a wealth of information about the powerful in Chile,” Paz said. “At this writing [May 2], it contains info on 3,107 individuals, 1,398 companies and 812 institutions.” He added there are currently six Chilean newsrooms republishing data through Poderopedia, and there have been nearly 300 news stories related to the tool. The platform, Pas said, has nearly 3,600 registered users and is growing rapidly. While there hasn’t been any announcement about a U.S. chapter yet, Paz has spoken about interest from journalists and technologists in other countries such as Portugal, Spain, Brazil, Argentina, Colombia, Canada and Mexico.

From http://www.govtech.com/ 05/09/2014

TOP↑

 

 

White House Directives Emphasize IT Effectiveness

 

Federal agency IT portfolio review sessions will scrutinize impact, not just efficiency, of investments, involve more leaders at the table. The White House Office of Management and Budget issued new directives this week to federal agencies to improve the effectiveness of the government's IT investments. In a May 7 memo issued by OMB deputy director for management Beth Cobert and federal CIO Steven VanRoekel, OMB laid out enhanced guidelines for conducting OMB's IT investment portfolio review sessions -- known as PortfolioStat -- that place new emphasis on the effectiveness -- not just the efficiency -- of federal IT investments. The IT portfolio review sessions will continue to focus on consolidating commodity IT, they said, but will now devote greater attention to "identifying and assessing high-impact investments" and ensuring they meet customer needs, with the intended impact.

 

The sessions, due to be completed by July 31, will also involve more senior leaders at the table, including the deputy secretary and agency financial, acquisition, human capital, and operations chiefs, as well as CIOs, CISOs, and program managers. OMB began using the PortfolioStat review sessions in fiscal year 2012 to eliminate wasteful IT spending and improve the return on the government's IT investment portfolio. The sessions also reinforced the president's management agenda to ensure IT initiatives improve services to citizens and businesses; increase the quality and value of the government's core functions; open government data and research to the public to spur economic growth; and enhance the government's current and future workforce. OMB developed a series of key performance indicators (KPIs) designed to gauge whether agencies had made cost-efficient IT investments, met customer needs in innovative ways, and protected federal data and systems.

 

The sessions also held agency executives, not just CIOs, accountable for delivering IT investments on time and on budget. IT projects must also be delivered faster, in more modular fashion, and make use of new technologies, such as cloud computing. They also must increasingly rely on automated configuration and vulnerability management tools and other security controls. The PortfolioStat sessions "identified approximately $2.5 billion in savings opportunities through the end of FY 2015," and agencies have already captured 77% of those savings, Cobert and VanRoekel said. In a May 8 report released by the Government Accountability Office, David Powner, director of IT management issues, said opportunities continue to exist to improve the acquisition and management of federal IT investments.

 

The report noted that as of April, 201 federal IT investments, worth $12.4 billion, out of 760 major government IT investments listed on OMB's IT Dashboard were in need of management attention, with 42 of those projects cause for significant concerns. OMB's IT Dashboard website lists IT investments at 27 top federal agencies. Powner reiterated nine common factors critical to successful IT acquisitions. Among them: having program officials actively engaged with stakeholders; having end users involved throughout the requirements and testing phases of the project; and employing program staff with the necessary knowledge and skills. OMB said that going forward, it would also look to strengthen the data and analysis methods it uses to evaluate the PortfolioStat KPIs. It would would also institute more explicit action plans and timelines around delivery, innovation, and protection goals.

From http://www.informationweek.com/ 05/10/2014

TOP↑

 

 

Innovative Technologies to Help County Governments Improve Service Delivery

 

World Bank approves $30 million for ICT applications to support Nairobi and other counties to enhance accountability in revenue management. County governments will benefit from transformational use of innovative technologies to improve their efficiency and effectiveness in public service delivery. This initiative will be supported by a $30 million additional financing approved today by the World Bank’s Board of Executive Directors for the Kenya Transparency and Communications Infrastructure Project (KTCIP). It will help the counties to develop master plans for use of Information and Communication Technologies (ICT) to increase their accountability in the management of their resources. “The innovative use of ICT will reduce revenue leakages and address other gaps in the revenue collection and management systems of the devolved county governments,” says Diarietou Gaye, World Bank Country Director for Kenya. “These applications will integrate the counties to the national government’s Integrated Financial Management Information System and link them to a unified communications system that will enable them to respond to the demand for better services by their citizens.”

 

The new program will enable the national government to work closely with county governments to improve their services through ICT reforms and also enhance transparency and good governance in the management of county governments’ affairs. It will help all the counties to develop road maps for development and deployment of ICT applications. Funded by the Bank’s International Development Association (IDA)*, the program will expand open data initiatives to the counties by scaling up the activities being implemented under the KTCIP. It will boost the total Bank funding for the entire project to $199.5 million. “The information on the money collected and used by the counties will become an important component of the data needed to revitalize Kenya’s Open Data Initiative in Nairobi and the other counties,” says Arleen Cannata Seed, the Task Team Leader of the KTCIP project. “The ultimate beneficiaries of this initiative will be Kenyan citizens, who will hold their county governments more accountable in the collection and use of county taxes and fees.” In Nairobi and two other counties, it will facilitate the implementation of some aspects of the plans, including rolling out of the Integrated County Management tool to enhance accountability in their revenue management and related functions.

 

KTCIP is part of the Regional Communications Infrastructure Project supporting Kenya, Burundi and Madagascar. Its implementation since 2007 has enabled Kenya to lower prices of international capacity and extend the geographical reach of broadband networks. It has also contributed to improved government efficiency and transparency through e-government applications. The project has enabled Kenya to achieve significant technological advances including digital inclusion, content development and digitization of government records. It has also expanded eGovernment shared services, contributing to increased efficiency, reduced duplication and cost savings. Moreover, it has supported Kenya to establish a Business Process Outsourcing and IT-enabled services sector. The World Bank’s International Development Association (IDA), established in 1960, helps the world’s poorest countries by providing zero-interest loans and grants for projects and programs that boost economic growth, reduce poverty, and improve poor people’s lives. IDA is one of the largest sources of assistance for the world’s 82 poorest countries, 40 of which are in Africa. Resources from IDA bring positive change for 2.5 billion people living on less than $2 a day. Since 1960, IDA has supported development work in 108 countries. Annual commitments have increased steadily and averaged about $16 billion over the last three years, with about 50 percent of commitments going to Africa.

From http://www.worldbank.org/ 03/26/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

CHINA: Government Microblogs Highlight Interaction with Public

 

Government departments and officials are using their microblog accounts as channels to hear voices of the public and provide public services despite slow growth in account numbers, according to a report released on Tuesday.The number of microblog accounts operated by government departments and individual officials increased by 46 percent in 2013, said the report issued by the E-Government Research Center with the Chinese Academy of Governance. It has issued the report annually since 2011.The growth rate was mild compared with the 249 percent in 2012 and 776 percent in 2011, the report noted.Verified government accounts on the four top microblog services in China -- Sina, Tencent, People.com.cn and Xinhuanet -- totaled about 258,700 by the end of 2013.About 70.8 percent of them were operated by government departments and the rest were individual users whose identities were verified to be government officials.

 

The report attributed the slowdown to users shifting to new social network tools such as WeChat, an instant massaging application claiming to have about 400 million active users.The reducing popularity of microblog services among ordinary Internet users dampened the governments' enthusiasm for launching blogs, said Wang Yimin, the research center's director.However, Wang said the slower growth is to be expected and did not indicate that the government paid less attention to these platform.Each year, the report selects the top 100 government microblog accounts that are considered best maintained.In 2013, each account of the top 100 posted an average of about 10,000 entries, or 28 every day, up 30 percent over 2012. Each account recorded a total of 737,000 reposts annually on average, up 166 percent over 2012, and 206,000 comments, up 182 percent."We saw a notable tendency in 2013 for these government accounts to become much more interactive with Internet users than previous years," Wang said.

 

Government departments and officials have gained good experience in managing microblog accounts that can also be applied to WeChat accounts and other newer emerging tools, he added.More efforts should be made to integrate different communication platforms, including traditional media, websites, microblogs and other social media, the report suggested.It also highlighted continuing disparities among regions and government departments in terms of microblog use.Governments in richer regions and bigger cities have proved more inclined to communicate with the people through microblogging, it said.Among various government departments, police have been the most active bloggers, according to the report. Four out of the top 10 government microblog accounts were operated by police departments.

From http://www.news.cn/ 04/08/2014

TOP↑

 

Official Micro Blogs Remain Active

 

Governmental departments and officials continue to use their micro blogs as channels to listen to residents and publicize services, despite a slowdown in the growth of accounts, according to a report released on Tuesday.The number of micro blog accounts operated by government departments and individual officials increased by only 46 percent in 2013, the report said, a mild rate compared with the 249 percent growth seen in 2012 and 776 percent in 2011.The report was issued by the E-Government Research Center of the Chinese Academy of Governance, which has provided such data annually since 2011.Verified government accounts hosted on the four top micro blog service platforms in China - Sina, Tencent, People.com.cn and Xinhuanet.cn - totaled about 258,700 at the end of 2013.About 70.8 percent of the accounts were operated by government departments, and the rest were from individual users whose identities were verified as government officials.

 

The report attributed the slowdown in micro blog growth to users shifting to new social networking tools such as WeChat, an instant messaging application claiming around 400 million active users.The reduced popularity of micro blog services among ordinary Internet users has dampened governments' enthusiasm for launching blogs, said Wang Yimin, the research center's director.Wang said slower growth was to be expected and doesn't indicate that governmental entities had paid insufficient attention to micro blogs.Each year, the report recognizes the top 100 government-affiliated micro blog accounts considered to be the best maintained. In 2013, those top accounts averaged about 10,000 posts, or 28 posts daily, up 30 percent over 2012.The accounts averaged 737,000 reposts annually, up 166 percent over 2012, and an average of 206,000 comments, up 182 percent."We saw a notable tendency in 2013 for these government accounts to become much more interactive with Internet users than in previous years," Wang said.

 

Departments of the government and various officials have gained valuable experience in managing micro blog accounts that can be applied to WeChat accounts and other emerging tools as they come along, Wang added.The report suggested that more efforts should be made to integrate different communication platforms, including traditional media, websites, micro blogs and other social media.It also highlighted the continuing disparities between different regions and governmental departments.The governments in wealthier regions and in bigger cities were more inclined to communicate with residents through micro-blogging, it said.Of the various governmental bodies that employ the online tools, the police have been the most active bloggers, the report said.Four out of the top 10 micro blog accounts maintained by governmental bodies were operated by police departments, it said.

From http://www.news.cn/ 04/09/2014

TOP↑

 

JAPAN: Govt to Standardize Farm-Related IT Data

 

The government will start working out a strategy on Monday to unify the standards of IT systems used for agricultural production, so data such as the amount of exposure to the sun’s rays and crops’ growth situation can be utilized as “big data” to help farmers increase their production and improve the quality of their crops, The Yomiuri Shimbun has learned. A panel of experts at the government’s comprehensive IT strategy headquarters will begin the task. It is aimed at having data input systems for farming-related IT, which currently differ among electronics and farm equipment makers, join hands, with accumulated data put into a database and utilized as “big data” for fostering more competitive farmers. The panel will compile its strategy by the end of May and draw up guidelines for utilizing the data. Major electronics makers and farm equipment makers have developed systems designed to help farmers increase production and improve crop quality by enabling them to record their daily work with portable devices and check the amount of crops with sensors attached to agricultural machines such as combines.

 

According to government sources, the items inputted into current systems and their ways of obtaining data differ among manufacturers, and the systems are not linked to each other. Because of such restrictions, farmers using different companies’ systems cannot combine their stored data. They also cannot have past data reflected in a new system when they change from one maker’s equipment to another’s. The government therefore decided to develop guidelines for standardizing data input items, such as the amount of exposure to the sun, air temperature, soil temperature and crop growth situation, to utilize the data from the new fiscal year.  After that, the government intends to interconnect different company’s systems. This will let farmers compare their situation with other farmers and facilitate the making of special branded products from particular regions and areas. There have been few attempts of this kind in the world. The government has also considered measures for protecting accumulated data from being disseminated to other countries, considering the international standardization of the system in the future. The government aims to have the standardized data lead to an expansion in scale for Japanese farming households. “There will be more opportunities for competent farmers, leading to the greater international competitiveness of Japanese farmers,” a government official said.

From http://the-japan-news.com 03/23/2014

TOP↑

 

Japan Establishes Cyber Defence Unit

 

The Japanese Ministry of Defense (MoD) established a Cyber Defence Unit (CDU) on 26 March to detect and respond to attacks on the MoD and the Japan Self-Defense Forces (JSDF). An MoD spokesman told IHS Jane's that the CDU's objective is to help government and the JSDF: "deal effectively with the threat of cyber-attacks, which become more sophisticated and complex by the day". The CDU will be tasked with monitoring MoD and JSDF networks and will collaborate with other ministries and agencies in strengthening Japan's capability to respond to cyber threats, said the MoD in a statement. The unit will be located within MoD facilities and integrates about 90 JSDF personnel that previously undertook separate cyber-related activities in Japan's air, land and sea self-defence forces.

From http://www.janes.com/ 03/25/2014

TOP↑

 

SOUTH KOREA: Telecom Ministry Urges Adoption of Smartphone Anti-Theft Feature

 

South Korea's telecom ministry said Thursday it plans to order local smartphone makers to install an anti-theft feature in all products in a bid to deter increasing thefts of the mobile devices in the country. The Ministry of Science, ICT and Future Planning said it finished the development of a new smartphone security solution, dubbed "Kill Switch," with local tech players. The project began in August 2013.

From http://english.yonhapnews.co.kr/ 04/10/2014

TOP↑

 

Lim Jae-Hong: E-Government Key to Good Governance

 

With Korea’s advanced information technology, its know-how in e-government services could provide a key tool for developing countries to help achieve good governance and effective public administration, the head of the U.N. Project Office on Governance said.  “E-government is one of the best paths to good governance that the humans have found so far, playing a key role in achieving a wide array of domestic and global policy objectives,” UNPOG director Lim Jae-hong said in a recent interview with The Korea Herald.  The organization was set up in 2006 as a subsidiary of the U.N. Department of Economic and Social Affairs with the principal aim of assisting member states to improve their governance capacity for 10 years. Its work is financed by an annual $1 million trust fund run by Seoul’s Ministry of Security and Public Administration.  In recent years, the idea of e-governance has emerged across the UNPOG’s three pillars of activities ― research and policy development, capacity development, and communication and outreach ― with Korea being a good example as a vibrant democracy and IT powerhouse, according to its director.

 

Its concept, he noted, also embraces the eight key components of good governance laid out by the U.N. Economic and Social Commission for Asia and the Pacific: accountable, transparent, responsive, equitable and inclusive, effective and efficient, follows the rule of law, participatory and consensus-oriented. Lim pinned high hopes on President Park Geun-hye’s vision for “Government 3.0,” which calls for broader public access to state data and participation in the decision-making process, increased transparency and greater interagency cooperation. The initiative followed the “e-Korea Vision 2006,” a third edition of the four-year national “informatization” plan unveiled in 2002. The package included building ICT capacity and industry, promoting e-commerce, upgrading the legal system and stepping up international cooperation.

 

“I think Korea’s public administration system has advanced very much along the lines of technological development, making more information available and expanding communications with citizens,” he said. “The ‘Government 3.0’ drive will help Seoul maintain its leading position in the e-government field as it basically seeks to create new values through open data, information sharing and communications.” A former ambassador to Thailand and Sri Lanka, Lim took the helm of the UNPOG last October shortly after retiring from the Foreign Ministry. During his 35-year diplomatic career, he assumed various posts related to the U.N. and the development issue, including chief of planning and coordination, minister-counselor at the mission to the U.N. in New York, and director for human rights and social affairs. He is gearing up for three major projects this year: the annual U.N. Public Service Awards, an international e-government forum and the launch of the biennial U.N. e-Government Survey in which Korea topped the list over the last four years.

 

The awards mark the most prestigious international recognition of excellence in public service, officials say. This year’s ceremony will take place on June 23 in Ilsan, Gyeonggi Province, as the centerpiece of a four-day public service forum organized by the UNPOG and New York-based DESA. The two agencies launched the e-government forum in Seoul in 2012 to boost the understanding on the concept around the world. The yearly event will be held in Kazakhstan in October. With the office’s 10-year term nearing its end, Lim is stepping up efforts to turn it into a permanent organization with greater financial capabilities and a bigger workforce so that it can help more developing countries beyond the Asia-Pacific.  “It will not be a wise decision to give up on the investment that we have made throughout the past decade ― governance is an idea that will dominate the 21st century, not a waning industry or a thing of the past,” the director added.  “I’m hoping that the UNPOG will be able to assist those in need such as least developed, post-conflict or landlocked countries, expanding its foray into Africa, the Middle East and Latin America.”

From http://theinsidekorea.com 04/27/2014

TOP↑

Govt to Develop Long-Range Ship Identification System

 

The Korean government will develop a system to identify ships from a long range in an effort to crack down on illegal Chinese fishing boats and prevent maritime accidents. The Ministry of Science, ICT and Future Planning and the Ministry of Oceans and Fisheries said they will jointly develop the system starting in 2015. The system will take three years to develop and cost 12-billion won. The system will utilize long-range radio frequencies allowing authorities to confirm a ship's authorization from up to ten kilometers away in around ten minutes. The government is also planning to link the coast defense monitoring system to the current maritime radar system to boost surveillance on illegal fishing boats. Authorities estimate illegal Chinese fishing boats cause 580-billion won in damages to Korea every year. 

From http://world.kbs.co.kr 05/05/2014

TOP↑

South Korea Train 14 Nigerian Public Officers on E-Government

 

The Korea International Cooperation Agency (KOICA), on Friday in Seoul, commenced training of 14 Nigerian public officials in e-government. Jang Bong Hee, the Deputy Resident Representative of KOICA in Nigeria in Seoul that the programme was part of ongoing efforts by the South Korean government to develop an e- government master plan for Nigeria. He underscored the importance of putting in place an e-government policy in Nigeria if the country with the largest economy in Africa was to achieve sustainable development. According to Jang, the UN says the key to achieving development in any nation and increasing literacy level is through the implementation of e-government. He quoted the 2012 UN survey on e-government carried out in over 200 countries as ranking Nigeria at the 168th position, while Korea ranked first. He said Nigeria had enough resources to achieve development and that  Korea would make every effort to assist it to attain the status. ``If the Federal Government and Nigerians cooperate, we can achieve this in a short time. We are aiming to improve Nigeria's ranking to at least the first 100 in the next five years. ``KOICA has been training public officers for over three years in e-government. This year, it introduced the economic development workshop to share Korea's experience with officers who are in charge of economic planning.’’ Jang  said KOICA was also making plans to set up a modern training centre in the FCT, equipped with the latest technologies, to introduce top state and federal government officers to the importance and role of e-government in national development.

 

The agency had granted annual scholarships to Nigerian nationals in various fields and provided infrastructure to schools and hospitals, as well as technical aid. He, however, said that the attitude of Nigerians and some government officers to the concept of development was not as positive and strong as it should be, and that had stalled the development efforts of government. ``Some Nigerians do not care about the national identity, but we see Nigeria as having the potential to develop if the people put in more effort and patriotism and government evolves proper policies. The KOICA deputy resident representative said that in assisting Nigeria, Korea hoped to improve mutual understanding, thereby deepening relationship between both countries. Jang said this would enable both countries to explore and promote their cultural and tourism potential through exchange of ideas. The training programme, which will last for 21 days, aims to expose officers to national e-policy, e -strategy and management skills. It also aims to provide ideas and concepts on e-government and national informatisation to enable them to assume advisory role at national and local levels, as well as in their organisations. Some of the participating organisations include the Federal Ministry of Communication Technology (FMCT), Public Service Institute of Nigeria (PSIN) and Galaxy Backbone.

From http://www.dailytimes.com.ng 05/17/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

INDONESIA: Promoting Government Transparency with Social Media

 

Indonesia’s Corruption Eradication Commission (abbreviated in Bahasa Indonesia, KPK) has highlighted the importance of social media in promoting transparency and openness to fight corruption. Chairman of the Commission, Abraham Samad, explained that as the frontline of every public sector agency, public relations teams form the bridge between the community and the agency, and play a vital role in combating corruption. Indonesia is the second largest user of social media. “Government agencies should cut down on opacity. The emergence of social media should be harnessed and used as an additional channel for engaging with the citizens,” he said, addressing public relations teams from 153 Indonesian agencies at the central and provincial level. Social media has become an inevitable part of citizen engagement, Abraham noted. Stakeholders including employees, citizens and journalists use social media as a source of reference. Further from managing the “image” of agencies, public relations teams should use this space for engaging in dialogue with its communities. However, he added that agencies need to be cautious when using social media. For example, information on social media may not be factually correct. Criticisms and misguided opinions are formed quickly and so it is important for public relations teams to have a good strategy that allows speedy and transparent response to comments.

From http://www.futuregov.asia 03/10/2014

TOP↑

 

Indonesia Capital City Government and Google to Monitor Civil Servants’ Performance

 

Jakarta Provincial Government plans to collaborate with Google to develop a system for better monitoring of civil servants’ performance in the Indonesian capital. Deputy Governor Basuki Tjahaya Purnama (or Ahok as he is commonly known) shared that he has spoken with Google to build a tool that will track civil servants’ position and monitor their performance. Ahok has emphasised that technology plays a crucial role in ensuring transparency in government. He expects such a system to help improve productivity of public sector officials in the Jakarta Government. Moreover, Ahok has also pointed to a possible collaboration with Waze, a community-based traffic and navigation app acquired by Google in 2013, which has proven popular among Indonesians. He shared that to maximise the benefits from this app, data from the Jakarta Government’s database should be integrated with the data collected by Waze. This would allow the government to respond to any reports of traffic congestion in real-time and analyse traffic conditions. It would also be useful for emergency and disaster management, he added.

From http://www.futuregov.asia/ 05/15/2014

TOP↑

 

PHILIPPINES: To Spend 13.38 Mln USD for Anti-Corruption IT System

 

The Philippine Department of Budget and Management (DBM) said Thursday that it has released 600 million pesos (13.38 million U.S. dollars) to kick-off the automation of government financial systems this year. Dubbed as the Government Integrated Financial Management Information System (GIFMIS), the information technology (IT) system will integrate all public financial management processes and enhance transparency in the government's financial transactions. "Because GIFMIS is web-based and updated in real time, all data in the system are easily tracked to ensure the integrity of our public financial management processes," said Budget Secretary Florencio Abad in a statement. The IT system is a government-wide, browser-based web application that will link government financial processes together and facilitate their automated management. These financial processes -- accounting, cash management, reporting, and auditing are regularly executed by the DBM, Commission on Audit, and the Department of Finance. Once in place, the DBM said the system will "embed" financial transparency in the day-to-day operation of the Philippine government.

From http://news.xinhuanet.com/ 03/20/2014

TOP↑

 

Philippine Government Gives Donor Agencies Access to Transparency Portal’s Content Management System

 

Presidential Spokesman Edwin Lacierda announced earlier this week, that 64 partner countries and seven multilateral organisations will be given access to the Foreign Aid Transparency Hub (FAiTH) website content management system, in a bit to better track foreign aid given to victims of Super Typhoon Haiyan last year. FAiTH was launched in 18 November, 2013 10 days after the Super Typhoon struck central Philippines. The portal aims to provide information on calamity aid and assistance, whether in cash or in kind, received by the Philippines from nations and multilateral organisations, as well as those coursed through our embassies abroad. The Office of the President will be providing all relevant donor organisations with information on how to log in, manage content, and track their pledges on the FAiTH website through the account details to be distributed by the Department of Foreign Affairs (DFA). “It will enable donors to input cash and non-cash pledges electronically, with each successful pledge entry generating a unique transaction ID that can be used to monitor submitted information,” Lacierda said. Information submitted by donors and partners will be authenticated and sent to the DFA before it gets published on FAiTH. “FAiTH has always been an embodiment of the Aquino administration’s commitment to enhance mechanisms for transparency in government,” Lacierda said. “This development brings into the process our partners and friends in the international community—a testament to the importance of monitoring and managing aid, and, more importantly, a testimony to the shared responsibility of holding everyone accountable,” he added.

From http://www.futuregov.asia/ 04/10/2014

TOP↑

 

The Philippines Government Promotes Open Government with National Citizen Engagement Portal

 

The Philippines Government will be launching a National Feedback Mechanism soon as part of its commitment to the Open Government Partnership (OGP) which it has been a founding member of since 2011. “Envisioned as a link between government and civil society, it will serve as an online platform where citizens will be able to engage government by launching petitions or making queries online,” Said Secretary Edwin Lacierda, Presidential Spokesperson of the Office of the President, The Philippines. The new platform will provide avenues for citizens to contribute to policy making and monitor the implementation of major programmes and projects by the Philippine Government. “Citizens play an enormous role in checking government activities. With a structured avenue for communication, organisations and citizens’ groups will find it easier to work with government toward our common goal of improving our country,” said Lacierda. Since 2011, the Philippines has launched several online portals including Open Data Philippines, Budget ng Bayan by Department of Budget and Management, and the Official Gazette by the Presidential Communications Operations Office to make documents and information that affect people’s lives available to the public. This new portal was among highlights at a forum of the Knowledge for Development Centres (KDCs) held April 23 to 25 in the Philippines. KDCs comprise of 15 universities, policy and research institutions in the Philippines, in partnership with the World Bank Group. The forum is supported by the Government of Australia.

From http://www.futuregov.asia/ 04/29/2014

TOP↑

 

SINGAPORE: Police to Improve Engagement on Facebook

 

Singapore Police Force (SPF) is currently looking at developing more content and increasing their engagement rate to create a larger fan base for its Facebook page, Fong Weng Kiong, Assistant Director (Policy & Development), Public Affairs Department told FutureGov. “We would be doing this by widening our scope of content posted on the platform and finding new ways to engage our current and new fans in a bid to stay connected and relevant in the rapidly evolving media and technological environment,” said Fong. The SPF Facebook page was set up in 2009 and has more than 353,000 fans till date. It is currently used to push out regular and timely crime alerts, prevention tips, recruitment information, incident updates and more. SPF is now exploring different types of content, such as games, contests, posts on the agency’s heritage, etc to improve the quality of the online engagement. The monthly “Throwback Thursday” postings seek to honour our policing past and create emotional connections with our viewers. Our first “Throwback Thursday” post, on the last week of January this year, highlighted the role of the Road Safety Park in increasing road safety awareness amongst children and road users over the previous generations. “Another example is a word search contest where fans have to spot police-related words in a matrix of maze of alphabet letters. That attracted close to 200 comments and more than 100 likes,” continues Fong. Besides widening its scope of content posted on the platform, the agency is also trying out new ways to connect with its audience on Facebook. SPF tries to ‘humanise’ the Force through story-telling, such as featuring stories on female police officers and officers who reject bribes. “Our latest Facebook feature story showcasing officers from Ang Mo Kio Division rejecting a bribery attempt was a success. It garnered 3537 likes, 392 comments and 73 shares, with many of our fans lauding the officers for the integrity they had displayed”.

From http://www.futuregov.asia/ 03/20/2014

TOP↑

Singapore and Oman Agree to Deliver Innovative E-Government Services for Labour Market

 

Singapore’s IDA International and Oman’s Information Technology Authority (IRA) have signed an agreement to deliver innovative digital services for Oman’s Ministry of Manpower. This collaboration is a crucial step in ITA’s E-Government Transformation Plan, which aims to accelerate and automate internal processes in government agencies. Ultimately, it looks to bring about better public services to citizens and greater operational and procedural efficiency in the Omani Government. The agreement will see IDA International, a wholly-owned subsidiary of Infocomm Development Authority of Singapore (IDA), provide consultancy services to simplify and streamline the visa processes for the Ministry of Manpower and deliver more customer-centric public services to the labour market in Oman, including blue collar, white collar and foreign domestic workers. IDA consultants will also conduct a detailed study to improve the inspection processes related to labour law violations. The agreement was signed between Hamed bin Khamis al-A’amri, Undersecretary of the Ministry of Manpower, Dr. Salim al-Ruzaiqi, Chief Executive Officer of ITA and Tan Lark Yang, Group Director of IDA International. Vincent Wong, Chief Executive Officer of IDA International, said, “As the public workforce in Oman becomes increasingly technologically savvy, it is imperative that smarter ways of work are adopted to enable more effective delivery of government services to citizens and residents in the Sultanate.” “As we seek to push forward the Digital Oman National Strategy, this strategic and timely collaboration with IDA International signifies a key step toward achieving the key pillar of our E-Government Transformation Plan,” shared Dr. al-Ruzaiqi.

From http://www.futuregov.asia/ 04/09/2014

TOP↑

 

THAILAND: City Mayor Reveals How Facebook Is Used for Crisis Communications and Flood Management

 

In an exclusive interview with FutureGov, Vichai Bandasak, Mayor of Pakkret City, a Thai city with a population of about 80,000, shares his challenges on managing the City’s flood crisis and how technology plays a part. The general Pakkret Municipality area is low-lying and densely populated along the Chao Phraya River. During the raining season, Pakkret City is often affected by floods. “We have been successfully in reducing the impact of flood on the community. About 20 years ago, 30 per cent of the area were affected. Last year, we brought that down to 5 per cent. My aim is to drop that figure to zero,” says Bandasak. Two years ago when one of the biggest floods hit Thailand, only 2000 people in Pakkret, out of its 80,000 residents, were affected by the flood. Much of the people’s lives - both culturally and for their livelihood - revolve around the river, so the work of building a dam has been opposed by some. Bandasak and his team has been using social media, particularly Facebook, to educate the City’s residents. “The reach and engagement on Facebook have been positive. Most of the audience consists of working adults and students. Many of them now support the City’s cause.”

 

Besides engaging the people, Pakkret City’s Facebook account plays a more important role of communicating flood warnings to the public. “Other than broadcasting warnings over the local radio stations and sending out SMS notifications, Facebook is an effective channel to alert people of a pending flood. We keep them updated on the water level and the location of evacuation sites,” he adds. Although not all of the population are on Facebook, the working adults and students who are connected will always pass the message on to their family members. Pakkret City also has a 24-hour monitoring and information centre equipped to deploy sandbags and other flood mitigation tools. Residents can also visit the centre to gather information, such as nearby evacuation sites which often are temples or sports stadiums.

From http://www.futuregov.asia/ 04/11/2014

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

How India's E-Government Plans to Support 22 Official Languages

 

In a crucial step towards making online public services more inclusive, Department of Electronics and Information Technology (DeitY) of India has launched a set of tools to develop online content in local languages for the various e-government portals and services.

PHOTOS

View photos

RELATED ARTICLES

New Zealand government tightens privacy laws

How can government open data and open source enable disaster risk management

New Zealand government opens up geographic data online

United States’ new e-government unit 18F runs on lean startup principles

RELATED CATEGORIES

DIGITAL INCLUSION

E-GOVERNMENT

FROM THIS SECTION

NEWS

 

The localisation portal offers basic tools and services for making e-government applications available in the official language of each state apart from English. Tools are currently available to support 6 Indian languages, and will gradually be made available for the other 16 official languages in India. Each project under India’s National e-Governance Plan has several online applications and portals, and the localisation portal provides standards, best practices and guidelines to support the agencies undertaking localisation of their applications. Joint Secretary for e-government at DeitY, Rajendra Kumar, shared that the localisation tools have already been used for seven projects, including content for health, e-district, public distribution system, pension, education and agriculture.

 

The Centre for Development of Advanced Computing is helping ministries and departments in the localisation process and has designed the Localisation Projects Management Framework (LPMF). It will assist with “surface localisation” of the user interface and static information on websites and “internal localisation” of online applications including linked databases. The localisation portal offers code converter APIs for converting legacy data to Unicode, JavaScript based on-screen keyboards, Sakal Bharati OpenType font (which supports all 22 Indian languages) and transliteration services. The portal also displays a dashboard illustrating progress of localisation across the various e-governance projects based on the LPMF.

From http://www.futuregov.asia/ 02/25/2014

TOP↑

 

 

E-governance: 1.3 Lakh Fake Pensioners Weeded Out in State

 

Thanks to electronic governance and linking of pensioners' accounts with their Aadhaar cards, the state has weeded out 1.3 lakh fake pensioners since last summer, with around 80% of them being removed from the list in the past two months. "We have already removed 1.3 lakh fake pensioners from the list of old-age, widowed and disabled pensioners," chief secretary RS Sharma told Hindustan Times. Till last year, the state had been doling out pension of around Rs. 642 crore to 10.66 lakh beneficiaries per year. The fresh list has 9.36 lakh pensioners, down by 12%. The state government will now save Rs. 80 crore per year. In fact, e-governance seems to be transforming the entire bureaucratic culture in the state. If an official, from the peon to the principal secretary, does not turn up in office by 10.30am, an SMS is automatically sent to his cell phone saying, "You are yet to mark your biometric attendance." "There has been a phenomenal change in the reporting time of staff," said Rajdeo Pandey, an official in the rural development department. "Earlier, most officials used to turn up around noon. Now everyone comes in before 10.30am and does not leave before 6pm."

 

The new human resources management (HRM) system lets anybody check attendance summary of individuals of all departments with different parameters in real time. The HRM software supported by biometric terminals has been installed at 16 locations housing 63 departments in the state capital, and will soon be installed at district and block levels too. Electronic measures have also been introduced in the form of treasury management, integrated financial management, SMS gateway and e-payment gateway. And then there are some department-specific applications. The chief secretary said no other state had yet implemented the attendance system and the integrated financial management system. "Jharkhand is much ahead of other states in terms of e-governance. It's a very powerful tool," he said.

From http://www.hindustantimes.com/ 03/04/2014

TOP↑

 

From e-Governance to m-Governance: The Way Forward

 

Today, India is moving towards m-Governance, after its foray into e-Governance. The speedy diffusion of mobile ICT such as laptops, mobile phones, PDAs (Personal Digital Assistants), along with emails, instant messaging and other networking services have rapidly fuelled the mobilization of interaction. Our society is increasingly getting mobile, and people want everything available on their handsets. According to Wikipedia, nearly 850 million people in India own a mobile phone today. India is the second largest telecommunication network in the world in terms of number of wireless connections after China. m-Governance is envisaged to propel the functioning of the government, at the next higher level. In this paper, we analyze the true potential of m-Governance in the Indian scene. Also, we examine the areas where the e-Governance services can be made available through wireless and mobile technologies. The paper also rivets on M-Health as well studies some successful m-Governance projects implemented in other countries, and examines the M-PESA mobile commerce project in Kenya.

From http://www.i-policy.org/ 03/11/2014

TOP↑

 

Big Data from IoT May Pose Challenges for Data Centers

 

As Internet of Things (IoT) deployments will generate large quantities of big data that need to be processed and analyzed in real time, this will bring newer sets of challenges to CIOs and data centre providers, says Gartner in a recent report. The report shows that IoT will include 26 billion units installed by 2020, and by that time, IoT product and service suppliers will generate incremental revenue exceeding $300 billion. Fabrizio Biscotti, research director at Gartner who sees a potential transformational effect on the data center market, its customers, technology providers, and business models, raises the concern that processing large quantities of IoT data in real time will increase as a proportion of workloads of data centers, leaving providers facing new security, capacity and analytics challenges.

From http://www.cxotoday.com/ 03/18/2014

TOP↑

 

E-Governance Projects to Be Speeded Up in Government Departments

 

Soon, Central Government departments could have a Chief Information Officer for IT adoption and to fast track e-governance projects as a part of the National e-Governance Plan (NeGP). This will also include several other initiatives such as cloud implementation for all mission mode projects (MMPs). At a recent meeting of the Apex Committee on NeGP, it was also decided to fast-track the adoption of ‘e-office’ for independent movement of e-files. The meeting was held under the chairmanship of Ajit Seth, Cabinet Secretary. Senior officials from the Planning Commission, UIDAI and Ministry of Communication and IT attended the meeting. It was also decided in the meeting that a workshop on cloud platform would also be organised by Department of Electronics and IT (DeitY) for all departments of ministries.

 

The workshop will explain the features, capabilities and the way forward for implementing cloud by default, the note said. Apart from these, it is learnt that DeitY will organise a workshop on the new e-initiatives in e-governance, such as Mobile Seva, e-Pramaan and e-Taal, for all ministries, departments and the Planning Commission. The representatives of UIDAI said that as almost 60 crore Aadhar numbers have been issued, it would be appropriate if it could now be a unifying and unique identity in all e-governance initiatives. The DeitY Secretary also clarified that linkage of UID in MMPs, wherever required, has been suggested as a key component in the ‘e-Kranti’ concept note. The committee also suggested that a standard mechanism should be established for expeditious replication of e-governance projects across the country.

From http://egov.eletsonline.com/ 04/23/2014

TOP↑

 

New Leap in UP in E-Governance: Driving Licenses Will Be Provided Through Online Applications

 

Seeking driving license will be simpler in Uttar Pradesh once Lok Sabha elections are over. Courtesy- introduction of online service. Taking a step ahead in e-Governance, UP government will launch online Driving License (DL) service for people in Lucknow and other cities. It will not only allow online application for the license but also simplify submission of application and payment of fee. “Right from submission of application to payment of fee, the entire process will be online,” said sources in the department. At present, though DL seekers can download the application from the transport department website, they have to submit it manually at the regional transport office. The new software, which is being tested by National Informatics Centre, Hyderabad, will make it possible to submit application and pay the fee online. Once online DL becomes a reality, applicants will be visiting the RTO only to get their biometric details recorded. The new facility might be introduced in phases much like the smart card driving license (SCDL). “It will be called Sarthi-on-web project,” said sources.

From http://egov.eletsonline.com/ 04/23/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

Azerbaijan and Afghanistan Discuss E-Government Formation Cooperation

 

Afghanistan and Azerbaijan discussed cooperation in the sphere of e-government formation, the Azerbaijani Ministry of Communications and Information Technologies reported on March 5. The issue was a subject of discussion in the last meeting of the third working group on the cooperation between Azerbaijan and Afghanistan in the field of ICT held in Baku, according to the Ministry. The Afghan delegation headed by the Deputy Minister of Communication and Information Technology, Aimal Marjan came to Baku for the discussions. The working group includes representatives from the ICT Ministry of Communications and Information Technologies of Azerbaijan and Afghanistan, UNDP and the Agency for International Development in Azerbaijan (AIDA). The main issues on the agenda of the working group were exploration of the possibilities of Azerbaijan's participation in the development of the Afghan ICT sector, Afghanistan's needs for ICT sphere, the definition of cooperation areas. The projects that can be implemented in Afghanistan were also considered. The possibility of investing in the ICT sector in Afghanistan, and the organization of training on IT-specialties within the framework of the established IT-University in Azerbaijan were also subjects of the discussions. The Azerbaijani Sinam IT-company presented its projects during the meeting. Earlier, the Afghan Minister of Communications and Information Technology Amirzai Sangin expressed interest in using the electronic GoMap (developer which is Sinam company) as a platform for creation of a local map for Afghanistan.

From http://en.trend.az/ 03/06/2014

TOP↑

 

E-Documents in Azerbaijan Can Now Be Signed Online

 

The Data Processing Centre (DPC) of Azerbaijani Communications and High Technologies Ministry has presented a software for signing electronic documents online. Earlier, it was possible to sign the e-documents only using a Microsoft Windows, however the DPC's new software helps to simplify the process, which will no longer be dependant on specific operating systems and browsers, according to DPC's message. The software allows to sign e-documents online, through major popular browsers, as well as most widely used operating systems. The software's interface supports the Azerbaijani, English and Russian languages. The main goals behind developing the new solution are to expand the scope of use of e-signatures and e-document turnover, simplifying public access to state institutions' electronic services, which are available on the 'electronic government' website ( (e-gov.az).

From http://en.trend.az/ 05/07/2014

TOP↑

 

Azerbaijani Servicemen to Hold Discussions with German IT Experts

 

Representatives of Azerbaijani Armed Forces will take part at an international event in Germany, the Azerbaijani Defense Ministry told Trend on May 19. Experts meetings on information technologies (IT) will be held in the German cities of Koblenz and Euskirchen from May 20 to May 22, in accordance with the Azerbaijan-Germany cooperation program.

From http://en.trend.az/ 05/19/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

AUSTRALIA: 4 Lessons from Mobile Government and Open Data Project

 

ACT Government and the NICTA eGov Cluster started the Mobile Canberra initiative to develop apps that provides access to geolocational government datasets and services. This projected, initiated at the request of the ACT Government via its Executive Director of the Government Information Office (GIO), was prompted by its commitment to being an open government and its goal to make Canberra a connected and digital city. Currently, the mobile services includes locations of bus stops, playgrounds, libraries, schools, public art, public toilets, Technical and Further Education campuses and public furniture. Based on its review of the pilot’s first year, these are the key lessons learnt:

 

1. Reliable access to government source data is critical

The team realised that the success of the apps depends heavily on having reliable access to relevant source data. In order to ‘go live’ with a production version of this app, the ACT government will need to ensure that a regular updated source of published data is available from data custodians within the public sector.

 

2. Collaborative project model worked well

The project team comprised of the ACT Government through its GIO and senior Shared Services representative, NICTA Engineering and Technology Development who provided oversight of development and user experience design, the eGov Cluster project managers, and the developers. According to the team, the collaborative project model has proven to be a more flexible model, yet dynamic approach to requirements definition. This successful model can be used as a template for governments looking to embrace innovation as a means of transformational improvements.

 

3. Open Data programmes must be treated as whole-of-government initiatives

The team observed that inter-agency collaboration on open data does not happen organically because of policy, technical, cultural challenges within the public sector. Therefore, in order for innovations like Mobile Canberra to succeed, government must ensure that their Open Data programmes are first and foremost treated as whole-of-government programme and then directed, managed and resourced properly.

 

4. Challenges around using web technologies to deploy apps

The team set out to explore the possibility of using web technologies to deploy an app, which could leverage a device’s geo-location capabilities in an accurate manner. In assessing the available technologies, they found PhoneGap and Titanium to best fit their requirements, and they selected PhoneGap for its open-source nature and better OS support. However, while PhoneGap allowed for a platform-agnostic approach to coding, it was not easy to use in practice because the team had to spend a lot of time debugging and finding workarounds in the many variations.

From http://www.futuregov.asia 02/28/2014

TOP↑

 

Comms Dept to Shed Up to 25 Percent of Workforce

 

Workers at the federal Department of Communications will be forced to reapply for their positions in a “spill and fill” process designed to slim the workforce down as much as 25 percent. Communications staff were this morning informed, via a 17-page document sighted by iTnews, of a new structure to be implemented at the agency, affecting all full-time staff members in an effort to potentially cut up to 130 positions. The department is understood to have a current headcount of 550 staff, 519 of those which are full-time equivalent. The new structure will see the majority of the department’s workforce asked to reapply for their current role. iTnews understands the opportunity will only be given to full-time equivalent staff. For workers unsuccessful in re-attaining their current position, three options are on the table: apply for a lower-grade role on a reduced salary, take a redundancy or be redeployed elsewhere within the APS. Voluntary redundancy applications wouldn’t be processed by management until the job application process wraps up, the department said in the communication to staff. “To achieve our strategic priorities, and meet our goal to be the Australian Government’s pre-eminent advisor on communications, the department will during the course of 2014 realign its structure and the roles of our staff,” it advised in the document.

 

It will take one layer of the organisation at a time before moving on the next when ‘designing and selecting’ the roles and staff for each individual layer. The department will make information about the positions available for each layer to “eligible employees” at the start of the selection process of each of the five individual organisation layers. Employees are only able to apply for jobs at their current employment level or below. President of the Community and Public Sector Union Alistair Waters said in a statement the process was “disruptive, costly and deeply divisive”. “All it will do is pit colleague against colleague and throw the department into a tail spin,” he said. “Waking up and finding out that your department is cutting jobs is bad enough but then to be told you will have to fight your workmates to hang on to job is worse.” He said while the union understood the priorities of government departments change, Communications had not approached it in the right way, and called on the department to rethink the process. “If jobs need to be cut, then the department should first ask people to apply for redundancy rather than go down this divisive route,” he said. “This is not the way to treat your staff. It’s an unprecedented example of the appalling way that this Government deals with public sector workers. Cutting thousands of workers’ jobs is bad enough but to do it this way is just cruel and vindictive.”

From http://www.itnews.com.au 02/28/2014

TOP↑

 

Budget Cuts Will Force Government IT Staff Rethink on Role

 

Government sector IT staff will consider changing their jobs if they are affected by cuts in agency and departmental budgets expected to be announced in tonight’s federal budget, according to one major ICT recruitment firm. A survey of almost 3,000 government IT staffers by Greythorn last week found that a third believed their role will change with the budget cuts and impending restructures, and a significant 44% said they would then be forced to consider changing agencies/departments. The highest result was in the heart of the federal public sector in the ACT, where 54% of IT respondents said they would consider changing agencies or departments if their role was to change. And, according to Greythorn, 29% of Government IT staff said they were pessimistic about the work situation, with the highest level of pessimism also in the ACT, at 38%.The Treasurer Joe Hockey has forewarned that the cost savings to be announced in tonight’s budget will result in many government agencies being sold, scrapped or merged.

 

Lisa Kinney, Director of Greythorn’s ACT branch said, “Despite the impending changes within Government, the vast majority (83%) of IT candidates stated they felt satisfied and engaged in their current jobs and would recommend their employer to others. “The challenge for the Government at this time is to maintain that level of satisfaction and engagement as the sector manages this change.”

From http://www.itwire.com 05/13/2014

TOP↑

 

NEW ZEALAND: Website for Justice Data Launched

 

The Ministry of Justice launched an online portal called “Justice Datalab” which aims to make the 2013 Justice Sector Annual Report more accessible to the public. According to an official statement, the Justice Datalab is an initiative which will give the public full transparency on the main statistics relating to the performance of the justice sector. It allows users to analyse conviction and sentencing statistics and search the Ministry’s vast research and evaluation collection. “Much of the information currently available about crime and safety trends is situated across various sources and may be hard to find, access, and compile. With the new tool in place, all that information is made available through one website, in a form which is easy to understand and where crime and safety trends can be easily identified,” says Justice Minister Judith Collins. Datalab will be a useful tool for students, journalists and other members of the public to research based on many variables such as the region or type of offence and create graphics displaying results and trends.” The Minister added that Datalab is a practical addition to the current pool of justice sector initiatives outlined in the recently released 2013 Justice Sector Annual Report.

 

“Crime in New Zealand is at a 33 year low and the Justice sector is on track to meet, if not exceed, all of its Better Public Services targets by 2017. The report shows that since June 2011, the total crime rate has fallen 13 per cent, the violent crime rate has fallen 9 per cent, the reoffending rate has fallen 11.4 per cent and the youth crime rate has fallen 22 per cent. The sector will continue to build on these results, seeking innovative and effective ways to better support vulnerable people and families, tackle the causes of crime and stop people – particularly young people – from entering a life of crime. The new Datalab tool will allow New Zealanders to see first-hand this progress we are making and increase transparency and confidence in the Justice sector”.

From http://www.futuregov.asia 03/12/2014

TOP↑

 

New Zealand Government Opens Up Geographic Data Online

 

New Zealand’s most current publicly-owned aerial imagery, covering 95 per cent of the country, is now available online through the LINZ Data Service. Land Information New Zealand has been working with other agencies to make imagery available under an open licence, and to ensure it is accessible through the LINZ Data Service. According to Land Information Minister Maurice Williamson, “releasing publicly held aerial imagery for reuse has the potential to create cost savings for the public sector and generate economic benefits for the private sector. “Imagery can be used to improve productivity in agriculture and forestry, and can be used in construction, engineering, disaster recovery planning, and land and asset management. Making aerial imagery available is in line with the government’s goal to make more publicly held data accessible to as many people as possible,” Williamson added. LINZ is also working with local authorities and government agencies to establish a national programme for coordinating public sector imagery purchases. This will ensure imagery is purchased on an open licence and at a consistent standard, which will mean value for money and open access. Aerial imagery provides an accurate photographic representation of the earth’s surface and features, and can be used to visualise landscape or to understand how an area has evolved over time.

From http://www.futuregov.asia 05/08/2014

TOP↑

 

New Zealand Government to Modernise Unified Portal with Faster Online Access and Responsive Design

 

With a global reputation for transparent government, the New Zealand administration is fast-tracking its investment in open data and improved access to information. This is supported by an ambitious new project, being launched in July 2014, that modernises the New Zealand.govt.nz site. This project involves 36 core agencies, and Crown entities that deliver key services. These encompass social welfare, immigration, transport, education, health, the environment, and conservation. This revamped site, currently in beta, will offer highly-intuitive access to government information, to enable citizens to access on-line services more easily. This all-of-government initiative is led by the Department of Internal Affairs (DIA). It supports transparent and open government reforms, and better online access to core services. New Zealand’s open government initiative reinforces digital reforms, according to Laura Sommer, DIA’s Wellington-based project lead for digital information.

 

She told FutureGov that demand remains high for improved access to on-line services. A re-designed central government site offers the ability to source and manage information in an interactive, and more intuitive environment, directly from the desktop, or mobile devices. Details about this project are available at Beta.govt.nz and the Web Toolkit site.

 

Fact-check usage

“We want to bring customers right into the site,” Sommer says. “We’re developing new ways to locate information, restructure content, and make better use of evidence-based reporting tools.” Agencies and Crown entities, linked to this site, are already able to “fact-check” content, track traffic and usage, and will be able to streamline their data analytics and information management capability. Collaborative development with agencies is critical to success. “This is because we’re talking about all-of-government programmes,” adds Sommer. “So we find that a co-creative co-design model is really important.”

 

Manage content

Tech-savvy citizens, used to navigating commercial sites, expect the same look-and-feel from government sites. Mobile apps, social media, and dash-board features improve information access for people on the move. “There are other aspects, like social media, mobility, and real-time access that remain critical to creating an open interface, and connecting more readily with citizens.” By mid-year, the New Zealand site will offer faster search and browsing capability.

 

Make design responsive

“We want to ensure that what we design is usable and accessible, especially on websites,’” Sommer says. “Apart from a highly-responsive design, people should be able look at what government is presenting online via any device.” New Zealand’s online presence focuses on a user-centred design. It will be “open by default,” nurture trust and security, and support collaborative development, and common capability. At DIA, Sommer leads a Digital Engagement team, tasked with improving the government’s online presence. This approach supports a “customer at the centre” strategy. Among its features, a re-designed site offers all-of-government information based on users’ needs, with plain English content and features that are easy to understand.

 

Improve security

The goal is helping citizens interact safely and securely with government online. A Domain Integrity Project is examining the current state of agencies’ web presence, and security management mechanisms. Plans are underway to streamline the security of critical infrastructure. Moreover, an online engagement service, that has guidance and a community-of-practice, will help agencies actively connect with end-users and other agencies. This helps inform about services and policy development. Share governments’ digital project updates at the 3rd Annual FutureGov Forum New Zealand being held Wednesday 6th August in Wellington.

From http://www.futuregov.asia 05/09/2014

TOP↑

New Zealand Reinforces Open Government Roadmap

 

With a global reputation for transparent government, the New Zealand administration is fast-tracking its investment in open data and improved access to information. This is supported by an ambitious new project, being launched in July 2014, that modernises the New Zealand.govt.nz site. This project involves 36 core agencies, and Crown entities that deliver key services. These encompass social welfare, immigration, transport, education, health, the environment, and conservation. This revamped site, currently in beta, will offer highly-intuitive access to government information, to enable citizens to access on-line services more easily. This all-of-government initiative is led by the Department of Internal Affairs (DIA). It supports transparent and open government reforms, and better online access to core services. New Zealand’s open government initiative reinforces digital reforms, according to Laura Sommer, DIA’s Wellington-based project lead for digital information.

 

She told FutureGov that demand remains high for improved access to on-line services. A re-designed central government site offers the ability to source and manage information in an interactive, and more intuitive environment, directly from the desktop, or mobile devices. Details about this project are available at Beta.govt.nz and the Web Toolkit site.

 

Fact-check usage

“We want to bring customers right into the site,” Sommer says. “We’re developing new ways to locate information, restructure content, and make better use of evidence-based reporting tools.” Agencies and Crown entities, linked to this site, are already able to “fact-check” content, track traffic and usage, and will be able to streamline their data analytics and information management capability. Collaborative development with agencies is critical to success. “This is because we’re talking about all-of-government programmes,” adds Sommer. “So we find that a co-creative co-design model is really important.”

 

Manage content

Tech-savvy citizens, used to navigating commercial sites, expect the same look-and-feel from government sites. Mobile apps, social media, and dash-board features improve information access for people on the move. “There are other aspects, like social media, mobility, and real-time access that remain critical to creating an open interface, and connecting more readily with citizens.” By mid-year, the New Zealand site will offer faster search and browsing capability.

 

Make design responsive

“We want to ensure that what we design is usable and accessible, especially on websites,’” Sommer says. “Apart from a highly-responsive design, people should be able look at what government is presenting online via any device.” New Zealand’s online presence focuses on a user-centred design. It will be “open by default,” nurture trust and security, and support collaborative development, and common capability. At DIA, Sommer leads a Digital Engagement team, tasked with improving the government’s online presence. This approach supports a “customer at the centre” strategy. Among its features, a re-designed site offers all-of-government information based on users’ needs, with plain English content and features that are easy to understand.

 

Improve security

The goal is helping citizens interact safely and securely with government online. A Domain Integrity Project is examining the current state of agencies’ web presence, and security management mechanisms. Plans are underway to streamline the security of critical infrastructure. Moreover, an online engagement service, that has guidance and a community-of-practice, will help agencies actively connect with end-users and other agencies. This helps inform about services and policy development. Share governments’ digital project updates at the 3rd Annual FutureGov Forum New Zealand being held Wednesday 6th August in Wellington.

From http://www.futuregov.asia 05/09/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Commerce.gif

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

NORTH AMERICA: Canadian Mobile App Industry Continues to Grow - Study

 

Nearly 25 per cent of developers extremely concerned about a skill shortage. Software developers creating mobile applications generated $1.7 billion in revenue last year according to a new study of the size of the app industry here. The Information and Communications Council report, released Monday, found that the number of people employed in the development of business, games and entertainment mobile apps has grown by nearly 25 per cent since its released a first report in October 2012. An estimated 64,000 people work developing and distributing applications here, the council found — 45,800 are employed by companies that specialize in app development, while another 12,800 are “induced,” meaning their jobs were indirectly created by the apps labour market. Most of them — 28,700, including technical and non-technical people (sales, marketing, management) – work in Ontario, followed by Quebec with 14,000 apps jobs. The report predicts that nearly 50,000 new jobs are expected to be created between now and 2019 as a result of the creation of new apps and wider enterprise and consumer adoption.

 

Still, it points out the sector has a number of challenges: international competition, shortage of skilled app developers, lack of awareness of the development companies’ service offerings and shortage of capital. “Mobile apps are a fast-growing, vibrant sector of the economy,” said Namir Anani, CEO of ICTC. “We consider that talent is one of the most important considerations in ensuring Canada takes full advantage of this opportunities offered by mobile technologies and mobile apps. We continue to work towards ensuring a sufficient supply of this talent by encouraging youth, Aboriginals and women to pursue technology careers, and by providing opportunities for training and up-skilling to all Canadians in all sectors of our economy.” In particular the report says those in high demand will be apps designers; apps developers; apps testers; programmers (C#); technical artists; software engineers; software developers; graphic designers (UI/UX); product managers; system designers; system  developers; JavaScript, MYSQL, HTML5, and PHP developers; software designers with CSS3; cloud architects; data analytics; coders and user support analysts. The ICTC is funded by the information and communications sector to research technology and labour market trends including immigration initiatives, women in IT, industry forecasts and identifying emerging technologies.

 

The mobile apps report was paid for in part by the Canadian Wireless Telecommunications Association (CWTA), which represents some of the country’s biggest cellular carriers. The report was complied from 100 replies from three surveys sent to mobile app development companies between June and December 2013. The study figures there are nearly 18 million app users in Canada among the 28 million cell phone subscribers, and 2 billion app users worldwide. Over half of developers — including those who work within organizations as well as software development firms – say they are focusing on developing apps that provide business solutions. Still, the report says the industry is having trouble filling technical positions, a situation that will get worse before it gets better. Eight out of 10 apps enterprises have some concerns with respect to finding the right blend of skills in adequate quantity. Three out of five apps employers are more than slightly concerned, while nearly a quarter are extremely concerned about skills shortage and mismatch.

From http://www.itworldcanada.com/ 03/03/2014

TOP↑

 

Half of Canadian Businesses Lacking in Mobile Apps, Survey Finds

 

For many businesses, having a mobile-first strategy seems like a “must” – and it follows logically that businesses would have some kind of mobile presence. However, in a new survey of more than 270 IT professionals in Canada, 54 per cent of CIOs said they don’t have a mobile app in place for their organizations – nor do they have any plans to build one, according to research from Robert Half Technology, an IT staffing company. While 21 per cent of the companies surveyed said they do plan to offer a mobile app in the next 12 months, just 21 per cent said they already offer one. Four per cent of the respondents said they didn’t know if they had a mobile app, or they refused to answer the question. That being said, 77 per cent of the firms surveyed said they do have a mobile strategy, with 61 per cent saying they use a mix of apps and mobile-optimized web pages to do business. However, 19 per cent said they don’t have any mobile strategy at all.

 

“As mobile devices increasingly become a part of day-to-day life, businesses will want to make it easy for customers and clients to connect with them through mobile platforms. In the next few years, this will likely become more of an expectation from consumers for doing business, and less of an option,” said Deborah Bottineau, senior regional manager of Robert Half Technology, in a statement. “While most organizations have a mobile technology strategy, many are not making the leap over to the use of mobile apps as a means to connect with customers and clients … Organizations that aren’t looking to develop mobile applications are potentially missing out on the opportunity to further engage with their business audience.” Beyond a mobile strategy, Canadian businesses may also be lagging in other areas. Earlier this month, the  Canadian Internet Registration Authority released a study showing just 45.5 per cent of Canadian businesses had their own websites, even though half of Canadian consumers have gone online to buy a good or service.

From http://www.itbusiness.ca/ 03/26/2014

TOP↑

 

Windows XP: The Final Shutdown

 

On April 8, Microsoft Corp. will end its support for the Windows XP operating system. After 12 long years of receiving security updates, having Microsoft technical support answering your phone calls or emails, and confidently receiving third-party support for new software products and peripherals, that will all end next Tuesday. Microsoft is encouraging its user base to migrate away from Windows XP to a more modern version of Windows, namely Windows 7 or Windows 8. Of course businesses will also have the option of moving to a different operating system like Mac OS X or perhaps a Linux variant. Microsoft is also cutting support for Office 2003, so that productivity software you’ve been enjoying on that old PC will also need to be upgraded. Just like Windows XP, it will no longer receive assisted support, software updates, or security patches.

 

Without that sort of service from Microsoft, anyone running either Windows XP or Office 2003 risks attack from a hacker that takes advantage of an unpatched vulnerability or exploit. Aside from the security risks, businesses that have to meet compliance standards may also face risk of breaching their regulatory obligations by not upgrade the software. If your business is still running Windows XP, there’s some urgency to take action to ensure you don’t suffer as a result. At IT World Canada, we’ve been following this topic for long ahead of the expiry date. Back in 2008 we even spearheaded a “Save XP” campaign asking Microsoft to extend the length of time it would sell Windows XP (it did, more than once). But now that the OS is finally on its last legs, we can offer you a full guide on what the end of support means and what you can do about it.

 

Get help migrating from Windows XP

Migrating away from Windows XP might not be the easiest IT task ever accomplished. Complicating the issue is the fact you can’t just upgrade from Windows XP to Windows 7. The upgrade path would be XP to Vista to 7, and Vista wasn’t widely deployed. But there are tools out there offered up by Microsoft and other vendors to make things easier on you and keep your data in tact as you move to a new PC, or wipe your current machine clean and install Windows 7.

Is this the end of Windows XP, or Y2K?

Since we’ve known about Microsoft’s planned end of support for Windows XP for a long time, there have been plenty of time for rumours to fly. Some trumped up the migration woes faced in an upgrade from XP to a new version of Windows. Others wondered what might happen to the legions of PCs still running the unpatched OS and what mayhem that could unleash. Here’s a look back at some of the real threats posed to users of Windows XP and some migration myth busting with Steve Heck, CIO of Microsoft Canada.

 

What's the worst that can happen?

Windows XP PCs are 6 times more likely to be infected: Microsoft

Businesses still running Windows XP are six times more likely to become infected by malware than users running new operating systems (OS) like Windows 8, according to a new report from Microsoft Corp.

I really want to keep running XP

If you’re running Windows XP still, you’re not the only holdout. Windows XP is still being run by 58 per cent of Softchoice Corp. customers, the IT services firm reported late last year. Another IT services firm, Fiberlink, reports 40 per cent of its users are still running Windows XP. So is there any way you can keep it without taking unreasonable risks? Maybe. If you can move to a terminal services model, or just completely isolate your PC from outside files that are possibly malicious, then you can keep your Windows XP PC running for as many games of solitaire and minesweeper as you like. Our Community Blogger Brian Bourne walks you through it.

From http://www.itbusiness.ca/ 04/01/2014

TOP↑

 

Canadian Businesses Ahead in Mobile, Accenture Study Finds

 

Canadian companies are ahead of the global competition in bringing mobile technologies into the workplace – but if they want to disrupt their industries, they’ll need to get the C-suite involved. In a recent survey from IT consulting firm Accenture, 85 per cent of 150 Canadian respondents said they’ve adopted and deployed mobile technologies. The global average was just 69 per cent among the 1,475 executives polled, showing Canadians are ahead of the curve. However, only 31 per cent of Canadians polled said their CEO is directly involved with their organization’s plans for mobile – less than the global average of 35 per cent. And there’s another factor holding Canadian businesses back. Like many of their counterparts in other countries, 70 per cent of Canadian companies are finding it hard to keep up with all of the new mobile devices and systems constantly being released. “To stay competitive and become digital disruptors in industries that have gone through years of disruption from new entrants, CEOs need to become more engaged in creating and implementing their digital strategies with their IT teams,” said Stephen Gardiner, managing director of Accenture Digital Canada, in a statement.

 

“The entire business strategy must be fully aligned and integrated in order to take advantage of digital technologies, including continuing the strategic shift to mobile that Canadian businesses are doing so well at. Mobile, cloud, social and analytics are rapidly – and permanently – transforming industries. Every business is now a digital business, and leaders who understand this and use it to capitalize on the benefits of digital are most likely to succeed in the long term.” Adopting mobile is something businesses are definitely thinking about, as 56 per cent of the Canadians polled said they expect mobility to be one of their organization’s top two priorities in investing in digital technologies. For these respondents, they said they wanted to use mobile technologies to boost revenue by engaging more with customers on their mobile devices, boost revenue by using mobile devices to do transactions, provide better customer service with access to data and capturing new leads, and finding new channels for sales and marketing. Twenty-six per cent of respondents said they expected digital technology to create more revenue for their companies, while 25 per cent said they want to build new digital businesses and services. Twenty-nine per cent said they plan on moving into new markets.

From http://www.itworldcanada.com/ 04/07/2014

TOP↑

 

U.S.: Google, Facebook, Amazon Warn FCC Rules Pose 'Grave Threat to the Internet

 

The world's largest technology companies are coming out in force against the Federal Communications Commission's proposed regulations of Internet access. In a letter to the FCC Wednesday, Google, Facebook, Amazon, Microsoft, Twitter, Yahoo, Netflix, and dozens of other companies warned that the FCC's plan to allow Internet service providers to charge websites for faster service in some cases "represents a grave threat to the Internet." "Instead of permitting individualized bargaining and discrimination, the Commission's rules should protect users and Internet companies on both fixed and mobile platforms against blocking, discrimination, and paid prioritization, and should make the market for Internet services more transparent," the companies wrote. "Such rules are essential for the future of the Internet."

 

It's not yet clear whether the tech giants are planning any larger protest of the proposed net-neutrality rules. Many of the same companies participated in a massive protest in 2012 that derailed the controversial Stop Online Piracy Act, or SOPA. Google, for example, blacked out the logo on its home page (the most visited website in the world) and collected 7 million petition signatures in a single day. Two Democratic FCC commissioners also expressed concern with the proposal on Wednesday, throwing the regulations into jeopardy. FCC Chairman Tom Wheeler will need both Democratic votes to move the planned regulations forward at a meeting next Thursday. The FCC first enacted net-neutrality rules in 2010, but the D.C. Circuit Court of Appeals struck them down in January. Wheeler is trying to rework the rules in a way that can survive future court challenges. His proposal would ban Internet service providers from blocking websites but would allow them to charge for special "fast lanes" as long as the arrangements are "commercially reasonable." Wheeler argues that his proposal is on strong legal ground and would prevent abuses.

From http://www.nextgov.com/ 05/08/2014

TOP↑

 

Open Data: Embracing 21st Century Economic Development in California

 

A California Open Government working group launched earlier this year aims to increase collaboration between government and civic startups. We launched an Open Government working group for the State of California earlier this year – with our most recent roundtable at San Francisco-based accelerator Runway last week – to increase collaboration between government and the civic startup community. This group will benefit people and communities through enhanced services utilizing open data. The benefits to the public, including transparency and reduction in lag time to inquiries are astounding as are the benefits to governmental offices, which include a decrease in paperwork and staff hours on public information requests, for example. The idea we espouse sounds simple enough, in theory. If government agencies and offices were to institute forward-looking open data policies statewide then the growing industry of civic-focused startups will grow exponentially. These civic entrepreneurs will create new products and platforms that will continue to increase government efficiency, while the reduction in costs to taxpayers will undoubtedly have a net-positive impact on society.

 

One example is BuildingEye, a civic startup that has created a real-time map with all of the locations that have building permits in the cities in which BuildingEye operates. The San Francisco Entrepreneur in Residence company makes it easier for the public to see what is going to be built in your neighborhood with a click of button. Currently, though, BuildingEye only works in a handful of cities that have opened their data. At our second open data roundtable hosted at San Francisco-based accelerator Runway last week, we charted a roadmap to bring new policies to unlock civic innovation. While the geographic boundaries of our goals are limited to city, county and state agencies within California, what we accomplish can be shared and borrowed by municipalities across the country as a blueprint for collaboration between tech, government and its inhabitants. Our diverse working group includes government leaders, open data experts, and civic startup founders, including, but certainly not limited to the innovative minds behind Accela, Appallicious, Code For America, GovFresh, OpenCounter, OpenGov and PopVox. These civic-minded innovators are coming together to help create more transparency, accountability, efficiency and economic development.

 

We’ve been lucky to count Kish Rajan, Director of the Governor’s Office of Business and Economic Development, as an active member of the working group. Rajan has been willing to engage in the important conversations necessary to drive an open gov platform which, he argues, will undoubtedly lead to vast economic development and the creation of an industry in its most infant stage. Rajan discussed strategies for implementing open data policies on the state level. He talked about how there is the potential for significant job creation when government agencies make their data more accessible. He also spoke about the importance of creating better, richer data systems and tools with open data that policymakers could use to make more informed decisions, which ultimately benefits constituents. But, he stressed the need for Californians to “re-envision” what economic development looks like, both at the state and local level, so that products and programs work from one city to another.

From http://www.govtech.com/ 05/08/2014

 

TOP↑

 

 

Bitcoin Website Exchange Offline

 

The website of major Bitcoin exchange Mt. Gox is offline amid reports it suffered a debilitating theft of the virtual currency. The URL of the Tokyo-based Mt. Gox was on Tuesday returning a blank page. The disappearance of the site follows the resignation on Sunday of Mt. Gox from the board of the Bitcoin Foundation, a group seeking legitimacy for the currency. Separately, several Bitcoin exchanges have released a joint statement saying funds under their control are held securely. The Bitcoin operators said they are working to're-establish the trust squandered' by the failings of Mt. Gox, which should not be considered a reflection of the value of Bitcoin or the digital currency industry. A 'crisis strategy' report shared widely online that purports to be an internal Mt. Gox document says more than 740,000 Bitcoins are missing from the exchange, which froze withdrawals earlier this month. The cloud hanging over Mt. Gox is a possibly fatal blow to Bitcoin. Supporters of the virtual currency have said its cryptography makes it immune to theft or counterfeiting. The virtual currency had been inching toward broader acceptance despite wild swings in value.

From http://www.skynews.com.au/ 02/25/2014

TOP↑

 

Digital Music Market to Grow $9 Billion Worldwide This Year

 

Mahindra Comviva, the global leader in providing mobility solutions and Ovum Consulting, today released a research study on Digital Music Market. The study encapsulates future trends on the uptake of digital music in terms of adoption rates; devices used to consume music services and segregation of listeners and suggested target approach. The research study reveals that digital music market grew by around 9% in 2012 and is expected to grow $9 billion worldwide in 2014. Strong growth is driven by the expansion of international and regional music brands as well as active smartphone growth in South East Asia, India and Africa, all topping 20% CAGR. It predicts that Asia-Pacific emerging markets are expected to approach $450 million and Latin America top $200 million in trade value in 2014. Commenting on the latest trends in the mobile music industry, Atul Madan, Head of Digital Services, Mahindra Comviva said, "the music industry is witnessing dynamic changes and consumption patterns are shifting, driven by the increasing adoption of smartphones.

 

The study reiterates our belief that the future of digital music will be based on enhanced engagement, 360 degree music experience and addressing the needs of price sensitive markets. Localized and customized content will play a greater role in enticing consumers." Across the nine markets surveyed (both emerging and developed), the share of devices used for listening, purchasing or downloading music has changed dramatically in 2013, as compared to 2010. Computer share has dropped significantly by 14% points with mobile and tablets together up 15% points, emphasizing the importance of mobile for reaching lean-back listeners. Segregating the group of digital music consumers into lean-back and lean-forward listeners, the study suggests that there is a huge opportunity for operators when it comes to offering personalized music packages and targeted music services that will help reduce churn, drive subscription and increase revenues.

From http://ca.finance.yahoo.com/ 02/28/2014

TOP↑

 

Global Mobile Wallet Market: Reports and Intelligence

 

Mobile wallet market set to register 127.5% CAGR in next seven years on account of growing smartphonesadoption. Reports and Intelligence today added a new study on "Mobile Wallet Market (Applications, Mode of Payment, Stakeholders and Geography) - Global Share, Size, Industry Analysis, Trends, Opportunities, Growth and Forecast, 2012 - 2020". The analysts of the report predict that the mobile wallet market will witness an exponential growth during 2013 and 2020 to be worth $5.3 trillion in 2020; registering a CAGR of 127.5% during the forecast period. Mobile network operators will be most benefitted with wave and will bag largest chunk of the revenue, while OSS/BSS solution providers, handset and other hardware solution manufacturers, software developers and cloud computing companies, and content and applications aggregators will have their chunk of shares. The key vendors who have established their dominance include, ISIS, MasterCard Inc., PayPal Inc., and Visa Inc., American Express Serve, Citibank NA and Google Inc.

 

Strides in mobile phone technology have increased the scope of mobile wallet market. Its scope is further expected to increase due to continuous research and developments in the smartphone technology and enhanced security levels. Increasing forays of Smartphones in developing countries and widespread popularity in developed countries are working in the favor of global mobile wallet market. Further, the mobile wallet market would grow exponentially due to inclination of consumers and retailers for NFC (Near Filed Communication). Mobile wallet is handy to use and also accessible anytime, anywhere. Apart from providing economical transaction facility, it also helps users to maintain account details. However, factors such as security, high investment cost, lack of technological understanding by consumers would prove to be detrimental for mobile wallet market.  Even though such limitations work against the growth of the market, many industry players are teaming up to study and provide an enhanced product in order to provide quality service to customers and fulfill their needs.

 

As per the report, global mobile wallet applications market is segmented based on mobile commerce, mobile coupons, mobile ticketing, micropayments and mobile transfers. Further, depending upon the mode of payment, the global mobile market consists of remote and NFC payments. Down the hierarchy, NFC mobile payment is categorized into NFC handsets, NFC tags and chips Micro SD, readers and NFC SIM/UICC card. Also, global mobile wallet market stakeholders comprise of mobile network operators (MNOs), handset manufacturers, software developers, content applications and aggregators, OSS/BSS solution providers, and other stakeholders. In terms of geographical locations, report segments global mobile wallet market into North America, EMEA, Asia Pacific and Latin America. Presently, Asia Pacific leads the global mobile wallet market, followed by EMEA and North America. Further, the report forecasts Asia Pacific region to have the highest share in global mobile wallet market during 2013 to 2020. This can be credited to factors such as increasing popularity of Smartphones, popularizing m-payments and m-banking and rising technological competence.

 

KEY BENEFITS OF THE REPORT

This report provides market intelligence with respect to applications, mode of payment, stakeholders and geographies

Deep dive of top factors impacting the market growth

Value chain analysis, Porter's five forces, top investment pockets are analyzed and presented in detail in the report

SWOT analysis and strategic developments are included in the report for key players

Study the challenges and opportunities available in the mobile wallet market

Derive market estimates for mobile wallet market and its sub-segments

Analyze the key strategies adopted by major market players engaged in the market

Analyze the market factors in various geographic regions and understand business opportunities

Assess and rank the top factors that are expected to affect the growth of the market

 

MARKET SEGMENTS

GLOBAL MARKET, BY APPLICATION

Mobile Commerce Market

Mobile Wallet Shopping Market

Mobile Wallet Bill Payments Market

Mobile Wallet Hotel Booking and Payments Market

Mobile Wallet Entertainment and Event Pay Market

Mobile Ticketing Market

Rail, Metro and Bus Tickets

Airline Tickets and Boarding Passes

Mobile Coupons Market

Mobile Transfers Market

Micropayments

 

GLOBAL MARKET, BY MODE OF PAYMENT

Remote Payment

NFC Payment

NFC Product Market

GLOBAL MARKET, BY STAKEHOLDERS

Mobile Network Operators (MNOs)

Handset and other Hardware Solution Manufacturers

OSS/BSS Solution Providers

Software Developers and Cloud Computing

Content and Applications Aggregators

Other Stakeholders

GLOBAL MARKET, BY GEOGRAPHY

North America

Europe

Asia-Pacific

RoW

From https://ca.finance.yahoo.com/ 04/01/2014

TOP↑

 

How E-commerce Is Taking Over the World

 

The internet has been responsible for changing the way we go about many of the tasks in our day-to-day lives. Not least it has changed the way we shop. Customer experience specialist Baynote has released a new infographic map showing the growth of e-commerce across the world. Interesting highlights include the fact that in the US e-commerce is growing at four times the rate of retail and in China it grew by 51 percent in 2013. India's e-commerce market is expected to increase from $13 billion in 2013 to between $50 and $70 billion by 2020.

 

The graphic also highlights the hotspot cities that play host to major players in the e-commerce world. Seattle, home of Amazon, for example accounts for more that $61 billion in online sales. However, this is dwarfed by Hangzhou in China, home to the Alibaba site which manages more transactions than Amazon and eBay combined. Another interesting trend is that 60 percent of E-commerce shoppers now use social network sites and tools in order to interact with brands showing that our online lives aren't neatly pigeon-holed. Click on the image below to view the full size map and see how e-commerce is spreading across the globe.

From http://betanews.com/ 04/18/2014

TOP↑

 

How Reputations Are Won and Lost in Modern Information Markets

 

Democratisation of online information, always-on media and the proliferation of audiences creates distorting effects that are not well understood, according to a new white paper published by the Oxford University Centre for Corporate Reputation at Saїd Business School and the University of San Diego School of Law. 'How Reputations are Won and Lost in Modern Information Markets' seeks to identify the key challenges and opportunities for businesses and policy-makers in dealing with online information networks. Recipients of early copies include the Policy Unit at No 10 Downing Street, the White House and the European Central Bank. Among the topics explored by the white paper are:

Why information networks breed extreme views

Positive and negative social potential of networks

Who owns your reputation and what influences them

How even 'honest' online ratings can 'lie' -- and the broader implications of the 'herding' tendency

 

Based on a conference co-hosted in San Diego by the two university institutions, and including contributions from leading academics, business executives and journalists, the report also suggests initiatives to counter some of the 'biases' fostered by information networks and to create a more productive environment for the exchange of information between business, government and their audiences, as well as helping policy makers understand how they can use reputation 'as a mechanism to hold organisations and institutions to account'. 'The effects of information networks and 21st century instant communication work in surprising and often counter-intuitive ways,' says Rupert Younger, Director of the Oxford University Centre for Corporate Reputation at Saїd Business School. 'These effects can distort markets, and damage the reputation and health of businesses and governments. But they also provide particular challenges and opportunities in terms of how reputations can be created, sustained and rebuilt.' The paper is organised under three headings:

Technology - the effects of the speed at which information is disseminated

Stakeholder Plurality - the challenges of addressing ever broader stakeholder audiences with conflicting agendas

Polarisation - why the market in information encourages extreme viewpoints

 

The subject matter covered, based both on academic research and practitioner experience, ranges from: the growing distrust between business and media and its wider implications; the positive 'herding' effects of ratings websites; the reputational challenge of dealing with consumer data across different territories; maintaining long-term business goals in the face of short-term information cycles; and the survival of traditional publishing in a digital age. It makes a number of recommendations that seek to redefine the way information networks are understood and engaged with, grouped under Trust, Humanity and Literacy:

Encourage Public-Private Engagement

 

Technology has democratised authority. At the same time it provides tools that allow large groups to know one another. The institutions of state and senior corporate leaders have yet to embrace this democratisation due to fears about losing control. Yet legitimacy and reputation can be gained by embracing this democratisation. We recommend that government organisations formally ramp up their engagement with society in order to rebuild trust. At a minimum, this public-private engagement should include transparent focus groups, polling, and public consultations. The public sector should formalise relationships with private sector groups to study how governments and corporations can harness technology and instill reasonable principles of transparency and self-policing.

 

Help Manage the Information Cycle

Technology has led to quicker cycles of information, which have a profound effect on reputation. These quicker cycles present serious challenges for policy makers, given the nature of electoral cycles and the media. For businesses, pressure comes from the constant need to (re)act quickly and to deliver short-term financial results. We recommend that government and business leaders put in place public-private teams to help leaders manage the increasing speed of the information cycle. These teams should include a wide range of media representation. The goals should include managing informational feedback loops, processing information as it arrives in stages and understanding -- and potentially avoiding -- quick reactions that are conditioned by biases.

 

Support financial literacy

Financial illiteracy is a serious problem in complex modern information markets. Unless there is a real understanding of the causes of economic problems, particularly the recent financial crisis, policy responses are likely to be inadequate. Basic literacy is important, not only in safeguarding vulnerable stakeholders, but also to improve the decision making of policymakers and corporate leaders and ensure that critics offer their views from an informed position. We recommend a systematic and sustained programme of public and private education related to core financial issues. Both the UK and US governments should target key audiences -- policy, regulatory, business and the public -- using clear and simple language, and employing technology to articulate basic financial constructs and how they work.

 

Help Counteract Biases

A strong 'herding' tendency occurs, especially around the early expression of views. In the United States, research has uncovered a clear bias toward positive reviews in online consumer rating sites. This herding effect gives rise to misinformation that can be very difficult to correct. Educating the public about these tendencies is important, as is ensuring that there is room for trusted translators and critics within any debate. Policy makers also should create safeguards to prevent powerful information intermediaries from abusing their status and power. We recommend that government and business create public-private initiatives to counteract biases in two ways. First, teams should ensure that there is a counterweight to the instant views that often dominate search engines and technology-related feedback mechanisms. Second, teams should encourage a culture of welcoming and engaging views that are discordant with early accepted norms.

 

Encourage Businesses to Invest in Tools that Facilitate the Desire to Do Good.

Human networks and human impulses underpin all information markets. A clear theme that emerged from the conference is the power of humanity as a force for good in modern markets. There are signs that businesses are starting to recognise their responsibilities in this area. Strong policy initiatives are needed to support and nourish these nascent efforts, which will help to restore trust among business leaders, their employees, politicians, and the public. We recommend that governments play a light-touch, yet important, role in this area, signalling through their actions that the way businesses relate to society is a national priority. Business leaders should consider formally articulating and embedding a culture of humanity in their mission and vision statements.Policy makers should consider tax incentives and reporting initiatives to encourage investment in tools that make it easy for companies' employees, customers and other stakeholders to accomplish social goals. Technology, in particular, can help stakeholder groups to form information and communications networks that facilitate the basic human desire to do good.

 

Encourage 'Yes And' -- Particularly in Risk Management

Positive working environments can generate productivity gains and make workers happier and better off. But the increasing plurality of stakeholders that corporations must consider often leads to a focus on risk management, rather than opportunity management, especially in areas such as social media. We recommend that private and public leaders attempt to harness the power of 'yes and', rather than 'yes but', in their decision-making forums. We do not mean that decision makers should ignore risks or critical oversight, but rather that the analysis should embrace possibilities and be more constructive than restrictive. For example, businesses could focus their risk management efforts, not on regulatory requirements and negative possibilities, but on the potential for positive outcomes. Contributors to 'How Reputations Are Won And Lost In Modern Information Markets' include: Twitter co-founder Biz Stone; senior executives from global companies eni, Experian and Millennium Management; prominent journalists from Reuters, the New York Times and CNBC; and professors from the Universities of San Diego, Stanford, Oxford and MIT. The full list of contributors is available in the paper.

 

Notes to editors

1 'How Reputations are Won and Lost in modern Information Markets' paper

http://www.sbs.ox.ac.uk/ideas-impact/reputation

2 About Oxford University Centre for Corporate Reputation

The Oxford University Centre for Corporate Reputation, established in January 2008, is an independent research centre which aims to promote a better understanding of the way in which the reputation of corporations and institutions around the world are created, sustained, enhanced, destroyed and rehabilitated.

3 About Saїd Business School

 

Said Business School at the University of Oxford blends the best of new and old. We are a vibrant and innovative business school, but yet deeply embedded in an 800 year old world-class university. We create programmes and ideas that have global impact. We educate people for successful business careers, and as a community seek to tackle world-scale problems. We deliver cutting-edge programmes and ground-breaking research that transform individuals, organisations, business practice, and society. We seek to be a world-class business school community, embedded in a world-class University, tackling world-scale problems.

 

In the Financial Times European Business School ranking (Dec 2013) Said is ranked 12th. It is ranked 13th worldwide in the FT's combined ranking of Executive Education programmes (May 2013) and 23rd in the world in the FT ranking of MBA programmes (Jan 2014). The MBA is ranked 5th in Businessweek's full time MBA ranking outside the USA (Nov 2012) and is ranked 5th among the top non-US Business Schools by Forbes magazine (Sep 2013). The Executive MBA is ranked 23rd worldwide in the FT's ranking of EMBAs (Oct 2013). The Oxford MSc in Financial Economics is ranked 6th in the world in the FT ranking of Masters in Finance programmes (Jun 2013). In the UK university league tables it is ranked first of all UK universities for undergraduate business and management in The Guardian (Jun 2013) and has ranked first in nine of the last ten years in The Times (Sept 2013). For more information, see http://www.sbs.ox.ac.uk/

From http://finance.yahoo.com/ 05/12/2014

TOP↑

 

Frost & Sullivan Study: Mobile Collaborative Market in Asia-Pacific to Grow

 

The mobile collaborative market in the Asia-Pacific is expected to exhibit a compound annual growth rate of 21.4 % through 2018, according to a study by the global market research/consultancy firm, Frost & Sullivan. The study is titled, " Analysis of the Mobile Collaborative Market in Asia-Pacific, CY 2013". The study estimated the total number of users of mobile collaborative platforms in the Asia-Pacific as worth US $ 1.12 million in 2013. The study covered mobile email, voice messaging and conferencing solutions of which mobile voice, messaging and conferencing represented key growth areas. Adoption of mobile collaborative services hosted in public/hybrid cloud environments is presently low among price sensitive, large enterprises in the Asia-Pacific that already have premises-based ICT infrastructure, according to the press statement. But the study expressed optimism that cloud-based enterprise mobile collaboration services would soon grow traction, due to the improved security situation and lower upfront investment requirements. The study noted the present state of quality among wireless infrastructure networks in the Asia-Pacific as uneven. But it expressed optimism the uneven state would be corrected in the next five years as networks in Asia upgrade to 4G and long term evolution (LTE) platforms.

From http://www.computerworld.com.sg/ 03/28/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

CHINA: Internet Group Buying Service Ends

 

Chinese group buying service website Didatuan.com will formally close its group buying business on March 31, 2014, and will transform its brand to a new business model in the future.Founded by Song Zhongjie, former sales general manager of Google China, in July 2010, Didatuan.com completed its integration with Velo, a Chinese coupon provider, at the beginning of 2013. After the integration, the new company continued to use the Didatuan brand and Song took the chief executive officer position in the new company.Didatuan.com previously received investments from IDG, KPCB, NEA, Greylock, and Northern Light Venture Capital.By January 2014 China had 213 group buying websites, which were 281 less than September 2013. So the highly saturated sector is downsizing and stopping businesses. Many of these businesses deal with Chinese retailers, who are notorious for long receivable cycles, not adhering to posted promotions, and often not likely to sign exclusive agreements with group buying sites. So investors have often been throwing money at poor management, poor executive, and ultimately a bad business model that does not operate the same in China as elsewhere in the world.

From http://www.chinatechnews.com/ 03/10/2014

TOP↑

Over 80% of Chinese Families Shopped Online Last Year

 

China Central Television published a report on China's economic life between 2013 and 2014 which shows that 81.52% of Chinese families had online shopping experiences in 2013.Compared with other consumer groups, university students and people in management positions shopped online more often, especially those in the 18-25 age demographic.By region, citizens in Hainan, Tibet and Jiangsu were more enthusiastic about Internet shopping; while those in Beijing, Xinjiang and Shanxi were at the bottom of this list. The survey shows that Internet shopping has become a national trend; however, products purchased online were mostly low-price ones. During 2013, the most popular products in online shopping were clothing, books, home appliances, and digital products.

 

CCTV said that though the consumption method has changed and online shopping gradually has become a national trend, it is worth noting that the top three popular online shopping products are still mainly low-price products.Based on overall consumer desires, over the past five years, consumers have always been willing to buy home appliances and tourism products. Meanwhile, the demand for high value-added products like automobiles declined. In addition, consumer services are still in a secondary position, except for education and training which is among the top five products demanded by consumers in 2014.

From http://www.chinatechnews.com/ 03/17/2014

TOP↑

 

Lenovo Succumbs to Patent Troll in USD100 Million Deal

 

Unwired Planet, a technology company headquartered in Reno, Nevada, announced that China's Lenovo has agreed to buy a series of patent portfolios and licenses for an intellectual property portfolio from Unwired Planet for about USD100 million.The payment will be made entirely in cash.Under the agreement, Lenovo will purchase a 21 patent portfolio owned by Unwired Planet, covering 3G and LTE mobile patents as well as other important mobile patents. At the same time, the Chinese company will gain a multiyear licensing of Unwired Planet's intellectual property portfolio, covering mobile device standard basic patents, installation patents, and application technologies. The deal is expected to be completed in 30 days.Jay Clemens, Lenovo general counsel, said in a statement that this investment is an extension of Lenovo's existing intellectual property portfolio. It will serve the company well as they grow and develop their worldwide smartphone and mobile PC Plus business in new markets.

 

Unwired Planet's share price surged by 61% after the announcement of the deal. Unwired Planet, previously named OpenWave, is called a patent troll by some media in the United States because of Unwired Planet's allegedly dubious activity to get companies to pay money for licensing patents owned by Unwired Planet.Unwired Planet's technology claims to have enabled many industry firsts, including mobile browsing, mobile photo-messaging, and the world's first Wireless Application Protocol deployment. The company has built a patent portfolio of approximately 200 issued U.S. and foreign patents and approximately 75 pending applications, many of which are considered fundamental to mobile communications, and span smart devices, cloud technologies and unified messaging.

From http://www.chinatechnews.com/ 03/24/2014

TOP↑

 

JD.com Signs Chinese Retail Store Deals for O2O Development

 

Chinese B2C e-commerce company JD.com signed agreements with about 10,000 convenience stores in China to develop an innovative online-to-offline retailing model.JD.com announced that the company will implement O2O cooperation with about 10,000 convenience stores in 15 cities, including Shanghai, Beijing, and Guangzhou. Those 10,000 convenience stores cover brands like Quik, Good Neighbors, Buddies, C&U, and Meiyijia. These deals will eventually allow Chinese netizens to buy goods online and have them delivered or picked up at physical locations, and it will allow Chinese consumers at retail outlets to use online payment methods to purchase goods at brick-and-mortar retail outlets.This marks JD.com's latest O2O deal following its cooperation with Shanxi Tangjiu Supermarket. JD.com said that in the future they plan to expand this model into all provincial capitals and prefecture-level cities in China.In addition to cooperating with convenience stores, JD.com signed strategic cooperating agreements with mainstream ERP software providers such as SAP, IBM, and Heading to jointly realize the seamless connection between retailing ERP systems and JD.com's platform.

From http://www.chinatechnews.com/ 04/02/2014

TOP↑

 

JD.com Jumps into Chinese Virtual Communications Sector

 

JD.com unveiled its virtual communications operating brand JD Mobile.At the same time, the e-commerce company announced that JD Mobile's business will be officially launched in May 2014 and the exclusive JD Mobile communications products and numbers will be available by then.JD.com also released the brand logo and sample SIM card designed for JD Mobile. As an important signature of JD.com, the dog image mascot Joy is kept in the logo of JD Mobile, and it represents the link between the parent company and the subsidiary.At present, JD Mobile is still undergoing beta testing. On March 21, the company opened its first number and completed the first voice communication. Users are expected to access the communications services in May.A representative from JD Mobile said that users will be able to apply for service opening and invoice printing via the Internet. JD's delivery staff are also business hall staff, so with this arrangement JD Mobile will establish a mobile Internet business hall for users.

From http://www.chinatechnews.com/ 04/05/2014

TOP↑

Survey: Chinese Lead in Online Shopping

 

Chinese consumers are more online-shopping savvy than their global peers, fueling a business trend of merging physical shopping with digital experience, PricewaterhouseCoopers said in a report yesterday.Chinese consumers led the way in online shopping with more than 60 percent of those surveyed claiming they shopped weekly, compared with 21 percent for global respondents, PwC said. The Achieving Total Retail report surveyed 15,000 online shoppers around the world in 15 countries and regions, including 900 in China.One in four Chinese consumers shop with a mobile phone at least once a week, compared with 9 percent for global respondents.“China is more advanced in its use of mobiles in the shopping experience than arguably anywhere else in the world, yet few retailers are bringing a digital experience to the physical store,” said Colin Light, PwC’s digital consulting leader for the Chinese mainland and Hong Kong.

 

“It is critical to bring the benefit of e-commerce, online-to-offline business in a bricks-and-mortar environment.”Consumer demands for handy access to goods, in-store stock level, consistent online and offline promotions, and easy return of purchased goods mean that retailers’ efforts in building an omni-channel retailing lag behind, according to the survey report.Recent business cases of e-commerce companies buying stakes in retailers and establishing cooperation with convenience stores reveal a trend of deeper cooperation between online and offline retailers, said Carrie Yu, PwC Hong Kong Assurance Partner.China’s e-commerce giant Alibaba said last week that it will invest HK$5.37 billion (US$692 million) to buy a 9.9 percent stake in Hong Kong-listed Intime Retail (Group) Co to expand its online-to-offline business.

From http://news.xinhuanet.com/ 04/09/2014

TOP↑

 

Baidu Launches Mobile Payment Platform

 

Baidu Inc., which operates China's most popular search engine, formally launched its mobile payment platform "Baidu Wallet" on Tuesday.The launch follows the release of similar products from major rivals, including Tencent's mobile application Wechat Payment last August and Alibaba's Alipay Wallet in January 2013.Baidu Wallet provides money transfer, payment and wealth management services, according to Zhang Zhenghua, general manager of Baidu's payment branch Baifubao.Mergers and acquisitions have been popular in the past year in China's Internet sector as online giants "BAT" -- Baidu, Alibaba and Tencent -- are speeding up development of their mobile Internet business.The Nasdaq-listed Baidu closed a 1.9 billion U.S. dollar deal to acquire 91 Wireless Websoft, a major Chinese smartphone application distributor, last August.In May, Baidu spent 370 million U.S. dollars to acquire the online video platform PPS in order to rival industry leader Youku Tudou.

From http://www.chinatechnews.com/04/15/2014

TOP↑

 

Tencent Breaks Off Online Literature Service into Independent Business Unit

 

Chinese Internet company Tencent announced that its Internet literature business will implement independent operation as a subsidiary and Wu Wenhui has been appointed chief executive officer of this new entity.Meanwhile, Shang Xuesong was appointed president of Tencent Literature; Zhang Rong was appointed senior vice president; and Cheng Wu, vice president of Tencent, was appointed chairman of this new company.Wu said at Tencent's annual launch meeting that Tencent Literature will fully embrace the mobile Internet. By using the latest technical carriers, they will provide a comfortable environment to writers and offer the joy of reading to more readers. Meanwhile, Wu said that Tencent Literature will have a new brand portfolio after commencing its independent operation. For content, they have literature websites for both male and female readers, which will become their two major vertical websites and the sources of original works.

 

For products and channels, they will focus on mobile reading.Founded in September 2013, Tencent Literature's various websites gained total growth of 50% over the past seven months' operation. The company accumulated 200,000 works, over 300 well-known writers, and 15 million daily active users on mobile devices.Wu said Tencent Literature will continue to enhance investments to achieve the full intercommunication between mobile and PC products. They will also improve the interactivity of mobile products and optimize reading experience and smart push basing on Tencent's big data platform. At the same time, the company will implement platform analysis and optimization, new channel development, as well as channel content optimization.

From http://www.chinatechnews.com/ 04/24/2014

TOP↑

 

Baidu Officially Opens Big Data Engine

 

Chinese search engine Baidu has officially opened its big data engine to provide big data storage, cloud computing analysis and research technologies to the outside world.Baidu's big data engine is formed by three core modules: an open cloud, data factory, and Baidu brain. By applying platform and interface technologies, Baidu will open its big data storage, analysis, and intelligent processing functions, creating what is claims to be the world's first open big data engine.With this open big data engine, Baidu's cooperating organizations and enterprises will be able to use Baidu's big data structure via the Internet to process their own accumulated big data. Meanwhile, they can integrate Baidu's big data technologies to improve enterprise management and business model links in traditional industries.The opening of Baidu big data engine will happen gradually. It currently has an invitation system and free-of-charge mode to first cooperate with traditional sectors such as government, non-governmental organization, manufacturing, medical, finance, retail, and education.China's national transport management unit reportedly plans to relocate parts of its application plans to the Baidu open cloud platform. The Chinese Center for Disease Control and Prevention also plans to combine disease control big data and Baidu big data to establish China's first flu forecasting system.

From http://www.chinatechnews.com/ 04/29/2014

TOP↑

 

Best Days Ahead for China's Internet Firms

 

Some people have cried wolf following the decision by Chinese authorities to regulate the online broadcast industry and penalize Internet firms for allowing pornographic content.Pessimism about China's Internet firms was obvious. The share price of Tencent fell 3 percent after four popular U.S. television shows were banned from being broadcast on online video streaming sites. Shares of Sina plummeted after being revoked some online publication licenses.Speculation has been building, out of ulterior motives or ignorance, that the cases spell trouble for China's flourishing Internet stars and might precede a "wider crackdown" on Internet companies, the Internet economy or even the use of the Internet itself.The fact is that they are just standalone cases by which the Chinese authorities try to fill the "regulation vacuum" concerning content for online broadcast, and, in the case of Sina, enforce its anti-porn laws.

 

Online video content regulation and anti-porn laws should be familiar to Internet users in most countries, especially in the West, where the most sophisticated and sound laws are in place to guard against misuse of the Internet and harms to public interests, especially minors.Both cases should not have come as surprise. For the TV show case, the state broadcast regulator issued a notice in March to enhance online video content regulation. For the Sina case, it is common sense that any law-breakers must be penalized.It is as simple as this. Nothing more. All the other conspiracy theories are misleading, either to ordinary people or investors coveting China's Internet economy which holds great business potentials.Just as the real economy, the Internet economy also needs rules and orders, maybe even more, as the intangible Internet is far more tricky to trace and manage.

 

Be it against online rumors, against pornographic content or measures to guard Internet security, they are all part and parcel of China's efforts to create a healthier environment for people and businesses to jump on the Internet economy bandwagon.In this sense, the two cases should have come as a boon to Internet companies, as they would herald a cleaner, healthier, more certain and rule-based Internet business environment.The Internet economy is booming, and, given the huge user base in China, is set to thrive for many years to come.In 2013, China's Internet was a platform for about 9.9 trillion yuan of commerce, and about 1.2 trillion yuan was paid on mobile phones, the users of which reached a whopping 838 million by January this year.It is business as usual in China's Internet economy and Internet firms, calm and cool, are pursuing their business plans. Coincidentally, online video business, which was claimed to be under threat, was a target in a 1.22-billion-U.S.-dollar takeover deal between Alibaba and Youku Tudou on Monday.

From http://www.news.cn/ 04/29/2014

TOP↑

 

China's First Mobile Virtual Operator Launches Business

 

T.Mobile, a unit of Telephone World Digital Group, on Sunday became China's first mobile virtual network operator (MVNO) to offer wireless voice and data services.Currently, the services, wholesaled from China Telecom, are restricted to Hangzhou, capital of east China's Zhejiang Province, but they will expand to other parts of Zhejiang later, the company said without elaborating.MVNOs do not own telecommunications infrastructure but provide services through network access they have leased at wholesale rates from another mobile operator.Telephone World Digital Group is one of 19 companies, mostly privately owned, that have received mobile virtual network operator licenses. The companies also include subsidiaries of e-commerce giant Alibaba, and retailers Suning, JD.com and D.Phone.Several other virtual operators are also expected to begin services soon. Suning and D.Phone started taking pre-orders for their telecom services on May 1.

 

Zou Xueyong, secretary general of the Industry Association of the Mobile Virtual Network Operators, said the mobile virtual network operators are expected to bring a "catfish effect" to the country's telecom industry, improving prices and services through competition."The virtual operators will help push forward reforms in the telecom industry and drive down prices of telecom services," Zou said.However, many industry insiders remain cautious.An executive from an MVNO, who declined to be named, said the virtual operators are not expected to bring about sweeping changes to the industry, which is dominated by three state-owned basic telecom operators -- China Mobile, China Unicom and China Telecom -- due to their unequal relations.It might take a long time before people accept the virtual operators, he said.The virtual operators will each need 1 million active subscribers to reach the break-even point, said an executive with China Telling Communications who declined to be named.

From http://www.news.cn/ 05/04/2014

TOP↑

 

Aliyun's Beijing Cloud Computing Data Center Opens for Business

 

Alibaba's cloud computing subsidiary Aliyun has formally opened its Beijing data center.Along with Hangzhou and Qingdao, this Beijing outpost is Aliyun's third data center focused on global services. The company is reportedly now selecting overseas sites for similar operations, which indicates that the company is accelerating its expansion. In addition, the company's South China engine room is expected to open in the second half of 2014.Aliyun's Beijing cloud computing data center has 10,000 servers for the first phase and it mainly serves clients in the Beijing and the North China region. Its major customers include government research institutions, financial organizations, and start-up companies.The Beijing cloud computing data center will provide four types of cloud products: cloud servers, relational database services, open storage services, and load balancing services. Users can subscribe to those services on the official website of Aliyun. More products will be available in the future.The opening of the Beijing cloud computing data center will offer more network node options to users so as to further improve user application service reliability and response speed.

From http://www.chinatechnews.com/ 05/06/2014

TOP↑

 

Chinese E-Commerce Giant Provides Subsidies for Exporters

 

Chinese e-commerce giant Alibaba will offer subsidies to small and medium-sized domestic exporters that complete transactions on its platform, the company announced on Tuesday.If exporters complete services including logistics, customs clearance and tax rebates through Alibaba's online platform OneTouch, they will get a maximum subsidy of 0.03 yuan, or less than half a U.S. cent, in cash for each 1 U.S. dollar of transaction volume, Alibaba said."The move is to integrate scattered services of small and medium-sized export enterprises via the platform, thus lowering down costs and breeding more profits," said Wu Minzhi, President of Alibaba's business-to-business (B2B) unit.Statistics released by Alibaba showed that for Chinese small export enterprises, spending on commodity circulation has taken up over 30 percent of total costs."Logistics, customs clearance and tax rebates have consumed time and manpower of small and medium-sized export companies," said Wei Qiang, a manager in charge of Alibaba's foreign trade service sector.He said for banks, logistics companies and customs, the OneTouch platform serves as "a key client" by integrating tens of thousands of export-oriented enterprises."As for those companies, convenient channels for export, financing and logistics could help them lower costs," he said.

From http://www.chinatechnews.com/ 05/13/2014

TOP↑

 

China Mobile to Offer Cheaper 4G Network Service

 

China Mobile will start to lower prices of its fourth-generation (4G) mobile phone network services on June 1 to attract more users, the firm announced on Wednesday.The country's largest mobile telecommunications provider will launch a 30-yuan service for 500Mb of data. Some new packages will be lowered to 58 yuan from 88 yuan.The data price will drop up to 50 percent in the new packages, said Lu Wenchang, a deputy general manager of the company's marketing department.In some new packages, 70 yuan will buy 2G data instead of 1G. In others, users can enjoy two to six times more data at the same price as a previous package.The company also offers a service which allows a user to share his package data with up to four relatives or friends.More than four million clients from about 200 cities have used China Mobile's 4G service.On Saturday, Chinese authorities freed up telecom fees, allowing all operators in the sector to make pricing decisions on their own as long as the charges abide by law and regulations.

From http://www.news.cn/ 05/14/2014

TOP↑

 

Mobile Internet Business Booming in China

 

Mobile Internet is becoming a lucrative business in China, with improving telecom infrastructures a main contributor, according to a report released on Thursday.Total revenue in the mobile Internet sector reached 108.3 billion yuan (17.8 billion U.S. dollars) in 2013, said the China Internet Development Report 2014, jointly issued by the Internet Society of China (ISC) and the China Internet Network Information Center (CINIC).China has more than 500 million cellphone-based Internet users and high-end subscribers used an average 1.6 Gb of data every month last year, according to the report."Chinese Internet users are shifting from desktop to mobile devices," said Shi Xiansheng, vice secretary-general of the ISC.Shi attributed the expansion of the mobile Internet business to the improvement of the country's underlying Internet facilities.As of the end of the third quarter last year, 130 million households had access to optical-fiber-based broadband Internet, and 3G mobile Internet had covered all townships.

 

Along with the development of mobile Internet business, smartphones saw rapid growth. Last year, smartphone shipments grew by 64.1 percent to 318 million units.At the same time, shipments of wearable device, such as smart watches and glasses, topped five million units in 2013 and the number is expected to reach 40 million units by 2015, according to data released by Internet observer website iresearch.com.cn.Ruan Jingwen, CEO of the website, said in addition to wearable devices, products that make medical treatment and transport "smart" are likely to boom in the future.However, the report warned that slack regulation of mobile Internet resulted in security loopholes, especially on the Android platform.Some 703,000 malicious mobile Internet applications were detected in 2013, 4.3 times the number found in 2012. The spread of cellphone viruses accelerated as it became easier to get infected when accidentally downloading such applications.Zhou Zhen, a senior analyst with the CINIC, said despite the rapid expansion of mobile Internet in China, the security issue is emerging as a pressing problem that needs to be addressed carefully.

From http://www.news.cn/ 05/16/2014

TOP↑

 

JAPAN: E-Commerce Giant Rakuten Halts Whale Meat Sales

 

Japanese e-commerce giant Rakuten said Friday it has told online retailers to stop selling whale meat after a UN court ordered an end to the country's Antarctic whale hunt. The move -- which also includes a ban on dolphin meat sales -- comes as Japan said Thursday it was cancelling this year's hunt for the first time in more than a quarter of a century to abide by the decision of the United Nations' Hague-based International Court of Justice this week. Australia, backed by New Zealand, hauled Japan before the international court in 2010 in a bid to stop the yearly campaign, which has attracted widespread condemnation outside Japan. "We issued a notice to all stores on April 1, asking them to stop sales of whale meat products by the end of the month," a Rakuten spokeswoman said. "We made the decision... following the ruling by the International Court of Justice and a subsequent comment by the Japanese government that it will obey the ruling," she added. The notice was issued to about 42,000 online shops that operate on Rakuten's digital marketplace, she said, adding the company did not have a figure for how many sold whale meat. A search of the site Friday turned up about 700 listings for whale meat products. There were no listings for dolphin meat. Tokyo had been widely criticised for using a legal loophole in a 1986 whaling ban that allowed it to continue slaughtering the mammals, ostensibly so it could gather scientific data.

 

However, it has never made a secret of the fact that whale meat from these hunts often ended up on dining tables. Rakuten's move to ban the sale of whale-meat products appeared to go above and beyond the ruling, which said that Japan's hunt in the Southern Ocean was a commercial activity disguised as science. The judgement did not affect whales hunted as part of Japan's coastal whaling programme or in the north Pacific. Public consumption of whale meat in Japan has steadily and significantly fallen in recent years and there is little support for whaling itself. But aggressive anti-whaling campaigns hardened sentiment among the Japanese public, who came to see the issue as an attack on differing cultural values. Rakuten's decision comes several weeks after the Environmental Investigation Agency (EIA) published a critical report that said the e-tailer was the world's largest online marketplace for whale meat and elephant ivory, and said the advertisements were akin to arming poachers. Rakuten said Friday there was no change to its online ivory sales, which are restricted to domestic shoppers.

From https://au.news.yahoo.com 04/04/2014

TOP↑

Online Retailers Looking for a Change in the Sales Tax System Before They Raise White Flag

 

So, now that we’re one month in, how’s everyone enjoying the latest sales tax increase to 8%?

A consortium of Japan’s online businesses, including ebook sellers and advertisers, met on April 10 to hash out some demands for the government before they get taxed right out of the competition since business such as segments of Apple and Google aren’t necessarily subjected to Japanese sales tax rules. If you were to buy a physical product from overseas, you wouldn’t have to pay the Japanese sales tax since it was not a domestic transaction. Despite that advantage, the customer would still have to deal with shipping costs and other hassles to make a domestic dealer the better choice. However, when we consider data purchases, you can basically get the same ebook in the same time without any shipping from a foreign company. Adding an increasing sales tax in Japan into mix and you’re likely to see more and more citizens look beyond the seas for their apps and digital media.

 

According to an interview by Economic News, the president of Kinokuniya bookstores had this to say: “The 8% tax is a big handicap. When the tax becomes 10%, we may start seeing some raise the white flag.” His and other ebook businesses may consider abandoning the market all together if nothing changes. Still in its early stages, the group hasn’t made any specific demands regarding what kind of reform they want to see. The Ministry of Finance is said to be preparing a plan to have a “tax agent” to ensure that foreign companies operating in Japan pay up properly. Perhaps the online Japanese businesses would like to see that expanded to foreign countries operating virtually in Japan as well. It would seem that whatever happens in the coming years, it’s the regular people who are going to get the worst of it. Either Japanese companies will be aided by stricter tax enforcement and we’ll all pay more no matter where we go, or those companies will fail to thrive and Japan will sink further into economic stagnation.

From http://www.japantoday.com 05/01/2014

TOP↑

 

SOUTH KOREA: Int'l Trade Association to Support Service Sector Growth in 2014

 

The head of South Korea's international trade association said Tuesday that supporting growth of the country's service sector will be an important goal for his organization in 2014. In a meeting with reporters, Korea International Trade Association (KITA) chairman Han Duck-soo said development of the country's service industry is critical for sustainable growth and creation of new jobs.

From http://english.yonhapnews.co.kr 02/25/2014

TOP↑

ICT Ministry Under Audit for Alleged Business Favors to Google: Sources

 

South Korea's state-run auditor has launched a probe into the ICT ministry on suspicions that it ignored regulations in allowing U.S. Internet giant Google Inc. to operate a mobile payment business here, industry sources said Tuesday. The Ministry of Science, ICT and Future Planning authorized Google Payment Korea Ltd. in June 2011. While South Korean telecom law requires mobile transaction service providers to have at least five staff members with more than two years of related job experience and other necessary facilities based locally, Google Payment Korea has outsourced its business and had its key operational facilities based at the Google headquarters in the U.S.

From http://english.yonhapnews.co.kr 03/18/2014

TOP↑

 

S. Korea's Smartphone Sales Promising from Global Boom: Analysts

 

South Korea's tech players will be able to boost their smartphone sales this year as they concentrate more on moderately priced models while global demand is likely to grow to a new high, local analysts said Wednesday. "Samsung Electronics Co. is expected to sell 370 million units around the world in 2014," said Lee Seung-woo, an analyst at IBK Investment & Securities Co. "The number is above the 319 million units estimated a year earlier." Lee based the strong outlook on Samsung's strategy with inexpensive models when the market for high-end products is becoming saturated, with added complications from ongoing patent suits with its U.S. rival Apple Inc.

From http://english.yonhapnews.co.kr 04/09/2014

TOP↑

S. Korea's ICT Exports Rise 8.9 Pct in March

 

South Korea's exports of information and communication technology (ICT) grew 8.9 percent from a year earlier last month on growing shipments to both advanced and newly emerging countries, the government said Thursday. Outbound shipments of ICT products came to US$14.98 billion in March, according to the Ministry of Trade, Industry and Energy. Imports surged 10.3 percent on-year to $7.43 billion, but the sector's trade surplus widened to $7.55 billion from $7.02 billion in March 2013.

From http://english.yonhapnews.co.kr/ 04/10/2014

TOP↑

 

S. Korea Fifth Largest Supplier of High-Tech Goods to U.S.: Report

 

South Korea was the fifth-largest supplier of high-tech goods to the United States in 2013, up two notches from the year before, a report by an international trade organization said Sunday.

According to the Korea International Trade Association (KITA), locally manufactured goods made the top 10 list in seven of the 10 high-tech fields.

From http://english.yonhapnews.co.kr 04/27/2014

TOP↑

 

South Korea’s ACRC Partners with IBM on Cloud-Based Mainframe

 

The Anti-Corruption and Civil Rights Commission (ACRC) in South Korea said this week that it will be working with IBM to test a hybrid cloud platform in a bid to consolidate numerous national public service phone numbers into one integrated call centre. ACRC, which responds to people’s grievances when they feel their civil rights have been breached, launched in 2008 and was created through the integration of several organisations in South Korea: the Ombudsman of Korea, the Korea Independent Commission Against Corruption, and the Administrative Appeals Commission. The agency deals with over 1.25 million complaints, 2.2 million civil petitions and 30,000 administrative appeals per year. The new platform will include a hybrid cloud solution which includes a cloud-based mainframe that will provide the backbone for ACRC’s digital platform, e-People, and its call centre services hub, the 110 Government Call Centre. The IBM mainframe solution will become the main repository for its integrated database workloads, which is expected to grow five-fold by the end of next year. ACRC said that the hybrid cloud platform will make its operations more flexible and scalable. “By integrating public services previously operated independently, we will improve significantly the quality and efficiency of our service, while reducing costs,” said HangNo Lee, director, 110 Government Call Centre.

 

“The new IBM IT infrastructure will help us provision and combine call centres much faster than before and better respond to the demands of our society,” Lee said. The partnership between ARC and IBM will run for the next three years. An initial pilot project will see six government departments move to the call centre before the end of July, with the rest of ACRC’s departments being integrated at a later time. Despite the fact that most greenfield cloud services today are being built for x86 environments IBM is still investing loads in mainframe development, a segment it has a near monopoly on. Last week the company announced it has set up two new mainframe cloud innovation centres in Africa, one in Nairobi, Kenya and the other in Johannesburg, South Africa, to focus on developing cloud-delivered solutions based on the platform. And when IBM announced first quarter revenues for 2014 last month it said that while mainframe revenues  declined, which it attributed to being at the bottom of a refresh cycle, MIPS (millions of instructions per second, a measure of its use) on the platform was up 26 per cent this quarter, signalling strong usage.

From http://www.businesscloudnews.com 05/19/2014

TOP↑

 

South Korea’s Online PC Game Market Is Growing — But Dislodging Its Biggest Players Is Impossible

 

South Korea’s PC online game market is expected to grow from $2.83 billion to $3.5 billion by 2018, but it won’t be easy for new entrants to dislodge the established franchises of NCsoft, Nexon, and Electronic Arts. A report from market researcher IHS shows that South Korea now has the second-largest market for online multiplayer PC games, with China in the top spot. NCsoft’s Lineage rules the market; although the massively multiplayer online role-playing game released in 1998, it still generated $281 million in revenues last year. Like in China, Korean competitive online gaming has become so popular that it’s like a major televised sport. After a 4 percent dip in 2012, the PC online gaming market in South Korea grew 8 percent in 2013. The 2012 decline provoked fears that the PC market was saturated as consumers turned to mobile games. Most Korean PC game companies have accordingly diverted their resources to high-growth opportunities like mobile games and exports to China.

 

“Most growth came from a collection of established franchises some of which have been around for nearly a decade and one that launched way back in 1998,” IHS said. “New games released during the year failed to break the stranglehold of these biggest titles underlining the entrenched nature of the market. With growth being driven from these established games it is perhaps no surprise that it was relatively suppressed at 8 percent. In contrast the mobile and tablet games market grew over 250 percent in 2013 and was worth over $1 billion for the first time.” After Lineage, the No. 2 game was Nexon’s Sudden Attack, with $208 million in spending last year. That debuted in 2005 and is a free-to-play title that makes money off microtransactions. Other top titles were EA’s FIFA Online 3 (which Nexon operates) and Riot Games’ League of Legends. IHS expects the Korean PC online game market to grow at a compound annual growth rate of 3.7 percent, hitting $3.39 billion in 2018. The question is to what extent mobile and tablet games will disrupt the market.

From http://venturebeat.com 05/21/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

INDONESIA: Telcos, Lenders Urged to Strengthen E-Banking Services

 

Indonesia's telecommunication operators and banks need to strengthen cooperation in providing Internet banking services in anticipation of the growing number of Internet users in the country, according to an Internet association. “Stronger cooperation between telecommunication companies and the lenders in Internet banking services will generate more creative ideas that will eventually benefit the country,” said Ferrij Lumoring, secretary-general of the Indonesian Mobile and Online Content Provider Association (IMOCA). Today, telecommunication companies and banks have developed cooperations in Internet banking in which the former provides networks and the latter offers the banking system. However, the two parties have not capitalised on the growing number of Internet users to improve their cooperation, Ferrij said. According to him, there is a tendency for telecomunication firms and banks to not work together fearing that increased cooperation would hurt their individual profits.  “It seems that they [telecommunication firms and banks] are competing with each other,” said Ferrij.

 

Meanwhile, state-owned lender Bank Tabungan Negara (BTN) director Sri Purwanto said he had no objections to the idea of improving cooperation in. Internet banking as long as it benefited those involved. According to him, e-banking was showing positive growth in the country and would continue to do so in the future. “I am optimistic that the growth of e-banking will be sustainable in the years to come due to the positive trend of rising Internet users,” Sri added. In BTN, e-banking transactions have grown on average 41.5 per cent every year. Additionally, e-banking transactions now account for 74.2 per cent of all transactions at BTN. “We predict that e-banking transactions in BTN will grow by 50 per cent this year,” said Sri. According to Mark Plus Inside Netizen Survey, the number of Internet users in Indonesia grew to 74.57 million in 2013, up 22 per cent from 62 million people in the previous year. The survey forecast that the number of Indonesian netizens would grow to 107 million this year and to 139 million people in 2015. However, of total netizens in the country, the number using e-banking services remains proportionally small, because most people are not yet familiar with the notion of moving money online. “It is our job to make people more familiar with Internet banking,” said Sri. "But I am upbeat that [in the future] e-banking will be a mandatory not just optional choice. E-banking can meet the higher demands of efficiency for money transactions in the country.”

From http://www.asianewsnet.net/ 04/22/2014

TOP↑

 

PHILIPPINES: Government and IBM Launches Disaster Management Operations Centre

 

The Information and Communications Technology Office of the Philippine Department of Science and Technology (DOST) and IBM have launched the Intelligent Operations Centre (IOC), a new multi-million disaster management facility in Diliman, located at the centre of southern Quezon City. The Centre features technology that allows the Department to monitor and forecast weather so that it can be better prepared and respond quickly to disasters, said DOST Secretary Mario Montego (pictured). He added that the agreement with IBM Philippines is a major step in leveraging planning technology and supercomputers to solve disaster management challenges. According to IBM Philippines Chief Technology Officer Lope Doromal, the GIS-enabled IOC will improve situational awareness and information sharing among key stakeholders. Other features of the IOC include real-time monitoring with a surveillance network, using social media feeds as an additional source of information and the use of global positioning system. During emergencies, IOC consolidates and analyses data for better coordination between first responders and supporting agencies. A unified communications system connects the National Disaster Risk Reduction Management Council with all stakeholders through multiple devices, including laptops, remote communication platforms and more.

From http://www.futuregov.asia/ 03/20/2014

TOP↑

 

Google and Singapore Government to Grow Analytics Talent

 

The Infocomm Development Authority of Singapore (IDA) will be collaborating with Google to develop the much needed analytics talent in Singapore. The Squared Data Programme will provide aspiring analytics professionals with the skills they need to gain a competitive edge in the world of analytics and data driven innovation. This is part of IDA’s Company-Led Training (CLT) initiative, which supports the industry in recruiting, mentoring and training entrant infocomm professionals in fast-growing technologies such as data and analytics, and mobile application development. From June 2014 to May 2015, Squared Data Programme will provide 20 Singaporean fresh graduates with intensive training in analytics, and give them the opportunity to work within a Singapore media agency to gain hands-on experience. They will also receive mentoring from top industry talent throughout the programme. According to IDA’s Assistant Chief Executive of Development Group Khoong Hock Yun, “Data and analytics are critical, underpinning Singapore’s efforts in becoming a Smart Nation.” “IDA has undertaken many initiatives to develop capabilities in these areas, such as the public release of government data sets and the setting up of innovation centres with the industry to pilot emerging data analytics technologies.” “To support these developments, a strong base of data analytics professionals is necessary. IDA is very happy that Google has come onboard as a CLT industry partner to enhance the data analytics potential of our young infocomm talent pool,” he concluded.

From http://www.futuregov.asia/ 02/27/2014

TOP↑

 

Singapore Government Improves Ease of Doing Business with Revamped Web Site

 

The Accounting and Corporate Regulatory Authority of Singapore (ACRA) has launched its revamped customer-centric web site to improve user experience and access to information. ACRA, the national regulator of business entities and public accountants in Singapore, also plays the role of a facilitator for the development of business entities and the public accountancy profession. The new ACRA web site adopts a customer centric approach with more user friendly navigation. Key new features include info-graphics, dynamic visual design and new and intuitive navigation menus. The most popular services and information are made more prominent on every page. On its home page for example, ACRA lists the most accessed services, such as buying information, searching the directory of registered entities, preparing financial statements using BizFinx and finding Singapore Standard Industrial Classification codes for business activities. To meet the specific needs of our different user groups, information is also sorted into different business entities and related life cycles.

 

Under the section “What would you like to do today?”, users can click on their profile - companies, sole-proprietorship, partnerships or start-ups - and the web site intelligently shows services that relevant to them. Information is organised and clearly presented to make it easy for users to navigate through the pages. Its ‘How-to-Guides’ section categorises guides based on users’ business events. For example, on the ‘How-to-Guides’ page for companies, the site divides the collection of guides into three major events - before starting up a business, when managing a company, and when exciting a company - so that users know where to go at a glance. There are also dedicated sections for public accountants and corporate service providers. ACRA celebrated its 10th anniversary last month. In the last 10 years, ACRA has been staying ahead of the curve in terms of innovation and to facilitate the ease of doing business. An upcoming initiative include the revamp of its one-stop business registration and filing portal, BizFile, which will see an improved customer-oriented user interface, streamlined processes and new value added e-services and mobility options.

From http://www.futuregov.asia/ 05/14/2014

TOP↑

 

VIETNAM: Mobile Phone Exports on the Rise

 

Viet Nam earned US$3.3 billion from exports of mobile handsets and spare parts in the first two months of 2014, posting a year on year increase of 22.9 per cent. Mobile phones and their accessories topped the list of processed industrial products, according to the Ministry of Industry and Trade. Mobile phones, the country's most lucrative sector in January, generated US$1.7 billion, representing an increase of 14.6 per cent over the same period last year, and 38.5 per cent over December 2013, the ministry said. The EU, United Arab Emirates, US and Russia are the main importers of Vietnamese mobile handsets and components. Their export value helped raise total two-month export earnings of processed industrial products to US$15 billion, an increase of 16.8 per cent over the same period last year.  Viet Nam's exports of phones and accessories witnessed a sharp year-on-year increase of 69.2 per cent in 2013, making mobile phone products among the country's most important export items.

 

This is the first time exports of phones topped the list of Viet Nam's key export items, with revenue of over $21.5 billion, according to information released by the General Statistics Office. Exports of phones and accessories accounted for one fifth of the country's total export turnover, and 50 per cent of the trade sector's growth, said the office. In 2009, mobile phones ranked ninth among the country's top 10 export items behind garments, footwear, crude oil, seafood, electronics, computers and spare parts, wood and wood products, rice and rubber. One year later, they climbed to fourth place after garments, crude oil and footwear. The sharp increase in the export turnover of phones and accessories was attributed to the contribution of Samsung plants in Viet Nam, which were responsible for 98 per cent of Viet Nam's mobile phone and accessories exports in 2012. Exports of phones last year were followed by garments, with $17.89 billion, and electronic products, computers and spare parts, at $10.67 billion in revenue, according to the General Statistics Office. Viet Nam spent $25.7 billion in 2013 for imports of equipment for production of phones, computers and other electronic products.

From http://vietnamnews.vn/ 03/10/2014

TOP↑

 

Bandwidth Revoked from Telcos

 

The Ministry of Information and Communications plans to withdraw mobile bandwidths that it provided to S-Fone and EVN Telecom mobile carriers due to fading operations. The EVN Telecom uses 450 MHz bandwidth spectrum and Sfone uses 850MHz, both of which were allocated by the ministry since the two companies began operations. However, while EVN Telecom had been taken over by Viettel in early 2012, Korean-invested S-Fone nearly postponed its operation due to falling subscribers. Pham Sy Hoa, general director of SPT, the Vietnamese partner of S-Fone, stated that the network is still running its operations at a bare minimum level as its Korean partner, SK Telecom, had not yet fully withdrawn from the joint venture. In late 2012, ailing S-Fone made most of its nationwide employees redundant in order to end its Business Co-operation Contract mechanism and change to a limited liability company. Having commenced operations in Viet Nam in 2003 as the third mobile operator after MobiFone and Vina-phone, S-Fone is a joint venture between the Korean telecom giant SK Telecom and Sai Gon Postel (SPT).

 

The company also became the first mobile operator to implement the advanced CDMA (Code Division Multiple Access) technology in Viet Nam, while other carriers still used GSM (Global System for Mobile Communications). However, due to the limited models of CDMA's terminal handsets, the company was unable to expand its customer base, with just over a million subscribers after a decade of operations, and will reportedly stop offering its services. After SK Telecom withdrew from the venture in 2011, S-Fone has failed to find a new investor to revive its ailing network. The company, which also wants to upgrade its network technology from CDMA to HSPA (High Speed Packet Access) to increase its subscriber base, had a turnover of merely VND786 billion (US$37.78 million) in 2011. The company did not release any turnover report in 2012 and 2013. In recent years, new mobile subscriptions in Viet Nam have skyrocketed, reaching 19 million in 2006, 25 million in 2007, 74 million in 2008, and 98 million in 2009. By the end of 2013, there were 134 million recorded subscribers.

From http://vietnamnews.vn/ 03/14/2014

TOP↑

Vietnam Government and Microsoft to Collaborate on Cloud

 

The Vietnam Ministry of Finance (MoF) has signed an agreement with Microsoft that will see the Ministry examining and adopting the latest IT solutions to enhance its efficiency. MoF will collaborate with Microsoft to provide online public services and optimise IT infrastructure for cloud. The two organisations will also work to develop an internal information portal on the financial sector with multi-dimensional data integration. This follows the signing of two deals covering cybersecurity between Microsoft and the Ministry of Information and Communications. “Through the MoU (Memorandum of Understanding), the Ministry will continue to work closely and effectively with Microsoft to exploit business intelligence solutions and cloud computing to raise the capacity of IT in the finance industry. This helps local people and enterprise to gain more benefits from modernised public services,” said Dang Duc Mai, Director of Financial Informatics and Statistics at MoF. Microsoft will share with MoF knowledge on new global trends in IT and cooperate to develop human resource for IT in the financial sector.

From http://www.futuregov.asia/ 03/17/2014

TOP↑

Online Banking Services in Vietnam Remain Safe: Central Bank

 

Online banking services in Vietnam remained safe from the OpenSSL Heartbleed, said the State Bank of Vietnam (SBV) on its website late Thursday. Vietnamese media on Wednesday reported that 15 websites providing services of online banking of Vietnamese banks have been attacked by Heartbleed, said SBV. After receiving information on OpenSSL Heartbleed, all credit agencies in Vietnam's banking system have checked and fixed the system. They are now safe and operating normally, said the country 's central bank. The SBV also suggested all customers of online banking services to strictly comply with the regulations of banks, changing lock code and using transaction control and account balance to monitor their accounts.

From http://news.xinhuanet.com/ 04/10/2014

TOP↑

 

Electronics Sector in Need of Support

 

Domestic electronics industry still struggle to survive as local electronic manufacturers have to narrow their production. The most important problem of the electronics industry is attributed to poorly-developed support industry. Electronics businesses are still facing difficulties in having access to bank loan and seeking workshop for their production. In addition, Viet Nam still lack industrial zone complexes to adapt small scale electronics businesses and R&D centres to assist in supplying technology for electronics makers. Most of locally-manufactured products are made in line with foreign design. Very few local makers are produced by local manufacturers and generate a very low added value and low competitive edge, reports Viet Nam Economic Times. For a long period, Vietnamese electronics industry only have assembled electronic spare-parts and labelled Made-in-Vietnam products On the other hands, local electronics manufacturers have low competitive edge in comparison with foreign direct investment companies as FDI businesses enjoyed huge tax and fee incentives. FDI businesses will enjoy a 10 per cent corporate income tax rate for 15 years, down from the usual 22 per cent. Furthermore, the investor will also enjoy a four year tax break and a 50 per cent reduction for the following nine years. While, local investors have to pay 20 per cent corporate income tariff. The tariff is applied in 2014.

 

Furthermore, one of the obstacles hinder local electronics manufacturers getting into global value chains in the electronics industry is the concept of building a comprehensive electronic industry ranging from eletronic accessories to CKD products. Local insiders noted that to develop this concept is not a simple thing. To participate in the global value chains in the electronics industry, Vietnamese electronic makers need to shift their production structure by changing from production and assembling of civil electronics products to design and development of specialised ones. They are also asked to focus on specific investment strategies. General secretary of Viet Nam Chamber of Commerce and Industry (VCCI) Pham Thi Thu Hang said local electronics makers needed to specify which are the best products and accessories having high competitive edge to be produced so as to meet the three following targets: "quality, on time delivery and reasonable price." If the three targets were met, local electronic producers could participate in the global value chains in the electronics industry, she said. According to the General Statistic Office (GSO), Viet Nam export turnover of electronic items reached US$20.5 billion or an increase of 90 per cent against 2011. In 2013, export turnover of this sector posted $32.2 billion taking the lead in the country's exports. According to the annual report of the VCCI, the great achievement in export turnover of electronics sector in the last three years showing that this sector plays an important role in the country economic development. However, it noted that the great achievement is mostly contributed by FDI businesses while local businesses have not yet made any impressive development in the achievement. Although FDI businesses account for 25 per cent out of 500 electronics businesses in Viet Nam, they account for 80 per cent of the market share and major of the export turnover.

From http://vietnamnews.vn/ 05/03/2014

TOP↑

Programme Aims to Create E-Commerce Payment System

 

Prime Minister Nguyen Tan Dung has signed a decision to approve a national electronic commerce programme in the period 2014–20. The programme aims at building a national e-commerce payment system for e-commerce models, especially business to consumer (B2C). It also targets to develop a payment card used widely to decrease cash usage and popularise digital signature to ensure the safety of e-commerce transactions. The objectives of the programme are also to transform online shopping into a popular method of purchasing goods for customers and to make enterprises apply widely e-commerce models, such as business to business (B2B), B2C and business to government (B2G), in their business operations.The programme aims for the construction and development of e-commerce infrastructure, including building an integrated card payment system and an online management system on transportation. Besides, the programme also aims at building standards in data exchange in e-commerce, as well as building a system to guarantee the trust in online shopping and mechanisms to tackle online disputes. The programme will target to develop products and e-commerce solutions, including building an online sales solution to assist SMEs implement e-commerce and build an e-commerce trade floor to spread the images and brands of Vietnamese enterprises. The government also supports and increases the capacity for export firms to take part in prestigious local and international trade floors. During the period, Viet Nam will also develop e-commerce applications on mobile devices and digital contents for e-commerce. It will implement activities and solutions to build online brands for major products and services of Viet Nam. Moreover, the government will build applications on online public services to assist the state's management governmental agencies and companies.

From http://vietnamnews.vn/ 05/17/2014

TOP↑

 

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

Report: Indian E-Commerce to Become $8 Billion Industry

 

The outlook for India’s economy may be gloomy for now, but one sector looks set to boom: online retail. As more and more Indians use the internet, revenues of e-commerce companies could triple over the next three years to 504 billion rupees ($8.13 billion), according to Crisil Research, a unit of Mumbai-based ratings firm Crisil Ltd. There are around 200 million internet users in India currently and the number could grow to 500 million by 2015, according to consulting firm McKinsey & Co. Over the last few years, dozens of websites have been launched in India to sell everything from books and appliances, to baby care products and flight tickets. Online retail companies earned revenues of around 139 billion rupees ($2.24 billion) in the financial year that ended on March 31, 2013, according to the Crisil report. Though this is just 0.5% of the total revenues of brick-and-mortar retail companies, online retail sales have been growing much faster.

 

Revenue of e-commerce firms grew by 56% annually between the financial year that ended March 31, 2008, and the year ended March 31, 2013, according to Crisil. The scope for growth in this sector has already attracted a lot of interest from venture capital investors. Earlier this month, online retailer Jabong.com raised around $100 million from CDC Group PLC, a U.K. government-backed private-equity fund-of-funds that invests in some emerging markets, according to The Economic Times. Clothing and accessories-seller Myntra.com also raised $50 million, this month. Foreign companies have also been looking to get a piece of the action in India. Amazon.com Inc. launched its India website in June.

From http://blogs.wsj.com/ 02/25/2014

TOP↑

 

E-commerce in India to Touch $60 Billion by 2023

 

MUMBAI: India's e-commerce sector is expected to have 7 per cent share of country's retail market amounting to $60 billion by 2023, a senior industry official said. "By 2023, e-commerce in India will have 7 per cent share of retail amounting to $60 billion dollars," Technopak Advisors chairman Arvind Singhal said at 'eTailing India Conference and Exhibition 2014' here. Telecom companies will be the biggest e-commerce players in India over the next couple of years, Singhal said.

From http://timesofindia.indiatimes.com/ 02/27/2014

TOP↑

 

eTailing India Announces First e-Commerce Industry Awards

 

Prominent e-commerce players like Amazon.in, Ebay.in, BigBazaar Direct, Yepme.com, Flipkart and Jabong have been conferred the first eTailing India e-commerce industry awards. Jabong.com won the "Online Retailer of the Year" award, while Yepme.com was declared winner of "Web-only Brand of the Year". The "Business to Consumer (B2C) Marketplace of the Year" award went to Flipkart.com and "Global Online Marketplace of the Year" was given to Ebay.in. The "Path-breaking Debut of the Year" award went to Amazon.in. The awards were conferred at eTailing India's flagship Conference and Exhibition 2014, an event that brought together major stakeholders in the retail and e-commerce business in the country. Congratulating the winners, eTailing India founder Ashish Jhalani said: "This is an inflection point in time for e-commerce adoption in India. People started buying online because of ease and greater variety. The industry will have to consolidate and give better reasons for people to stay online." Over 300 people participated at the three-day eTailing India's flagship event held in the country's commercial capital last week. Awards were given in 10 different categories. The conference featured over 70 industry speakers representing companies like Neville Taraporewalla, GM India and Microsoft. It covered diverse topics such as omni-channel retailing, packaging for e-commerce, marketing, warehousing, mobile and tablet commerce, payment solutions and retail exports in e-commerce.

From http://www.dnaindia.com/ 03/03/2014

TOP↑

 

Consulting Loses to E-Commerce at B-schools

 

MUMBAI: In a stamp of approval for the fast-growing startup ecosystem in the country, one-fourth of MBA students from across India's top-tier business schools, including the IIMs, said they would prefer working for the fledgling e-commerce sector, pipping traditional favourites like consulting and financial services jobs. The sector which has been flush with funds, on the back of growing adoption of online shopping, is now the second most preferred job avenue for B-school grads after the FMCG industry. Continuing with its rapid acceptance among management graduates, e-commerce has dethroned management consultancy from the second spot for the first time this year even as sectors such as manufacturing, software and IT services fell out of the top 10 league, said findings from a survey conducted by global market research firm Nielsen and shared exclusively with TOI. Investment banking, a much coveted sector for MBA grads in the pre-economic crisis days, is now at a lowly 10th spot, having lost its sheen internationally and in India among MBAs. I-banks with fat bonuses on offer were a big draw before the collapse of Lehman Brothers in 2008.

 

What is significant though is that despite economic uncertainty still looming large, the trend of young MBA grads looking to board the startup bandwagon has only gone up over the past couple of years in India. "One in five respondents indicated that they might consider a startup after gaining experience at their first job, and are open to the risk and challenge that come with working independently or on board an online/e-commerce set up. This is a trait seen largely in toppers from premier campuses, who aim to operate as young entrepreneurs in the near future," said Surjya Roy, director, Nielsen India.

From http://timesofindia.indiatimes.com/ 03/04/2014

TOP↑

 

 

Flipkart: India e-Commerce Could Hit $70B by 2020

 

The Indian e-commerce company expects a fast growing Internet-connected population and smartphones to be the biggest drivers to online shopping driver over the next few years. India's e-commerce market could reach US$50 billion to US$70 billion by 2020, a huge jump from the US$13 billion seen last year, according to the country's largest e-commerce firm Flipkart. The growth momentum will be fueled by on the back of a fast growing internet-connected population and improvement in related infrastructure like payment and delivery systems, Flipkart co-founder and CEO Sachin Bansal told IANS in an interview. "Consumer mentality and shopping patterns are changing very fast. Online shopping is going to become mainstream in the coming five-six years," Bansal said in the report. Among the factors driving the growth momentum will be the rising adoption of smartphones, which will pave the way for e-commerce in Tier-II and Tier-III cities. The Flipkart CEO pointed out India's e-commerce industry was still at a nascent stage, with online shopping accounting for less than one percent of total shopping in the country. For example, online sales worldwide hit US$1.22 trillion in 2013, with China alone reaching around US$200 billion. However, logistical issues may prove to be a hurdle with only around 10,000 out of over 150,000 postal codes covered by courier companies.

From http://www.zdnet.com/ 03/04/2014

TOP↑

 

Introducing Our New E-Mail Newsletter, 'E-Commerce Insider'

 

Catch up on the latest e-commerce industry news with E-Commerce Insider, a daily email newsletter that tracks the biggest changes in the e-commerce industry, highlighting the technologies and companies that are transforming retail. As e-commerce continues to take a much bigger slice of total retail sales — and as browsing for products online becomes integrated into every consumer's shopping behavior — there's a lot at stake for physical and digital retailers, consumer brands, and the payments industry. We'll follow all the top trends, companies, and people spurring the biggest innovations. Signing up is quick and easy. Click on this link, enter your email address, and click, "Submit." You'll receive it every morning in your inbox. The newsletter is produced by BI Intelligence, Business Insider's subscription industry news and research service. Any comments or suggestions, please email mballve@businessinsider.com.

From http://www.businessinsider.com/ 03/18/2014

TOP↑

 

India’s e-Commerce Revolution

 

Indian e-commerce portal Flipkart recently announced it has clocked US$1 billion in sales. Others such as Snapdeal and Myntra are expected to follow. These figures may be small compared when compared to Amazon or eBay turnovers or Facebook’s valuation of WhatsApp, yet they are significant milestones for a country such as India. For one, they underline genuine Internet users in India, not just fake profiles, trolls, memes, hackers, spammers, Modi followers and those that regularly spoof Arvind Kejriwal or Rahul Gandhi in the run up to general elections in a few weeks time. There is some serious money to be made in the online space. It is projected in the next decade India’s e-commerce retail market would amount to US$60 billion. I count myself among the very active Internet users in India, the number of which is expected to cross 250 million this year. I operate my bank account, pay bills, purchase insurance, invest and plan my travel on the Internet. I buy online clothes that usually fit nicely, books much cheaper than at stores, music and movie CDs that work fine, and even fresh groceries well within expiry date on the Internet.

 

I am one of many I am sure, evidenced by shutdown of most music, movie and book stores in Gurgaon, where I live. The only DVDs that continue to do brisk business are pirated. These are good value for money and decent quality, but they are illegal. A popular music outlet close to my home that has existed for as long as I can remember closed down recently to offer laundry services. I spoke to the owner, who I know. His answer: “In a progressive fast growing city like Gurgaon, everybody downloads music from iTunes and we can’t match the prices.’’ However, my friend was not worried. He was sure his new laundry business would do well, given disposable incomes floating around in a city such as Gurgaon replete with high earning professionals. Change does open doors for newer opportunities. I would like to debunk any theory that my online usage makes me an anti-social person in any way. It saves me a whole lot of time, allowing for more face-to-face interactions with friends and family, instead of just Facetiming or liking Facebook posts.

 

Visiting my bank to book a fixed deposit, for example, would otherwise be a nightmare involving negotiating traffic, parking and sweet talking insurance agents masquerading as customer relationship managers. Is there any bank manager who has not tried selling an insurance policy when all a person wants is a new cheque book or some small administration matter dealt with. I would also like to debunk any theory the Internet makes me lazy, akin to a TV couch potato. Rather, I am able to do more with greater efficiency. I am, however, still not fully confident about buying electronic or very high value items on the Internet, though there are many that do. I believe some of the redressal mechanisms of Indian online retailers are still not world class, like, say, Amazon. I have heard some harrowing tales of damaged TVs, mobile phones, cameras and laptops that are usually not available on Cash on Delivery arrangements. A friend recently told me that it took almost a month to get a refund on a printer she ordered online that arrived broken. She was repeatedly told by customer care to send multiple pictures of the item, the courier company assigned to pick up the dysfunctional printer never arrived and finally the refund process itself got lost in a bureaucratic maze.

 

“It was so difficult to get through on the phone to customer care that I had to call many times. I was always in queue,’’ she told me. We castigate government departments for red tape. Private entities can sometimes be worse. E-commerce retailers need to trust their customers more, not focus on making money only. It is about putting in place an effective process that assuages an unhappy customer quickly. Maybe, it is a good idea to allow foreign players more leeway in the market to improve standards and customer deliveries. I believe there is plenty more that can or should be possible via the virtual world. The government can surely make more efficient use of the Internet. Politicians such as Narendra Modi do. The Aam Aadmi Party does. I believe Lok Sabha candidate Gul Panag kept herself relevant via thousands of tweets, even as her movie career nosedived. So far most online state-backed services are mostly limited to downloading forms, which is not saying much. Any government document, whether passport or driving license involves layers of approvals and interactions that can easily be streamlined online, provided antecedents of an applicant are verified. I believe even voting should be possible via a virtual click, thus saving the exchequer huge expenditures and avoiding deployment of security forces on such a large scale. E-democracy could re-define democracy. There could be ways to minimize foul play, like it is with online payment gateways that encrypt credit card details. This can only be wishful thinking for now. But who knows. Did anybody imagine the power and reach of the Internet even a decade back?

From http://asiancorrespondent.com/ 03/24/2014

TOP↑

 

 

Semantics and Definitions; Klevu Turns E-commerce Search Fields Smarter

 

Not that this is a rule of thumb by any means, but when you take three men with doctorates and some computer science background, there’s a good chance they’ll come up with a pretty convincing business model for a startup. For example, when Dr.Jyrki Kontio, Dr. Niraj Aswani and Dr. Nilay Oza put their heads together and mindstormed Finland-based Klevu into existence. How convincing the startup is will eventually be up to you to decide, but it was enough to recently raise and close a �250 000 capital investment round led by Finnish seed investor & accelerator KoppiCatch and joined by Inventure, as well as Finnish and Russian business angels. Klevu relies purely on academical logic; It’s a smart search engine specifically built for e-commerces relying on analysis of semantics and what you could think of as an automated virtual dictionary.

 

Dr. Nilay Oza, Klevu’s CEO, told us how 15% of web shops have never even considered looking into their e-commerce search engines, usually relying completely on Google powered search results, which aren't a pure catastrophe but do leave quite a bit for improvement. The result of inaccurate or too broad search results leads to a whopping 42% rate in online-cart abandonment, which translates to lost customers, which in turn translates to lost revenue. Sure enough, there was a significant market gap to be filled, and since its establishment to the day of the closed fund, Klevu took form while being bootstrapped by the three Ph Ds. As things moved on, Jyrki Kontio used his networks to get in touch with one of Klevu’s current angel backer Jaakko Salminen, and as they say, one thing led to another. Once KoppiCatch was on the line, the deal wasn't far away anymore; Klevu perfectly fit what they were looking for, which was a company in the field search engineering and e-commerce. The deal moved on, including Inventure, four Finnish and one Russian Angel into it.

 

Today’s Klevu is dealing with clients over three continents including clients from the US, UK, India not to forget Klevu’s “home”-ground Finland where they have deals with multiple major enterprises. Klevu’s search engine owes much to the massive open source software GATE (General Architecture for Text Engineering) which is sort a text engineering bible. At this moment, Klevu offers both faster final as well as autocomplete results (search results appearing while you’re typing), faceted filtering (categorized filtering options) and most importantly, trend mining. Trend mining is basically keeping up with what’s “cool”. This means results are adjusted automatically based on search trends on your shop. Product promotion and search analytics are a given.

 

Klevu is already looking pretty good with many well constructed search related features, but Oza says the future will take all of this even further. He explained how on top of marketing, the funding will play an essential role in developing Klevu into a search engine that takes into account an emerging trend among e-commerces, which is content on top of products. Today’s bigger companies with online shops usually provide content on top of products. As an example Oza mentions H&M, which today has both the traditional e-commerce and since recent years, blogs. The next gen search engine would somehow connect the two in results with each other. Oza says this is the next step and though it’s a big challenge it's a possible one. Now including Finnish and English, Klevu’s also working on bringing French and German into their language repertoire. Implementation prices start at �19/month and go up to �99/month for bigger needs. Klevu’s also offering a no-obligation free trial of 30 days, so give it a look.

From http://www.arcticstartup.com/ 04/02/2014

TOP↑

 

Gap and Myntra May Partner for E-Commerce Biz in India

 

After starting delivery services to Indian patrons through its global site, American lifestyle clothing retailer Gap is now inching closer to them by partnering with ecommerce portal Myntra. As per reports, talks are on to finalize a deal with Myntra to launch its online store in India. It may be recalled that the largest casual wear retailer in the US is also said to be in talks with Arvind Lifestyle Brands to open brick-and-mortar stores in the country. According to a Third Eyesight survey, eight US department stores and brands are currently shipping their products to India. Experts feel that this strategy being adopted by most foreign brands and retailers indicate their strategy to test the market before making a formal entry. If the Gap’s deal gets through, Myntra may handle the operations of San Francisco-based Gap's online store. Both offline and online stores may be launched simultaneously early next year. After securing funding from PE investors recently, Myntra is racing ahead to be the leader of India’s ecommerce store amid tough competition from rivals like Flipkart and Jabong. Sources say the fashion e-tailer, which is projecting sales (gross merchandise value) of around Rs 2,000 crores this fiscal, may also partner with the Dutch clothing brand Scotch & Soda. The e-tailer, currently at half the sales figure of Shoppers Stop and Lifestyle, aims to match their figures in another 15 months. While on one hand, the portal is looking at becoming India’s largest retailer, on the other, it would utilize the raised amount to increase mobile-led services, while focusing on expansion of in-house fashion brands. The company aims to reach a turnover of Rs 1,500 crores in fiscal 2015 and grow to Rs 10,000 crores in the next three to four years.

From http://thirdeyesight.in/ 04/03/2014

TOP↑

 

Indian Govt Rejects Sports Retailer Decathlon’s Proposal to Sell Goods Online

 

French sports good retailer Decathlon’s proposal to sell its products to consumers online in India has been rejected by the Department of Industrial Policy and Promotion (DIPP), reports The Economic Times citing a government official. It adds that this is despite an approval from the Finance ministry. The department has apparently told Decathlon that the FDI policy on single brand retail doesn’t allow online sales yet. Note that the Indian government currently allows 100% FDI in single brand retail although it does comes with a rider which mandates retail ventures to source 30% of its materials locally. Decathlon which currently retails its products through 11 branded offline stores and online retailers like Snapdeal, Sports365.in and Playmore.in to consumers, had written to the DIPP last month seeking approval to sell its products online. It had sought an amendment to the approval given to the company noting that the online sales would be a marginal extension to its offline retail business and would enable them to retail products to customers in remote areas.

 

Decathlon had claimed that allowing this proposal would further improve local sourcing in the country, thereby benefitting Indian vendors. The company had estimated that it will be sourcing 35% of its products locally in the next few years. Last month, commerce and industry minister Anand Sharma has mentioned in an interview that he is in favor of allowing 100% FDI in the e-commerce sector and they are currently awaiting the approval of Election Commission to relax the existing FDI guidelines in the business-to-consumer (B2C) e-commerce segment. However, with forthcoming general elections this month, it’s not clear whether these guidelines will now be actually relaxed or not. It’s worth noting that competing party BJP’s views on E-Commerce are not clear yet. Responding to a query on the party’s stand on FDI in E-commerce Arvind Gupta, Head of the BJP’s IT Cell had told Medianama in August last year, that the political party was going to review Industry needs because “More and more businesses want to operate out of India. FDI in e-commerce is a huge issue because companies are dying here”.

From http://www.medianama.com/ 04/04/2014

TOP↑

 

 

 

Online Retail Swells to $12.6 bn, with One Million Traders

 

According to an IAMAI report, online retail in India touched $12.6 billion in 2013. India has about one million online retailers - small and large - which sell their products through various e-commerce portals, according to a recent report by the Internet & Mobile Association of India (IAMAI). These retailers sell products across categories such as electronics, books, apparel, accessories, footwear and jewellery. The presence of such a large number of online sellers testifies to the efficiency, lower capital costs and deep outreach that the online marketplace provides to the retailers, said Subho Ray, president, IAMAI. According to the IAMAI report, online retail in the country touched $12.6 billion (Rs 62,967 crore) in 2013. Online giant Flipkart.com is one such example. Its February sales figures show its annualised gross merchandise value (GMV) has crossed the $1-billion mark (about Rs 6,000 crore), a landmark the company targeted to achieve in 2015.

 

GMV is the industry term for the total worth of sales transacted on the e-commerce portal. Snapdeal, another key e-commerce player, is expected to top $1-billion mark in GMV soon. IAMAI has identified key segment drivers such as apparel and jewellery brands, which are marketing and selling their products increasingly through the online channel. The Association's report notes that consolidation and growth of logistics will drive further development of the sector. According to the report, although marketplace players run from city centres, the bulk of logistical management such as storage and deliveries are being handled from Tier-II or Tier-III cities. This leads to "equitable employment generation and bridging the urban rural divide", says Ray. Regional growth patterns indicate that apparel and fashion accessories account for the bulk of sales in the east and south, while jewellery, leather and consumer item sales are prominent in the northern and western sectors. While online retail is growing at roughly an equitable growth rate across all regions in India, the western region has a slight advantage over the extreme eastern belt.

From http://www.afaqs.com/news/ 04/04/2014

TOP↑

 

 

Indian e-Commerce Boom Produces Acceptable Casualties

 

NEW DELHI: Call it collateral damage. With India's e-commerce industry growing at warp speed, many portals are falling by the wayside unable to keep up with the nature of the beast. Apart from talks of Myntra being bought out by Flipkart, which could well turn out to be the biggest consolidation the Indian e-commerce market has seen, the latest portals to join the e-commerce dead pool are Istream, Dhingana, Letsbuy, Studyplaces and Honour among many others. Radhakrishnan Ramachandran, founder and CEO of Istream was inconsolable when his portal shut down within a year of going live. On the premium video streaming site, which is no longer functional, he writes: "My team was heartbroken. They just couldn't rationalize the situation. Neither could I. We were by far the undisputed leader in the premium online video space in India. Our numbers were soaring-in March we crossed 6 million unique users. We had marquee brands advertising with us. And now we are forced to shut Istream down-something we built with so much passion, emotion and honest sweat. I don't have all the answers as to why it had to end this way."

 

Istream, initially funded by Saif Partners, shut down because it ran out of money. Similarly, Letsbuy, once a popular shopping site, opted for a distress sale to e-commerce giant Flipkart. "Investors decided it was time to consolidate their risk profile and opt for one big player rather than put their money into too many smaller baskets," says Gaurav Saraf, director, Epiphany Ventures that has funded a few e-commerce ventures. Satyan Gajwani, CEO of Times Internet that operates many successful portals including Indiatimes, says the Indian online retail industry is still in its nascent stages. "It's not even 1% of the country's total retail business. So, the market opportunity is still huge. But it requires an ability to stay in for the long haul. Businesses that have been buying transactions while losing money were not sustainable, so they were likely to be shut down or sold. We have focused on being operating-margin profitable, and that allows us to sustain ourselves in an aggressive market."

 

Other e-commerce websites that shut down are Dhingana, an online music-streaming site that failed due to T-series not renewing its licensing agreement. Education portal Studyplaces was sold to Educomp in a distress sale. Fashion and You shut down Urban Touch, a site it acquired for a reported $30 million. "It's time the e-commerce companies came to terms with the fact that only growth at the cost of profitability is not a wise idea on a sustained basis," says Viraj Malik, CEO and founder of PK Online, an online video streaming and digital advertising company. "Emerging economies like India are experiencing a technology boom with many e-commerce, digital media and technology start-ups expanding at a phenomenal rate. Higher profitability, lower costs, tighter control over investments even at moderate growth rate would lower customer acquisition cost and generate investor value. What's happening currently is that companies are going all out for investment spree offering lower prices, overspending on customer acquisition and debt/equity binge amounting to widening of loses and escalation in customer acquisition costs."

 

Currently there are more than 900 e-commerce ventures in the Indian digital space compared with only 10-20 three years ago, according to industry sources. Experts believe only 5% of them would be doing healthy volume of transactions on a daily basis. Arvind Singhal, chairman of retail consultancy Technopak says that the consolidation is a natural process and it's nothing to get worked up about "It happened in many industries including software," he says. "Unless you have a sustainable model you won't survive. Eventually, the ventures that have the muscle to invest in technology, go for market share and have the patience to wait it out will survive." Interestingly, Youtube took more than five years to see the tip of profit.

From http://timesofindia.indiatimes.com/ 04/10/2014

TOP↑

 

 

PE, VC Investors Warm Up to Indian e-Commerce

 

Mumbai: India’s slowing consumption story has meant a decline in the interest shown by private equity (PE) and venture capital (VC) investors in consumer product, retail, and restaurant companies, even as it has meant a revival of their interest, which appeared to be fading, in e-commerce firms. Investments in retail, e-commerce, consumer packaged goods and quick service restaurants rose to $1.142 billion (across 94 deals) in 2013-14, from $855.53 billion (across 107 deals) in 2012-13, according to investment tracker VCCEdge. Of this, investments in e-commerce firms rose 258.31% to $805.36 million in 2013-14 from $224.85 million a year-ago. Investments in consumer products and restaurants fell by more than half.

Fast-moving consumer goods were the focus of many investors, but with the “consumption story” fading, that is no longer the case, explained Ashish Bhide, executive director, Avendus Capital Pvt Ltd. “Investors need to get out of a business in five-six years and if the slowdown lasts for two to three years, they know that they will not get the desired returns,” added Bhide.

Growth in the consumer packaged goods industry dropped by nearly half to 9.4% in 2013 from 18.1% in 2012, according to market research firm Nielsen India.

 

In contrast, e-commerce was the fastest growing segment in the consumer space, albeit on a small base. The total digital commerce market in India grew by 33% to reach Rs.62,967 crore (in sales) in 2013 from Rs.47,349 crore in December 2012, according to industry lobby Internet and Mobile Association of India. In 2013-14, Flipkart.com raised $360 million from existing investors Tiger Global Management Llc, Accel Partners and Iconiq Capital, and MIH (a part of South African media company Naspers Group); this is the largest investment in online retail in India thus far. Santosh Verma, director, investment banking, IDFC Capital Ltd, says e-commerce companies are gaining scale and raising money every six months. Companies such as Flipkart have also attracted US investors that understand the e-commerce space, he added. “The trend of e-commerce attracting a bulk of private equity and venture capital investments should continue for the next couple of years as more sectors such as baby products, apparel and lifestyle are now online,” said Verma. Still, it isn’t as if investors have gone completely cold on consumer product companies, said a consultant.

 

“We will continue to see activity in the e-commerce space in the new financial year. Activity will also pick up in fast moving consumer goods and the food space,” said Rachna Nath, executive director, PricewaterhouseCoopers (PwC) India. Mint reported in March that Pan India Food Solutions Pvt. Ltd, a restaurant operator and owner of the Noodle Bar, Bombay Blue and Copper Chimney brands, is in talks with PE and strategic investors for a stake sale. Hygienic Research Institute Pvt. Ltd, maker of hair care products Streax and Vasmol, is in talks with strategic investors as it looks at its next stage of growth, said Manish Chhabra, the company’s managing director and chief executive officer. In the e-commerce space there will be more consolidation as companies look to gain depth, said Nath of PwC.

From http://www.livemint.com/ 04/13/2014

TOP↑

 

 

The e-Commerce Revolution

 

One of the things that really separate us as humans from the high primates is that we’re great tool builders and we learn and execute fast, hence are acknowledged as the crown of creation. We have seen this happening for long that we don’t settle but keep improving and innovating for convenience. There has always been a strong wave of revolution in existing models to try and make them better for our convenience. Take for example e-commerce, when it started in India a lot of us were skeptical about the concept due to various reasons like internet, devices and shopping online. But few strong visionaries have changed our buying habits and most of us by now would have experienced shopping online. India’s e-commerce business jumped by more than 80 per cent in 2013 and the momentum is likely to continue for at least the next five-six years. Catching the trends early experts who were running big retail businesses as specialty stores now have e-stores and have started competing with the big players in the e-commerce race.

 

By June 2014, India will have 243 million internet users, at which point of time, it is expected to overtake the US as the second largest internet base in the world, the I-Cube 2013 report, released by the internet and mobile association of India (IAMAI) and IMRB International said. At present, China leads with more than 300 million internet users while the US has an estimated 207 million internet users. All of this is great and will surly take e-commerce business to heights beyond imagination. But here is the catch, smartphone penetration and growing internet penetration on mobile in India is touching unexpected heights YoY. Now since the consumer is on mobile and trained, his demands and expectations have increased. Today, consumers want to know the best of products, offers and services in and around their location right now and not wait for something to be delivered after 24 hours (best case). Big players like Google, Facebook and others are moving their attention to mobile and location is a testimony around this and makes it a global movement and the next big revolution to what out for in near future.

 

There is a common saying about the Indian retail consumers’ mentality, “can’t touch, won’t buy”. In L-commerce the experience is totally magical, for instance you saw a t-shirt, which you wanted in your vicinity, you could immediately visit there and check for great discount and get a guarantee of return and refund. Nothing can replace this experience. In an environment that is getting better every year we would witness the big location-based commerce (l-commerce) revolution soon and local merchants will start competing with the big brands in e-commerce. L-commerce refers to the localisation of products and services through mobile commerce and context aware computing technologies. L-commerce revolves around five key service areas: Location: determining the basic position of a person or a thing; Navigation: plotting a route from one location to another; Tracking: monitoring the movement of a person or a thing; Mapping: creating maps of specific geographical locations; Timing: Determining the precise time at a specific location.

 

E-commerce is publishing best products with great offers and is a one way communication, but l-commerce is a personal two way communication and the merchant would treat you with velvet gloves to ensure he gets a long-term customer. L-commerce has, in a way, revolutionised the industry, benefitting both — the consumers and merchants. With the entry of e-tailing, malls, supermarkets and grocery stores have seen a decline in the number of annual footfalls. This has drastically affected the revenues of these stores as they mostly have only physical presence. The larger players are a huge threat to these smaller players. With the five key service areas of l-commerce, it is proving to be a great platform that will help in the revival of this number. The location aware technology is proving a be an innovatory technology by providing real-time offers and deals that consumers can avail of in a vicinity closest to them. By using location aware technology, user’s location can be identified to provide the most relevant offers and deals in a category the user is looking for. The categories can range from apparel, entertainment, mobile devises to food, health and beauty.

 

Another added advantage of this revolution is that it has caught the attention of the unorganised markets as well. Local stores have seen the potential business it can bring if they publish their offers and deals online. This technology is undoubtedly helping merchants to promote their offers and discounts to drive consumers in their stores, which otherwise went undiscovered. In the early days, it was only the organised market that was getting accounted for. But with l-commerce and location aware technology, the unorganised market is also being recognised and will soon have a revenue number being put on this market.

From http://www.mydigitalfc.com/ 04/14/2014

TOP↑

 

 

eBay Aims to Create the World's Largest Trader Base in India

 

NEW DELHI: In a move to create the world's largest trader base, online marketplace eBay has tied up with traders body CAIT to encourage small retailers for selling products through its platform. eBay and Confederation of All India Traders (CAIT), which is associated with over 20,000 small trader associations in the country, have signed a Memorandum of Understanding (MoU) for the education and modernisation of Indian traders with the establishment of an e-commerce centre of excellence (COE).

From http://articles.economictimes.indiatimes.com/ 04/17/2014

TOP↑

 

 

SRI LANKA: Mulling Japanese E-Commerce Giant for First Trials

 

As Lanka’s exports to Japan topped $ 223 Mn mark, Sri Lanka is mulling a strategic, fast-track entry to one of the most coveted online markets in the world-Japan. “Japan is the second biggest retail market in the world. Japanese are also heavy internet users with a large e-commerce base. Using a top Japanese online giant like Rakuten could give Lankan exporters a wide-coverage and a low cost entry to this promising market” said Sujatha Weerakoone (DG-EDB) on 02 May at EDB premises. DG Weerakoone was addressing the EDB organized event “Japan’s Rakuten Platform for Sri Lankan Products” held for Lankan exporters on 02 May at EDB. The session consisted of a special in-depth presentation by Japan’s Kanagawa based Takashi Yoshino (Principal, Y and F Associates LLC) who, in a his presentation, shoed in-depth of the pros and cons, and how to create an online strategy for Lankan exporters to Japan. Eager representatives from more than 40 Lankan export firms were present at the session.


Sri Lanka’s exports to Japan has shown a steady rise. In 2012, total exports to Japan recorded $ 215.74 Mn and in 2013, it rose to $ 223.82 Mn. Apparel, tea and seafood (prawns and fish) became the lead products in 2013. Not only in Japan, but across the world, Rakuten (rakuten.co.jp) is considered as one of the largest e-commerce retailers. Within Japan, Rakuten is the largest e-commerce retailer. Rakuten is internationally present in 19 countries.  As for Japan, around 30 percent of $ 13 Bn annual Japanese e-commerce traffic goes via Rakuten. With a single login to Rakuten, 78 to 80 million regular Japanese web users access its many services-which include retail business, travel, telecoms, banking and e-money services. The B2B2C Rakuten Platform recently reported revenues at $4.6 Bn with operating profits of about US$244 million.

 

 “This is a challenge and a tryout for Sri Lankan exporters. I thank the EDB for inviting me to show you this novel concept. Japan e-commerce market is unlike many international online sales portals we know such as Amazon” said Principal Yoshino, addressing the session. ”Japan’s retail consumer market is world’s second largest. It is not conducted in English though. Almost in Japanese language. More than 75% of Japanese buy products online, and most of them heavily use Japan’s top online e-commerce portal Rakuten used by 29%-30% Japanese. Other top e-commerce portals are Yahoo Japan (7.5%), and Amazon.com (12.4%). Rakuten had 6 million credit card customers and more than 75 million users in Japan. This February Rakuten announced they have acquired Viber for $900 million and are expecting to increase their user base to 2 Billion through mobile internet shopping. Sri Lankan product details have to be in Japanese language when placed with Rakuten. All catalogs are translated to Japanese language for Japanese customers. Products from 27 countries are displayed at present and Japanese customers have access to 95 million products around the world as a result. It is time Sri Lanka too joins this” said Principal Yoshino. “Before displaying products, prior analysis and research is done by Rakuten so that they cater the best products and services to their customers. Remember, Rakuten is Japan's largest online shopping mall, offering customers more than 95 million products from about 40,000 shops” added Principal Yoshino.


Many exporters present at the session, expressed their interest towards the initiative. Ushan Edirisinghe, (Senior Marketing Manager - Siddhalepa Ayurveda), stressed: “This is very interesting. We are willing to take part. There is that initial portal opening fee charged by Rakuten, which is J-Yen 1.6 Mn (around US $ 15700 only) charged for portal opening for a foreign country. If the government is willing to pay this startup fee, then we the Lankan exporters to Japan have an opportunity to join this platform and take up the regular installment payments thereafter to Rakuten by ourselves on a sharing basis -among the participating exporters.” Edirisinghe’s Siddhalepa Group, which won the Superbrand status in 2006, exports several of its well-known products to Japan.

From http://www.news.lk 05/08/2014

TOP↑

 

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

AZERBAIJAN: Investment Volume by Mobile Operator in Country’s ICT Announced

 

Azerbaijan's mobile operator Azercell Telekom invested 84.5 million manat in the development of the country's telecommunications sector as of 2013 compared to 133.14 million manat in 2012, company head Cyril Gaburici said on Feb.27 at a press conference on the results of the operator's activity in 2013. The total volume of the company's investments in the country's economy amounted to one billion manat over 17 years, according to the company head. The company transferred 111 million manat to Azerbaijan's state budget in the form of taxes in 2013. Tax payments amounted to nearly one billion manat during the whole period of the company's activity in the country. In 2013 Azercell Telekom installed 1200 new base stations providing high quality voice and Internet connections throughout the country. The total number of base stations was 5500 as of late 2013, Gaburici said. Over 260 of the total number of the company's base stations in Baku and in Absheron peninsular support the 4G network providing high-speed internet and voice connection through CSFB solutions. Azercell Telecom LLC was founded in 1996. The company's network comprises 53 percent of the mobile market and covers 99.8 percent of the country's population. The number of subscribers amounted to 4.5 million by late 2013.

From http://en.trend.az/ 02/27/2014

TOP↑

 

Azerbaijan’s E-Commerce Market Grows by over a Third

 

As of Jan.-Feb. 2014, the volume of Azerbaijan's e-commerce market amounted to 452,500 manat, the country's State Statistical Committee said on March 11. The total volume of retail e-commerce in Azerbaijan increased by 34.5 percent compared to the same period of 2013. Legal entities and individuals which carry out e-commerce and are buyers of goods and services are participants of the e-commerce market. Some 82.2 percent of goods purchased by the Azerbaijani population in an electronic form fell to legal entities and 17.8 percent to individuals. Non-food products account for around 91.7 percent of the e-commerce market's turnover. The total volume of retail trade in Azerbaijan amounted to 3.2 billion manat as of Jan-Feb, 2014. The sales of consumer goods in the country increased by nine percent compared to 2013. Some 1.7 billion manat fell to consumer goods such as food, beverages and tobacco and 1.5 billion manat fell to non-food products. The specific weight of non-food products increased 4.5 percentage points.

From http://en.trend.az/ 03/14/2014

TOP↑

 

Azerbaijan's Largest Bank Introduces Online Loan Payment Service

 

As a result of the joint collaboration of International Bank of Azerbaijan and the processing center "AzeriCard", given the opportunity to make payments for the loans on the Bank's website and on the payment page of AzeriCard, the processing center reported. From now on, the owners of plastic cards of the Bank can pay the loan on the site www.ibar.az or www.azericard.com at any convenient time. In addition, customers can perform the operation for the account transfers. Commission fees for these transactions are not deducted.  Also, customers have the opportunity to receive the payment details to email.

From http://en.trend.az/ 04/14/2014

TOP↑

 

Azerbaijani Ministry Obliges Mobile Operators to Solve Traffic Exchange Problem

 

The Azerbaijani Ministry of Communications and High Technologies will put pressure on mobile operators in the country to solve the problem with traffic exchange between their own networks, Azerbaijani Minister of Communications and High Technologies Ali Abbasov told media on April 17. "The tariffs for the traffic exchange among mobile operators have declined in early 2014," he said. "This must affect the reduction of tariffs for mobile services rendered to the end user." "Unfortunately, this has not happened yet," he said. "We believe that this is inadmissible as the tariff is regulated at the level of the Tariff Council and the Cabinet of Ministers. We will take coercive measures, by using the legislative base for the cost of traffic exchange among operators to comply with the established rules. This will inevitably affect the reduction of tariffs for mobile communication services in Azerbaijan."

From http://en.trend.az/ 04/18/2014

TOP↑

 

Another Favorable Offer from Azercell for Mobile E-Signature Users

 

Azercell Telecom - the leader of the mobile communication market of Azerbaijan has presented another discount for its subscribers, according to a message from the company. The company, that was the first in Azerbaijan to launch the mobile signature service, has substantially reduced the respective tariff. As of May 16, the subscription fee (cash or money transfer) for individuals, state employees and business (juridical and individual persons performing entrepreneurial activity) is set at 18 manats (VAT incl.). The monthly usage fee for the 'Asan İmza' service for all types of 'Asan İmza' users is set at 0.5 manats (VAT incl.) Also, as of June 20, 2014 each transaction made via 'Asan İmza' (authentication, mobile electronic signature) will be charged according to the standard tariff of 1 SMS (0.03 manats (VAT incl.)).

 

The 'Asan İmza' helps every subscriber to use electronic services and easily benefit from the opportunities created by digital signature. The speed, comfort and reliability of this service have enabled the easy access to public services and foster the active adoption of new technologies by consumers and developers. To use the service, subscribers have to apply to ASAN Service Centers, where they can get an 'Asan İmza' SIM-card from Azercell Registration Desk, as well as a digital signature certificate from the module of Asan Certification Services Center (ASXM) of Azerbaijani Taxes Ministry. The 'Asan İmza' SIM-card is valid for both current and new Azercell numbers. Azercell - the driver of innovations on the mobile communications market of Azerbaijan will further continue to serve its subscribers with its unique services, favourable tariffs and attractive campaigns.

 

Azercell Telecom LLC was founded in 1996 and since the first years of its activity the company sustains a leading position on the market. Azercell introduced a number of technological innovations in Azerbaijan: GSM technology, GPRS/EDGE, 24/7 Customer Care, full-time operating Azercell Express offices, mobile e-signature service 'Asan İmza' and others. With 53 percent share of Azerbaijan's mobile market Azercell's network covers 99.8 percent of the country's population. By the end of 2013 the number of Azercell's subscribers reached 4.5 million people. In 2011, Azercell deployed 3G, and in 2012 the fourth generation network - LTE in Azerbaijan. The company is the leader of Azerbaijan's mobile communication industry and the biggest investor in the non-oil sector.

From http://en.trend.az/ 05/16/2014

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

AUSTRALIA: Mobile Wallets to Overtake Physical Wallets by 2021 - CBA

 

The frustrations of using the physical wallet is driving the popularity of contactless card and smartphone payments, with research conducted by Lonergan Research, on behalf of the Commonwealth Bank of Australia (CBA), revealing that mobile wallets will replace physical wallets in Australia by 2021. According to the survey, frustrations like forgetting to take their wallets out, forgetting to put specific items in the wallet, and having to carry a bulky wallet, are some reasons why 73 percent of Australians expect that mobile wallets will replace their entire wallet in the next seven and a half years, and cash and card payments within six and a half years. "Consumers are 'going mobile', and they are clearly showing their preference for the convenience and simplicity of transacting on mobile anywhere, anytime, and on any device. We expect this trend will only continue," said Michael Harte, Commonwealth Bank group executive enterprise services and CIO. But consumers are just expected to be able to use their mobile wallet to pay for purchases. The survey also found that consumers expect to use their mobile wallet to be able to access loyalty schemes (55 percent), redeem coupons (45 percent), store receipts (44 percent), and get around on public transport (43 percent).

 

However, 77 percent of consumers still believe at the same time that there will always be a need for cash. Commonwealth Bank card, payments, analytics, and retail strategy executive general manager Angus Sullivan said that while mobile banking and payments are going to be the primary functions of the mobile wallet in the short term, consumers are also expecting that it will replace their bus tickets, and loyalty and membership cards. "While there may always be a need for different payment methods, such as cash for emergencies and cards for travel, it's clear the mobile wallet is set to become a part of many Australians' everyday lives," he said. "As a nation, we've been at the forefront of the contactless payments revolution, and Australians appear keen to lead the world into the new era of the mobile wallet," said Sullivan. The main influencer for why Australians have adopted the mobile wallet is trust and confidence in the security of it. The survey showed that banks and financial institutions are by far the most trusted providers of mobile wallets (44 percent), ahead of the government (16 percent), technology companies (14 percent) such as Google and Apple, and retail stores (10 percent).

From http://www.zdnet.com 03/21/2014

TOP↑

 

Mobile Broadband Boosts Economy by Billions: ACMA

 

A report commissioned by the Australian Communications and Media Authority (ACMA) has said that businesses and households using mobile broadband added AU$33.8 billion in economic activity in Australia in 2013. The joint report from the Centre for International Economics (CIE) and Analysys Mason found that while mobile communications only counts for 0.2 percent of employment and 0.5 percent of economic activity in the Australian economy, its impact on productivity has been substantial, accounting for AU$33.8 billion in additional economic activity in 2013, contributing 2.28 percent of Australia's total gross domestic product. A total of AU$7.3 billion of this came from productivity growth from the mobile communications sector itself, while AU$26.5 billion came from time savings reported by businesses. The report surveyed 1,000 businesses, and found a time saving of 2.3 percent for employees in those businesses with access to mobile broadband.

 

The report measured that between 2006 and 2013, productivity growth was 11.3 percent per year, but would have been 6.7 percent per year without mobile broadband. In that time, prices for mobile broadband were measured to have declined by 8.4 percent per year. It found that most mobile broadband use came from households at 70 percent, followed by businesses at 28 percent. Smartphones were said to use an average of 1.7GB of data per month in Australia in 2013, while this is set to rise to 3GB per month by 2017, as the availability of 4G devices and networks increases. Despite the productivity gains made for businesses using mobile devices, the report found that the majority of the use of mobile devices were mainly for phone calls, followed by emails. Although email could be considered a cloud service itself, the study reported that accessing cloud services was one of the lowest cited uses of mobile devices by businesses. Businesses reported that the biggest change in the availability of mobile devices was providing access to the internet to employees, and allowing employees to use their downtime productively. Machine-to-machine technologies were also listed as a major change in telecommunications technology.

 

Businesses in the utilities sector, followed by the transport and postal sector reported the biggest impact in mobile technology saving time or reducing costs to the business. IT, media, and telecommunications reported the lowest impact on their businesses. ACMA chairman Chris Chapman said in a statement that the research showed the real impact of mobile communications in Australia. "We know that mobile broadband services and technologies enrich our work and private lives on a daily basis, in ways that were unheard of a decade ago. But with this groundbreaking research, we now see the real dollar value of these daily connections," he said. ACMA used the report to defend its responsibility for the management of spectrum allocation in Australia. "In its spectrum management role, the ACMA is constantly seeking to strike a balance between the economic value of the spectrum, the interests of incumbents and their sunk investments, and the pressures of finding practical solutions for other competing and emerging interests," Chapman said. The Coalition government is currently reviewing the communications portfolio. The libertarian think tank, the Institute of Public Affairs has suggested that the ACMA be handled by the Department of Communications, and said ACMA should be shut down.

From http://www.zdnet.com 04/03/2014

TOP↑

 

Australian Businesses Reach for the Clouds to Improve Efficiency

 

A few years ago, cloud to many organisations and analysts was just another buzzword, but today, according to Accenture Australia, cloud has evolved to where it is now considered by many businesses a core investment for their operations. Accenture Australia cloud computing lead Alison Cairns said cloud has come a long way since it first hit the market, and while it is still in its infancy, there's still a "very steep acceleration" in terms of adoption in Australia, particularly as enterprises start to understand the benefits a lot more. "It did start out as a buzzword and everyone use to talk about cloud thinking 'what does that really mean?', but it has almost become business as usual now. I think probably in three or four years we may not even use the term anymore; it'll just be how we operate," she said. "Technology sits underneath everything and there are a lot of cool things we want to do with it to run our business better, particularly when it comes to mobility and analytics, and cloud acts as the enabler. So it stopped being a buzzword and it has become an essential." Cairns said organisations are looking at using cloud to help create more intimate relationships with their customers through mobility and analytics programs.

 

"Once you're able to get your data onto the cloud it suddenly becomes elastic and therefore it becomes far more available. This allows all these businesses to have more intimate conversations with their own customers because they are able to find out more about them at any time," she said. "Our businesses also talk about how creating this intimate relationship with customers involves the use of analytics. It's very hard to do that if you don't have your data in the cloud." A key consideration when cloud is a topic of conversation for businesses is security, which Cairns said is always the first question businesses ask about. "We usually say to the customer the very same laws that govern the data you have on the premise are the same for the cloud and that's how you are going to protect your data sovereignty," she said. But questions concerning security are not the only ones businesses are asking suggesting there's still some time to go before businesses fully grasp the concept of cloud. Other popular ones Cairns said include "how am I going to determine what is going to across to the cloud?', "who do I engage with to do that?", "how do I make the journey?", and "when I make the journey what is it going to look like".

 

Cairns also notes three years ago cloud was seen as an Infrastructure as a Service, but predicts, over the next two to five years, sales growth will focus on Platform as a Service deployments. There are two key benefits for this shift: Businesses will be able to make real-time decisions using the data they have available on the cloud and cost savings. "It's a very exciting time that we're unlocking with cloud as it is a very agile way of doing business," she said.

From http://www.zdnet.com 04/21/2014

TOP↑

NEW ZEALAND: Mobile Phone Plans Rate Well Across OECD Countries

 

New Zealand's Commerce Commission has released a report comparing prices for mobile services in New Zealand over the last year with prices in other OECD countries. "Prices have been steadily dropping and popular plans are below OECD averages," said Telecommunications Commissioner Dr Stephen Gale. "The price in New Zealand for the plan with average calling and data use was 40% below the OECD average. Prices for all usage plans have dropped significantly, between 25% and 70%, over the last three years but prices for plans with high call volumes have stayed persistently above average which is potentially a result of high volume users being less price sensitive," said Dr Gale. A typical 1.5GB per month plan for mobile data for laptops and tablets, was about 10% above average. The price for a 6GB data plan was one of the highest in the survey, about twice the average. The $98 per month price in New Zealand suggests that mobile broadband is not at present a strong competitor for fixed line broadband.

From http://www.cellular-news.com 03/05/2014

TOP↑

 

NZ Businesses Paying Bills in Record Time

 

Businesses are paying their bills in record time, with the forestry and agriculture sectors winning the prompt payment stakes while the transportation industry is a distant last place, according to credit checking agency Dun & Bradstreet. Average payment times across New Zealand dipped below 40 days in the final quarter of last year - the fastest rate recorded in the past ten years. The findings underscore the healthier financial position of many companies and industries over the past year, and the relative strength of the New Zealand economy. Compared to Australia, where payment times have stalled at an average of 53 days, the corporate sector here has been steadily increasing the rate of its invoice payments during the past 12 months, the D&B report found. "These findings continue a clear and positive trend in the performance of the corporate sector, and follow additional positive movements in business and consumer confidence, the current account deficit and jobs growth," said D&B managing director Dennis Martin. Businesses paying their bills in the standard 30-day period rose to 66 per cent, from 61 per cent in the same period the previous year.

 

When local businesses experience stronger sales and profitability they have a greater capacity to pay their expenses in a timely fashion, which in turn returns finance back into circulation providing a positive knock-on effect through to the entire economy, Martin said. "Our forecasts are for New Zealand's key economic measures to continue improving this year, and consequently we also expect to see consolidation of this trend of faster business payment times," he said. The forestry sector was the fastest to settle accounts during 2013, with payments by the country's third largest export sector improving to an average of 33 days. The agriculture industry also cleaned up its act, with average payment times moving to 36 days, compared to 37 days last year. The transportation sector showed a marked account settling slow down during 2013, with the average payment time going from 39 days to 47 days. While smaller operations recorded faster invoice payment times, larger companies bucked the trend over the final three months of 2013, with average payment times slowing compared to the previous year. New Zealand businesses employing between 200 and 499 people were one day slower to settle their accounts, while larger operations were significantly slower.

 

D&B's analysis found that companies with more than 500 staff paid their invoices in an average of 45 days, up from 41 days. "Even though the Reserve Bank has commenced an interest rate tightening cycle, the boost to the economy from the dairy sector, construction and household spending is likely to see company payment times remain low for at least the near term," said Stephen Koukoulas, Economics Advisor to Dun & Bradstreet.

From http://www.nzherald.co.nz 03/26/2014

TOP↑

 

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Society.gif

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

EUROPE: Netherlands Creates National Response Network

 

The Netherlands Cyber Security Centre announced the creation of the National Response Network, a cooperation of public and private organisations aimed at increasing the digital resilience of the nation's critical systems. The agreement to set up the NRN was signed on 17 April at the Security and Justice Ministry. The initial participants include the Tax Service, Surfnet, DefCERT, the Information Security Service for municipalities and the NCSC. The aim of the NRN is to share information and coordinate responses in the event of major cyber security incidents. More public and private partners will be added in the coming period.

From http://www.telecompaper.com/ 04/18/2014

TOP↑

 

NORTH AMERICA: Canada - How Stephen Harper’s Use of Social Media Blurs the Lines, Online

 

OTTAWA — The Prime Minister’s Office and the federal Conservative party appear to be blurring the lines between official government business and partisan work in their online activities, as they look to identify new supporters the party can tap for financial contributions. Prime Minister Stephen Harper’s profile on his main Twitter account, @pmharper — which is largely operated by the taxpayer-funded PMO — directs people to his personal website, stephenharper.ca, which is operated by the Conservative Party of Canada and harvests names and email addresses of potential voters. Staff from the PMO who travel with the prime minister on official government trips tweet pictures and information for Harper on his @pmharper account that often direct people back to Conservative party websites such as stephenharper.ca or conservative.ca.

 

Harper has more than 439,000 followers on his Twitter account. The use of government resources for political party purposes appears at odds with the prime minister’s own ethical guidelines for ministers and their staff. That guide, titled “Accountable Government: A Guide for Ministers and Ministers of State,”  says, “In no circumstance should any political activities be performed at a government place of work; nor should any government equipment or material be used for such purposes.” It also states that ministerial responsibilities include “ensuring that all expenditures in ministers’ and ministers of state’s offices are properly and prudently managed and are related to the conduct of official business.” However, the PMO insists no government resources are used for political activities that relate to Harper’s role as party leader.

 

“Social media accounts belong to Stephen Harper who is both the Prime Minister of Canada and the Leader of the Conservative Party of Canada. The PMO has a role to play when Stephen Harper posts content online relating to the government,” the prime minister’s press secretary, Carl Vallée, said in an email. “The party has a role to play when Stephen Harper posts content online relating to the Conservative Party of Canada. No government resources are used for political activities in Stephen Harper’s capacity as Leader of the CPC.” The PMO over the past week or so has tweeted from the @pmharper account: “Canadians are better off today under our gov’t than under the previous Liberal gov’t,” with a link to the Conservative party website. Another tweet from @pmharper urges Canadians to visit the Conservative party’s website and sign their support for the federal legislation that would adopt “tougher penalties for child predators.” Many of the tweets also include links to the prime minister’s official government webpage: pm.gc.ca — which is a normal use of government social media.

From http://www.ottawacitizen.com/ 03/09/2014

TOP↑

 

U.S.: The Intelligence Community's Big-data Problem

 

The intelligence community is perhaps the most innovative data collector on the planet, with each of its 17 agencies able to siphon off various pools of information from nearly any source. Yet the IC collects voluminous amounts of mostly fragmented data, and therein lies a challenge every other body in government struggling to make use of big data can relate to. “In our world, we’re very good at collecting data, we’re also pretty good at analyzing it – we have to quickly parse out what is valuable,” Roger Hockenberry, a former chief technology officer for the Central Intelligence Agency, said during a panel session March 11 at the Symantec Government Symposium in Washington. “Our data is always fragmented, and we’re trying to make sense of fragmented data options, which is extremely difficult,” said Hockenberry, who is now a consultant. “How we analyze every piece of data, how we reprocess it to continue to make better sense of what is going on – that is the biggest we have, especially when we can’t get complete databases.”

 

Former National Security Agency contractor Edward Snowden’s public disclosures of classified information have highlighted how the NSA and other agencies collect various sorts of signals intelligence. A significant amount of this data doesn’t come packaged neatly for ingestion and analysis in any open-source or proprietary platform. Social media feeds and emails, for example, represent large but highly unstructured datasets. To “normalize” that kind of unstructured data in a way that it becomes useful continues to be a major challenge, Hockenberry said. To conduct its large-scale analytics effectively, the CIA uses a mixture of open-source and commercial products built off a data-science oriented reference architecture that sprung up from one of its small labs in the past decade. The CIA started with OpenStack and added commercial products in various places to note differences and build an effective and scalable solution. Hockenberry said platforms and tools differ in usefulness depending on the environment in which they’re operating, and that logic also carries over to the post-analytic visualizations a dataset produces.

 

“You have to decide the right mix,” said Hockenberry, adding that big data forces analysts or data scientists to be creative in how they ask questions. The intelligence community is at the forefront of big data as a technology, but even at its most effective levels, analyzing piles of unstructured, fragmented data is challenging. Algorithms will improve and data holders will inevitably learn to ask better questions of data, yet as the deluge of unstructured information continues to pour forth, finding meaningful signal in the noise is likely to remain problematic for some time. “It’d be nice if al-Qaeda would ship us all their records in a nice, standard format, but they don’t,” Hockenberry said. 

From http://fcw.com/ 03/13/2014

TOP↑

 

Los Angeles Wants High-Speed Internet for Everyone in City

 

With some 30 percent of Angelenos not having access to broadband Internet, city officials on Monday launched an effort to ask the private sector for ideas on how to connect the entire city. Under the proposal from Councilman Bob Blumenfield, the city issued a request for information over the next seven weeks on a proposed program that would provide high-speed Internet access, either through wi-fi or wired connections, to every residence and business. Blumenfield called it “one of the most important steps the city will take during this generation.” “It is vital we move forward, just as accessibility to roads, highways and bridges is important to our residents,” Blumenfield said. Blumenfield said the city is not locked in to whether the service will be wired or wireless, but that something needs to be done to help the 30 percent of the city that doesn’t have Internet access. Mayor Eric Garcetti fully supports the plan, Deputy Mayor Rick Cole said. “Mayor Garcetti believes the single most important factor to be competitive in the global economy and for our residents to be successful is that we have universal high-speed broadband access,” Cole said. “We are looking at a suite of solutions of different technology that no single company can provide.”

 

Blumenfield said the request for proposals is expected to be prepared in the next six months. Also, he said, the city is looking to avoid any direct costs in the project, leaving it up to the Internet companies to cover the costs, in exchange for benefits from the city such as expanded access to infrastructure. Several other cities have undertaken similar efforts, including Chattanooga and Houston. Peter Marx, chief information and technology officer for Garcetti, said the city needs to keep up with the rapidly changing technology world. “The only universal constant is that there is greater and greater demand for bandwidth,” Marx said. Norma Fernandez, technology adoption manager of Everyone On, a nonprofit which helps provide Internet access to the poor, said there is an “opportunity divide” when millions of residents have no access to the Internet. “We hear these stories everywhere we go,” Fernandez said. “Last week, I met a student from Los Angeles City College who said she had to do her research on her cell phone because she doesn’t have Internet access at her home because she can’t afford it.” Information can be provided to the city until June 30 online through the Information Technology Agency link at www.labavn.org.

From http://www.govtech.com/ 04/08/2014

TOP↑

 

 

White House Website Helps Veterans Find Jobs

 

Veterans Employment Center offers job-search tools to help transitioning service members connect with employers. In an effort to provide military service members with post-service career opportunities, the White House has launched an online tool that allows veterans, transitioning service members, and their spouses to search for jobs, create resumés, and connect with employers. The new Veterans Employment Center, available at ebenefits.va.gov, was announced by First Lady Michelle Obama and Dr. Jill Biden at a veterans' jobs summit in Fort Campbell, Ky. "It's time to serve our military families as well as they've served us," Obama tweeted during the summit Wednesday. Among the features offered on the Veterans Employment Center is an online resumé builder and a military skills translator, which matches military career tracks with civilian occupations and skills. Veterans can also target job searches based on specific career paths, use a single search for both public- and private-sector positions, and save job postings via social media.

 

Resumés submitted through the site become part of a comprehensive database used by employers. "Employers are provided with a direct feed of resumes from veteran applicants, can view reverse skills translation (military to civilian skills) for applicants, and can make public their own veterans hiring goals," Rich Morales, executive director of Joining Forces, explained in a post on the White House blog. Joining Forces is a nationwide initiative launched by Mrs. Obama and Dr. Biden in 2011. The initiative focuses on employment, education, and wellness of service members. Companies working with Joining Forces have hired more than 540,000 veterans and spouses, according to the blog post. While there are already several websites dedicated to job-seeking veterans-- including VA for Vets, VA Careers, Vet Success, My Career @ VA, and Feds Hire Vets -- this is the first interagency tool that combines public and private job openings. It's a collaborative effort among the Department of Defense, Department of Labor, Office of Personnel Management, Small Business Administration, and Department of Veterans Affairs.

 

USAJobs.gov is an online job board that offers various resources to veterans, but it's restricted to employment within the federal government. Earlier this year, Monster Worldwide, the Consumer Electronics Association, and several technology business groups introduced a job site that specifically focuses on moving veterans to civilian careers within the technology industry. USTechVets.org uses Monster's 6Sense semantic search technology, a more intelligent version of traditional keyword search engines that can contextually interpret the meaning behind words. The site provided a similar tool to the Veterans Employment Center, called "translate your skills," which matches veterans' skills and training to civilian tech jobs.

From http://www.informationweek.com/ 04/25/2014

TOP↑

 

Using Technoloy to Transform the Health Care Industry

 

May 6, 2014 -- Today's interview is with Dr. Harry Greenspun, senior advisor, Healthcare Transformation and Technology at Deloitte. The discussion starts off with the observation that Dr. Greenspun is wearing a Nike Fuel Band on his wrist. This initiates a wide ranging discussion that begins with mobile devices and touches upon advanced analytics. Mobile devices produce data for physicians to improve care and reduce cost. This can be in a regular commercial hospital or one of the 157 VA hospitals or 773 outpatient centers. During the interview, Dr. Greenspun mentions that mobile devices could provide information that would make physicians more productive as well as helping monitor patients in remote locations. The downside of the proliferation of mobile devices is the glut of information that they provide. This will cause an increased focus on advanced analytics of the data provided. Big data is a big problem if not used properly. Dr. Greenspun also mentiones the Deloitte University Press, an arm of his company that assists in understanding healthcare issues by publishing articles and studies to assist in using technology to reduce healthcare costs.

From http://www.federalnewsradio.com/ 05/06/2014

TOP↑

 

The Role of ICT in Building Smart Cities – Infrastructure

 

Objectives

•Provide a market and technology analysis of the latest trends in smart energy, smart water, and smart transportation in urban spaces.

•Provide strategic recommendations to key stakeholders eyeing smart city markets.

 

Research Scope

Physical smart city infrastructure and related services for citizens (further referred to as smart city infrastructure):

•Smart grid and smart energy customers in cities.

•Smart public transportation and traffic management.

•Smart urban water management.

No strict definitions for smart cities have been developed for the purpose of this analysis. The scope of the study is defined pragmatically by smart city goals, not a smart city label. The analysis focuses on three infrastructure-related smart city pillars—smart energy, smart transportation, and smart water—to show growth opportunities driven by future smart cities.

 

Research Methodology

•Primary research: interviews with key stakeholders including utilities, software providers, meter data management system providers, and hardware suppliers.

•Secondary research: Frost & Sullivan research services, online databases, online energy, transportation, and water portals, and market participants' reports.

 

Smart Energy

'Smart energy' refers to all energy projects aimed at reducing energy losses, improving supply services, increasing energy efficiency, and reducing energy wastage. All of these projects are based on advanced information and communication technology (ICT) infrastructure and services. 'Smart transportation' focuses on data-based traffic management and freight and people transportation. This category, thus, includes the implementation of intelligent transportation systems for traffic and fleet monitoring and control, services for drivers and passengers based on real- or near-real-time information, and integrated public transportation.

Smart Water

'Smart water' refers to projects promoting water conservation and energy efficiency in the water sector through the application of machine-to-machine (M2M) technology, data mining, and analytics.

 

Key Data-related Trends Driven by Smart Cities

With the emergence of smart cities and enabling technologies, authorities and other stakeholders will start exploiting new data sources—sensors, meters, and in-car telematics—to improve the efficiency of daily city operations relating to facilities and infrastructure. They will also have to include social media and various Web-data sources in their decision-making models. City stakeholders are used to dealing with simple and structured data that is limited in volume and velocity. Collection, storage, and processing of M2M data from sensors and meters will pose a challenge for authorities and companies from the energy, transportation, and water sectors. The greatest difficulty will be to define required output of data processing and choose cost-feasible data management platforms. Open data platforms will have to be established to unlock the potential of multi-source data for citizens. Customers and other smart city stakeholders consume or generate data using mobile devices increasingly often, particularly smartphones and tablets. Their behaviours become more geographic information system (GIS)-related. This drives not only changes in user interface but also in customer interaction strategies.

 

Smart transportation is receiving a strong boost from local authorities and transportation operators. The intelligent transportation systems (ITS) market in the European Union is in a growth phase and has attractive growth perspectives ahead. Tenders for ITS are being launched in the largest European cities. Over time, new ITS functionalities will emerge that will drive further market growth. Smart energy is in an early development stage. Energy companies are still looking for a business case for smart grids. The availability of smart meters and grid data will drive investments in customer and grid analytics. Frost & Sullivan foresees that smart energy will bring the highest investment opportunities within smart cities by 2020.

So far, the interest in smart water is low and limited to a few countries. The smart water market presents the weakest growth opportunities by 2020.

 

2020 Market Trends

Smart Energy (Smart Energy Network)

•Integration of renewables and decentralised energy

•Demand response and demand-side management

•Network monitoring and control Smart Transportation

•Vehicle-to-everything (V2X)

•Driver behaviour management

•Mobile applications based on open data Smart Water

•Pressure management

•Remote control and predictive maintenance

•Integrated platforms for water management

Executive Summary

Introduction to Smart Cities

Smart Energy in the Smart City Context

Smart Transportation in the Smart City Context

Smart Water in the Smart City Context

Conclusion

From http://finance.yahoo.com/ 03/25/2014

TOP↑

 

 

Concise Analysis of the International ICT Market in the Education Sector

 

There has been a radical change in the way that knowledge is being imparted in schools, wherein textbooks are gradually being replaced by tablets. This has led to the development of more meaningful and functional applications in the field of education. Tablets have changed the way in which teachers interact with their students. Tablets can store a large volume of information that a student can access at any time. At secondary and higher education levels, tablets reduce the need for a student to refer to a lot of textbooks for each subject. Moreover, with the increasing number of applications being developed specifically for the Education sector, teachers can engage students with interesting educational applications. Hence, students will find the learning process exciting and motivating. This will help increase interactivity between students and teachers, which will in turn enhance the learning process for the student. One of the major drivers in this market is the need for creative and innovative learning. Educational institutions are in the process of adopting best practices in delivering creative, innovative, and quality education through the use of computing devices. This has resulted in a focused approach toward the global integration of various educational institutions, thereby enabling them to share their knowledge base and resources to promote interaction among students and teachers.

 

Key Topics Covered:

1. Executive Summary

2. List of Abbreviations

3. Scope of the Report

4. Market Research Methodology

5. Introduction

6. Market Landscape

7. Revenue Segmentation by Category

8. Revenue Segmentation by Level of Education

9. Country-wise Education Initiatives

10. Geographical Segmentation

11. Key Leading Countries

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

20. Key Vendor Analysis

21. Other Reports in this Series

 

Companies Mentioned:

Acer

Apple

Dell

Fujitsu Technology Solutions

HCL Technologies

Hewlett-Packard

IBM

Lenovo Group

Microsoft

Oracle

SAP

Toshiba

Wipro

From https://ca.finance.yahoo.com/ 03/26/2014

TOP↑

 

Smart Homes in Asia-Pacific--A CEO's 360-Degree Perspective

 

Building Homes Beyond Green

Residential buildings in Asia-Pacific will continue to evolve and it will be directly affected by the growth in population and urbanization rate, as well as development of new cities and new economic zones. Smart homes will emphasize on eco-friendly building materials in addition to the deployment of energy saving devices and information and communications technology (ICT), as well as advanced technologies such as home fuel cells. Favorable factors such as the need to reduce energy consumption, are positively influencing the adoption of smart homes in Asia-Pacific. Market participants in the synergistic smart home value chain will face competition at both intra-industry and inter-industry level.

 

Executive Summary—CEO 360 Perspectives

Mega Trends

• The buildings industry is expected to be directly affected by the mega trends related to population and urbanization rate.

• The rise in population in Asia Pacific is likely to push the demand for new residential houses, especially in China, India, and Indonesia.

• Emergence of new cities or satellite cities and new economic zones will spur construction of residential buildings.

• Increasing energy consumption with rise in construction is likely to give way to high-tech (smart or green) innovations, introducing various green technologies in future buildings, including residential.

Industry Convergence

• Asia-Pacific is a heterogeneous market, with smart homes at different stages of evolution.

• Smart homes will emphasize on eco-friendly building materials in addition to the deployment of energy saving devices, and information and communications technology (ICT).

• ICT platform integration gives property developers a complete lifecycle approach to the construction of new houses.

 

Technology

• Cost efficient LED lamps would eventually replace traditional light bulbs in the near future.

• Home-based miniature fuel cell technology would boost the market for 'zero energy' homes.

• Remotely controlled building automation systems will increasingly become a necessity in the future.

• Integration of IT with waste removal system will be common and it will be used to gauge, manage, and minimize the volume of household waste.

Economic

• Although the smart home market is still in its infancy, favorable factors such as the need to reduce energy consumption are positively influencing the adoption of smart home.

• Inadvertently, new buildings in Asia-Pacific will increase the demand for electricity and push up the consumption of oil and gas in turn.

 

Competitive and Best Practices

• The building industry of Asia-Pacific is dominated by major foreign companies, with smaller local participants having a marginal share.

• The competition within the Smart Home ecosystem is both intra-industry and inter-industry.

• Two likely scenarios could occur in the smart home market, either a consolidated industry standard will emerge or a fragmented marketplace having multiple standards exists.

Customers

• Asia-Pacific's target demographics are middle-class, younger, and tech-savvy home owners.

• Market participants should invest in developing more efficient and cost-competitive devices and systems to cater to the emerging middle-class population who are price sensitive.

 

Executive Summary—Key Takeaway

1. Continuous innovation is expected in lighting and heating, ventilation and conditioning (HVAC), as such equipment consume maximum energy in the homes.

2. Cost and resource optimization benefits would pressure companies to have a complete plan of the construction before embarking on the actual task.

3. Developed Asia-Pacific markets provide key opportunities, especially those with highly-wired cities such as Seoul, Tokyo, and Singapore.

4. Financial pressures may result in the decrease or abolishment of government subsidies, but tax rebates may be introduced to encourage adoption and development of green technologies.

5. Respective Governments are currently embracing sustainable economic growth and have introduced grants for both commercial and residential applicants for adopting green practices and technologies.

Definitions

 

Homes of the Future

Home is defined as residential buildings, such as apartments, condominiums, and landed-houses (terrace, bungalow, semi-detached).

In this document, future homes will incorporate current and future trends that have shaped the demand for residential homes. The homes of the future may be referred as smart homes in the study.

Market Size

Unless otherwise indicated in this study, market size refers to sales revenue of products or services within mentioned markets. It excludes book revenue or uncollected revenue from current and future sales or contracts.

CAGR

Compound annual growth rate (CAGR) is the year-over-year growth rate of a market or investment over a specified period of time.

Geography

Unless otherwise indicated in this study, the region is Asia-Pacific, which includes countries such as China, India, Indonesia, Japan, Malaysia, Singapore, and Thailand. Other countries not defined here may be mentioned or referred to in the content of this study.

 

Characteristics of Homes of the Future

Economical

Must be affordable to the masses for the benefits to be seen.

Neutral

Being energy efficient is no longer enough, carbon neutral is the new fad.

Automated

So that optimal settings could be set even when the occupants are out.

Connected

Integration of information and communications technology (ICT) into our daily lives have made this a necessity.

Aesthetic

Consumers are getting demanding, and want both functionality and style.

 

Table of Contents

1. Executive Summary

2. Introduction

3. Building Construction Market Overview

4. Mega Trends

5. Industry Convergence

6. Technology

7. Economic

8. Competitive and Best Practices

9. Customer

10. Conclusion

11. The Frost & Sullivan Story

From https://ca.finance.yahoo.com/ 04/01/2014

TOP↑

Achieving Improved Energy Efficiency with Green Data Centres

 

Speaking to over 200 senior IT decision makers from the Singapore Government at the 11th Annual FutureGov Forum Singapore, Murray highlighted the importance of taking progressive steps to promote efficient energy consumption in data centre facilities. “The rise of Infocomm services and Big Data means we need large infrastructures and data centres to support our various initiatives.” Data centres are crucial in supporting the development and operations of nearly every sector of the economy. However, their demand for energy is growing rapidly in response to an increase in internet traffic, new computing paradigms like cloud and mobile computing, more complex applications and data storage demands. While reliability and speed of access to data will remain major concerns, energy efficiency and ICT sustainability are becoming priorities for data centre operators. “Today, the energy bill accounts for more than half of the operating expenditure in a typical data centre in Singapore. We as an industry are one of the biggest contributors of the energy problem globally and we will continue to be one unless we look for ways to drive improved energy efficiency in our data centres.” The Singapore Government, for example, has taken bold steps to improve energy efficiency and reduce the carbon footprint of data centre facilities by setting up a progressive framework that ensures a significant reduction in energy consumption without hampering the mission-critical functions of the data centre. Murray adds that as a global specialist in energy management, Schneider Electric’s expertise with all aspects of the data centre lifecycle allows them to review, assess and analyse the energy performance of data centre facilities. “This allows us to help governments and other industries chart a path towards a future-proof data center that is both sustainable and green.”

From http://www.futuregov.asia/ 04/22/2014

TOP↑

 

Action Needed to Protect Telco Infrastructure from Climate Change

 

ICT sector needs to prepare for the 'new normal' argues an ITU report

The role of ICT in driving increased greenhouse gas emissions has been well documented. However a new report produced under the auspices of the United Nations' International Telecommunication Union argues that the ICT sector needs to prepare to adapt to climate change in order to preserve vital communications infrastructure from both the short- and long-term impacts of global warming. "ICT sector responses to climate change involve actions aimed at mitigating its effects... monitoring climatic trends... and adapting to its impacts (e.g. by helping to reduce the vulnerability of various sectors, strengthening networking, decision making and resource access for adaptation)," states the ITU report, Resilient pathways: The adaptation of the ICT sector to climate change. However, the report adds that "much less is known" about "adaptive strategies that the ICT sector itself could adopt to better prepare for, respond and adjust to more frequent and intense climatic impacts".

 

Speed of innovation, smaller infrastructure than sectors such as energy and logistics, and "reliance on a combined network instead of individual structures" are all factors in favour of ICT when it comes to adapting to climate change. However, the growth in frequency and impact of extreme weather-related events, such as heat waves, flooding, extreme winds and landslides, and a rise in sea level can still disrupt ICT services and degrade comms infrastructure, increasing operational costs and cutting revenue. "The magnitude of climate change impacts, coupled with the increasing pervasiveness of the ICT sector in the global networked society and the growing reliance on its services, evidence the urgency of re-thinking and adjusting... to reduce the sector’s vulnerability to climatic impacts, to improve its responses to short- and long-term effects, and to benefit from business opportunities that may arise with change," states the report. ICT needs to adopt the "notion of resilience" and take a holistic sector-based approach. Backbone networks require redundancy and comms infrastructure should be decoupled from the electricity grid as much as possible. Backup power generators or solar-powered batteries should be deployed at mobile towers, the report argues.

 

Measures to increase the robustness of telco infrastructure can also include running cables underground wherever possible, or replacing some vulnerable sections of wired networks with low-powered wireless. The telco sector needs to undergo a "comprehensive assessment" of its resilience to current conditions and predicted future climate conditions. The ITU report advocates that new standards be developed for the ICT sector to promote increased resilience. "Available evidence suggests that climate change will cause unavoidable impacts that will affect the ICT sector both directly and indirectly. Within this context, adaptive practices will increasingly become part of the 'new normal' for business operations around the world, including those of the ICT sector," the report concludes.

From http://www.computerworld.com.au/ 04/29/2014

TOP↑

 

Asia Dominates Wi-Fi Hotspots, ABI Says

 

More than two-thirds of the world's Wi-Fi hotspots are in the Asia-Pacific region, partly because of huge deployments by mobile operators in China, and the number of hotspots worldwide is expected to more than double by 2018. There were 4.2 million hotspots by the end of 2013, with 68.6 percent of them in Asia-Pacific, ABI Research said in a report published Thursday. ABI expects the worldwide total to hit 10.5 million by 2018. Those rollouts will be driven by growing demand for mobile data, ABI said. Wi-Fi can deliver fast wireless data without using scarce and expensive licensed frequencies, so carriers deploy it to beef up their cellular networks and wired service providers use it to get into mobile. Wi-Fi specialists such as Fon are also in the game, building their own hotspots and providing access to those built by others. Consumers benefit because their data use on Wi-Fi typically doesn't count against monthly limits.

 

China, already the world's largest mobile market and one where new cellular spectrum licenses have sometimes been long in coming, has embraced Wi-Fi in a big way. China has about 620,000 hotspots, including 420,000 deployed by China Mobile, 128,000 by China Telecom, and 72,000 by China Unicom, ABI said. Latin America is the second most wired region for Wi-Fi hotspots, with 12.3 percent of the world's total, the report says. One big player there is the cellular carrier Oi, which has already completed a rollout of 500,000 hotspots in preparation for the 2014 FIFA World Cup. Meanwhile, at the end of last year Europe had 9.0 percent of the globe's hotspots, North America had 8.7 percent and the Middle East and Africa region had 1.4 percent, ABI said. ABI's hotspot growth forecast comes out to an average of 15 percent per year. That will help to absorb a dramatic increase in data traffic going over mobile networks, rising from 23,000 petabytes last year to 190,000 petabytes in 2018, the company said.

From http://news.idg.no/ 05/09/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

CHINA: Cell Phone Users Boost Mobile Internet Traffic

 

China's growing number of cell phone users has led to a surge in data flow as more of them access mobile Internet via their phones, latest government data showed on Monday.The number of cell phone users in the country hit 1.24 billion in January, up 6.16 million from December, according to the Ministry of Industry and Information Technology.The increase has boosted mobile Internet traffic, which reached 133 million gigabytes in January, up 46.9 percent year on year, the data showed.Business revenues of mobile telecommunications hit 69.52 billion yuan (11.36 billion U.S. dollars) in January, up 11.1 percent year on year.

From http://news.xinhuanet.com/ 03/03/2014

TOP↑

 

China's Mobile Internet Consumption to Surge

 

China's mobile Internet consumption will reach 2.16 trillion yuan (351.45 billion U.S. dollars) in 2015, said Lu Wei, secretary-general of the Internet Society of China (ISC), at a press conference on Thursday.E-retail transactions amounted to 1.8 trillion yuan last year, and was estimated to take over 10 percent of the country's total retail sales in 2015, according to the ISC.Lu attributed the surge in consumption to the booming e-commerce industry in China. with more businesses and new technology involved and integrated.Lu said the accelerating e-commerce will create more new business and service models like location-based services, mobile health care and Internet of Vehicles, which are predicted to become part of people's daily lives soon.

From http://www.news.cn/ 03/20/2014

TOP↑

 

Social Media Messaging Causes China Mobile's First Annual Profit Drop

 

Chinese telecom operator China Mobile announced its annual results for 2013 in Hong Kong, and those financial numbers did not impress.During the entire year of 2013, China Mobile's operating revenue was CNY630.2 billion, a year-on-year increase of 8.3%; but its net profit was CNY121.7 billion, a year-on-year decrease of 5.9%.This is reportedly the first time for China Mobile to see an annual net profit decline.China Mobile stated in its chairman's report that 2013 was a key year for the company's transitional development. On one hand, the issuance of 4G license brings new opportunities; on the other hand, its operating pressure continues to increase as it faces the competition from over-the-top services and market saturationThe competition from OTT Internet services was a major reason for China Mobile's net profit decline. For example, with the launch of new communication methods such as Tencent's Wechat Weixin service, China Mobile's short message business continued to decline since January 2013.Information from Ministry of Industry and Information Technology of China revealed that in January 2013, the short message business volume of Chinese carriers decreased by 10% year-over-year. At the same time, though the mobile call times increased by 11.3%, the growth rate decreased.

From http://www.chinatechnews.com/ 03/26/2014

TOP↑

 

ChinaNetCenter Net Profit Up 129% in 2013

 

ChinaNetCenter, a content distribution network and data center service provider in China, published its annual results for 2013.ChinaNetCenter's operating revenue reached CNY1.205 billion, a year-on-year increase of 47.89%; its operating profit was CNY254.898 million, a year-on-year increase of 126.73%; and its net profit attributable to shareholders was CNY237.112 million, a year-on-year increase of 128.55%.During 2013, ChinaNetCenter's CDN business launched a network security acceleration solution named SAS and a network security protection service named WSS, which mainly target government and financial websites. Meanwhile, its Internet data center business launched an ECB cloud backup solution. During the reporting period, the company's CDN business sales reached CNY966 million, accounting for 80.17% of its major business revenue; while its IDC business sales were CNY224 million, accounting for 18.63% of its major business revenue.For research and development, ChinaNetCenter invested CNY83.721 million in 2013, a year-on-year increase of 139.46% and it accounted for 6.95% of the company's total operating revenue. ChinaNetCenter said that based on the company's CDN technical platform, they implemented mobile Internet acceleration and secure cloud service platform projects in 2013. For technical upgrades, they realized upgrades of CATM and streaming media acceleration platforms. At the same time, the company continued to promote basic technology upgrades and launched a management system for large-scale business platforms. ChinaNetCenter's CDN platform has finished its nationwide distribution and has already deployed nodes abroad.For its cloud distribution platform, ChinaNetCenter completed an interface standardization for major products and teamed with mainstream cloud computing manufacturers in China.

From http://www.chinatechnews.com/ 03/28/2014

TOP↑

 

China Focus: Guizhou Emerges as China's Big Data Center

 

Guizhou Province, one of the least developed in China, has emerged at the center of China's big data ambitions, with Alibaba Group and other tech leaders moving to cash in on the big data boom.Alibaba signed a framework agreement with the Provincial Government of Guizhou on April 17 to use the province as its industrial base for the development of cloud computing and big data.Big data refers to enormous sets of data that cannot be analyzed using traditional processing. The data can be used by businesses and governments to analyze trends and improve services.Both sides will cooperate to cultivate a data trade market, intelligent logistics system and an experience center for the online-to-offline business of department store operator Intime Retail Group Co. Alibaba announced last month that it would pay 692 million U.S. dollars for a 26-percent stake in the Hong Kong-listed retail group.Jack Ma, chairman of Alibaba Group, said at the signing ceremony that Guizhou boasts good potential for the development of the big data industry and enjoys geographical advantages.

 

Guizhou's visibility has been rising in China's big data frontier as a number of heavyweight telecommunication carriers, including China Telecom, China Unicom and China Mobile, have moved into the province's Guian New District since October to establish cloud computing bases and big data centers.So far, more than 100 big data enterprises, including Baidu, Jingdong and Dawning, and Internet giants such as Sina.com and Sohu.com have moved in. ( In the eyes of Li Guojie, academician of the Chinese Academy of Engineering, the swarming in of heavyweight players is not driven by bandwagon appeal.According to Li, the province is an ideal industrial base for big data development. Cool weather, plenty of energy resources, well-developed equipment manufacturing, military industry, sufficient power supply and lower electricity prices are all advantages to lure data centers to set up bases in the region, Li said.As one of China's least developed provinces, Guizhou is eyeing the big data industry to boost its economic sustainability while China speeds up its reforms. In 2012, the GDP per capita of Guizhou was only 50.9 percent of the national average, the lowest in the country.

 

Although rich in energy and natural resources, Guizhou has seen its economy heavily dependent on traditional heavy industries such as chemical manufacturing and ferrous metal production, whose growth potential have been declining.Guizhou Governor Chen Min'er has taken the big data industry as an opportunity for the province to add jobs, build new economic boosters and lift the personal income of residents in the coming years.The province mapped out a plan in February to boost the big data industry to serve governments, the public and business. Under the plan, e-governance systems, intelligent transportation, logistics, tourism, industrial cloud computing, e-commerce and food security will be upgraded through big data technologies to improve the efficiency of government departments and improve people's lives.However, the province faces a lack of talent to supply the industry's needs.To remedy the situation, Guizhou launched a talent recruitment project to attract college graduates to set up big data companies in Guiyang by offering them preferential policies.

 

Leading Chinese universities such as Peking University and Tsinghua University have signed agreements with Guizhou, promising to provide information technology talent to Guiyang, the provincial capital.A total of 42 higher education research institutes have so far invested in Guiyang to enhance local innovation capability. Their aggregate investment totaled 17.4 billion yuan (2.79 billion U.S. dollars).Under the provincial government's blueprint, a domestic first-class data resource center is expected to be established in 2017, which could make related industries worth 300 billion yuan (48.06 U.S. dollars).

From http://www.news.cn/ 04/24/2014

TOP↑

 

Chinese Government Will Invest CNY20 Billion to Promote IPv6

 

The Ministry of Industry and Information Technology of China says it will continue to promote the Internet sector's adoption of IPv6 with an investment of over CNY20 billion.Chen Jiachun, deputy director of the Communications Development Department of MIIT, said during the Global IPv6 and Next-Generation Internet Summit that MIIT will coordinate with related government departments to promote the network and website transformation process and promote the construction of next-generation Internet demonstration cities. Taking 4G LTE development as an opportunity to do this, they will open up the supply chain to accelerate the commercial use of IPv6 on the mobile Internet.According to Chen, they are facing problems in end-user transformation and website applications, which require a large number of software and hardware facility procurement and upgrade as well as long transformation period. In addition, IPv6 business strategy and business models are still unclear, which brings large pressure to network transformation projects.

 

With the encouragement of MIIT, over 200 metropolitan area networks in China will be transformed over the next three years.Zhao Huiling, director of the cloud computing center of China Telecom, said that the transformation from IPv4 to IPv6 involves multiple levels of government coordinating, and the existing network elements on the various levels are huge. The upgrade and transformation of the entire network will cost over CNY20 billion.Chinese carriers already claimed to have implemented full deployment in the IPv6 sector. China Telecom is actively moving its base businesses, including online gaming base, music base, and video base, to IPv6. The group's official website has completed IPv6 transformation.China Mobile provides both IPv4 and IPv6 LTE access to terminal users. In addition, China Mobile cooperated with various manufacturers, including Qualcomm, HiSilicon, Vimicro, and Leadcore, in the launch of over ten LTE chips which support IPv6.

From http://www.chinatechnews.com/ 04/30/2014

TOP↑

 

JAPAN: Govt. to Screen Online Babysitting Services

 

Japan's Health, Labor and Welfare Ministry will examine the operation of Internet-based babysitting services, following the arrest of a man suspected of abandoning the body of a toddler in his care. Ministry officials will look at the number of agencies mediating online babysitting and how they connect sitters with clients. The ministry will then advise parents to confirm on its website whether an agency is insured and keeps records on its babysitters. Babysitters are currently not required to register with local governments, and there is no law regulating agencies that provide this service.

From http://newsonjapan.com 03/19/2014

TOP↑

 

Japan Schools Look to Teach Online Morals, Safety

 

Schools across the nation are redoubling their efforts to teach students rules and ethics for their use of the Internet. Until recently, this kind of education mainly focused on preventing minors from accessing harmful websites. Nowadays, however, education experts agree on the importance of instilling a sense of online ethics early on, to prevent young people from engaging in behaviour such as inappropriate use of documents, academic papers and other sources, as well as the questionable posting of photos to the Internet. Municipal Ushizu Elementary School in Ogi, Saga Prefecture, offered its sixth-grade students lessons on how to properly use the Internet in April, in the form of a lecture during their moral education class. Teacher Makoto Jinnai, 54, first led students in a discussion about the positive and negative aspects of cars and gasoline. When he asked the same kind of question about the Internet, one student volunteered, "I can search for knowledge I want," while another said, "I can copy sentences other people wrote." Jinnai said, "If students think about the Internet in the same way they think about other things around them, they can understand that it has both good and bad sides, depending on how it's used." Jinnai is a director of IT Support Saga, a Saga-based nonprofit organisation that aims to maintain Internet environments appropriate for children.

 

The NPO has worked with local university students on a variety of projects, include staging plays with such complicated topics as "What should be done if a book report copied from the Internet wins a writing contest?" The NPO has also produced educational videos. This fiscal year, the Ogi municipal board of education will work with IT Support Saga to draft and implement a plan for teaching Internet morals in each school subject at all primary and middle schools in the city. At the Kamakura Jogakuin Junior and Senior High School in Kamakura, Kanagawa Prefecture, an similar effort started last fiscal year. High school students lead lessons on Internet morals for middle school students. The high-schoolers take around six hours of classes to build a foundation of knowledge as part of the school's information sciences classes, which are taught in part by experts from information technology companies. The high school students are then tasked with considering how to teach their newfound knowledge, and ultimately present the information to their middle school counterparts.

 

This fiscal year, second-year high school students will take part in the programme. In a class in late April, these students were taught about a variety of ethical situations. Their instructor explained, "If you take a person's photo without permission and upload the photo on the Internet, it constitutes an infringement of the person's portrait rights," and "If you take mischievous photos and carelessly post them to the Internet, it could lead to trouble." One 16-year-old student said, "Considering how best to share our knowledge with our juniors while we learned increased our own interest." Shoji Sato, a 54-year-old teacher at the high school, explained the idea behind the method saying, "I believe our students will feel closer to the issues when they're taught by people from the same generation." The need for education in Internet morals was pointed out in the fiscal 2002 school curriculum guidelines for middle school technology and home economics classes. Since fiscal 2011, education in this area has been seen as necessary for all students from primary to high school.

 

In recent years, there have been increasing problems due to inappropriate or careless messages and posts on the Internet, a phenomenon partly attributable to the proliferation of smartphones. This year, the Education, Culture, Sports, Science and Technology Ministry issued guideline materials and films for instructors about Internet moral education, distributing them to prefectural and municipal boards of education across the country in April. Because Internet-based data is easy to copy and alter, the guidance and teaching materials explain that careful consideration of other people and associated rights, including copyright, portrait right are important. Prof. Kazuhiro Sumi of Saga University, who heads IT Support Saga and is an expert on technological and information education, said, "As issues about plagiarism in academic papers have created great controversy, it's necessary to ensure that minors learn not only to protect themselves from dangers on the Internet but also to have a sense of responsibility for their own actions."

From http://news.asiaone.com 05/07/2014

TOP↑

 

SOUTH KOREA: Customs Service to Establish Combined Info System on Travel Records

 

The Korea Customs Service plans to establish a system that provides comprehensive information regarding the travel records of Koreans traveling abroad. The customs service said on Wednesday that it will combine relevant data and records, currently managed by the Foreign Ministry and the Immigration Office, to create a combined information system. Customs said that it will set up the system to secure easier access to data, that is currently managed separately by the two other organizations.

From http://world.kbs.co.kr/ 03/26/2014

TOP↑

 

Mobile Banking Users Top 50 Mln

 

The number of mobile banking users in South Korea broke the 50 million mark in the January-March period as more people used their smartphones for banking transactions, central bank data showed Thursday. The number of registered mobile banking users totaled 52.55 million as of end-March, growing 5.2 percent from three months earlier, according to the data by the Bank of Korea. The figures include users with multiple accounts.

From http://english.yonhapnews.co.kr 05/15/2014

 

TOP↑

 

Medical Insurance Info Goes Online

 

An online communication channel that will help people better understand domestic health insurance policy for four major diseases launched on May 9. In 2013, the government began the process of expanding health insurance coverage until 2016 for cancer, heart disease, cerebrovascular disease and rare and intractable diseases, known by Statistics Korea to be the four major causes of death. The new insurance policy has been designed to help lessen the burden of medical expenses. In the future, health insurance coverage will be expanded even further to include other less-serious illnesses. The online communications platform opened on May 9 provides information and all the details about national insurance coverage and how to progress with a claim. The online service provides more than just information about coverage for the four major diseases, though. It will also help people stay informed about medical technologies that weren't covered preciously and let people know about adjustments to their coverage concerning a certain proportion of their total expenses. The homepage will also give information about coverage of rare and intractable diseases and expensive anti-cancer drugs that have no specific alternatives. Moreover, the service website is designed to receive people's questions or opinions on each category of illness covered by the national insurance scheme. The online service can be accessed through the website of the Ministry of Health and Welfare (www.mw.go.kr), the National Health Insurance Service (www.nhis.or.kr) or the Health Insurance Review & Assessment Service (www.hira.or.kr).

From http://www.korea.net/ 05/16/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

INDONESIA: Capital City Prioritises Big Data and Open Government for Public Safety and Transport

 

Jakarta, capital of Indonesia and city of nearly 10 million, is holding its first open data challenge, HackJakarta, on 26 April, Setiaji, Head of Jakarta’s Information Development Planning Centre, told FutureGov on the sidelines of the Cities & Big Data Summit 2014 in Singapore yesterday.  Setiaji shared with over 100 city leaders at the Summit how Jakarta is using open government and Big Data to help its city managers make more informed decisions. HackJakarta, which Setiaji is leading, is the first time that the city is opening up over 50 datasets in machine readable format and a crucial initiative as Indonesia is co-chairing the Open Government Partnership.

 

Visualising Big Data

Setiaji also noted Jakarta’s Intelligent Transport System which connects to the traffic management centre and local police for CCTV and traffic signals. The system was adapted from Australia. Residents are now able to get public transport information and the city is able to prioritise and manage its public transportation. There are currently 1000 CCTV cameras in Jakarta, and it’s expected to grow to 5000, making Jakarta a safer city. “We’re only starting now and we will definitely improve in the future,” Setiaji said. With 13 rivers flowing into Jakarta, flood management is another important area for Big Data application. Jakarta’s new early warning system monitors risk indicators so that agencies are able to take quick action before the situation escalates. The city sees around 15,000 projects being implemented every year and numerous parameters need to be taken into account for managing these projects. Jakarta’s project monitoring system combines all the parameters into one of three possible signals (similar to red, yellow or green on a traffic signal) so that city managers are able to quickly interpret the data and take action.  A big challenge for Jakarta’s city government is extracting value from and taking action on the huge volumes of data in the city systems, Setiaji stated. Another aspect that Jakarta’s government is improving on is collaboration between agencies.

 

Smart City roadmap

As Jakarta travels down its Smart City roadmap, leapfrog changes must take place for the city to reach its ultimate goal, Setiaji highlighted. A crucial step towards this is the city’s Intelligent Operations Centre (IOC), which will serve as the command and control centre bringing together different data sources for a holistic view of movements in the city. Jakarta’s IOC takes inspiration from Rio de Janeiro’s and will leverage sensors to collect data, and combine and analyse it to automate collaborative response. Setiaji highlights three main stages in the IOC action plan - leverage information, anticipate problems and coordinate responses. “The IOC is the first step toward a smarter city because 40 per cent of city challenges lie in emergency response systems which test the agencies’ ability to coordinate their actions,” Setiaji noted. The IOC will ultimately enable agencies to prepare and forecast changes in urban dynamics.

An important lesson Setiaji shared is that inspirational leadership is important for the success of the Smart City vision, along with good communication, fair negotiation and consistent law enforcement.

 

From http://www.futuregov.asia/ 04/17/2014

TOP↑

 

Indonesia, Australia Government & World Bank Release New Disaster Mapping Software

 

Indonesia’s National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction and the World Bank - Global Facility for Disaster Reduction and Recovery (World Bank-GFDRR) have recently released a new version of software that can predict the social and human impact of natural disasters. At the launch of the Indonesian Scenario Assessment for Emergencies or InaSAFE 2.0, a free and open source software, the Head of BNPB Dr Syamsul Maarif said that the tools will help improve disaster preparedness in Indonesia by providing a new way to combine scientific hazard information and community knowledge on disaster risk. “It enables production of realistic natural hazard impact scenarios for better planning, preparedness and response training activities, by incorporating a range of natural hazard information, such as earthquake, volcanoes, tsunami or flood; and exposure data, such as the spatial distribution of population, roads or critical infrastructure,” he said.

 

Australia’s Minister-Counsellor for Development Cooperation in Indonesia, Jean-Bernard Carrasco, said InaSAFE 2.0 includes the ability to work with road data, including a capability to download roads maps directly from the online mapping tool OpenStreetMap (OSM). The new functions could help when planning possible evacuation and emergency response routes. “With the help of Australian Government agency Geoscience Australia and the Australia-Indonesia Facility for Disaster Reduction, over 1.3 million buildings in Indonesia have already been mapped in OSM and this data is being incorporated into InaSAFE”, said Carrasco. The updated software is compatible with the free and open source Geographic Information System QGIS 2.0, and allows users to import spatial data from remote sources and create custom impact map templates. The World Bank-GFDRR is facilitating use of InaSAFE across the world in Africa and to countries such as Sri Lanka and Pakistan. InaSAFE 2.0 is free and open source software that provides disaster managers around the world with a simple but rigorous tool for evidence-based disaster planning.

From http://www.futuregov.asia/ 05/05/2014

TOP↑

 

PHILIPPINES: Government to Use Sensors for Disaster Early-Warning

 

The Philippine Institute of Volcanology and Seismology (PHIVOLCS) will be rolling out a wide-area disaster prevention system to detect volcanic and seismic activity by using seismic intensity meters and tide indicators, as well as offering disaster countermeasures. Being on the circum-Pacific seismic belt, The Philippines often suffers from damage caused by active volcanoes and seismic activity. The country therefore has an urgent need to reduce the impact of natural disasters and to improve its capacity to respond to disasters through the enhancement of earthquake and tsunami surveillance systems and the real-time provision of related information. The system, scheduled to begin operating in February 2015, gathers sensor data from the strong-motion seismographs and tide indicators located throughout the Philippines at the PHIVOLCS via satellite-based communication. The system will enable the Institute to constantly monitor volcanic and seismic activity and to promptly convey the information to the relevant ministries and agencies in the event of an earthquake.

 

Seismic intensity meters will be located in approximately 40 locations and tide indicators will be located in approximately 20 locations all over the Philippines. These sensors will use photovoltaic solar cells so that they can send data constantly. The data on oscillation and the tides will be gathered in real time, enabling the constant monitoring of volcanic and seismic activity. PHIVOLCS aims to reduce the impact of natural disasters by communicating with the relevant ministries and agencies immediately after an earthquake or tsunami is detected and making use of changes in the sensor data to predict volcanic eruptions. The team also hopes to enhance the system that will make an automatic notification when there is any abnormal change in the data. This can be accomplished through coordination between this system and the systems of the other Philippine ministries and agencies, and a warning service for citizens. This project will be rolled out by NEC and is supported by grant aid from the Japanese government’s program for Improvement of Equipment for Disaster Risk Management.

From http://www.futuregov.asia/ 03/17/2014

TOP↑

 

SINGAPORE: Health Centre Recognised for Paperless Medical Records System

 

Singapore’s National Skin Centre (NSC) has been awarded by the Healthcare Information and Management Society (HIMMS) as the first and only primary outpatient care facility in Asia Pacific to achieve a Stage 6 of the Primary Care Electronic Medical Record Adoption Model.  HIMSS Analytics developed the Primary Care Electronic Medical Record Adoption Model (PC-EMRAM) in 2012 as a methodology for evaluating the progress and impact of EMR systems at primary care facilities. HIMSS Analytics ranks primary care facilities in eight stages (0-7) with stage 7 representing the highest level of EMR adoption. NSC’s seamless and paperless Electronic Medical Records system, launched in March 2004, allows patient transactions to be performed electronically, starting with an online real-time patient appointment system, self-registration kiosks, physician order entries, billing and day-end clinician administrative module. Clinician decision support modules such as drug allergy and medical alerts have reduced potential medical errors. The system also allows real time monitoring of waiting times and patient load at the clinics.

 

Professor Goh Chee Leok, Senior Consultant Dermatologist and Chairman of NSC’s Medical and Healthcare Informatics Committee spearheaded the project in 1998. He said, “We are proud to be first ambulatory outpatient care hospital to do so in South East Asia. It goes to show that NSC has harnessed its fully integrated paperless EMR system to improve its patient safety, care and treatment outcomes. Our staff dedication and commitment towards improving patient care has helped us achieved this certification. We will strive to improve our EMR system to serve our patients ever better and aim to achieve Stage 7 certification soon.” Meanwhile, Professor Roy Chan, Director of NSC said, “By harnessing innovative IT systems, we are able to raise our standards of medical service and increase our efficacy in patient care. This is evident from being the first in Singapore to implement both the Electronic Medical Records in 2004 and the Patient Health Portal in 2011.” The online system, Professor Chan explained, is an online system which allows patients to access aspects of their health records including dates of visits, diagnosis, medication history, allergies and procedures. Through this portal, patients are able to communicate with their healthcare providers via a secured messaging system. Since its launch in December 2011, NCS has been receiving excellent feedback from stakeholders and patients.

From http://www.futuregov.asia/ 03/03/2014

TOP↑

 

Singapore Police Emergency Call Centre Is Twitter-Enabled

 

Singapore Police Force will accelerate the posting of alerts on social media, both on its existing Twitter account and upcoming Instagram account, Fong Weng Kiong, Assistant Director (Policy & Development), Public Affairs Department, Singapore Police Force told FutureGov. “SPF’s 999 Ops Room is now trained and operationally ready to tweet specific incidents such as traffic diversions and road closures arising from fire, flood and the discovery of war relics, that may affect the travel of motorists,” said Fong. The SPF Twitter profile (@SingaporePolice) has attracted more than 18,000 followers since 2010 by providing real-time emergency alerts and crisis communications. The 999 Ops Room has also been tweeting appeal for information on missing persons, particularly the elderly and young children, where the public’s assistance is sought to help locate them. “SPF is constantly looking at ways to better use Twitter as a ‘live’ news channel. We want to increase our engagement rate by actively communicating with our Twitter fans,” he continued. For example, SPF has already been using its Twitter channel to ‘live’ tweet at events to encourage the community to participate in its events. SPF is currently active on many social media channels - YouTube, Facebook, and Twitter. The agency is currently planning to set up an official Instagram account and the pilot SPF Recruitment Instagram account has already been set up. The SPF Instagram account will maintain its reach to the younger generation of digital natives and project Police’s image in more innovative ways.

From http://www.futuregov.asia/ 03/06/2014

TOP↑

 

How Singapore Government Is Using Data Analytics to Improve Social Services

 

The National Council of Social Service (NCSS), a Singapore government statutory board responsible for about 400 Voluntary Welfare Organisations (VWO) highlighted the importance of leveraging data to produce powerful insights that can help social policy makers and practitioners improve social services. NCSS and its manpower development arm, the Social Service Institute, gathered 400 social policy practitioners from 80 member VWOs last week to discuss practical frameworks, methodologies and tools that collect, manage and analyse data. NCSS believes that its member VWOs can employ data meaningfully to identify emerging and unmet social needs, and design or improve social service programmes. Using The School Pocket Money Fund (SPMF) project as an example, NCSS showed how data can be mined and analysed to optimise fund and benefit needy families. SPMF is a charity that provides school pocket money to children and youth from low-income families. For SPMF to extend assistance to clients effectively, its fund disbursement policies and eligibility criteria are jointly reviewed by NCSS and SPMF regularly.

 

1. Keeping social initiatives current

NCSS monitors trends in the community through surveys to ensure SPMF remains current and relevant. In 2013, NCSS conducted a survey with schools to better understand the after-school activities and the patterns of expenses of students. The survey findings were revealing - compared to 2009, students stayed back in schools on more days and longer, and hence, spent more on food and transport. NCSS subsequently increased the monthly quantum assistance accordingly to dispense more pocket money to the students and their families. Secondary school students now receive $90 every month, an almost two-fold jump from $50 in 2000. The amount of pocket money given to needy students monthly has been steadily increasing over the years to keep pace with the rising cost of living and basic needs.

 

2. Monitor impact of social projects

In addition, NCSS analyses data from SPMF’s disbursing agencies to track how the fund is helping the clients. NCSS uses the electronic Case Management System it developed to draw aggregate information on clients. NCSS uses the demographic, educational and financial information of beneficiaries and their families to gain insights on the profile, risks and needs of low-income families with school going children and youth. Safeguards are put in place to ensure client confidentiality and the NCSS can only draw on aggregate information for decision-making, analyses, planning and projections. “VWOs should capitalise on advances in technology and use smart data tools to synthesise and make sense of the deluge of information that they have access to. Such tools can help uncover connections and reveal patterns that can help solve a social problem, meet a social need or even spark a transformative innovation that can improve the lives of vulnerable populations,” urges Tina Hung (pictured), NCSS’s Deputy CEO and Group Director for Service Planning and Development.

 

3. Effective reporting of social impact

The use of data can also effectively communicate social services’ impact to funders and donors. Communicating social impact is important as funders and donors are increasingly seeking assurance that their contributions are put to worthy and effective uses. NCSS published the first impact report for the Tote Board Social Service Fund (TBSSF) this year where the social impact of the Fund achieved between Financial Year (FY) 2010 and FY2012 is clearly articulated. In the three years, the Tote Board injected $160.3 million in 1,127 social service programmes and new initiatives, including research and pilot projects across four key sectors: families in need, children and youth, persons with disabilities and eldercare, to benefit over 285,000 individuals and families. The impact report revealed that funds amounting to a total of $39.4 million by TBSSF in FY2010 increased to $64.8 million in FY2012. The increase of 65% in funding resulted in an additional 121 social service programmes receiving support from TBSSF, and a total of 104,000 individuals benefiting from the funded programmes in FY2012. In part due to the unequivocal demonstration of the social outcomes, the Tote Board has pledged $301.9 million to TBSSF for FY2013 to FY2015, the largest amount NCSS has received from them this far.

From http://www.futuregov.asia/ 03/17/2014

TOP↑

 

Singapore Infocomm Development Authority Helps Elderly Pick Up E-Health Tools

 

A record number of Singaporean senior citizens are attending an IT workshop organised by Infocomm Development Authority of Singapore (IDA) this week to pick up basic computer and Internet skills from students. The Intergenerational IT Boot Camp is hosted in the computer labs of schools where senior citizens can learn IT skills, including e-health, online health tools and social networking from their grandchildren or student volunteers. This week it has attracted 348 senior citizens - the highest since the programme began in 2012. This boot camp was co-organised with the People’s Association Active Ageing Council and Tampines Group Representation Constituency Active Ageing Committees. The boot camp is part of IDA’s Silver Infocomm Initiative which aims to help the elderly pick up essential IT skills and applications in a convenient and friendly environment. Since 2010, 53 schools have co-organised 77 bootcamps and reached out to 1600 senior citizens. In 2012, the programme was awarded for ‘Innovations in Citizen Engagement and Dialogue’ by the Commonwealth Association for Public Administration and Management for its contributions to the public service.

From http://www.futuregov.asia/ 03/20/2014

TOP↑

 

Singapore Police to Launch Geo-Tagged Emergency Notification System on Mobile App

 

Expected to be ready by mid 2014, the second version of Police@SG Mobile App will include a geo-tagged notification system, among other new enhancements, Fong Weng Kiong (pictured), Assistant Director (Policy & Development), Public Affairs Department, Singapore Police Force (SPF) told FutureGov. The system will allow the agency to broadcast emergency information on a location basis. “For example, if you are at a location and a major fire breaks out, the mobile app will e-alert you and users within the vicinity of the incident and advise all of you to move away,” said Fong. Another feature will enable users to respond to a Police Appeal directly via text or call through the application. Beyond this, users will see more crime prevention and other police related information inside the app as well. The app is already available on both iOS and Android platforms. The Police@SG app was first launch in 2011 and has attracted more than 100,000 downloads so far. It was designed to serve as an information portal and to crowd source for crime-related information from the public. It provides easy access to police information and services, such as localised crime statistics, crime information, police stations locations and useful telephone numbers and links.

From http://www.futuregov.asia/ 03/27/2014

TOP↑

 

Singapore Tertiary Students Participate in Social Innovation with Interactive Portals and Mobile Apps

 

The School of Design at the Temasek Polytechnic, a tertiary education institution in Singapore with over 16,000 students, kicked off its Design Show 2014 yesterday showcasing 460 final year projects. FutureGov spoke to students of six projects which stood out for their use of technology to improve lives of Singapore’s residents and visitors.

 

1. The 365 Days of Singapore

Student Ivan Oon wanted to attract tourists to revisit Singapore by showing that there is so much more to do in Singapore. Taking into consideration major events and cultural festivals, Oon created an interactive portal for users to explore and choose from 365 activities, each with a captivating image and description. Tourists can use this portal to better plan their visit so they can have a different experience of Singapore each time.

 

2. Wildlife Wonder

Dian Sofia and Syam Ariffin created an interactive mobile app to enhance the experience of visitors to the Wildlife Reserves of Singapore - Night Safari, River Safari and Singapore Zoo. They wanted to target teenagers and young adults by leveraging mobile technologies and social media. The entire campaign includes viral videos and digital mascots interacting with the public through Twitter.

 

3. Storigami

Chua Pei En created an iPad app to better engage children in learning. The app, designed for children aged five to 10, features a series of classic fairytales. As a child goes through each digital story, the app will guide him or her to fold origami versions of characters in the story. Chua hopes that this will promote a healthy balance of digital and hands-on learning.

 

4. Everybody Eat

Rachell Tay and Shirley Ngiam wanted to promote family bonding in Singapore by encouraging people to dine with their family. As part of this campaign, they created a mobile app that allow users to track these family meals and share photo moments with their social networks. They included a gaming element to reward users with vouchers as they accomplish different tasks, such as logging three meals or sharing a post on their social network.

 

5. The Hawker Flame

Using an interactive and attention-grabbing web site filled with images of local food, Zhihao and Lim Si Hui aim to reignite the passion for hawker food among the youth. The portal highlights familiar sights and sounds of local hawker culture, such as the unique practice of ‘choping’ or reserving the table with a packet of tissue. It also encourages users to share photos via Instagram and Twitter.

 

6. Harvestack

With an aim to encourage urban gardening, Sim Mei Jun and Claire Liang created ‘Starter Kits’ for people who are interested in growing herbs and vegetables in their own homes but may not be experienced gardeners. A portal allows users to place their order for ‘Starter Kits’ and learn how to take care of their plants. The site even features videos and recipes to guide users on cooking with these herbs and vegetables.

From http://www.futuregov.asia/ 04/04/2014

TOP↑

 

Singapore Tertiary Institution Partners Industry to Enhance Digital Learning

 

Republic Polytechnic (RP), a tertiary institution in Singapore with 15,000 students, will be working with Popular e-Learning to enhance the quality and effectiveness of interactive digital learning solutions to keep pace with the evolving learning needs of students. The two year agreement will formalise and extend RP’s existing collaboration with Popular e-Learning. Popular e-Learning currently offers internship positions to students from RP’s Diploma in Interactive and Digital Media through the Industry Immersion Programme (IIP), which allows students the opportunity to put into practice the skills and techniques gained through their diploma course in areas such as storyboarding, 3D rendering and video production. In addition, the collaboration provides a platform for outstanding students’ final year projects to be adapted for commercialisation and implementation. In the first year of the agreement, a total of three student final year projects will be undertaken in collaboration with Popular e-Learning. With the support of experienced staff from both organisations, RP students will gain invaluable experience in conceptualising and designing print and digital media products in the education field to make learning enjoyable.

 

Popular e-Learning Holdings Limited had positive feedback about the contribution of past batches of IIP students in enhancing the company’s digital learning products and solutions. This factor was instrumental in the formalisation of the agreement, which will allow both institutions to jointly develop more innovative and vibrant e-learning solutions. “We are pleased to collaborate with an established brand name like Popular e-Learning. We believe that this MOU will open up new opportunities for our Infocomm students to work with industry partners and produce work at a level relevant to industry needs. We are also hopeful that this collaboration will pave the way for more opportunities between RP and Popular to work together to produce more innovative digital e-learning solutions,” said Boo Chong-Han, Director, School of Infocomm, Republic Polytechnic. “RP embraces Problem-based Learning which too, is our approach towards holistic learning. By working with experienced educators from RP through sharing of experiences and resources, we hope to ignite students’ passion for digital learning and bring about innovative solutions for the next generation of preschool education learning needs - transforming the students from learners to teachers.”, said Christine Chiang, Senior Director, Popular e-Learning.

From http://www.futuregov.asia/ 04/09/2014

TOP↑

Singapore Government Invests US$54mil in Intelligent Bus Management System

 

The Land Transport Authority (LTA) of Singapore has invested S$68 million (US$54 million) in a new unified Intelligent Bus Management System for operations control, fleet management, passenger information and business management. Currently, the two public transport operators - SBS Transit and SMRT - use separate bus fleet management systems to manage their daily bus operations and provide bus arrival information to commuters. This unified system, which will be implemented by ST Electronics (STE-InfoComm) and Trapeze Switzerland, will manage all buses, regardless of which transport operator they belong to. The newest on-board computers and touch terminals will be installed on all buses to aid bus drivers with traffic information and advisories on adherence to route schedules within the transport network. The system will be implemented progressively from end 2015. Ultimately, this would mean better operated bus services for the benefit of commuters, who should experience more consistent performance of bus services.

 

Group Director, Innovation and Infocomm Technology, LTA, Rosina Howe said, “Since early 2013, we have been working with both SBS Transit and SMRT to define a unified transport control system which is able to relay real-time information to the operation control centres, bus drivers and commuters. This will be an intelligent system capable of providing timely advisories to bus drivers through touch screens, enabling better optimisation of the fleet resources by despatching buses to where they are needed and disseminating more accurate bus arrival timing to benefit commuters. With more accurate bus arrival information, commuters can better plan their journeys and travel options.” Based in Singapore, STE-InfoComm provides infocomm technologies and electronics and intelligent transportation systems to commercial, government, defence and homeland security sectors. STE-InfoComm has implemented LTA’s i-Transport system, arterial roads monitoring and analysis system, and traffic junctions CCTV surveillance system. Trapeze specialises in the supply and implementation of intermodal transport control systems for the public transport industry with its notable implementation for the Transport for London’s fleet of 8,500 buses.

From http://www.futuregov.asia/ 04/10/2014

TOP↑

 

Singapore Government Uses Big Data Analytics to Optimise Transport Management

 

The Land Transport Authority (LTA) of Singapore has been using its highly sophisticated and integrated Intelligent Transport System to collect, process and disseminate real-time data, said Chang Mook Choong, Deputy Director of Intelligent Transport Systems Development Division at the Cities and Big Data Summit. Speaking to over 100 city administrators, Chang described how LTA has harnessed technology to optimise the use and efficiency of the country’s transportation infrastructure, improved safety and enhanced the travelling experience of commuters. “LTA’s three key strategies are to provide innovative mobility solutions, establish collaborative partnership, as well as develop and adopt technology standards,” he said. The Agency collects data from several sources, including road sensors, Expressway Monitoring and Advisory System (EMAS), Green Link Determining System also known as GLIDE which controls over 2000 traffic lights to enhance drivers’ experience, Junction Electronic Eyes, TrafficScan which uses GPS technology on 9500 taxis to monitor road condition, Parking Guidance System, and finally data crowdsourced from the public.

 

“We started out with several systems, each collecting and processing data separately. However, in order to make sense of all data, we have now integrated all into the unified ‘i-Transport Platform’,” Chang said. “Using a single interface, our operators can now make sense of different sources of data. The platform fuses raw traffic data so that it can be converted into meaningful traffic information,” he added. Once data has been processed into information that is relevant and useful, LTA disseminates this information via electronic signboards on the roads, web portals, its Twitter account, radio, and mobile applications. “Data is also made available to the industry to encourage collaboration. Companies have used the data for navigation devices and to create new innovative applications,” concluded Chang.

From http://www.futuregov.asia/ 04/17/2014

TOP↑

 

THAILAND: City Mayor Reveals How Facebook & Technology Help in Flood Management

 

In an exclusive interview with FutureGov, Vichai Bandasak, Mayor of Pakkret City, a Thai city with a population of about 80,000, shares his challenges on managing the City’s flood crisis and how technology plays a part. The general Pakkret Municipality area is low-lying and densely populated along the Chao Phraya River. During the raining season, Pakkret City is often affected by floods. “We have been successfully in reducing the impact of flood on the community. About 20 years ago, 30 per cent of the area were affected. Last year, we brought that down to 5 per cent. My aim is to drop that figure to zero,” says Bandasak. Two years ago when one of the biggest floods hit Thailand, only 2000 people in Pakkret, out of its 80,000 residents, were affected by the flood. Much of the people’s lives - both culturally and for their livelihood - revolve around the river, so the work of building a dam has been opposed by some.

 

Bandasak and his team has been using social media, particularly Facebook, to educate the City’s residents. “The reach and engagement on Facebook have been positive. Most of the audience consists of working adults and students. Many of them now support the City’s cause.” Besides engaging the people, Pakkret City’s Facebook account plays a more important role of communicating flood warnings to the public. “Other than broadcasting warnings over the local radio stations and sending out SMS notifications, Facebook is an effective channel to alert people of a pending flood. We keep them updated on the water level and the location of evacuation sites,” he adds. Although not all of the population are on Facebook, the working adults and students who are connected will always pass the message on to their family members. Pakkret City also has a 24-hour monitoring and information centre equipped to deploy sandbags and other flood mitigation tools. Residents can also visit the centre to gather information, such as nearby evacuation sites which often are temples or sports stadiums.

From http://www.futuregov.asia/ 04/11/2014

TOP↑

 

Thailand Government Consolidates Mobile Services with New App Centre

 

Thailand’s Electronic Government Agency (EGA) has set up the new Government Application Centre (GAC) which will bring together mobile apps developed by or related to various government departments and agencies, announced EGA President and CEO, Sak Segkhoonthod. The GAC will run the apps.go.th portal which will be officially launched in May and where all the government apps will be available. The apps will be categorised so that users are able to find and access apps of interest to them more easily. Segkhoonthod shared that although many agencies are creating mobile apps, they are uncertain if their apps are serving the needs of the citizens, and the GAC will help the agencies to create apps that match the users’ needs. Currently about 100 mobile apps are provided by Thai government agencies and 10 more will be introduced with the launch of the apps.go.th portal this month. In addition, some existing apps will also be relaunched. A single sign-on feature for apps will come in place soon as EGA consolidates the various registration requirements of different apps. Once completed, users will need to register their username and password once and will be able to access all apps through the same username. The focus is currently on Android and iOS operating systems, with the Windows operating system expected to take some time.

From http://www.futuregov.asia/ 05/07/2014

TOP↑

 

Thailand Government Launches Mobile App to Enhance Road Safety

 

The National Electronics and Computer Technology Centre (NECTEC), a statutory government organisation under Ministry of Science and Technology in Thailand, has launched a mobile application to reduce the risk of road traffic accident. According to NECTEC, recent statistics have shown that Thailand has the second highest global road accident rate per 100,000 citizens. The mobile application, now available on Android and iOS platform, aims to promote safe driving among road users as well as public transportation. The free application known as ‘SafeMate’ uses the accelerometer sensor on the smart phone to analyse the driver’s behaviour in real time. The app alerts drivers when it detects dangerous movements such as sudden braking and swerving. To encourage motorists to change their driving habits, users will be given a score at the end of the trip, their average and maximum speed, as well as suggestions on how they can improve their driving styles the next time they are behind the wheel. Users can also share this information on their social networks.

From http://www.futuregov.asia/ 05/08/2014

TOP↑

 

Thailand Smart Country Project Brings Efficient E-Services to Citizens and Civil Servants

 

Thailand’s Smart Country project is making headway as Phuket Province (population, 600,00) launched its THB 95 million (US$2.9 million) Smart Province project, shared Permanent Secretary of Thailand’s Ministry of Information and Communication Technology (MICT), Surachai Srisarakham. The Smart Province project in Phuket, scheduled to be completed in 2015, will bring one-stop service centres where residents can access information and use digital services with a swipe of an ID card. The Smart Country project will link local government offices, police stations and private enterprises with a single network which will be used to share and access information in a secured manner, explained Srisarakham. Among the benefits he highlighted that residents will be able to access public services online, faster and more efficiently. Government agencies will be moved towards paperless offices to create a more efficient workplace. Provinces can save up to THB 4 billion (US$123 million) as they move towards electronic voting for elections. Srisarakham revealed plans for free public WiFi in Phuket which will allow residents to access public records when connected to the network, and will also support the booming tourism industry in Phuket. Emphasis is also placed on use of IT in enabling rural areas to access education of comparable quality to that available to students in urban areas like Bangkok. The Smart Province pilot has been completed in Nakhon Nayok Province. The plan is to expand the project to the rest of the country; however, this may take more time than expected given the recent changes taking place in the central government, Srisarakham added.

From http://www.futuregov.asia/ 05/09/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

INDIA: E-access to Four Wakf Board Certificates

 

HYDERABAD: For the first time, citizens can access certificates issued by the AP State Wakf Board at Mee Seva centres across the state. Chief secretary P K Mohanty, who is keen on improving the scope of e-governance, launched on Friday four services that are offered by the APSWB which functions under the minorities welfare department (MWD). "We had earlier planned to launch eight services that come under our purview but owing to demand by certain sections of society for a more thorough study on some of these subjects, we went ahead and inaugurated the four which were free from any controversy," Syed Omar Jaleel, special secretary, MWD, said.

From http://timesofindia.indiatimes.com/ 03/01/2014

TOP↑

 

Innovative Fully Integrated Cloud Based e-Health Centre Launched in Hyderabad

 

Mediciti Hospitals in collaboration with Hewlett Packard (HP) and SHARE India, an NGO, launched an innovative fully integrated cloud based e-health centre at Aliabad village near Hyderabad. With an aim to provide affordable and easily accessible healthcare facilities in rural areas of Andhra Pradesh, Mediciti/SHARE and technology major Hewlett Packard (HP) in collaboration with the Council of Scientific and Industrial Research (CSIR), have opened a fully integrated cloud based e-health centre (eHC) in Aliabad village in Rangareddy district. This eHC centre is fourth of its kind of centres established in India. Located 45 kilometers from Hyderabad, the centre is expected to cater the healthcare needs of the rural areas. Other three centres were established elsewhere in India include Chausala in Haryana, Myinapur in Uttar Pradesh and Jamshedpur in Jharkhand. With the launch of this e-health centre, it is expected to provide healthcare services to remote areas which would benefit approximately 20,000 people across 10 villages in the district. Diagnosis and treatment will be delivered by doctors seated at a studio in Mediciti hospital at Ghanpur village in Medchal mandal in Rangaraddey.

 

Partnering in this innovative initiative, HP has designed the fully integrated cloud technology and deployed its solution at the e-health centre. The solution will connect the medical equipment deployment at the e-health centre with an e-health cloud collect basic patient health data to enable better medical diagnosis. The e-health centre will also provide remote consultations using built in video conferencing options tapping into specialist experts worldwide. Using HP’s cloud-enabled healthcare solutions, now it is possible to  provide health services for local people. Millions of people in India have no access to healthcare in rural areas. More than 65 per cent of the population lives in rural areas, while only two per cent of India’s doctors are located there. About 89 per cent of rural patients have to travel an average of eight kilometers to access basic medical treatment. Paul Ellingstad, HP corporate affairs said, “The e-health centre in Aliabad is HP’s fourth centre in India and together with our partners support we are rapidly scaling up our initiative of affordable and easy accessible healthcare in the rural areas.”

 

Dr Krishnaiah, CEO, Mediciti Institute of Medical Sciences said, “Providing access to quality healthcare in rural areas is the main goal and Aliabad e-health centre is one step forward in this direction. We thank Hewlett Packard and CSIR for providing innovative technology to support our initiatives.” The eHC health cloud integrates the process of healthcare delivery and health data collection. This centralized patient information sets the platform for data-driven research such as disease surveillance by tracking disease patterns and risk factors. The health profile of the region as well as monitoring of the daily usage of the eHC is enabled by an integrated eHC dashboard, providing comprehensive yet digestible analytics that will help health policy makers.

From http://www.pharmabiz.com/ 03/01/2014

TOP↑

 

India’s First e-Kisaan Tablet for Farmers Launched

 

Six months ago, 34-year-old Gouri Shankar, a US-based techie, decided to return to his village. And he didn’t come empty-handed. After spending eight years abroad, he launched a company to introduce India’s first specially programmed tablet for farmers to give them access to technology. On Tuesday, Shankar launched the tablet with the e-kisaan software in Karnataka’s Bagalkot district, where he had studied in a government college in Timmapur village. “The idea is to democratise information,” Shankar said, distributing the tablet for free among 250 farmers from Bagalkot and Bijapur districts. Feedback from the pilot drive, he said, will help improve the tablet and expand the reach of the project. The idea germinated in Boston about six months ago. Shankar collaborated with two of his friends — Sreekanth Bhaskar and Pramit Makody — and set up a company, Virtuex IT Solutions. “The team engaged with people at Harvard to develop the architecture for the project. Later we spent a lot of time with the farming community and experts in India to give it its final shape,” he said. In order to make the software user-friendly, the team constantly engaged with agriculture universities in Dharwad and Raichur. It also collaborated with Bangalore-based technology firm Tribyte.

 

“We have integrated features based on the needs of farmers,” Shankar said. The e-kisaan tablet will provide information on fertilisers, pesticides, seeds, crop combinations and other farming parameters, besides providing real-time weather data and enabling access to e-governance platforms. Various e-governance schemes come integrated into the software. For instance, Sakala – the right to delivery – can be directly accessed through the software. For Internet connectivity, the company has collaborated with Airtel 3G services, which will provide data for free for the first six months to the tune of 5 MB per day per table. When offline, the tablet can be used to access information from the village panchayat office to which it is connected. The team has also established a call centre to resolve problems. “After initial feedback from farmers through the call centre and also from our partners, we will roll out the second phase of the project,” Shankar said, adding the software will soon be made available on Android.

From http://indianexpress.com/ 03/05/2014

TOP↑

 

National Launch of Post Office Savings Bank ATM and Core Banking-postal Life Insurance

 

India Posts is operating small savings schemes since 1882. Presently, the following seven schemes are being offered- Savings Account, Recurring Deposit, Time Deposit, Monthly Income Account Scheme, Senior Citizens’ Savings Scheme, Public Provident Fund and National Savings Certificates (VIII and IXth Issue). The total number of accounts of Small Savings Schemes is 29.89 crores. The Department of Posts has undertaken an end to end ‘IT Modernization project 2012′ to equip itself with requisite modern tools and technologies. In order to IT enable Post Office Savings Bank, Core Banking Solution (CBS) is being implemented across India covering all the post offices. At present, 64 Post Offices have been migrated into the CBS environment in Delhi, Uttar Pradesh, Tamil Nadu, Karnataka, Maharashtra, Assam and Andhra Pradesh. As on date, four Post Office Savings Bank ATMs have started functioning. M/s Infosys ltd. has provided the Core Banking Solution, Finacle, for the IT Modernisation Project of India Post.

 

Core Banking Solution (CBS) will enable customers to operate their accounts and avail account related services from any post office in the country. ‘Anywhere Anytime Banking’, Net-banking, RTGS, NEFT shall be available for the Post office customer. The objective of CBS is to provide faster and easier banking services through internet, mobile devices and ATMs. The Post Office ATM will facilitate the customer to withdraw money anytime. The ATM at Indraprastha Head Post Office and Delhi GPO will be replicated in 1000 locations across the country in the next few months. This will be scaled upto 2800 ATMs by 2015. A total of 600 Post offices in India will be migrated by March 2014 and 23,207 Post Offices in India are to be migrated by 2015.

From http://egov.eletsonline.com/ 03/05/2014

TOP↑

 

Biocon Launches e-Healthcare Programme in Odisha

 

Biocon has started an e-healthcare program for the underprivileged and rural communities in the Odisha in collaboration with the state government. Biotech major’s CSR arm Biocon Foundation along with state government and OTTET (Orissa Trust of Technical Education) has launched the scheme to deliver e-healthcare program for underprivileged and rural communities, the biotech firm said in a statement. The scheme will be implemented under the public private partnership (PPP) model. This e-healthcare program aims to provide quality healthcare services for the 51,000 villages in Odisha. Canara bank has lent its support to the scheme and MoU has been signed for that. The official statement reads that, “Under this PPP, Biocon Foundation & OTTET will set up an electronic diagnostic facility, an e-Health Centre, managed by local young entrepreneurs, at all the Primary Health Centers (PHC) of the Odisha government.”

 

Young entrepreneurs will be provided financial assistance by the Canara Bank and will be trained by Biocon Foundation & OTTET to support the medical officer at the PHC for various healthcare and diagnostic services. Commenting on the development Biocon Chairperson Kiran Mazumdar-Shaw said:” We aim to strengthen the present public healthcare delivery system in Odisha, by providing solutions around primary & secondary healthcare with effective use of technology

From http://egov.eletsonline.com/ 03/08/2014

TOP↑

 

E-Aadhaar to Be Used as Proof

 

Now, e-Aadhaar or electronic-Aadhaar will be considered an official valid document for opening a bank account, rules RBI. How to use e-Aadhaar at banks. An e-Aadhaar is an electronically generated document that contains an image of your Aadhaar card and a letter from the Unique Identification Authority of India (UIDAI). The letter issued by UIDAI, which gives your details such as name, address and Aadhaar number, will now be accepted as a valid identity proof when you go to open a bank account. The central bank has also told banks that if the address provided by the customer is the same as that on the Aadhaar letter, it can be accepted as a proof of both identity and address. Let’s say you only know your Aadhaar number or have a soft copy of e-Aadhaar with you when you go to a bank branch to open an account. The bank will be responsible for printing your e-Aadhaar letter directly from the UIDAI portal, or adopt the e-KYC (electronic-know-your-customer) procedure or confirm identity and address of the resident through simple authentication service of UIDAI. This is now possible as RBI said in the same circular that it has decided to accept e-KYC service as a valid process for KYC verification. Axis Bank Ltd is the only bank that have already started using e-KYC.

 

 It is an authentication process provided by UIDAI. With an Aadhaar number and biometric authentication, you can open a bank account without carrying any photocopies of other identification documents with you. All you need is your Aadhaar number and fingerprints. Remember that physical Aadhaar card containing details of name, address and Aadhaar number received through post will continue to be accepted as a valid document. How to download e-Aadhaar You will first have to visit the UIDAI website (https://eaadhaar.uidai.gov.in ). You can either use your enrollment number or your Aadhaar number to get your e-Aadhaar. Besides the number, you will have to key in your full name and the pin code. If you only have your enrollment number, you will also have to put the date and time of issue and your mobile number to get a one-time password. However, if you have the Aadhaar number, the system will automatically pick your mobile number and send you a one-time password. Once you enter this password, you can download the e-aadhaar document, which will be in PDF format. Use your postal code to open the file. If you have your Aadhaar number, but have not registered your mobile number, then you have to use your enrollment number which is available on your Aadhaar card or your receipt.

From http://egov.eletsonline.com/ 03/12/2014

TOP↑

 

Reliance Jio to Use Viom Towers for 4G Services

 

Reliance Jio Infocomm Limited will launch its services across India using telecom-tower infrastructure provided by Viom Networks. Under a Master Services Agreement, Reliance Jio will use Viom Networks’ Pan India Passive telecom infrastructure having a footprint of over 42,000 telecom towers. “This agreement is in line with our mission of a pan India launch spanning next-generation voice and data services and leveraging existing telecom infrastructure,” said Sanjay Mashruwala, Managing Director, Reliance Jio. “We look forward to partnering with Viom Networks for rolling out services across the country.” Reliance Jio holds a pan-India Unified License and is currently building a network to offer next generation high-speed data services. The company believes that the Indian market is highly underserviced. There’s thus a deep demand undercurrent for reliable (4th generation) high speed internet connectivity, rich communication services, and various digital services on pan-India basis in key domains such as education, healthcare, security, financial services, government citizen interfaces and entertainment, said an RJio release.

 

The mission therefore, is to provide anytime, anywhere access to innovative and empowering digital content, applications and services, thereby propelling India into a global leadership league in the digital economy, it added. “From a conventional tower company, we are transforming ourselves as an innovation-driven, data-centric infra solutions provider,” said Syed Safawi, CEO, Viom Networks. “We are delighted to partner with Reliance Jio and offer our countrywide network infrastructure. Our consistent delivery of high network up time, on-time reliable project delivery capability, and optimal operation and a maintenance cost offer a great value package.”

From http://egov.eletsonline.com/ 03/19/2014

TOP↑

 

 

Going Digital

 

As internet users are expected to increase from 214 million currently to 494 million by 2018, online services market is likely to double to $29 billion in the next three years. Internet companies are investing to develop the market which will result in a larger active base and higher online usage. The e-commerce or online retail segment will be the fastest-growing one over the next few years, and online travel, which includes rail, air and hotel segments, is the most mature segment. Moreover, as digital advertising is expected to grow three times by 2018, digital media will present an opportunity to engage specific target segments in a more cost-effective way.

 

A Morgan Stanley analysis says that leading e-commerce companies have been doubling their gross revenues every two years and are expected to grow at around 40-50% per annum over the next three years to touch $8.5 billion for the top three companies. Interestingly, 80% of e-commerce in India relates to consumer electronics or apparel and more than 50% of e-commerce transactions are from non-metros. Online job search, real estate and matrimonials will drive e-commerce and digital advertising. However, despite the growth potential of e-commerce, the internet time spent is still low in India (87.5 hours per month) as compared with 120.5 hours per month in China. Also, cash still accounts for 50-60% of the total payment of e-commerce orders, indicating there is a long way to go before online banking or debit/credit card usage becomes popular with users.

From http://www.financialexpress.com/ 04/12/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

AZERBAIJAN: Mobile Operator Nar Mobile to Create Internship Platform for Students

 

Attaching a high importance to education, science and innovations, Azerbaijan's mobile operator Nar Mobile has signed a new cooperation contract with the Enactus (Entrepreneurial. Action. Us.) Program, the company said on March 7. Aiming to attain better achievements, start a new cooperation and exercise more effective influence on the society in 2014, the Enactus judges it very important to begin the partnership with one of the largest telecommunication companies of Azerbaijan - Nar Mobile. The Enactus Program joined by 57,000 students and over 1,600 teams from 39 countries is being also implemented in Azerbaijan since 2006. This year's X Enactus National Contest that will be organized with the participation of more than 500 students and 14 University teams draws a huge public interest. Under the Enactus Program, students will form their teams to express their opinions and share business ideas. Such projects aim to increase living standards of the public and it helps students to share their experience and learn theories of market economy, leadership skills, financial successes and business ethics that bring benefits to themselves, the society and the countries. Joining willingly this initiative, Nar Mobile sets up a sophisticated platform for students and youngsters to spread their new ideas, gain working experience and prove their force. Thus, students that will feel the business environment can contribute to the daily activities of the mobile operator while the most talented ones selected among them will get a career opportunity in Nar Mobile in future.

From http://en.trend.az/ 03/07/2014

TOP↑

 

Growth of Cloud Technology Usage Recorded in Azerbaijan

 

A growth was recorded in the number of organisations and enterprises using 'cloud' technology in Azerbaijan, technology consultant at Microsoft Azerbaijan, Gachay Mirzoyev told Trend on March 13. The main reason for this growth is that the use of 'cloud' services increases the efficiency of the enterprise and this is an important factor is the low rental cost for the usage of the virtual space, he said. For example, the monthly rent of one gigabyte of virtual cloud space in Windows Azure costs 0.07 cents in Azerbaijan.  "At present, the number of enterprises and organisations using the Windows Azure 'cloud ' infrastructure in Azerbaijan reach 40 units and over 100 companies are testing its capabilities today. There are both public and private enterprises and companies among them," Mirzayev said. There is still mistrust over such infrastructure solutions in Azerbaijan, according to the expert. A reverse pattern is observed in Europe, where 'cloud' technologies have proved themselves and are very popular. "Computer technology and software are not considered capital assets, but are working capital. Taking this into account, the company seeks to use 'cloud' services in order to save money. This means the company actually gets the same services at affordable prices," Mirzayev said.  Windows Azure is an open and flexible 'cloud' platform allowing a quick creation of applications and manages them through a global network of data centres using Microsoft. The user receives an opportunity to execute the creation of applications by using any language, methods or any platform and to integrate their public 'cloud' applications with the existing IT-environment.

From http://en.trend.az/ 03/16/2014

TOP↑

Bakcell Launches SMS Notification Tool for Emergency Situations

 

Bakcell, the First Mobile Operator and The Leading Mobile internet Provider of Azerbaijan is pleased announcing development of SMS notification jointly with the Ministry of Emergency Situations of Azerbaijan Republic, the company said on March 19. The project aiming at mitigation of public safety concerns in emergency situations is being implemented in Azerbaijan for the first time by Bakcell. Disasters damage human life causing injuries and deaths, destroying of homes and gas and electricity systems. As a socially responsible company, it is critical for Bakcell to support its customers when they most needed it.  The development of notification tool will support the Ministry of Emergency Situations to notify residents of relevant regions about natural disaster and emergency situations by sending SMS alert which help people to get awareness in time and ensures a rapid response in a more caution manner in any critical situation. By this SMS alert, Bakcell customers can receive warnings and emergency information to their mobile phones.

 

The customers do not need to activate any service in their phones or to pay to receive the SMS. This is the first-ever location and time based SMS alert available in Azerbaijan. Bakcell customers who enter a relevant emergency zone will receive SMS notification to their inboxes. The service is available for all phone models in the local market. SMS notification tool for disaster and emergency situations helps both relevant agencies and population to plan measures to be taken by eliminating miscommunication as everyone receives the same SMS alert at the same time. The system is able to send SMS alert almost immediately after receiving notification by the Ministry about the emergency situation. "SMS alert systems supporting the countries to ensure the safety of its people is being more popular in the whole world today. The system provided by Bakcell will enable emergency providers and local population to manage the challenges caused by disaster and other emergency situations. This is a very effective tool for improvement of emergency coordination and public communication. We are pleased to work with the government on disaster preparedness program and help our customers to stay connected in emergency situations", says Yigit Berktash, Chief Technical Officer of Bakcell.

 

Bakcell inform that the SMS notification tool has been successfully tested and is fully ready for implementation. Bakcell, The First Mobile Operator and the Leading Mobile Internet Provider of Azerbaijan, offers a variety of products for modern mobile communications customers. Bakcell provides class leading 3G mobile internet experience in the country under the Sür@ brand name. As one of the largest national non-oil investors, Bakcell today continues making large investments in the economy of Azerbaijan through its investments in state-of-the-art telecommunication technology and its people who service our customers. Bakcell's network covers more than 99% of the population and 93% of the land area of the country (excluding occupied territories). Bakcell is a leader in innovation and it focuses on bringing the best of the mobile internet to Azerbaijanis through new partnerships and its Sür@ services. With more than 1000 3G base stations Bakcell 3G service is available in all regions and covers 80% of population and 55% of the territory of the country (excluding occupied territories). 300 retail outlets and 5 Customer Service Centers operating in the capital and regions are providing the best customer experience to Bakcell customers. For more information about Bakcell products and services, please visit www.bakcell.com or call 555.For press releases please see www.bakcell.com/az/news (or www.bakcell.com/en/news for press releases in English). If you are not a Bakcell subscriber, but wish to find out about Bakcell and its services, please call 055 000 05 55.

From http://en.trend.az/ 03/19/2014

TOP↑

 

Azerbaijan Expands List of E-Service Types

 

A list of electronic services rendered in Azerbaijan by the central executive bodies has been extended by three, according to a decision of the Cabinet of Ministers. In this regard, decision No191 on approving a 'List of types of electronic services' and 'Rules for rendering the electronic services in specific areas by the central executive bodies' of the Cabinet of Ministers dated November 24, 2011 has been amended. The list of services includes issuing a document confirming the facts of a publication and receiving appeals about the publication of the first information given on the liquidation of non-profit legal entities and educational institutions and timing of the notification of the creditors' claims. It is planned to issue the documents confirming the fact of publishing and receiving the appeals about the publication of the first information about the liquidation of the commercial legal entity and religious organizations and timing of the notification of the creditors' claims in an electronic form.

From http://en.trend.az/ 04/01/2014

TOP↑

 

Mobile Operator Prepares to Launch Cable Television in Azerbaijan

 

Azerbaijani mobile operator Azerfon is preparing to introduce a "NarHome" product, which involves provision of broadband services on the principle of "Fibre to home" according to the general director of the company, Kent McNeley.  The company will also provide cable TV services (under the NarTV brand name) together with B&B TV Communications company in the framework of this project, according to McNeley.  "At present, details on the deployment of TV services are at the stage of discussion" McNealy said. "At the initial stage, the "NarHome" project will start in Baku and then will gradually be expanded to all regions of Azerbaijan."  The implementation of "Fibre to home" project has started in Azerbaijan in January 2014.  In accordance with the plans of the Ministry of Communications and High-Technologies, all areas of Azerbaijan will be provided with high-speed Internet access by 2017.  At present, some 70 percent of the Azerbaijani population use Internet, and the level of broadband internet pervasion among the population is 50 percent.  The ultimate goals of the project are to provide population with high-speed internet in the range of 10-100 Mbit/s throughout the country, including remote rural areas and bringing the number of broadband Internet users up to 85 percent, which would allow Azerbaijan to reach the level of developed countries by 2017.

From http://en.trend.az/ 04/08/2014

TOP↑

Baku Enhances Parking Control System

 

Speaking to Trend on April 21 the public relations specialist at Azerbaijani Transport Ministry's Intelligent Transport Management Center, Shafa Mehmangizi said illegally parked motor vehicles are one of the main causes of traffic jams and problems related to bus stops. Given these problems the transport management center created a system to control parking. This system monitors parking and imposes penalties in case of violations. The system registers parking in prohibited places as a violation of parking rules. Mehmangizi said there are two cameras installed on the center's posts in locations around the city: one for observations, and the second for control. "A motor vehicle violating the parking rules will be detected by these cameras. Then the parking control system identifies the motor vehicle's number and its owner," Mehmangizi added. She also said the motor vehicles can be left in places forbidden to park for certain limited time. But if a motor vehicle is left at a forbidden place for more than the allowed period of time, the control camera will register the vehicle a second time and a fine will be imposed against the vehicle's driver. All notices about the penalty will include four photos - two photos depicting the moment when the motor vehicle just stopped, and two others reflecting the last-minute of parking. The photographs will not reveal other motor vehicles' state numbers or data of pedestrians.

From http://en.trend.az/ 04/21/2014

TOP↑

 

E-Signature Tariffs Decrease in Azerbaijan

 

Azerbaijani Communications and High Technologies Ministry has reduced the cost of electronic-digital signature, the ministry said on Wednesday, April 30. The cost of an e-signature for citizens was reduced from 30 manats to 18 manats; for individuals and legal entities engaged in entrepreneurship the e-signature costs 36 manats and 72 manats respectively. Previously, the e-signatures' cost for legal entities and individuals was 168 manats. The cost of the e-signatures for employees of the state institutions remained unchanged at 80 manats. The new tariffs for e-signature envisage a three-year period of use, according to the message. Upon receipt of the signature the users will be given a card reader. A digital signature can be obtained throughout Azerbaijan, including Nakhchivan Autonomous Republic. For detailed information on obtaining a signature please visit: e-imza.az.

From http://en.trend.az/ 04/30/2014

TOP↑

 

UZBEKISTAN: Mobile Operators Can Switch to Eight Digit Numbers

 

Uzbekistan`s mobile operators can upgrade to an eight digit number format for mobile subscribers in mid-2014, General Director of Unitel LLC, a subsidiary of JSC VimpelCom in Uzbekistan, Alexander Vorobyov told journalists on March 11. "As far as I know, the programme will be launched from the middle of this year," he said. The company has set high hopes on the eight-digit substitute of numbering capacity as it will improve the quality of communication, according to Vorobyov. Earlier, the operator reported that its subscriber capacity utilisation reached 90 percent and in some regions of Uzbekistan the figure was 99 percent at the end of 2013 which makes it difficult to work on the improvement of the quality of communication and development of the service. The State Committee for Communication, Informatization and Telecommunication Technologies of Uzbekistan confirmed that preparations are underway on the change of subscriber number format without clarification of the timing of commissioning the new format. Investment made in the development of the network in Uzbekistan amounted to $227 million in 2013 which is 65 percent more than in 2012, according to the company. The number of the operator's subscribers increased by four percent in 2013 up to 10.5 million users at the beginning of 2014. In 2006, VimpelCom completed the acquisition of Unitel from the international consortium led by the Greek Germanos SA, as well as purchased Uzbek GSM-operator Buztel, then joined their network. In March 2009, Unitel and fixed line operator Buzton ('daughter' Golden Telecom) started to provide commercial services under a single Beeline brand.

From http://en.trend.az/ 03/14/2014

TOP↑

 

Uzbekistan Increases Requirements for Internet Providers and Internet Cafes

 

A resolution of the State Committee for Communication, Information and Telecommunication Technologies has entered into force in Uzbekistan.  The requirements for Internet providers rendering Internet services in public areas are being increased.  Besides the usual hardware (computers, modems , telephones and other equipment ), the providers must install surveillance cameras in Internet cafes to ensure the safety of visitors, according to the resolution.  The regulator also imposed a ban on the location of an internet cafe in the basement or semi-basement rooms of multistory buildings.  Uzbekistan has recently strengthened control over the Internet space to combat terrorism.  Uzbekistan announced the creation of a new social network - Bamboo in February 2014.  It should unite the users in the country, according to the project authors. The new social network resembles Twitter, but it is focused on getting large information about users.  The number of internet users (without mobile Internet users) increased by 18.3 percent to 7.1 million in Uzbekistan in 2013, according to the official data.

From http://en.trend.az/ 04/01/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

AUSTRALIA: Government Urges Transparency in Citizen Data Privacy Handling

 

Crucial reforms to Australia’s Privacy Act 1988 come into action today (March 12) to better regulate the handling of personal information by Australian Government agencies and the private sector, including all private health service providers. The changes include a new harmonised set of Australian Privacy Principles - replacing the two sets of principles that applied separately to the public and private sectors previously. Moreover, the Office of the Australian Information Commissioner (OAIC) now has the power to conduct a privacy performance assessment and, in the case of serious or repeated breaches, seek civil penalties. “These are the most significant changes to privacy laws in over 25 years and affect a large section of the community. The world has changed remarkably since the late 1980s when the Privacy Act was introduced and so the changes were required to bring our laws up to date with contemporary information handling practices, including global data flows,” explained Australian Privacy Commissioner, Timothy Pilgrim.

 

The new laws require government agencies and businesses to be more transparent about how they handle personal information. Organisations have to clearly express and update their privacy policies about the way they handle personal information. A recent survey on community attitudes to privacy by OAIC revealed that 23 per cent have not dealt with a government agency because of concerns on how their personal data will be used. Pilgrim added that the OAIC’s focus in the following months “will be on working with entities to ensure that they understand the new requirements and have the systems in place to meet them”.

From http://www.futuregov.asia 03/12/2014

TOP↑

 

Australian Government Mobile Service Centres to Help Drought-Hit Farmers

 

Farmers affected by drought are encouraged to visit Mobile Service Centre ‘Desert Pea’ when it is in central west Queensland next week to test their eligibility for income support by lodging a claim, announced Senator the Hon Marise Payne, Minister for Human Services of Australia. The Ministry has two Mobile Service Centres, known as ‘Desert Pea’ and ‘Kangeroo Paw’, and they travel through rural and regional Australia to provide remote communities with government services. “Some farming families in central west Queensland have been experiencing financial hardship, but have not been eligible for income support to help with their daily living expenses,” said Payne. Both Mobile Service Centres, ‘Kangaroo Paw’ and ‘Desert Pea’ have been visiting drought- affected areas in Northern New South Wales and Queensland. I encourage farmers to visit the Mobile Service Centre, to test their eligibility and apply for the Interim Farm Household Allowance. Staff can help farmers to complete and lodge their claim form on board, and refer people to other community support organisations for further assistance.”

 

Payne said staff on board the Mobile Service Centre have extensive experience in rural servicing and understand the needs of people living in rural and regional communities. “In fact, the original Mobile Service Centres were known as the ‘drought buses’ and came into service in 2006 as a drought response measure,” Payne said. “Since 2009, the Mobile Service Centres have travelled over 300,000km to 1400 rural and regional communities across the country and helped more than 50,000 people access Centrelink, Medicare, Australian Hearing and Child Support information, payments and services.”

From http://www.futuregov.asia 04/08/2014

TOP↑

 

Australian Health Department Upgrades Online Application System for Over-the-Counter Medicine

 

The Therapeutic Goods Administration under the Australian Department of Health has upgraded its over-the-counter medicines online application system to simplify the application process for businesses. Made available online yesterday, the new system enables applicants to submit their dossier and covering letter online, instead of on paper. The Department expects to cut down application processing time with the upgraded portal. For example, an evaluation of a C2-type or low risk medicine application will fall from 105 working days to 90 working days. The team targets to complete initial evaluation of C2-type applications within 60 working days.

 

The upgraded system provides the following new features:

# built-in validation ‘rules’ that provide prompts on information that is required to be submitted with an application

# clear prompts as to the supporting documents required for each application category

# the ability to submit supporting documentation as electronic attachments directly through the system

# enhanced visibility to the applicant of the status of their application from the date of submission until finalisation.

From http://www.futuregov.asia 04/10/2014

TOP↑

 

Australia Government Launches E-Learning Programme to Support Mental Health of Veterans

 

The Australian Department of Veterans’ Affairs (DVA) have released a new Case Formulation e-learning programme to assist clinicians prioritise multiple conditions and adopt a case formulation and treatment planning approach with their clients. Launched by the the Minister for Veterans’ Affairs, Senator the Hon. Michael Ronaldson yesterday, the e-learning programme together with the other existing resources are developed to support the mental health and well-being of the new generation of Australian veterans and their families. They are available to all mental health providers, and deliver insight into the unique veteran experience and the specific mental health issues veterans face. DVA offers a range of free online training programmes to increase the knowledge and skills of mental health providers who treat serving and ex-serving personnel. “The mental health of veterans is a key priority for the Coalition Government and part of this is ensuring that mental health practitioners are able to respond to the needs of contemporary veterans,” Senator Ronaldson said.

 

“Veterans commonly present with comorbid disorders and complex needs that require careful treatment planning. Military personnel have a unique occupational experience. Addressing the mental health needs of veterans is a challenge not only for DVA, but for all governments as well as for veterans and their families. It is clear to me that early intervention is undoubtedly the surest way to minimise the risk of escalating symptoms which in the worst cases can lead to tragic loss of life. I am pleased that we have been able to partner with tertiary institutions, like the Australian Centre for Posttraumatic Mental Health, in developing these evidence-based resources. The ongoing development of new resources and professional tools means that mental health providers are much better prepared to recognise mental health problems, intervene early and provide effective treatments,” Senator Ronaldson concluded. For further information on Online Case Formulation Training Programme and other veteran mental health related education programmes, please go to the At Ease website.

From http://www.futuregov.asia 05/06/2014

TOP↑

 

ICT Skills Shortage, What Shortage?

 

Offshoring has decimated the local ICT jobs market. Australia now has a large and increasing oversupply of ICT professionals, not a skills shortage as widely touted over recent years, according to a new report. Contrary to what we have been constantly told over recent times, there’s no skills shortage in the ICT sector, with the latest indicator of supply and demand clearly showing that there’s actually an oversupply of ICT professionals in the Australian market. In fact, the latest Clarius Skills Indicator reveals that, for the March quarter, a slowdown in new IT systems investment and a sharp increase in offshoring information services to Asia have significantly swelled the oversupply of ICT professionals. According to the Clarius Group – which includes ICT recruiter Candle - there was an oversupply of 1,800 professionals in the three months to the end of March, compared to surpluses of 1,500 and 1,200 for the September and December quarters last year respectively. And, there was still an oversupply of 500 ICT managers in the March quarter, unchanged since December last year. Meeting demand for professionals in the ICT sector, however, may pose difficulties for the future. Clarius reveals that attracting students to ICT related courses remains a problem, with the recent downturn in opportunity and offshoring accelerating the situation. Despite this, Clarius says that universities are pushing hard to attract candidates.

 

On the oversupply in the market, Clarius Group CEO Kym Quick says growth in offshoring IT services accelerated during 2013, up by a “staggering 20%” over the year, but that there are signs the project and employment tide is turning. “Monthly imports of computers and similar devices were much stronger in the first two months of 2014 compared to last year signalling a step up in IT sector investment. Business and governments across the board have reduced investment in new technology and IT. Australian businesses took advantage of the high Aussie dollar which underwrote their use of foreign suppliers of ICT services. But we’re beginning to see a lift in project activity in the first half of 2014. Industry sectors showing positive signs include the transition by business and government to Cloud and mobility solutions, particularly in banking, finance, and health, digitisation and app development. There is also an increase in demand for data centres, and due to the demand for space which is expensive in all CBDs, there will be further opportunities in rural and outer suburbs.”

 

According to Quick, app development is driven by demand for smartphones, tablets, smart watches, in-car technology and in-flight technology. “Australia has always been an early and enthusiastic adopter of new technology and the markets for these devices are driving demand for skilled developers, designers and engineers.” Quick also says that Clarius has found that digitisation is starting to overtake many other projects as companies try to outpace or keep up with competition in their particular markets. On a state-by-state basis here’s the market picture for ICT professionals for the March quarter from Clarius:

 

ACT

• Candle has had a 34% in job opportunities in the March quarter for senior positions including project managers, business analysts, architects and senior developers for a variety of federal government projects

• Most demand is for contractors but this may be offsetting jobs lost by retrenched public servants

• Telco’s and other large vendors supplying government departments are ramping up projects.

 

NSW

• In NSW demand is increasing in Continuous Integration and Release Engineers in the Financial Sector, specifically in core banking and financial trading

• Infrastructure Engineers in the IT consulting space with high level design experience across Exchange and Active Directory are in demand as consultancies engage in large scale projects with various NSW Government Departments

• Skills in project management have been in high demand this quarter – a good sign that large and more complex projects are getting off the ground.

 

Queensland

• Queensland’s healthcare sector has been the most active with sought after skills being PHP developers, help desk, web designers, architects, systems testers, business systems analysts  and specific SAP skills

• While further opportunities will arise in health, management services, consulting and in cloud based expertise, the move to offshoring and outsourcing has adversely impacted the industry 

• Salaries remain flat with contractor rates reducing by about 10 per cent in 2013. Hours have reduced from 40.0 to 36.25 hours for some. Clients are looking at flexibility to reduce costs.

 

South Australia

• Most activity in South Australia is coming from state and local government and in education. Demand has slowed in the construction and SME sectors

• The contract market is improving while the permanent market remains consistent

• The market has seen an increase in business analyst work, help desk support and in the development space – both in infrastructure and programs

• Two significant IT roll outs are taking place in 2014 – deployment of the SA Health EPAS project in the Royal Adelaide and Queen Elizabeth hospitals. Both will need more contractors, largely in the development space.

 

Victoria

• The market is starting to move across a range of skills requirements with a continued increase in the demand for software developers particularly with .Net skills

• The most activity is at the top end of the market in the Telco, Healthcare, Insurance and Education (Tertiary) sectors

• Other skills categories in demand are data analysis and SQL reporting – SSRS, network engineers for VMware and Cisco, and Citrix Cloud based technologies

Victoria has seen a slight increase in higher level roles signifying some recovery.

 

Western Australia

• WA has not experienced a resurgence in ICT opportunities in 2014. While a number of oil and gas projects are proceeding, many are behind schedule

• Mining is slow, but with the Roy Hill mine and some smaller projects outside of iron ore, demand may start to grow in the latter parts of 2014

• Business is particular about who it hires in the project management space due to the diverse range of demands. There’s a large pool of professionals resetting their rates following long term mining contracts

• Demand for back-end help and service desk staff with experience remains high as is demand for SharePoint and .Net developers.

From http://www.itwire.com 05/06/2014

TOP↑

 

‘Digital Revolution’ Driving Rise in ICT Jobs Demand

 

There’s encouraging signs that Australia's ICT jobs market has been gathering pace over the past quarter, with the market for ICT skills now at its highest point for more than a year, according to a newly published report. And, ICT recruiter Peoplebank, in its latest ICT Salary Index, attributes the increasing demand for ICT professionals to digital transformation projects by both the private and public sectors. “A key force for rising demand is that public and private sector organisations are pushing ahead with digital business transformation projects - the continued shift to the Cloud, the rise of big data analytics and more - as they fall in with the digital revolution,” says Peoplebank CEO, Peter Acheson. "In fact, Peoplebank is seeing quite a buzz in the marketplace, with many organisations looking to achieve the next steps in their digital strategy before the end of the financial year." Acheson says that demand, especially in the “big 3” markets of New South Wales, the ACT and Victoria - which together represent 75% of Australia's ICT jobs market - is at least “mirroring the stronger-than-expected employment growth rates in the broader economy.”

 

"Demand is strong for Data Analysts, those with specialist skills in Business Intelligence and Cloud-based operations, as well as for Business Analysts and Project Managers focussing on turning big data into opportunities." According to the Peoplebank survey, most salaries and rates were unchanged, continuing a trend of static remuneration that has persisted for more than a year, and Acheson says that with many projects in the pipeline, businesses may need to offer rate and salary increases to attract key skills later in 2014. "Interestingly, there are also early signs of ICT hires being made by business units, rather than the organisation's ICT department. The implications of this trend include that industry professionals will increasingly need to speak the language of marketing and other disciplines to advance their careers."

 

Table - Comparative Sample of Capital City Salary Rates (for permanent roles)

Row 1 - April 2014

Row 2 - Jan 2014

Row 3 – November 2013

Row 4 - March 2013

Position

Sydney

ACT

Melbourne

Adelaide

Perth

Brisbane

Senior Business Analyst

$120,000

$120,000

$130,000

$120,000

$120,000

$115,000

$115,000

$120,000

$130,000

$130,000

$130,000

$120,000

$120,000

$120,000

$130,000

$130,000

$130,000

$130,000

$130,000

$120,000

$120,000

$120,000

$109,500

$109,000

Senior J2EE Architect

$150,000

$150,000

$150,000

$140,000

$150,000

$150,000

$150,000

$150,000

$150,000

$150,000

$150,000

$160,000

$120,000

$120,000

$120,000

$140,000

n/a

$135,000

$135,000

$128,500

$135,000

Senior Oracle Financials – Functional

$140,000

$140,000

$140,000

$140,000

$100,000

$100,000

$100,000

$100,000

$130,000

$130,000

$130,000

$130,000

$130,000

$130,000

$130,000

$130,000

$120,000

$120,000

$120,000

$120,000

$120,000

$120,000

$114,000

$120,000

Senior  SAP – Functional

$130,000

$130,000

$130,000

$130,000

$150,000

$150,000

$150,000

$150,000

$140,000

$140,000

$140,000

$130,000

$150,000

$150,000

$150,000+

$150,000+

$140,000

$140,000

$140,000

$140,000

$130,000

$130,000

$128,500

$135,000

Senior CIO/IT Director

$350,000

$350,000

$350,000

$350,000

$205,000

$205,000

$205,000

$205,000

$300,000

$300,000

$300,000

$300,000

$240,000

$250,000+

$250,000+

$250,000+

$250,000

$250,000

$250,000

$250,000

$190,000

$190,000

$190,000

$200,000

Senior IT Manager

$180,000

$180,000

$180,000

$180,000

$120,000

$120,000

$120,000

$120,000

$150,000

$150,000

$150,000

$150,000

$150,000

$150,000

$150,000

$160,000

$170,000

$170,000

$170,000

$170,000

$110,000

$110,000

$109,500

$115,000

From http://www.itwire.com 05/20/2014

TOP↑

 

Slipping Australian Education Under Threat from Reduced ICT Spending

 

Australian higher education is going through a nightmare downward spiral, with declining standards, decreased revenues and a corresponding decrease in ICT spending. What’s more the already dismal scenario is forecast to get even worse in the immediate future, according to a new report. Overall Australian education standards, revenue from Higher Education institutions and ICT-enabled spending for education have been slipping, particularly in comparison to other developed global economies and a number of key East Asian countries including China, Korea and Singapore, according to research group IDC. IDC Government Insights' research found that 35% of all Australian education institutions are operating with reduced ICT budgets in 2013, compared to 2012. This is expected to continue into 2014. According to the research, there is a great deal of focus on educational outcomes for political reasons. However, very little is publicly focused on the role that ICT has to play for critical sector-wide transformations. IDC Government Insights' surveys found that education initiations are planning to implement higher bandwidth broadband, social networking technologies, mobility, and videoconferencing that can come together to create cutting-edge educational experiences. However such initiatives have not been clearly mapped out yet.

 

The education sector, Australia's 4th largest export, needs serious transformation attention, according to IDC. The number of international students coming to Australia has sharply dropped since the peak in 2009 due to the high value of the Australian dollar, the increased cost of living in Australia, stronger competition from other countries, and disruptive sector forces from Massive Open Online Courses (MOOCs) for higher education. Notably, the international students Education Sector is Australia’s fourth largest export, following iron ore, coal, and gold. In 2012-13, education services for international students generated almost A$15 billion in export revenues. Gerald Wang, Research Manager, IDC Government Insights Asia/Pacific, explains that a climate of very high expectations relating to immediate return-on-investments, coupled with tight budgetary environments means that Australia's Education Sector is heavily stressed to deliver improved education services while being expected to do more with less. “However, chasing productivity for productivity sake is pointless without clear long-term strategic outcomes that deliver tangible socio-economic values. Smart Education Initiatives may provide not only alternative pockets of funding but also help justify a more aligned approach towards matching the business of education and critical ICT investments for continued sector relevance," Wang warns.

 

Emilie Ditton, Head, A/P Vertical Markets, IDC Australia, adds that education spending and investment, while always highly politicized, is receiving a great deal of focus in Australia in 2014 as a consequence of the downward trajectory of outcomes, particularly in the K-12 segment. “However, the conversation in Australia still has not extended to how technology in education can be part of an integrated strategy for improving those outcomes as well as driving administrative efficiencies. Declining budgets are not an excuse for not working to integrate technology solutions within traditional education strategies," says Ditton.

From http://www.itwire.com 05/20/2014

TOP↑

NEW ZEALAND: Statistics Launches 2013 Census Maps

 

The New Zealand Government unveiled today an online tool called StatsMaps, that uses data derived from the 2013 Census to visualise and help users have a deeper understanding of New Zealand, and the changes in its economy, environment and society. StatMaps features information on: the five main ethnic groups in New Zealand, proportions of people in different age/sex groups, and types of home ownership for households. The application is also accessible across various platforms allowing users to access statistical information anytime, anywhere. Furthermore, it also features a time slider function that shows changes in the information on the map over time and a Choropleth mapping option that allows users to easily see differences in variables across the region.

From http://www.futuregov.asia 02/28/2014

TOP↑

 

New Zealand Health IT System Upgrades Search for Quicker Patient Data Access

 

New Zealand now has a new IT system that allows healthcare providers to easily identify patients and their data through a unique healthcare identity number. It makes it easier to access patient data quickly while preventing errors. Anyone who uses the country’s healthcare services has a unique identity number which is stored in the National Health Index, Health Minister, Tony Ryall, said. “This new technology platform has a much more advanced search capability than our previous IT system which was twenty years old. That makes it faster to find the right patient, and reduces the risk of a patient being issued with more than one identity number,” he added. If healthcare providers are unable to find a patient on their own IT system, they can check contact and identity information on the Index. They are now able to match people with their health information more accurately, resulting in better treatment decisions for patients. Health services are also able to match patients’ addresses against New Zealand Post’s up-to-date addresses database. Feedback from the district health boards has shown that they are immunising more children because they have better patient contact details, and that more patients are turning up for appointments because letters are being sent to the right addresses.

From http://www.futuregov.asia 04/02/2014

TOP↑

 

Online Service to Identify Blocked Phones Launched

 

The New Zealand Telecommunications Forum (TCF) has launched an online service that allows mobile phone users to check whether a handset has been blocked from use on New Zealand networks before they buy. In December 2013, the TCF, along with its members Vodafone, Telecom and 2degrees, worked to develop a national mobile handset blacklisting system, which gives each network carrier the ability to block the IMEI number of a mobile device that has been reported as stolen across all three networks. According to TCF, the launch of the online IMEI checking service completes the last part of this project. Chief executive of the TCF David Stone said that introduction of the online checking tool for consumers, is an important step in reducing mobile phone theft. “Mobile handset blacklisting was introduced to help reduce mobile phone theft by blocking lost and stolen devices nationwide so that phones become virtually worthless and therefore less enticing targets for thieves.” said Stone. “Now that users can check the status of a device before they purchase it, we hope to further combat the problem of handset theft.”

 

The service is free and can be used by New Zealand based users up to three times per day. However, TCF cautions that the tool is not infallible. The IMEI check only provides details of those phones reported and blocked at the time of the inquiry, so it cannot identify a device that has not has not yet been reported as lost or stolen. Users have up to 30 days to report a lost or stolen handset. “If you’re in the market for a second hand phone ask the seller for the IMEI number, input this into the webpage and if the results show the phone has been reported lost or stolen, then stay clear. You should always use common sense though - if a deal looks too good to be true, it usually is," said Stone.

From http://www.computerworld.co.nz 04/08/2014

TOP↑

 

ICT Candidate Market Dries Up as Professionals Seek Lucrative Contracts

 

A skills shortage is being felt in New Zealand’s booming ICT industry where professionals are reverting to contracting to reap the financial rewards, according to a new market report. Candidates are holding out for well paid contract roles, rather than take permanent roles as the local software development sector breaks new international markets. The Candle Market Update released today shows the only category in oversupply of talent is project management. Troy Hammond, Country Manager for Candle NZ, said: “It’s a candidate short market where over the last couple of months, the candidate switch has ‘turned off’. “Candidates know when the market is going well and they’re making hay while the sun shines. Everyone is going out contracting again.” The Candle Market Update shows the most sought after skills in the next 12 months will be those supporting the growth of software and web based software companies: skills in C# and Java Script frontend IOS and UX, web based development and design tools.

 

With this new found local confidence, the off-shore flow of IT talent has reversed and Kiwi professionals are coming home from Australia, the US and UK. Mr Hammond said the situation was remarkably different across the ditch in Australia where there is a growing glut of IT professionals, partly due to a trend to offshore work and a failure to capitalise on local innovation. Positive business sentiment in New Zealand, along with flexible workforce structuring, should continue to give the local ICT sector an ongoing advantage, the report says. “Australia has been outsourcing offshore which has brought parts of its ICT sector to its knees, but there are other underlying structural differences that are giving kiwis the advantage,” he said. “In New Zealand our exports of computers and information services is healthy in comparison. Our exports of computer and information services grew on average by 7.3 per cent per year in the five years to 2013, reaching $A452 million. Over the same period, Australia’s exports of computer and information services grew on average by 1.5 per cent year, to $A1,768 million. Aussie ICT firms have battled with a high dollar but our businesses have faced similar issues.”

 

The report says the flexibility of New Zealand’s labour market, where the share of workers on individual contracts is higher than in Australia, is an advantage. This flexibility incentivises employers to take on new workers, and allows them to quickly adjust their labour arrangements. Australian businesses lack this flexibility. By 2019 in New Zealand, where bosses have flexibility and more incentive to hire, the unemployment rate will be 4.5 per cent, while in Australia it will be 5.5 per cent. Another advantage is the confidence of the kiwis to ‘give it a go’. It’s not just proving gold for local development shops, it’s pulling in professionals from other markets. The New Zealand ICT industry has also spawned the likes of Xero, a Wellington based cloud financial software with global customers, Auckland based Movio, an analytics and targeted market solution for movie marketers and Silverstripe, a content management software house. The reconstruction of Christchurch is rewriting its culture with the earthquake torn city now ‘buzzing’ and becoming a product development type shop steeped in innovation. “Some local developers are getting together and sharing facilities and that’s driving the typical Kiwi innovation way of ‘having a go yourself’ and driving the need for developers,” Mr Hammond said.

From http://www.ict.org.nz 05/15/2014

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/e-Security.gif

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

EUROPE: U.K. - Government Launches Cyber Security Certification for Businesses

 

The government has launched its Cyber Essentials scheme to provide "clarity to organisations on what good cyber security practice is" and to "set out the steps they need to follow to manage cyber risks". Once organisations have been independently assessed against the best practice recommendations they can apply for the "Cyber Essentials award". The government said this will demonstrate to potential customers that businesses have achieved a certain level of cyber security, and that they take it seriously. The new scheme is applicable to not only businesses, but also universities, charities and public bodies, said the government. Universities and science minister David Willetts said: "Cyber Essentials is an easy to use and cost effective way to help businesses and the public sector protect themselves against the risks of operating online.

 

"Organisations will now be able to easily demonstrate they are 'cyber safe' - reassuring their clients, boosting confidence and profitability. I encourage all organisations to adopt it." David Booth, managing director of the Information Assurance for SMEs (IASME) body, said: "We welcome this initiative, which fills an important gap in enabling organisations, particularly SMEs, to understand the most important technical aspects of cyber security protection. It fits nicely into IASME's wider governance approach to information assurance for small companies." The scheme is being funded by the government through the National Cyber Security Programme. Organisations can self-assess themselves now, and from this summer will also be able to apply to be assessed and gain formal certification, leading to the award of a Cyber Essentials badge. The scheme has been developed following consultation with the British Standards Institution (BSI), IASME, the Information Security Forum (ISF), as well as businesses and professional bodies.

From http://news.idg.no/ 04/11/2014

TOP↑

 

 

NORTH AMERICA: Canada - 10 Security Concerns for the Public Cloud - Russinovich

 

SAN FRANCISCO – It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a lot of questions around the public cloud – ones that not everyone is asking. For Mark Russinovich, technical fellow of Microsoft Corp.’s Windows Azure cloud platform group, the public cloud has helped businesses grow, but there are still many concerns for data security and privacy. He pulled together a list of 10 different concerns that security professionals should consider when putting their organizations’ data into the public cloud. “We’ve coined a name for this – ‘cloud critical’ bugs,” said Russinovich, speaking from a session at the RSA conference in San Francisco on Thursday. “The cloud is at a much higher risk of exploitation, because there’s a lot of diverse data from businesses and industries.”

 

Here’s a roundup counting down 10 concerns he has with the public cloud.

10. Shared technology vulnerabilities

For Russinovich, one of the difficulties of the public cloud is that everyone using it has shared technology vulnerabilities. If a breach of the cloud were to happen, that would look bad for every cloud vendor. “We’d be notifying people, cleaning up, and bringing things back online,” he said. “But to customers, it’d be a big public cloud fail.” For one thing, there’s no firewall attached to the public cloud, and there’s a huge variety of data in the public cloud up for grabs, if hackers were to gain access to it. Luckily, however, the public cloud is better at responding to threats, since most businesses recognize how risky it would be to fail to defend it. Businesses need to be aware they can’t wait for patches if they know about a vulnerability – instead, they need to automate software deployment, ensure they have strong detection tools for breaches, and be determined to preserve their customers’ trust.

 

9. Insufficient due diligence

There’s a lot of talk nowadays about shadow IT, where employees come up with their own IT solutions and bring them to work. One of the most popular of these is the cloud. Russinovich said he’d even like to coin a phrase for it – like the bring-your-own-device trend, or BYOD, he’d name it BYOIT – bring-your-own-IT. What IT departments need to do is to help their organizations’ employees with implementing the cloud and ensure they’re complying with security best practices, he added.

 

8. Abuse of cloud services

While having a public cloud can be helpful, businesses run the risk of attackers taking it over and using it as a malware platform, or becoming botmasters taking advantage of trusted IP addresses. The public cloud can also be used as storage for illegal content, like copyrighted content being stored through Pirate Bay, or inappropriate content like pornography, Russinovich added. And increasingly, security professionals might see people using the public cloud to mine Bitcoin.

 

7. Malicious insiders

When hiring employees who will be able to access data within the organization, there’s always the danger they may walk away with sensitive data, Russinovich said. He put up a picture of former National Security Agency contractor Edward Snowden on his presentation slide. “It’s a real risk, better understood by third-party audits,” he said. Ways to mitigate this risk include doing employee background checks, as well as security controls on what data each employee can access.

 

6. Denial of service (DOS)

Whether this happens through an attack – like a distributed denial of service (DDoS), or through an outage, customers don’t really care, Russinovich said. What they do care about is whether cloud providers are responsible. For example, in August 2011, a lightning storm brought down the clouds for Amazon and Microsoft in Dublin, Ireland. While that was an equipment failure, neither Amazon and Microsoft should have let that happen, Russinovich said. That’s why it’s important for cloud providers to mitigate the chance of DOS by ensuring non-public applications are isolated from the Internet, and by setting up location-specific clouds. That way, if one cloud goes down, another can take over, he added.

 

5. Insecure interfaces and application programming interfaces (APIs)

As the public cloud is still so new, a lot of APIs will crop up – and not all of them are particularly secure. Organizations need to ensure their APIs use strong cryptography, for example, Russinovich said.

 

4. Account hijacking and service traffic hijacking

It’s been said time and time again, but organizations need to ensure their employees’ accounts are using strong passwords. While it’s not a problem unique to the public cloud, there’s a lot of data at stake, Russinovich said. He added IT administrators need to turn off any unused endpoints, and that they need to ensure their employees are trained to avoid opening strange attachments or clicking on suspicious links.

 

3. Data loss

Whether this happens because someone accidentally deletes or modifies data so it can’t be accessed, or if an attacker steals it or uses ransomware to encrypt it until he or she is sent a sum of money, this is definitely a problem for the public cloud, Russinovich said. And of course, there’s always the chance an organization could lose data through a natural disaster – for example, a flood or hurricane destroying its servers. Russinovich says companies should mitigate this danger by setting up backups, as well as geo-redundant storage. There’s also the practice of deleted resource tombstoning – by ensuring it’s possible to recover deleted data by removing a tombstone, organizations can return data to their customers. “This is something we’ve learned through painful lessons,” Russinovich said.

 

2. Data breaches

While this appears to be a very general heading, Russinovich said it’s an important one. “Data is at the heart of the matter. The data is the company. If there’s no data, there’s no company,” he said. “It’s the most important asset, so there’s the highest risk of loss.” For example, if an attacker gains access to data’s physical media – for example, a disc holding the data – that’s a problem. A fix might be to encrypt that data and to set up extensive physical controls, like a strict rule not to allow any employees to take data out of a data centre. Or, an organization might make a rule saying any discs that are no longer used should be crushed by a disc-destroying machine. At Microsoft Azure, no data is allowed to leave the building, and the company also uses third-party certifications like FedRamp to ensure its employees are handling the data properly.

 

4. Self-awareness

In giving his presentation at the RSA conference, Russinovich asked the audience whether they could hazard a guess to his final concern on the public cloud. No one could, but he said as the public cloud grows more and more sophisticated, the data in that cloud may take over and we may stop focusing on what we need to do to secure it. “This is new technology. We’re learning as we go,” he said.

From http://www.itbusiness.ca/ 02/27/2014

TOP↑

 

Canadians Confident, Concerned About Cyber Attacks: Study

 

More needs to be done to raise Canadian exec awareness, says vendor. Leaders of Canadian organizations are more confident than American, British and Australian they can beat back targeted Internet attacks, according to a new survey. The study, paid for by BAE Systems, which sells security and data solutions for governments, carriers and the transportation industry, showed that Canadians were the most confident when asked if their company and their sector were well equipped to prevent targeted cyber attacks. The vast majority – 92 per cent — were confident in their organization’s ability to prevent targeted attacks compared to 88 per cent of respondents overall. A similar majority (90%) were confident in their sector’s ability to prevent attacks versus 78% overall.   

 

Respondents were 350 strategic and IT decision makers in the UK, US, Australia and Canada surveyed last fall. Interestingly, though, 30 per cent of Canadian organizations surveyed did not have, or were unaware of, crisis plans in the event of a cyber attack on their company. Of those respondents who did have crisis plans, Canadians were the least likely to say these plans were well publicized ( 37 per cent compared to 54 per cent) overall. And note this: Forty-eight per cent of Canadian respondents said they were unaware of any cyber threat information sharing initiatives by governments or industry bodies. That compares to 66 per cent awareness of U.S. respondents. On the other hand in follow up 54 per cent of Canadian respondents said they had recently increased their IT security spending. Seventy-seven per cent of Canadian respondents said it had gone up in the previous 12 months.

 

In a news release BAE said Canadians have a “curious combination of confidence and concern” on IT security. Canadian respondents were least likely to be confident when asked about their board of directors’ grasp of cyber threats, with a significant proportion of Canadian respondents (36 per cent) saying they did not believe that their boards fully understood the risks. Another way Canadians differed from respondents from other countries was when they were asked which groups were most likely to mount a targeted cyber attack. Canadian respondents chose hobbyist hackers (60 per cent) as the top ranking threat, compared to 46 per cent internationally.

 

By contrast, each of the other countries ranked organized groups of fraudsters as the chief threat group (55 per cent of respondents internationally), compared to 48 per cent of Canadian respondents. “The research demonstrates there is a growing attentiveness of the increasing cyber threat,” Martin Sutherland, managing director of BAE Systems Applied Intelligence, said in a statement, ”but more work needs to be done to raise awareness levels across Canadian organizations of the unique risks inherent in a coordinated cyber attack. We are now seeing a dangerous combination of organized criminal groups using highly-sophisticated cyber techniques to carry out financial crime on an industrialized scale.”

From http://www.itworldcanada.com/ 02/27/2014

TOP↑

 

Malware from Spying on Governments Now Used in Cybercrime, Sophos Says 

 

Advanced persistent threats (APTs), once the province of hackers hired to spy on foreign governments and to gather intelligence, are no longer a rarity in the world of cybercrime – cybercriminals are now using them to make money, according to new research from security solutions provider Sophos Ltd. In a blog post from Sophos Labs, security researcher Gabor Szappanos wrote that in early 2013, hackers were using exploits in Microsoft Office with DOC, XLS, and RTF files to launch targeted attacks. Typically, patches would eventually appear and the attacks would no longer be effective. But then, these attacks began spreading from the APT community and into the bigger world of cybercrime.

 

At first, Sophos researchers only observed classic APT malware families, but in March 2013, they began spotting Zeus malware in the wild. With this kind of malware, attackers use bots and zombies to steal banking credentials, like usernames, passwords, and the access codes used in the two-step authentication process when people log into their bank accounts. And there seem to be more attacks on companies that wouldn’t have been expected to be targets in the past, Szappanos wrote. He pointed to Sophos’ collection of different samples of malware, scooped up from voluntary detection reports from Sophos product users, Google’s VirusTotal malware submission program, and collections from other security organizations.

 

All told, Sophos researchers uncovered about 34,250 detection reports of malware from 4,335 “booby-trapped” documents, belonging to 86 different malware families. “A much larger user population is now being targeted and infected by the set of exploits listed above.When a small number of people end up infected by a narrowly-focused attack mounted by artisan operatives in an intelligence service, that damages our economy,” Szappanos wrote in his post. “When a large number of people end up infected by industrial-scale plunderers from the cyberunderworld, that damages our economy even more heavily. Sadly, these two sorts of digital criminality are no longer as compartmentalised as they used to be.” For organizations and consumers looking to protect themselves, they should search for an anti-virus solution that includes an HIPS detection feature, Szappanos wrote. Plus, organizations should turn on APT protection features to prevent malware from communicating with outside attackers, and they should use tools that will assess their patches to make sure they’re not missing any updates.

From http://www.itbusiness.ca/ 03/12/2014

TOP↑

 

Canada's Electronic Spy Agency Uncovers Wrongdoing, Ethics Breaches

 

OTTAWA - An investigation at Canada's secretive eavesdropping agency has uncovered misuse of public assets and "serious breaches" of the spy outfit's values and ethics code. The findings, prompted by confidential information from a whistleblower, led Communications Security Establishment Canada to revise policy, improve training and boost oversight. However, CSEC will say little more about the episode — leading opposition MPs to accuse the spy agency of needless secrecy as it comes under intense scrutiny due to widely publicized leaks by former American intelligence contractor Edward Snowden. Ottawa-based CSEC monitors foreign computer, satellite, radio and telephone traffic of people, countries, organizations and terrorist cells for information of intelligence interest to the federal government. It is a key player in the Five Eyes intelligence network that includes partner agencies from the United States, Britain, Australia and New Zealand.

 

The Canadian agency says its findings of asset misuse and ethics breaches are not related to national security information, the privacy of Canadians or the continuing construction of CSEC's elaborate new Ottawa headquarters. However, the investigation led to recommendations concerning purchasing practices, asset management, and financial controls and accountability. It resulted in changes including "more rigorous training of staff and managers" and "increased monitoring of financial authorities," CSEC says. In addition, the agency took "various measures" with regard to the employees in question. CSEC spokesman Ryan Foreman said that for privacy reasons he could not release any information about "specific employees involved in this disclosure of wrongdoing." Foreman also refused to discuss the number and type of employees implicated, whether anyone was disciplined or fired, what kind of public assets were involved or their value.

 

Nor would he say when the matter came to CSEC's attention, or when were the corrective steps were taken. "They basically tell you nothing," said Liberal public safety critic Wayne Easter. NDP defence critic Jack Harris said the response "shows an unwillingness to be up-front with the public." "It just seems to me to be a public-relations response which doesn't do much to inspire trust and confidence, frankly," Harris said in an interview. "If they're hoping to inspire public trust in their agency, it would be in their interest to provide a little bit more disclosure here so that we'd have some sense of what was going on." The federal whistleblowing law, the Public Servants Disclosure Protection Act, allows employees a confidential means of informing superiors about serious wrongdoing in the workplace. If a resulting investigation confirms improper acts, the senior official of an agency or department, such as CSEC chief John Forster, can suspend, demote or fire an employee. Other legal penalties may also apply. In addition, the senior official must "provide public access" to information about the wrongdoing and any corrective action taken, the government says. CSEC's values and ethics code — released to The Canadian Press after repeated requests — spells out detailed procedures for reporting suspected malfeasance.

 

"In this case, allegations of employee wrongdoing were reported, investigated and addressed through these established procedures," Foreman said. In addition, he noted, CSEC employees may report allegations of employee wrongdoing to Jean-Pierre Plouffe, the independent watchdog who keeps an eye on the agency. Easter, who advocates creation of a full-fledged national security committee of parliamentarians, said the finding of wrongdoing at CSEC — and the lack of public information about it — underscores the need for such a review body. "We do not have the checks and balances in place in this country that other countries do with their oversight agencies." Classified material leaked by Snowden showed that the U.S. National Security Agency, CSEC's American counterpart, had quietly obtained access to a broad sweep of emails, chat logs and other information from major Internet companies, as well as data about a huge volume of telephone calls. The revelations have sparked widespread concern among privacy and civil liberties advocates. Documents Snowden handed to journalists also indicated that Canada had helped the United States and Britain spy on participants at the London G20 summit in 2009. Other material suggested CSEC once monitored Brazil's department of mines and energy.

From http://www.thecanadianpress.com/ 03/17/2014

TOP↑

 

Majority of Cyber Attacks Coming from Legitimate Sites - Report

 

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque attacks and trying to snare people with pleas for help from Nigerian princes, many attackers are now reacting to organizations’ defenses and finding ways around them by using exploit kits or command and control servers. Using Websense’s Threat Intelligence Cloud, researchers found about 85 per cent of malicious links in web or email attacks actually came from legitimate websites that had been compromised. Hackers are also gearing their attacks towards specific populations by geographic region or political boundary, or going after people in specific groups or with particular business functions. And sometimes, they target just one person, going after him or her for that individual’s strategic value. All of this says hackers are becoming wiser about who they attack.

 

However, for this year’s report, Websense came up with a threat model called “the kill chain,” which outlines seven stages of an attack: recon, lure, redirect, exploit kit, dropper file, call home, and ultimately, data theft. The goal of the model is to help organizations understand they can defend themselves at every stage. he key is to tap into the psychology of a cybercriminal, says Charles Renert, vice-president of research and technology. “The most important aspect of defeating threats is understanding how they are made, how they are achieving the attacker’s end, and therefore how to stop them based on those motivations,” says Renert, who co-authored the report. “The kill chain views, from start to finish, not just the techniques that are used, but why they are used. And it is that understanding that future-proofs an organization against the next attack.” For example, the first stage of the kill chain is recon, where hackers look for “lures” and try to infiltrate an organization’s network to get data, with the whole campaign basically being a reconnaissance exercise. One common way to trap victims is to send a phishing lure over social media. Later, hackers may stage more campaigns to get more personal or corporate data.

 

To stop an attack at this first stage, organizations need to ensure their employees are educated and are aware that hackers may be targeting them. “The secret to fighting the later, more dangerous stages of the attack model is to catch the early warning signs that recon can reveal at the apparatus level. Paying attention to all security events and performing due diligence can expose the true intent of even the most seemingly basic events,” the researchers wrote in their report. “Recognizing that attackers will achieve some level of success at every stage, aggressively monitoring such early-stage activity can help you determine whether a multi-stage attack might be forming.” However, there are still stages where attackers are very hard to block – for example, the fourth stage focuses on exploit kits. Once users click on links to compromised websites, hackers will use exploit kits like Black Hole, Magnitude, or Neutrino to scan users’ systems and pull out data about known and zero-day vulnerabilities. Once they find a vulnerability, hackers can install malware, like key logging software, making it easier for them to pick up even more valuable data.

 

There’s also stage five, “dropper file,” where cybercriminals install command and control software to bypass traditional defenses created by security solutions providers. For example, they might evade defenses by installing use-time delays, so scanners don’t notice them until later, when they’ve already exhibited malicious behaviour. Or they might check for human interaction or clues this is a virtual environment, giving them more information about whether they’ve managed to actually get into an organization’s network. Nor do traditional security solutions providers monitor enough of their outbound communications through the Secure Socket Layer (SSL), Renert says. Instead, most of them only scan inbound communications – which isn’t enough given today’s advanced persistent threats (APTs).

 

“Security is always a move and response phenomenon. When attackers try a technique, the security industry responds with a way to defeat it, which then promotes a new technique from the attackers,” Renert says. For example, he adds the security industry used to focus on signature-based approaches to stop attackers. While that might have worked at one point, nowadays, it’s not enough to prevent APTs, he says. In fact, more than 90 per cent of the attacks Websense has detected are using other methods besides signature-based approaches. It’s not easy to defend against hackers in the fifth and sixth stages of the kill chain, but organizations need to try to intercept them every chance they get, Renert says. “At any point along the progression of an attack, it’s a moment to protect,” he says. “You need protection across all of the stages.”

From http://www.itworldcanada.com/ 04/02/2014

TOP↑

 

U.S.: Cybersecurity Gets a Boost from the National Guard

 

The National Guard has a critical role to play in coordinating cyber-resources across federal, state and local governments. A $46 billion annual business of protecting infrastructure from cyberattacks largely revolves around the federal government. But within the past year, efforts have ramped up to bring federal-level cybertools and resources to state and local governments — and the National Guard may be the vehicle for driving that collaboration. The feds have been trying to go at cybersecurity alone for years, but they’re finally coming around and including states and localities, said Heather Hogsett, director of the National Governors Association’s (NGA) homeland security and public safety committee. Last year, the NGA backed a bill called the Cyber Warrior Act of 2013, which would have directed the Department of Defense to establish “Cyber and Computer Network Incident Response” teams composed of National Guard members in each state. Although the measure failed to pass last year, it drew attention to the issue. And state-level efforts — like the National Guard’s cyberteam in Washington state — continue to expand the Guard’s cyberprotection role.

 

Congress is hearing from lower governments on the cyberissue. Last September, Michigan Gov. Rick Snyder briefed Congress on the NGA’s cybersecurity efforts, emphasizing the importance of state government’s growing role. During the event, Snyder released a paper called Act and Adjust: A Call to Action for Governors for Cybersecurity, a-six page document outlining recommendations for states that want to improve their cybersecurity. Snyder also released a piece of software, now being tested in Michigan and Maryland, that allows governors to see an overview of their state’s cybersecurity environment. “Governors are very focused on cybersecurity, and we at NGA are trying to provide them with any tools and resources available to help them better protect critical fiber infrastructure and assets that reside in their state,” Hogsett said. Bringing the nation’s governors into the world of cybersecurity would be mutually beneficial for states and the federal government, and it makes sense for the guard to fill that role, she said.

 

“The National Guard is unique in the fact that it can serve both the governors and the president. It’s the only military service that can do that,” she said. “Both the federal government and states have pretty widely put out there that there’s a shortage of trained, qualified personnel to help perform cybersecurity functions.” And the National Guard is in a perfect position to recruit skilled private-sector professionals to assist the government with cybersecurity. Concerned IT professionals wouldn’t need to join the guard, Hogsett said — they could just help during their free time because the National Guard has the ability to do that. The National Guard is trusted, well known and cost-efficient, she added. “For the cost of a single active-duty soldier, you can essentially provide two to three National Guard members,” she said. “It’s a really solid resource that we believe can and should be better leveraged.” The timeline on this isn’t five or 10 years, she said — this is more likely something that could happen in the next 12 to 18 months. Although the measure failed to pass last year, it drew attention to the issue. And state-level efforts — like the National Guard’s cyberteam in Washington state — continue to expand the Guard’s cyberprotection role.

 

Congress is hearing from lower governments on the cyberissue. Last September, Michigan Gov. Rick Snyder briefed Congress on the NGA’s cybersecurity efforts, emphasizing the importance of state government’s growing role. During the event, Snyder released a paper called Act and Adjust: A Call to Action for Governors for Cybersecurity, a-six page document outlining recommendations for states that want to improve their cybersecurity. Snyder also released a piece of software, now being tested in Michigan and Maryland, that allows governors to see an overview of their state’s cybersecurity environment. “Governors are very focused on cybersecurity, and we at NGA are trying to provide them with any tools and resources available to help them better protect critical fiber infrastructure and assets that reside in their state,” Hogsett said. Bringing the nation’s governors into the world of cybersecurity would be mutually beneficial for states and the federal government, and it makes sense for the guard to fill that role, she said.

 

“The National Guard is unique in the fact that it can serve both the governors and the president. It’s the only military service that can do that,” she said. “Both the federal government and states have pretty widely put out there that there’s a shortage of trained, qualified personnel to help perform cybersecurity functions.” And the National Guard is in a perfect position to recruit skilled private-sector professionals to assist the government with cybersecurity. Concerned IT professionals wouldn’t need to join the guard, Hogsett said — they could just help during their free time because the National Guard has the ability to do that. The National Guard is trusted, well known and cost-efficient, she added. “For the cost of a single active-duty soldier, you can essentially provide two to three National Guard members,” she said. “It’s a really solid resource that we believe can and should be better leveraged.” The timeline on this isn’t five or 10 years, she said — this is more likely something that could happen in the next 12 to 18 months.

 

In states like Washington, the guard has a head start on demonstrating its ability to coordinate cybersecurity activities and response. The National Guard adjutant general, a position currently held by Bret Daugherty, also serves as state homeland security adviser and director of emergency management, three roles that allow one individual to bridge jurisdictions and simplify command of federal resources and the Washington State Fusion Center, while leading the state’s cybersecurity team, said Kelly Hughes, director of plans and programs at the Washington Air National Guard. “If a utility gets hacked really badly, they reach out to the Department of Homeland Security, they can get teams or support to help them mitigate it and figure out what happened,” Hughes said. “Before, they would just go direct to those agencies by themselves. Now, they go through the state military department, so we coordinate those efforts.”

 

Coordinating the state’s efforts through a central authority has the advantage of increased awareness and shared resources, Hughes said. It also gives them the opportunity to work with the FBI and the state fusion center so they can reach out to other organizations that may have been affected by an attack but didn’t know it. For the last few years, the Washington National Guard has been running cyberexercises with technical help from the DHS, Hughes said, but last fall the state was scheduled to test its cyberincident response plan without input from the federal agency. “We’re going to test that plan with a group of policy folks from state, local and hopefully some local private industry as well to say, ‘If we did have [an incident], how would we respond? Bring your Rolodex. How many smart guys can we call off our own phones before we have to ask somebody else to come in and help us?’”

 

 

The National Guard is a great partner, said Washington state CIO Michael Cockrill. “Security is my No. 1 focus overall,” he said. “Generally when someone asks me what my top three foci are, I say security, security and security. And then we talk about No. 4 and 5. ... The security landscape on a global basis is changing so fast that it takes a constant effort to keep up with it, and it has to be the highest priority of the state to keep citizens’ data safe.” Using the National Guard for testing cybersecurity is great not just because it has access to federal resources and offers a more centralized command structure, Cockrill said, but it’s a cost savings to the state too. Using an outside organization for such testing would be costly and less secure. “We can keep it all in-house, and it’s going to be much more streamlined in doing this super-critical penetration testing.”

 

In Michigan, the National Guard applied for funding to begin an interstate network of cyber-range facilities that would allow for public and private industry to participate in joint exercises without needing security clearance. Existing federal projects, like the Defense Advanced Research Projects Agency’s (DARPA) $110 million National Cyber Range, are helpful, said Brig. Gen. Michael Stone of the Michigan National Guard, but only to those with top security clearance. An interstate network of cyber-range facilities would provide valuable research and analysis of cybervulnerabilities for state and local operators of critical infrastructure. “There are folks who work at the federal level, policy makers, who believe the domain of cyber falls entirely on the federal government,” Stone said. “The problem is that requires perfect resources and perfect execution by the federal government. And how perfect is federal government execution all the time?”

 

It doesn’t make sense to put federal agencies in charge of critical infrastructure such as power grids and dams, Stone said, because that’s not who’s operating them. “Eighty percent of all critical infrastructure is privately owned,” he said. “And 85 percent of all people operating networks for critical infrastructure are civilians, nonfederal government.” Not everyone favors more local control, though. Gartner Analyst Lawrence Pingree said the fed-centric model has some strengths. “I am unconvinced that the state and muni level is the right approach since the amount of spend should be more centralized and administered in a similar fashion to support efficient deployment of capital,” he said. “Also, one major problem government has is that it is often unwilling to pay the appropriate salary levels that security practitioners can demand in the private sector, significantly limiting their ability to execute or retain talent once it is developed.”

 

But Stone contends that a network of state cyber-ranges would be both valuable and economical. He said the cost for establishing each facility in the network is in the hundreds of thousands of dollars, as opposed to the millions spent by the federal government. “The dollar figure to stand up hubs is really the cost of running fiber optic to the buildings we want, which is about $50,000 a mile,” he said. “Once you’re there, it’s really the human capital cost.” The Michigan National Guard partnered on the initiative with a handful of other organizations, including the California National Guard; California Polytechnic State University, San Luis Obispo (Cal Poly); and Michigan’s Merit Network, a high-performance network linking universities, K-12 schools, government agencies and nonprofits in the state. Electricore, a nonprofit group of public and private organizations established by DARPA to develop advanced technology, applied for a U.S. Department of Energy grant on behalf of the team’s members.

 

Michigan opened a public-private cyber-range in 2012. Other participants will include Cal Poly and major universities in Michigan. Some of the first hubs will be military bases and academies in Michigan. Stone said he is also in talks with the National Guard Bureau in Little Rock, Ark., and organizations in Kansas. The idea, he said, is to cast a wide net while also creating a culture of cybersecurity awareness. “We’re going to need special guardsmen with civilian skill sets. We’re going to need recent college graduates; we’re going to need an abundance of IT experts to really be able to surge, to overcome those problems.” Michigan CIO David Behen views the cyber-range initiative as a way to strengthen his state’s cyber-readiness and spur economic development. “I believe that the Michigan cyber-range, through a public-private partnership, is the exact model we need to build a cybersecurity industry here in Michigan,” he said. “That’s what we’re really excited about. How can we draw entrepreneurs? How can we use cybersecurity in a positive way around economic development?”

From http://www.govtech.com/ 02/28/2014

TOP↑

 

 

Survey - IT Pros Not Concerned About NSA Spying

 

You may have heard that the NSA has been spying on just about everyone, everywhere without regard for whether or not they are an actual threat to national security. The allegation that RSA accepted a payment of $10 million in exchange for cooperating with the NSA led some to boycott the recent RSA Conference, or participate in the TrustyCon counter-conference that was hosted around the corner. As it turns out, though, most IT professionals don't seem all that concerned with the activities of the NSA. AppRiver conducted a survey of the attendees at the RSA Conference. AppRiver's Fred Touchette describes in a blog post   how the boycott and the apparent success of TrustyCon piqued his interest about where government hacking ranks on the overall threat landscape for IT professionals.

 

"We decided to do a face to face survey with conference attendees one on one to ask them a few simple questions about these issues compile the data and see what is on people's minds," Touchette explains. "These are people that deal with security every day, whose jobs depend on keeping networks secure, and who use threats as a practical problem not [as] theoretical or philosophical issues." The AppRiver survey only includes responses from about 110 people--out of a total attendance of about 25,000--so it doesn't qualify as a scientifically relevant sampling. Nevertheless, the results are interesting. What AppRiver discovered is that only a meager 5.3 percent of respondents ranked external threats from government hacking attempts as the top threat. Government spying, like that conducted by the NSA, ranked at the bottom of the survey results, tied with malicious insiders--authorized individuals like Edward Snowden who intentionally compromise or expose data.

 

A third of the respondents cited the insider threat without malicious intent as the top threat. In other words, random users compromising data or putting the network at risk by circumventing security controls, ignoring security policies, or just plain human error. The biggest concern by far, though, remains external hackers. More than 56 percent of the survey respondents cited evil bad guys on the outside of their network trying to infiltrate and infect their PCs as their number one security concern. Interestingly, regardless of what is considered to be the top threat, nearly three fourths of those surveyed believe that people are most frequently the weak link in the security chain that leads to network or endpoint compromise. More than 20 percent claim that faulty policies are to blame, while only 7.2 percent fault technology as the point of failure. The debate over government intelligence gathering is far from over. But, according to AppRiver's unscientific survey of IT security professionals, the ethics and legality of NSA activities is simply not part of the day-to-day concern when it comes to defending against malware and cyber attacks.

From http://news.idg.no/ 03/09/2014

TOP↑

 

RSA 2014 - Can the Government Earn Back the Public’s Trust in the Cyberfight?

 

Cybersecurity is no longer a niche subject for IT aficionados; it is a government problem, in addition to a mainstream, societal problem. Cybersecurity issues grow in pop culture prominence as breaches become more pervasive. Last year, media outlets simmered with the news that Edward Snowden leaked documents exposing the agency’s global surveillance program, and today the flames have badly burned the NSA’s reputation. The firestorm is what caused comedian Stephen Colbert to blast both the NSA and Snowden during his closing keynote at this year’s 2014 RSA Conference. Colbert, famous for hosting his political satire show The Colbert Report on Comedy Central, isn’t someone people would expect to speak before a live audience at a cybersecurity conference. A mainstream celebrity’s presence at RSA is evidence of the fact that cybersecurity is no longer a niche subject for IT aficionados.

 

Colbert’s appearance also speaks to the government link between society and information breaches. His claim to fame is the political satire and government commentary on his show, so his RSA visit underlines the fact that cybersecurity is a government problem on top of being a mainstream, societal problem. But how can the American government work with the public to enhance cyberdefense if citizens are filled with mistrust? “If you breach the trust in general in that context and then you’re saying, ‘We need to be able to guard that private user information but we have good intentions,’ the general citizenry will have a lack of trust. You’ll have a backlash,” said Jack LeGrand, Dell security specialist.

 

LeGrand’s colleague at Dell, Jackson Shaw, senior director of product management, felt that the government could take an active role in offering cyberfitness advice via public service announcements, which would improve the government’s image. “I’m sure they could come up with something catchy,” he said. “I really think that one of the things that’s missing, that the government could help with, is just educating the everyday person about email and about phishing scams, those kind of things where a lot of these threats start.” But regardless, the government, along with the private sector, will always have to play catch up with the bad guys. “I think the greatest challenge we have in the year ahead is figuring out ways to get defenses that can match up with the offensive capabilities that, as a whole, the world is struggling against,” said Paul Kocher, president and chief scientist of Cryptography Research.

From http://www.govtech.com/ 03/10/2014

TOP↑

 

Snowden - Proposed NSA Reforms Vindicate My Data Leaks

 

(Reuters) - Former security contractor Edward Snowden, addressing a sympathetic crowd at a tech-heavy event in Austin, Texas, on Monday from a secret location in Russia, said proposed reforms at the National Security Agency show that he was vindicated in leaking classified material. Snowden, who faces arrest if he steps foot on U.S. soil, spoke via a video link to a packed house at the annual South by Southwest (SXSW) gathering of tech industry experts, filmmakers and musicians. He said the U.S. government still has no idea what material he has provided to journalists. "I saw that the Constitution was violated on a massive scale," Snowden said to applause, adding that his revelations of government spying on private communications have resulted in protections that have benefited the public and global society.

 

NSA officials declined to comment on the Snowden remarks. Last year, Snowden, who had been working at a NSA facility as an employee of Booz Allen Hamilton, leaked a raft of secret documents that revealed a vast U.S. government system for monitoring phone and Internet data. The leaks deeply embarrassed the Obama administration, which in January banned U.S. eavesdropping on the leaders of friendly countries and allies and began reining in the sweeping collection of Americans' phone data in a series of limited reforms triggered by Snowden's revelations. Major companies also tightened up safeguards. But Snowden said the efforts are still not enough to protect privacy properly, calling for stepped-up encryption that would make mass government surveillance too costly to conduct.

 

"The government has gone and changed their talking points. They have changed their verbiage away from public interest to national interest," he said, adding that this poses the risk of losing control of representative democracy. He said the government's priority has been an expansive and ill-executed system of massive information collection instead of protecting the vast amounts of intellectual property that support the U.S. economy. "We've got the most to lose from being hacked," Snowden said. U.S. Representative Mike Pompeo, a Republican from Kansas, wrote to SXSW organizers, calling on them to withdraw the invitation to Snowden, who he said deceived his employer and his country.

 

"Rewarding Mr. Snowden's behavior in this way encourages the very lawlessness he exhibited," Pompeo wrote. To many in government and at the NSA, Snowden is a traitor who compromised the security of the United States. But for many at the conference he is a hero who protected privacy and civil liberties. "To me, Snowden is a patriot who believed that what he did was in the best interests of his country," said Roeland Stekelenburg, creative director at the Dutch Internet firm Infostrada. Snowden fled to Hong Kong and then to Russia, where he currently has asylum. The White House wants him returned to the United States for prosecution.

From http://www.reuters.com/ 03/10/2014

TOP↑

 

Big Data Google-style Comes Under Attack

 

The article in TIME is headlined "Google's Flu Project Shows the Failings of Big Data." However, critics says the real failing here is not with big data but with Google. The article takes issue with a project named Google Flu Trends (GFT), pioneered by the Internet search giant to produce real-time monitoring of flu cases around the world using search data the company collects. The idea was that analyzing how many people are searching for flu terms in an area can predict where there are cases of the flu. The work was lauded in a book, "Big Data: A Revolution That Will Transform How We Live, Work and Think." Google admitted at the time that not everyone who searches for flu terms would be sick, but it said it found "a close relationship" between search terms and flu cases.

 

The only problem is that it didn't. The journal Science released a reports showing some flaws in GFT. Specifically, it said that GFT's predictions of flu cases were overestimated by 50% or more in some cases compared to figures produced by the federal Centers of Disease Control (CDC). "From August 2011 to September 2013, GFT over-predicted the prevalence of the flu in 100 out 108 weeks," TIME reported. "During the peak flu season last winter, GFT would have had us believe that 11% of the U.S. had influenza, nearly double the CDC numbers of 6%." TIME goes on, "just because companies like Google can amass an astounding amount of information about the world doesn't mean they're always capable of processing that information to produce an accurate picture of what's going on--especially if turns out they're gathering the wrong information."

 

So what do big data enthusiasts think of all this? They point to the specifics of Google's approach in critiquing GFT, not big data in general. "What happened with Google wasn't a failure of big data," says Charles Caldwell, director of solutions engineering, Logi Analytics. "It is about believing that big data can be a replacement for everything else." It's not a surprise that a team of professional epidemiologists at the CDC will have better information about the flu that an Internet search company. For big data projects, it's about picking the right tools and having the right data. That didn't happen with the GFT, but Caldwell says that's a failure of the project, not of big data in general. "Big data needs to support human expertise, not replace it."

 

So is big data overhyped as being a panacea? "Absolutely," or at least the term is says Clarke Patterson, senior director of product marketing at Cloudera, which is one of the leading companies delivering Hadoop, the big data platform as a product. The fact of that matter is that there is a huge amount of new data that businesses and researchers have access to. But it's not just about having data, it's about knowing what to do with it and getting true insights out of it. "Unfortunately, this transformation is in its early stages and as a result projects are going to fail (like the Google GFT example) if we get over excited about the technology alone," he says.

 

A few bad apples shouldn't spoil the bushel, says Jim Ingle, SVP at NTT Data, which consults with companies to hone a data management strategy. Many companies, he concedes don't have the need for a big data platform. But, he says traditional data warehousing tools are also not idea. New data platforms allow for faster and easier access to data. "It is difficult to effectively predetermine how an organization will want to access and analyze its data over time," he says. "Flexibility and speed of data analysis is the future and big data technologies enable this regardless of whether you have massive amounts of data or not."

From http://news.idg.no/ 03/20/2014

TOP↑

 

Pentagon Chief Says US Cyberspace Force to Expand Further

 

US Defense Secretary Chuck Hagel said Friday the cyberspace force at US Cyber Command will grow to more than 6,000 by the year 2016. Hagel disclosed plan while addressing the retirement ceremony of General Keith Alexander, the outgoing head of US Cyber Command and of the controversial National Security Agency (NSA), at the NSA's headquarters in Fort Meade, Maryland. The cyber capabilities require dedicated professionals, Hagel said, and Alexander has been recruiting and training the cyberspace force at the Cyber Command. "In 2016, that force should number 6,000 professionals who, with the close support of National Security Agency, will be integrated with our combatant commands around the world," said Hagel. "Continuing General Alexander's work to build this cyber force will remain one of DOD's top priorities."

 

The force would expand President Barack Obama's options with "full-spectrum cyber capabilities that can complement other military assets," he added. Hagel also praised Alexander's service, especially his tenure of more than eight years at the helm of the NSA and his duties as Commander of the Cyber Command since May, 2010. "As the longest-serving director of NSA, General Alexander has led this agency through countless intelligence breakthrough and successes. He's also led NSA through one of the most challenging periods in its history, in our history." It was announced in October 2013 that General Alexander and one of his deputies, were leaving the NSA. The announcement came four months after former NSA contractor Edward Snowden's disclosure of the agency's secret surveillance programs, which have triggered huge controversy and fury at home and abroad.

From http://www.globaltimes.cn/ 03/29/2014

TOP↑

 

 

Pentagon to Triple Cyber Staff to Thwart Attacks

 

WASHINGTON (AP) -- The Pentagon plans to more than triple its cybersecurity staff in the next few years to defend against Internet attacks that threaten national security, Defense Secretary Chuck Hagel said Friday. Hagel's comments at the National Security Agency headquarters in suburban Washington come as he prepares to vist China next week, where officials are likely to challenge him amid reports of aggressive U.S. cyber spying. "The Department of Defense is on its way to building a modern cyberforce," Hagel said in a speech at the retirement of Gen. Keith Alexander as head of the U.S. Cyber Command and NSA. "This force is enhancing our ability to deter aggression in cyberspace, deny adversaries their objectives, and defend the nation from cyberattacks that threaten our national security." The Pentagon has been recruiting outside talent for the work as well as encouraging people already in the military to train for the jobs. By 2016, the Pentagon should have 6,000 cyber professionals, Hagel said. That compares to some 1,800 by the end of this year.

 

"Our nation's reliance on cyberspace outpaces our cybersecurity," Hagel said. "Our nation confronts the proliferation of destructive malware and a new reality of steady, ongoing and aggressive efforts to probe, access or disrupt public and private networks, and the industrial control systems that manage our water, and our energy and our food supplies." He said government and private businesses have a far better grasp of cyber threats than they did a few years ago, thanks in part to Alexander's work as the first commander of Cyber Command. Vice Adm. Mike Rogers, head of the Navy's Cyber Command, is awaiting Senate confirmation for a fourth star to allow him to succeed Alexander at Cyber Command. No confirmation is needed for his appointment as head of the NSA, but officials said Friday that Rogers will not step into either job until the Senate approves him as head of Cyber Command.

 

Noting President Barack Obama's announcement Thursday on reforms to the government programs that have swept up data on Americans' phone calls, Hagel said: "We will continue to engage in a more open dialogue with the American public." Obama asked Congress on Thursday to end quickly the government's bulk collection of phone records under reforms he hopes will address privacy concerns while preserving the government's ability to fight terrorism. The U.S. accuses China's army and China-based hackers of launching attacks on American industrial and military targets, often to steal secrets or intellectual property. China says it faces a major threat from hackers, and the country's military is believed to be among the biggest targets of the NSA and U.S. Cyber Command. Pending Rogers' confirmation, the current deputies of Cyber Command and the NSA, Lt. Gen. John Davis and Richard Ledgett, respectively, will be in charge.

From http://www.federalnewsradio.com/ 03/29/2014

TOP↑

 

Cyberattacks: Too Much How, Not Enough Why

 

Legislators, executive branch agencies and industry pay too much attention to the mechanics of cyberattacks and not enough to why the attacks occur, according to a report by the Intelligence and National Security Alliance. The nonprofit, public/private INSA's March publication "Strategic Cyber Intelligence" states that national security and intelligence communities need to identify the broader goals and perspective on cyberattacks to properly allocate resources and counter assaults. INSA seeks to recognize and promote standards in the national security and intelligence communities. Its members include current and former high-ranking intelligence, military and government leaders, analysts, and experts from industry and academia. Tactics dominate the discussion of cybersecurity, the reports states. The tactical focus is apparent in the Cyber Intelligence Sharing and Protection Act, which defines cyber intelligence as "information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity including information pertaining to the protection of a network or system."

 

The focus on "system" and "network" instead of an organization's intellectual property, trade secrets, sensitive operations, and other competitive and mission-oriented data misses the larger point, according to INSA. A broader strategic vision that looks for reasons why an attack is occurring and what the attackers are after can lead to better tactical, on-the-ground defenses. "Many organizations do not consider themselves to be attractive targets for a cyber incident until after the threat occurs," the paper states. INSA officials said they hope to help C-suite executives, top managers and other senior-level leaders interpret and understand the full context of cyber threats, including the bond between strategic cyber intelligence and risk management. They also want a more thorough consideration of the role of strategic cyber intelligence analysis based on the National Institute of Standards and Technology's risk assessment methods. Among other vulnerability exercises, INSA recommends "red teaming" to understand possible attackers' motives, goals and potential targets. Vulnerability assessments that follow NIST's recommendations are also essential to any risk management plan, the report states.

From http://fcw.com/ 03/31/2014

TOP↑

 

 

DHS Prepares Overhaul of Internal Security Operations

 

The Homeland Security Department late Thursday announced future plans to overhaul an organization that defends DHS’ own internal networks. A counter-hack mechanism called the intrusion defense chain, or "kill chain” -- developed by researchers at Lockheed Martin -- is expected to drive the revamp, according to DHS officials. The current DHS security operations center, or SOC, manages the department's wide area network, its data centers and agency-level local area networks. Verizon in 2008 was awarded a $678.5 million, 10-year contract to run the center. A kill chain predicts an intruder’s attack plan and breaks it down into steps that must be taken to achieve the ultimate hack -- for instance, obtaining a map of the most critical U.S. water plants from a DHS network. Operators then devise a countermeasure for each action that, if applied along any point in the chain, will thwart the criminal's plan.

 

The office of DHS Chief Information Security Officer Jeff Eisensmith is requesting SOC operation ideas, "including most notably the employment of an Intrusion Defense Chain methodology to 'align enterprise defensive capabilities to the specific processes an adversary undertakes to target that enterprise," stated a market research survey posted on Thursday night. The notice quotes a 2011 Lockheed paper. Lockheed used kill chain in 2011 to successfully thwart a sophisticated intruder who had hacked the firm’s security provider RSA, according to Dark Reading. The potential plans also ask vendors how they would measure the effectiveness of the center, if given the management job. And officials want contractors to list staffing and facilities requirements DHS should consider. DHS apparently is still trying to figure out how much authority should be delegated to the department's many agencies.

 

"What level of direct responsibility should the ESOC," or Enterprise SOC, "retain over host-based and network-based infrastructure? What responsibilities should be delegated to an IT department?” officials ask. The revamp already has begun, according to the notice. Officials are in the process of transitioning stewardship of the center from management within the Customs and Border Protection to the CISO’s office. “Once transitioned, this ESOC will serve as a baseline for creation of the new NextGen ESOC capability,” Homeland Security officials said. “For the NextGen ESOC, DHS is seeking new and significantly enhanced capabilities to effectively counter current and emerging cyber threats in a cost-effective operational environment.”

From http://www.nextgov.com/ 04/04/2014

TOP↑

 

 

Data Protection in Internet of Things Era

 

The Internet of Things brings an explosion of data, along with security and privacy concerns. We need IoT rules of the road. If the digital revolution was one of the most transformative events of our time, then the Internet of Things (IoT) is about to redirect history. Today three billion Internet users are demanding digital content anytime, anywhere, and on multiple platforms. Next year it's estimated that there will be 15 billion connected devices. By 2020 that number will reach 50 billion. These devices will include more than just smartphones and tablets. Cars, sensors, and even appliances -- nearly anything will be connected in the emerging IoT era. With a surge of new devices comes a virtual explosion of data. According to IDC, from 2005 to 2020 the digital universe will grow by a factor of 300 -- from 130 exabytes to more than 5,200 gigabytes for every man, woman, and child in 2020. Between now until 2020, the digital universe will double every two years.

 

Much of this data can benefit humanity, in a game-changing development in the evolution of information technology and the global economy. Connecting vast computer networks with everyday devices enables a multitude of applications with incredible potential. Imagine electronic medical devices that can monitor patients' health and remotely connect them with doctors to treat life-threatening conditions. Think about the practicality of smart grids for utilities to optimize renewable energy. Picture networks of sensors that can make self-driving automobiles a reality or increase the safety of schools and neighborhoods with automated monitoring. People are already benefitting from these technologies. Businesses, governments, and educational institutions use data to create new products and services, generate operational efficiencies, enhance services, and drive economic growth. But any revolutionary technology includes challenges. Consider the introduction of the motorcar, for example, and the debates it prompted about cost and safety. In the end, rules of the road resolved anxieties and liberated the car to transform our lives. Now we need some "rules of IoT."

 

It's no surprise that regulators at the US Federal Trade Commission (FTC), the European Commission, and other organizations are looking at privacy and security issues related to IoT. Concerns about how marketers, insurance companies, and government agencies use personal data and about potential criminal activity lead to serious questions that we must address as the IoT's capabilities expand. The good news is that solutions to security issues related to IoT, mobile, and cloud computing are quickly being developed, and an increasing number of security standards and requirements are being implemented in the IT ecosystem. Of course, protecting the IoT, data, and privacy is a shared responsibility. Industry collaboration -- not competition -- will accelerate broader ecosystem support by aligning current computing-industry standards with the world's most widely adopted security ecosystem. ARM and AMD, for example, are working together to advance ARM TrustZone technology, which allows consumers and businesses to secure their data and perform secure transactions with a greater level of trust and protection than current technologies.

 

Additionally, as policymakers and regulators wrestle with the privacy and security implications of IoT, we are proposing the following set of common policy principles that will mitigate security threats, while allowing IoT innovation and its benefits thrive:

Consumers should own their own data.

Data can drive economic growth and provide a multitude of societal and individual benefits.

Not all data are equally sensitive.

Consumers must have confidence in how their data are used, stored, and transported.

Technology is a significant part of the solution.

A data-handling framework that categorizes different types of data and associated management strategies is required to unlock the potential of IoT.

 

With these policies, highly sensitive data, such as health, financial, and individual communications, should be subject to more stringent privacy and security requirements than data that have been volunteered. For example, some people may want to share information on Facebook about their shopping preferences or how fast they ran marathons. They also have a right to expect that their personal addresses and credit card information will be protected when they do business online. By adhering to these principles and a data-handling framework, policymakers can develop rules that address privacy and security concerns for IoT while also ensuring that social and economic benefits are not restricted. While there is more work to be done, this new IoT-era is already providing tremendous benefits. It promises transformational change going forward for individuals and society as a whole.

From http://www.informationweek.com/ 04/14/2014

TOP↑

 

 

The U.S. Government: Paying to Undermine Internet Security, Not to Fix It

 

The United States spends more than $50 billion a year on spying and intelligence, while the folks who built OpenSSL are four core programmers, only one of whom calls it a full-time job. The Heartbleed computer security bug is many things: a catastrophic tech failure, an open invitation to criminal hackers and yet another reason to upgrade our passwords on dozens of websites. But more than anything else, Heartbleed reveals our neglect of Internet security. The United States spends more than $50 billion a year on spying and intelligence, while the folks who build important defense software — in this case a program called OpenSSL that ensures that your connection to a website is encrypted — are four core programmers, only one of whom calls it a full-time job.

 

In a typical year, the foundation that supports OpenSSL receives just $2,000 in donations. The programmers have to rely on consulting gigs to pay for their work. "There should be at least a half-dozen full-time OpenSSL team members, not just one, able to concentrate on the care and feeding of OpenSSL without having to hustle commercial work," says Steve Marquess, who raises money for the project. Is it any wonder that this Heartbleed bug slipped through the cracks? Dan Kaminsky, a security researcher who saved the Internet from a similarly fundamental flaw back in 2008, says that Heartbleed shows that it's time to get "serious about figuring out [t]hat software has become Critical Infrastructure to the global economy, and dedicating genuine resources to supporting that code." The Obama administration has said it is doing just that with its national cybersecurity initiative, which establishes guidelines for strengthening the defense of our technological infrastructure — but it does not provide funding for the implementation of those guidelines.

 

Instead, the National Security Agency, which has responsibility to protect U.S. infrastructure, has worked to weaken encryption standards. And so private websites — such as Facebook and Google, which were affected by Heartbleed — often use open-source tools such as OpenSSL, where the code is publicly available and can be verified to be free of NSA backdoors. The federal government spent at least $65 billion between 2006 and 2012 to secure its own networks, according to a February report from the Senate Homeland Security and Government Affairs Committee. And many critical parts of the private sector — such as nuclear reactors and banking — follow sector-specific cybersecurity regulations. But private industry has also failed to fund its critical tools. As cryptographer Matthew Green says, "Maybe in the midst of patching their servers, some of the big companies that use OpenSSL will think of tossing them some real no-strings-attached funding so they can keep doing their job."

 

In the meantime, the rest of us are left with the unfortunate job of changing all our passwords, which may have been stolen from websites that were using the broken encryption standard. It's unclear whether the bug was exploited by criminals or intelligence agencies. (The NSA says it didn't know about it.) It's worth noting, however, that the risk of your passwords being stolen is still lower than the risk of your passwords being hacked from a website that failed to protect them properly. Criminals have so many ways to obtain your information these days — by sending you a fake email from your bank or hacking into a retailer's unguarded database — that it's unclear how many would have gone through the trouble of exploiting this encryption flaw.

 

The problem is that if your passwords were hacked by the Heartbleed bug, the hack would leave no trace. And so, unfortunately, it's still a good idea to assume that your passwords might have been stolen. So, you need to change them. If you're like me, you have way too many passwords. So I suggest starting with the most important ones — your email passwords. Anyone who gains control of your email can click "forgot password" on your other accounts and get a new password emailed to them. As a result, email passwords are the key to the rest of your accounts. After email, I'd suggest changing banking and social media account passwords. But before you change your passwords, you need to check if the website has patched their site. You can test whether a site has been patched by typing the URL here. (Look for the green highlighted " Now Safe" result.)

 

If the site has been patched, then change your password. If the site has not been patched, wait until it has been patched before you change your password. A reminder about how to make passwords: Forget all the password advice you've been given about using symbols and not writing down your passwords. There are only two things that matter: Don't reuse passwords across websites and the longer the password, the better. I suggest using password management software, such as 1Password or LastPass, to generate the vast majority of your passwords. And for email, banking and your password to your password manager, I suggest a method of picking random words from the Dictionary called Diceware. If that seems too hard, just make your password super long — at least 30 or 40 characters long, if possible.

From http://www.govtech.com/ 04/16/2014

TOP↑

 

 

Improving IT Security by Implementing Better Governance

 

In the face of ever-increasing cybersecurity risks, significant attention is being paid to improving agencies' preparedness and response to vulnerabilities and threats throughout the public sector. Two ways to go about supporting those activities involve addressing cybersecurity from a risk-based framework and engaging top-level leadership in addressing security as a strategic priority. A third complementary imperative involves establishing an overall IT governance structure that includes cybersecurity as a key enabler to achieving programmatic outcomes. Fortunately, agencies have a number of tools at their disposal to enhance their governance framework.

 

1. OMB policy drivers for IT governance

At the end of 2008, the Office of Management and Budget reaffirmed and clarified the organizational, functional and operational governance framework required within the executive branch for managing and optimizing the effective use of IT. OMB Memorandum 09-02 established an IT governance framework that addresses the management structure, responsibilities and authorities of heads of departments and agencies and their CIOs in planning, acquiring, securing, operating and managing IT systems and assets within the department or agency. The memo requires that agencies designate an executive-level CIO who reports to the head of the organization and has formal and full responsibility for all requirements set forth in statutes, regulations and public laws. That CIO also has ultimate responsibility for the governance, management and delivery of IT mission and business programs at the agency and must have an effective operative means of meeting that responsibility.

 

Furthermore, the CIO has the authority to set agencywide IT policy, including all areas of IT governance such as enterprise architecture and standards, IT capital planning and investment management, IT asset management, IT budgeting and acquisition, IT performance management, IT risk management and IT workforce management. The authority also extends to IT security and operations and IT information security, working with the agency chief information security officer and other security officials. In August 2011, OMB issued related guidance in memo 11-29, which updated policy regarding the CIO's role in IT governance and explicitly discussed information security as part of the CIO's responsibilities. Taken together, those two OMB memos provide a strong framework for incorporating security considerations into overarching IT governance and strategy. That approach allows agency leaders to properly assess security risks in the context of risks and benefits from IT initiatives more broadly and from the programs that leverage IT and require good security to be successful.

 

2. An industry framework for implementation

One way to achieve the objectives of strong IT governance is to incorporate the COBIT 5 framework as a guide to implementing sound IT governance at the enterprise level. COBIT, which stands for Control Objectives for Information and Related Technology, serves as a business framework for the governance and management of enterprise IT and clearly defines IT governance as distinct from IT management. According to the COBIT 5 framework: "Governance ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision-making; and monitoring performance and compliance against agreed-on direction and objectives." Furthermore, "management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives." As technology use continues to increase the spread and impact of IT and cyber vulnerabilities and incidents, so do the tools and techniques to improve controls to protect key enterprise resources. The COBIT 5 framework is one of those tools. (COBIT 5 currently consists of the framework, two enabler guides, four professional guides, and COBIT 5 Online Collaborative Environment.) Moreover, COBIT 5 is one of the informative references contained in the National Institute of Standards and Technology's Cybersecurity Framework.

 

COBIT 5 is built on five basic principles and includes extensive guidance on enablers for governance and management of enterprise IT. Enterprises can use COBIT 5 framework principles to create optimal value by governing IT in a holistic manner, implementing comprehensive risk management and security controls, and ensuring that those controls are defined and implemented at a level appropriate to the increasing complexity of the enterprise. The COBIT 5 framework delivers to its stakeholders the most complete and up-to-date guidance on governance and management of enterprise IT, as depicted in the graphic below. COBIT has proved to be very effective for implementing IT governance and detailed security controls globally at all sorts of institutions and a number of federal and state government agencies, including the Department of Veterans Affairs.

 

3. Sound IT governance can make a significant difference

In light of the constant changes in the IT environment, all enterprises should look to IT governance to secure information from the moment it is created to the time it is destroyed. That is why, in the past decade, IT governance has moved to the forefront of enterprise efforts to effectively manage and appropriately protect IT systems and assets, contributing to the success of risk-based security and supporting strategic decisions made by C-level executives across the public and private sectors.

From http://fcw.com/ 05/02/2014

TOP↑

 

 

National Day of Civic Hacking Widens Reach in Second Year

 

The civic hacking celebration goes international for 2014. Last year thousands participated, hundreds of civic apps were created and myriad civic hackers collaborated with government agencies and localities across the U.S. This year, the National Day of Civic Hacking is back, and it will expand its scope internationally in 79 cities and 98 civic hacking events from May 31 to June 1. “We’re really trying to provide an avenue between government and citizens, and this is what civic hacking is really about,” said Neisan Massarrat, communications director at the Khadem Foundation, a non-profit civic collaboration group leading the event series — with support from Code for America and SecondMuse, an innovation and collaboration agency.

 

New additions for this year’s event series will include opening participation up internationally for hackathons in China, Australia, France, Spain and India, among others. Massarrat said the number of localities and events are likely to grow beyond 100 with more than 11,000 participants as more participating organizers sign up to spearhead their own hackathons and civic tech events. “This year is going to be much bigger,” Massarrat said, “We’re calling out to everyone around the country to participate, from entrepreneurs to designers to civil servants so they really engage for the weekend while connecting with neighbors to improve their communities.”

 

As with last year, government agencies and departments will be joining in, either by opening up data sets for developers to work with or by hosting hackathons -- or both. Agency backgrounds are diverse and spread across a wide array of disciplines. According the event’s official website, there are currently 14 government organizations that have volunteered as event hosts or facilitators, including the Federal Emergency Management Agency (FEMA), the National Aeronautics and Space Administration (NASA), the Department of Health and Human Services (HHS) and the White House Office of Science and Technology Policy (OSTP), among others. A contributing sponsor, the Knight Foundation, a media and civic tech philanthropy organization, supplied the event with $150,000, a donation announced May 1, to be distributed by Khadem to event organizers to facilitate events. Knight plans to hold a special challenge as well, one which pits hackers against the hurdles facing America’s changing labor force of independent freelancers, entrepreneurs and independent workers.

 

“Currently more than 20 percent of workers are self-employed, and this trend is predicted to continue in the coming years,” said Carol Coletta, Knight’s vice president for community and national initiatives. Considering the self-employed’s unique challenges, Coletta said Knight hopes the tech community can provide solutions in three specific areas. The first, matching skilled workers with jobs; the second, creating connections within the increasingly distributed and virtual workforce; and third, to aid in the development of professional and personal support networks. “For Knight’s Community and National Initiatives program, the events get the tech community — which is one of the groups most affected by the changing modes of work — talking about one of the questions that’s core to building successful cities,” she said.

 

Examples from last year’s National Day of Civic Hacking  include a project to harness the White House’s “We the People” petitions system API so developers can build apps using data from submitted petitions and signatures; a Peace Corps application to allow its volunteers and teachers to connect in real time; and a project involving the Digital Public Library of America that used its library datasets containing more than 2.4 million records to create visualizations, mapping applications and other tools to inform educators and researchers. “This is very much based around being a civic engagement event," Massarrat said, "and it’s about really understanding that the toughest challenges are not for one community alone to solve."

From http://www.govtech.com/ 05/02/2014

TOP↑

 

 

Defense Authorization Bill Boosts Cybersecurity

 

The House Armed Services Committee is moving forward on a fiscal 2015 defense authorization bill that would meet the Pentagon’s $5.1 billion request for cybersecurity operations. The Pentagon has prioritized building up the federal cyber workforce, with Defense Secretary Chuck Hagel recently calling for more than 6,000 professionals to work in support of the National Security Agency by 2016. In relatively austere times for the Pentagon, cybersecurity has been one of the few areas to see a boost in funding. The measure would “direct the secretary of Defense to establish an executive agent to coordinate and oversee cyber training and test ranges, critical to operationalizing and improving our DOD cyber forces,” according to a summary of the IT provisions included in the portion of the bill approved last week by the Subcommittee on Intelligence, Emerging Threats and Capabilities.

 

The defense authorization bill, which the full committee began debating May 7, “fully” supports the broader IT requests in President Barack Obama’s budget and tasks the Government Accountability Office with reporting on insider threats to IT systems, the summary said. GAO is also tasked with reporting on “opportunities to improve services contract processes,” as part of a larger move toward acquisition reform. The legislation also would require “assessments” of DOD’s Joint Information Environment, an effort to standardize IT operations across the department. An amendment by Rep. Tulsi Gabbard, D-Hawaii, and approved in the May 7 markup, focused on bettering “situational awareness” at U.S. Cyber Command. The amendment directs the command to coordinate with the undersecretary of Defense for acquisition, technology and logistics to submit a plan for “improving cyber situational awareness tools” to congressional defense committees by March 1, 2015. That plan should include a “common, open cyber situational awareness architecture” that includes privacy and civil liberty protections, the amendment said. The amendment singles out “net flow data, host-based monitoring, anomaly detection, audit logs and agent-based algorithms” as cyber tools for DOD to consider focusing on.

From http://fcw.com/ 05/07/2014

TOP↑

 

 

Medical Informatics World Conference Debuts New Track on Information Security and Privacy

 

Second annual conference will also explore provider-payer-pharma collaboration, coordinated patient care engagement and population health management. Cambridge Healthtech Institute (CHI) and Clinical Informatics News’ Medical Informatics World Conference today announced it will debut a new disciplinary track focused on information security and privacy. The new track, “Information Security and Privacy in Healthcare,” focuses on navigating the challenges presented by technology, remote access, HIPAA and the increased need for information sharing between patients, providers and payers. The second annual conference, a professional forum focused on the cross-industry connections and innovative solutions needed to take biomedical research and healthcare delivery to the next level, will be held at Boston’s Seaport World Trade Center April 28-29, 2014.

 

Today’s healthcare industry is undergoing a rapid evolution that creates challenges for organizations to maintain and protect personal health information (PHI). Due to the growth of electronic health records – both in number and in volume – new government regulations, and more complex technology – from smartphone access to the cloud – organizations need to focus more on how to ensure privacy and security of medical information. This has produced a growing need among organizations to ensure knowledgeable and credentialed security and privacy practitioners are in place to protect this sensitive information. “After last year’s inaugural event, many of the attendees felt that with the ever-changing regulations around PHI and the rapid advancement of technologies, a track focusing on security and privacy should be added to the conference,” said Micah Lieberman, Executive Director of Conferences for CHI and Medical Informatics World. “In addition to this new track, we will again feature our core tracks that attracted attendees to the conference last year, which will explore provider-payer-pharma collaboration, coordinated patient care engagement and population health management.”

 

In addition to the new track on information security and privacy, other tracks being featured at Medical Informatics World include:

Provider-Payer-Pharma Cross-Industry Data Collaboration: Integrating real time data analysis into the economy of the health care ecosystem

Coordinated Patient Care Engagement and Empowerment: Connected health, remote monitoring, personalized medicine and analytics to improve outcomes

Population Health Management and Quality Improvement: Using technology and analytics to predict outcomes, target high-risk populations, increase compliance and control quality

From http://finance.yahoo.com/ 04/17/2014

TOP↑

 

What Heartbleed Teaches Governments About Cybersecurity

 

“All government agencies and enterprises should run a quick inventory of all their servers and PCs, such as those that host web sites, email and chats,” said Angel Averia, President of the Philippines Computer Emergency Response Team (PhCERT). “Computers that are running with OpenSSL implemented more than two years ago and have not been upgraded since may not be as vulnerable. However, those running OpenSSL versions later than the first implementation of Heartbleed should be deemed to be vulnerable and appropriate action must be taken,” he added. The Malaysia CERT (MyCERT) has since notified relevant parties in government about the threat and released two alerts on how to mitigate the problem, Megat Muazzam Abdul Mutalib, Head of Department at MyCERT told FutureGov.

 

The most recent advisory by MyCERT explained the impact of the Heartbleed vulnerability and provided a step-by-step guide to fix it. The US Department of Homeland Security (DHS) has been working with other agencies to analyse their systems to identify where they have the Heartbleed vulnerability and implementing response without disrupting critical operations. According to a recent update by DHS National Protection and Programs Directorate, Deputy Under Secretary for Cybersecurity, Phyllis Schneck, “[We have] enabled our network defences across the Executive branch to detect someone trying to use the exploit and in many cases to block those attempts. We have begun scanning government networks for this vulnerability to ensure that we know where it exists.”

 

The Department has also issued technical alerts and mitigation steps through the National Communications and Cybersecurity Integration Centre and engaged with industry partners to discuss the threat posed by Heartbleed. DHS, through the Multi State Information Sharing and Analysis Center (MS-ISAC), reached out to State and local governments via the MS-ISAC community to address the Heartbleed issue. Gary Coverdale, Chief Information Security Officer at the California County of Napa (and a member of MS-ISAC) said, “The big takeaway is to test your sites as well all partners’ environments, remediate, and then be aggressive in changing all passwords associated with those sites”. Coverdale also suggested that State and local agencies, as a public service, should reach out to its local constituents providing education and tools to test sites - such as banking and purchasing - as well as encourage the public to change passwords to protect themselves.

 

Chong Rong Hwa, Senior Malware Researcher, FireEye said that organisations should adopt a patching strategy to prioritise fixing the servers and devices depending on its exposure risks. “Due to the severity of information exposure, system owners should also consider resetting of administrator and user passwords, reissuing of SSL certificate, conducting of security assessments, as well as auditing systems and network hygiene.” Open source software has been known for the effectiveness of finding and fixing bugs since the large community of users and developers can spot and deal with security holes. This is commonly known as the Linus’ Law: “Given enough eyeballs, all bugs are shallow”. Some have started to question the validity of this principle after the report on Heartbleed.

 

“The fact that the bug was found, and more importantly, rapidly fixed, actually proved the validity and truism of Linus’ Law,” explained Harish Pillay, Global Head for Community Architecture and Leadership, Red Hat. “Linus’ Law does not, however, state when bugs will be found, if they will ever be found or even who will fix the bugs. It is not constrained by time or person,” he continued. “One thing stands true - that the Linus’ Law has been proven repeatedly over the years. For example, a six-year-old Linux kernel critical bug that was reported in 2004, was fixed in 2010.” “What I love about the open source community and Red Hat’s role in it specifically, is that we rally together to fix issues as they come up. The tremendous amount of engineering talent in the community enables collaboration which transcends commercial interests and cuts across the entire ecosystem for the well being of the software we all love and use,” added Pillay. [He answers government’s queries on trends and misconceptions around open source in another recent article here.

 

One of the questions that came up from this incident is: whose responsibility is it to ensure the security of an organisation’s IT infrastructure and software, noted Averia of PhCERT. “It is costly for government agencies to develop and maintain a testing capability to determine if a piece of software is safe to use. The alternative is to check if the software or hardware has been tested for vulnerability and certified. Governments can also engage other organisations equipped to do the testing,” he said. “An expensive proposition perhaps, but with the growing use of technologies and increasing dependence on information systems, plus the fact that government agencies amass data about citizens, especially of those who transact with them, such investment may be well worth it,” Averia concluded.

From http://www.futuregov.asia/ 04/25/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

China Exclusive: PBOC Highlights Virtual Payment Risks

 

Security concerns forced China's central bank to suspend payments via code scanning and virtual credit cards, a People's Bank of China (PBOC) senior official told Xinhua on Monday.The PBOC would allow such online payments to be reintroduced on a trial basis once related security and technical standards were in place, said the anonymous central bank official.The online shopping boom has led to e-commerce leaders like Alibaba and Tencent scrambling to give customers a quick and convenient way to pay, such as payments by scanning a bar or QR code.Alibaba and Tencent said earlier this month that they had joined China CITIC Bank to each issue one million online credit cards, only to be called off by the central bank two days later.The central bank official attributed the suspension to concerns about multiple risks.Technological and business models concerning payments via code scanning are only in the experiment stage, and there is no uniform technological and certification standards, the official said.

 

The official said substantial risks were in the "formation mechanism and transmission process" of the codes, lack of security guarantee for the payment terminals, and a shortage of protective tools for code verification.In most countries, central banks, bank card associations and financial institutions are relatively cautious with payments via code scanning and there has been no widespread use of the payment model, he said.The official also referred to a number of cases in China resulting from virtual payments where consumers, after code scanning, found their personal information had been leaked or money stolen from their account."With so many problems unanswered, the security risks would be unimaginable if code-scanning payments were adopted by hundreds of millions of users of payment companies," he warned.Concerning virtual credit cards, the official pointed to the application process which has no strict risk control procedures or face-to-face qualification checking required by traditional banks.

 

"So, the anti-money laundering system and the real-name system for bank accounts are at risk of being damaged," he said.Virtual credit cards are not allowed for now, also because of the lack of a uniform regulation governing the issuance of virtual and real credit cards, which might lead to unfair competition, the official said.However, both virtual credit cards and code-scanning payments still have a future in China, but only after security concerns are addressed."It is suspension, not termination," the official stressed.The PBOC would work with all relevant sides including the payment firms to evaluate the two business models in terms of technological security, consumer protection, fighting money laundering and real-name system, he said."We would take security as our bottom line and support the payment companies in improving business procedures and regulations. After the security concerns get addressed, they can conduct the business on a trial basis," he added.

From http://news.xinhuanet.com/ 03/24/2014

TOP↑

 

China Military to Tighten Cyberspace Security

 

The Chinese military will increase cyberspace security after reports of U.S. cyber espionage against China, a Defense Ministry spokesman vowed on Thursday."The reports of U.S. surveillance activities targeting Chinese government departments, companies and people reflect the U.S. hypocrisy and hegemony," Geng Yansheng said at a monthly briefing on Thursday.On Saturday, The New York Times and German magazine Der Spiegel reported that the U.S. had spied on Chinese telecoms firm Huawei, citing classified documents provided to journalists by former U.S. National Security Agency (NSA) contractor Edward Snowden.Der Spiegel also reported that the NSA was targeting China's political leadership.Stressing that U.S. accusations of China's cyber espionage have been proved to be "sheer fiction," Geng said the Chinese military will take substantive and effective measures to prevent falling victim to such hacking itself.

From http://news.xinhuanet.com/ 03/27/2014

TOP↑

 

Overseas Attacks on Chinese Cyberspace Rising

 

Cyber attacks from overseas on China's Internet are on the rise, according to a report released on Friday by the country's Internet security watchdog.Backdoor threats, phishing and trojans or botnets constitute three main forms of attacks, said the National Computer Network Emergency Response Technical Team Coordination Center of China in a report covering 2013.Last year, 31,000 overseas mainframes controlled 61,000 websites on the Chinese mainland through backdoor programs. Despite an annual decrease of 4.3 percent in the number of mainframes involved, the number of affected websites was up 62.1 percent compared to the previous year.Some 15,349 websites, about a quarter of the total, were attacked by 6,215 mainframes located in the United States.Moreover, 90.2 percent of phishing websites targeting Chinese users were running on foreign servers.A total of 3,823 overseas IPs lured Chinese users to 29,966 fake websites to obtain password and other personal information, up 54.3 percent and 27.8 percent year on year respectively. U.S.-based servers hosted 12,573 fake phishing websites.In addition, 29,000 overseas servers controlled 10.9 million mainframes on the Chinese mainland via trojans or botnet. Servers originating from the United States hijacked 41.1 percent of all the mainframes, followed by those from Portugal and the Republic of Korea.The report suggested China maps out a state-level strategy and devise more regulations to enhance cyber security.

From http://news.xinhuanet.com/ 03/28/2014

TOP↑

 

China Tech Entrepreneur Lands Internet Privacy Startup in Hong Kong

 

Online information security and privacy have increased in prominence over the past year, especially since Edward Snowden’s allegations revealed a wide array of government and corporate spying around the world.Danny Levinson, an American technology entrepreneur who has successfully grown and exited Internet ventures in China over the past 20 years, is focusing on online privacy with his latest venture named Kovurt based in Hong Kong. Hong Kong is also the first outpost Snowden fled to once his spying revelations came to light.Kovurt calls itself an Internet privacy fix and is aiming at providing cheap privacy solutions for users around the world. Kovurt began a couple years ago when Levinson was creating free virtual private networks for friends’ companies in China, and he morphed it into a business recently and already claims thousands of free and paid users. The company is providing mobile apps and desktop software to aid users to maintain privacy on wireless networks so that snoopers and malware don’t harm users’ data.

 

The company is headquartered in Hong Kong’s Cyberport, where many Internet startups are based, and has staff working in Scotland, Beijing, Delhi, Moscow, and Seattle. The company has been self-funded by Levinson the past two years and reportedly is not seeking any investment in the near term. Levinson says he is focused on growing his paid customer base and investment may be necessary for jumping further hurdles in the future.Levinson’s two most recent ventures were one of China’s largest vertical business media news groups which sold to private investors who now own this website TechSecurityChina.com, and a Cloud-based social media aggregation and distribution service that incorporated email marketing and social media monitoring that was acquired by Nasdaq-listed Vocus in the United States.

From http://www.chinatechnews.com/ 03/31/2014

TOP↑

 

China Vows Joint Efforts on Securing Cyberspace

 

A Foreign Ministry spokesman vowed on Monday that China will work with the international community to build a peaceful, secure, open and cooperative cyberspace.Spokesman Hong Lei made the remarks at a regular press briefing when asked to comment on a speech by U.S. Defense Secretary Chuck Hagel on cyberspace."The United States does not seek to militarize cyberspace," said Hagel at the National Security Agency (NSA) headquarters at Fort Meade, Maryland on Friday.The Pentagon "will maintain an approach of restraint to any cyber operations outside the U.S. government networks. We are urging other nations to do the same," Hagel said.He said the United States wants to promote the qualities of the Internet that have made it a "catalyst for freedom and prosperity.""We have taken note of the U.S. statement," said Hong, adding that information and communication technologies are conducive to social and economic development as well as human well-being.It is in line with the common interests of the international society to safeguard peace in cyberspace and prevent it from becoming a new battleground, said the spokesman.China hopes the United States can turn its remarks into concrete policies and actions, he added.Next week, Hagel will begin a tour of Asia with a stop in China, which will be his first as defense secretary.His speech was seen as an effort to ease strains and shape the dialogue over cyber issues ahead of Hagel's China trip, which follows reports in The New York Times and Germany's Der Spiegel that the NSA had secretly tapped Chinese telecom giant Huawei for years.

From http://news.xinhuanet.com/ 03/31/2014

TOP↑

 

Hacking into Computers Drops as Nation Beefs Up Protection

 

Overseas cyberattacks remain a major problem in China, the nation's Internet security watchdog said on Friday, and special government departments and laws must be established to tackle the increasingly serious online attacks and boost international cooperation against hacking.Last year, 11.35 million computers in China were hacked into, a 22.5-percent drop from 2012, according to a report issued by the National Computer Network Emergency Response Technical Team and Coordination Center of China.The report said last year's figure represents the first decline in five years mostly as a direct result of the nation's efforts to eradicate online threats.But of these hacked computers, roughly 10.9 million were attacked by more than 29,000 threats originating from overseas Internet provider addresses and servers, the center said."It means overseas online attacks are still major problems for the cybersecurity of our country even if the total number of affected computers dropped," said Wang Minghua, director of administration and operation department at the center.

 

Among the IP addresses listed as threats in the report, 8,807 originated from the United States. US threats were responsible for hacking into 4.49 million computers in China, the report said.The highest number of threats came from the US, followed by South Korea and Hong Kong, it said.Approximately 31,000 overseas computers controlled 61,000 websites in China with so-called backdoor attacks last year, according to the report. Although the number of foreign cyberattacks dropped 4.3 percent from the previous year, the number of controlled websites increased by 62.1 percent, the report said."To curb these online problems, the Chinese government used numerous cybersecurity measures late last year in a move to build the nation's protections against attacks," Wang said.By the end of last year, an office of Internet security affairs was established by the Foreign Ministry to help the country tackle hacking, Wang said.President Xi Jinping also ordered a central Internet security and informatization leading group in February to deal with cybersecurity issues on the national level, Wang said.

From http://www.chinadaily.com.cn/ 04/08/2014

TOP↑

 

Alibaba Throws Money at Internet Privacy

 

Hu Xiaoming, Alibaba's vice president for small- and micro-financial group and chief risk officer, announced in Beijing that the company will invest CNY40 million to establish a security fund.The security fund will be used to fight Internet phishing, trojans, money laundering, malicious attacks, and to protect user information.The security fund will cooperate with banks, financial organizations, industry peers, and security manufacturers. Meanwhile, Alibaba's Internet payment subsidiary Alipay will enhance security investment in product design. The upcoming Alipay wallet version 8.1 has reportedly added innovative security services such as device management and short message safeguards.With the device management function, users can use their own mobile phones to check on which mobile phones they have ever used with Alipay and they can delete those records via their own mobile phones. Commenting on the new function, Hu said that most mobile payment users make payments with multiple mobile phones and this new device management service will effectively control the risk of losing personal information.

From http://www.chinatechnews.com/ 04/15/2014

TOP↑

 

Drop Cold War Mentality on China's Cyber Security

 

As China celebrates 20 years of Internet development, it is ironic that China, as the largest victim of cyber security threats, has suffered groundless accusations over hacking other countries.Twenty years after it embraced the Internet, China boasts 618 million Internet users, almost twice the population of the United States. But the country is still far from being a cyber power.China annually imports computer chips worth more than 200 billion U.S. dollars, which far exceeds the value of its crude oil imports. Its market for key technologies, including CPUs, operating systems, databases, high-end servers and telecommunications facilities, is dominated by Western giants such as Microsoft, Cisco, IBM, Intel and Apple.Disadvantages in cyberspace have exposed China's government, military and corporate networks to severe potential threats of intrusion, spying and hacking.

 

Facing threats to its cyber security or even national security, China does not have enough counter measures at its disposal. The only solution is to beef up its Internet strength by becoming more innovative and cultivating talents in the long run.All of China's operations to develop Internet capabilities and technologies adhere to domestic and international laws and deserve no mistrust or criticism from cyber powers.However, no matter how open and transparent China is on cyberspace issues and no matter how sincerely China seeks international cooperation to tackle cyber crimes, Western countries do not plan to do the same.Rather, some hold prejudice and hostility toward China's cyber development.Certain powers are even waging cyber offensives, as shown in recent revelations of electronic espionage by the United States National Security Agency, including reports that the spy service hacked into Chinese telecommunications company Huawei's network.In the wake of this news, accusing China of threatening cyber security amounts to the same hypocrisy as a thief yelling, "Stop thief!" or a bandit calling for justice.

 

It is true that cooperation and competition coexist in international cyberspace. It is equally true that some powers' pursuit of a long-term Internet monopoly cannot be a reason for them to block others' development.Cooperation should outweigh confrontation as the world faces common cyber threats.As the two largest economies, China and the United States have conducted many candid and effective dialogues. But we cannot deny that mistrust and attempts to hold China back remain ingrained in the mindset of U.S. politicians.Unless they cast away the Cold War mentality of turning cyberspace into a battleground to curb China's rise, it will be impossible to build a just international order or avoid high-risk behavior in cyberspace.With official claims that the United States "does not seek to militarize cyberspace" and "will maintain an approach of restraint to any cyber operations outside the U.S. government networks," there is the expectation that such words be translated into concrete policies and actions.If not, the Internet will never become a "catalyst for freedom and prosperity," as the United States hopes.

From http://www.news.cn/ 04/22/2014

TOP↑

 

Beijing's Public Security Bureau Forms Internet Security Alliance

 

The network security safeguard team of the Beijing Municipal Public Security Bureau and the Chinese Internet security company Qihoo 360 jointly announced they will establish a network security anti-fraud initiative.The initiative's official website at Fanzhapian.360.cn has officially started operation.Meanwhile, Ye Manqing, director of the network security safeguard team, announced that with the approval of the Beijing municipal government, they have selected April 29 as Beijing's Internet security day to educate the public and help fight Internet fraud.The newly established anti-fraud alliance will have information sharing of malicious URLs, fraud-related instant messaging, fraudulent phone numbers, and spam text messages between the bureau and Qihoo 360. The two parties will build a network fraud database to warn users and help the anti-fraud campaigns of many public security units.The next step of the alliance will expand cooperating partners to cover enterprises, institutions, and social organizations, broaden information source channels, and enhance the network fraud information database. At the same time, the official website of the anti-fraud alliance will handle reports, complaints and inquiries from individual users. They will also open a network security education channel to provide related knowledge via articles and videos.

From http://www.chinatechnews.com/ 04/23/2014

TOP↑

 

Japan, Lithuania to Share Cyberattack Info

 

Defense Minister Itsunori Onodera and his Lithuanian counterpart, Juozas Olekas, agreed Tuesday on the need to share information on cyberattacks, including destructive system intrusions and computer virus infections. During their meeting in Tokyo, Olekas told Onodera that cyberattacks are a common threat. Onodera replied that Japan and the United States are cooperating in developing measures against cyberattacks.

From http://the-japan-news.com/ 02/26/2014

TOP↑

 

Japan Holds First Broad Cybersecurity Drill, Frets Over Olympics Risks

 

Japan faced a full-on cyber attack across government departments on Tuesday in a drill aimed at bolstering national security as the country gears up to host the 2020 Olympics. Japan is following the lead of Britain, which invited ethical hackers to test its computer systems in the run up to the 2012 London Olympics. In the event, London parried multiple cyber attacks. Some 50 cyber defense specialists gathered at an emergency response center in Tokyo, with at least three times that many offsite, to defend against a simulated attack across 21 state ministries and agencies and 10 industry associations, said Ikuo Misumi, a hacking expert at Japan's state-run National Information Security Center. "It's not that we haven't put effort into cybersecurity, but we are certainly behind the U.S.," Ichita Yamamoto, the cabinet minister in charge of IT policy and who is leading the effort to boost cybersecurity, said in an interview before the drill. The exercise simulated a phishing attack, where government officials or businesses opened up their own servers to a computer virus by visiting a fake website. "Cyber attacks are becoming more subtle, sophisticated and international, and strengthening Japan's response to them has become a critical issue," the Japanese government's spokesman, Yoshihide Suga, said during the drill in Tokyo. Suga, as Chief Cabinet Secretary is in charge of Japan's cybersecurity.

 

The government forecasts Japan's first summer Olympics since 1964 will lift the economy. But officials worry it could also make Japan a target for computer hackers. Attacks by foreign and domestic hackers against the government doubled last year, Misumi said. Cyber attacks against a closed Japanese network designed to lure and measure hacking increased last year to 12.8 billion times from 7.8 billion the previous year, according to its operator, the government-affiliated National Institute of Information and Communications. In a blog published ahead of the drill, Suga said Japanese government sites were attacked twice a minute. Officials have acknowledged that even though Prime Minister Shinzo Abe has passed a strict official-secrets law, the government cannot adequately protect itself from malicious internet hackers. This is a worry for America as the two allies review their decades-old defense pact to respond to new threats, including state-backed hackers. The government has also vowed to safeguard Japan's cutting-edge technology from industrial espionage. Last week, Toshiba Corp sued SK Hynix Inc, saying a former employee passed key chip technology to the South Korean rival.

 

Japan's cyber security is shared among the National Police Agency and four ministries, including those for defense and industry. Tuesday's drill was the first time that Japan has worked together across government and business to counter the threat of hackers. The test will help break down various "silos that currently exist in Japan", said William Saito, a U.S.-born tech entrepreneur recruited to advise the government. IT minister Yamamoto this month convened the first meeting of cybersecurity officials from the ministries and police agency, joined by outside experts, to hammer out a unified approach to Japan's online security. Yamamoto said his group will begin making recommendations by the summer. They might include encouraging more students to take up computer science or developing security software in Japan to guard against hackers rather than relying on imported products.

From http://finance.yahoo.com 03/18/2014

TOP↑

 

SDF Cyberdefense to Use ‘Decoy’ Sensors

 

The Defense Ministry plans to position sensors at what it designates “monitoring bases” on the Internet, designed to defend the information network of the Self-Defense Forces from cyber-attacks, it was learned Thursday. Envisaged in the three-year project from this fiscal year is a framework under which “decoy sensors” will be installed at points away from the true core of the online information network. These sensors are to detect any signs of incoming cyber-attacks so the information network can quickly be warned of imminent danger. They will also be utilized for crisis control for the entire government. The cyberdefense unit established last month will be in charge of operating the system. The ministry plans to set up its own servers on the external network and locate sensors at these servers, aiming to lure cyber-attackers to obtain the latest information on them. Some of the functions the sensors are expected to carry out include: 1) understanding possible attacker movement, 2) detecting illicit websites, and 3) blocking distributed denial of service (DDoS) attacks, which disrupt computer functions by overloading servers with massive volumes of data.

 

The sensors are to collect e-mails with viruses attached and to trace them back to compromised computers likely to be used in DDoS attacks, allowing such malicious telecommunications to be blocked. The information will constantly be transmitted to the ministry’s information network, which will be utilized for defense purposes. Alerts about any serious threats will be sent to the entire government through the National Information Security Center at the Cabinet Secretariat. Details will also be sent to defense-related companies, including those that manufacture equipment for the SDF. The information network is vital for the smooth operation of SDF units and communication among them. Should the network functions be disrupted by cyber-attacks, the whole system may descend into chaos. Until now, the network has been protected by defenses that block intrusions with round-the-clock monitoring for possible computer virus infections. However, this system offers no protection outside of the network itself.

 

“Imagine a facility equipped with lots of security cameras on the inside, but with virtually nothing monitoring the nearby vicinity,” remarked a senior Defense ministry official. It was also confirmed that “public drinking fountain attacks” have been occurring since around summer last year, in which cyber-attackers deploy viruses to websites frequently browsed by governmental officials, such as news sites, to infect their computers. The sensors will also monitor these new types of attacks. The cyberdefense unit is an organization newly established in March in the Joint Staff Office at the ministry. Manpower is a major issue, with the unit only having a staff of about 90. At the meeting of the Japan-U.S. Security Consultative Committee held in October, attended by foreign affairs and defense ministers from both countries, Japan and the United States agreed to accelerate their cooperation in the area of cyberspace, which is called the fifth field of military operations alongside ground, sea, air and space. The Defense Ministry plans to deepen cooperation in this area, where the United States is considered to be a global leader.

From http://the-japan-news.com 04/11/2014

TOP↑

 

Recent Online Exposures Reveal Lack of Awareness of Terrorism Risk

 

With so many people streaming through every day, it is needless to say that the highest level of attention should be paid to guarding airports and train stations. Thus the recent online exposure of blueprints for terminal buildings and other facilities has raised grave concern over the security of public transportation. It has been revealed recently that floor plans and other sensitive information regarding Chubu International Airport, New Chitose Airport, JR Tokyo Station and Shin-Osaka Station were made publicly accessible online. In each case the online exposures occurred via the Google Groups online bulletin board service, provided by Google Inc. Employees of Google Japan exchanged e-mails containing the sensitive information with their clients, with the privacy setting of the mail-sharing services set to “Public” when it should have been set to “Restricted.” The incident has revealed the service provider’s inability to handle its own service correctly. We urge Google to reflect seriously on this.

 

It is likely that the series of exposures started in July 2012. The privacy settings have since been adjusted, but it’s possible that many Internet users have seen the exposed information.

With the exposed floor maps of the two airports visible, the locations of employee-only passages and the airport’s secure areas—where access is limited due to security reasons—can be determined at a glance. The exposed blueprints for Tokyo Station show the location of the operations control center—the heart of the building—and the layout of high-voltage cables. An interrogation room belonging to the Railway Police Unit was easily found on the floor plans for Shin-Osaka Station, along with other sensitive facilities. Public transportation is prone to becoming a terrorist target. If the locations of core functions of airports and stations become public, terrorists may gain an unnecessary advantage. JR and the operating companies of the airports provided the floor plans so that information for the Google Maps service could be updated, but it seems the way the floor maps were passed to Google Japan lacked caution. They should have taken meticulous care when transferring such sensitive information, such as concealing the locations of important facilities. For this reason it was proper for the Land, Infrastructure, Transport and Tourism Ministry to conduct an investigation of all domestic airports regarding how they provided floor plans to Google Japan, saying that the online exposure of such data poses grave concerns for airport security.

 

It has also been discovered that the operating company of New Chitose Airport provided floor plans to Google Japan without notifying the transport ministry, contrary to the ministry’s policy requesting airport operators to consult the ministry before making such disclosures. The transport ministry has also instructed companies to alter some parts of floor diagrams, such as secure areas, before sharing them, but the New Chitose operator failed to comply with this instruction as well. The incident may be a violation of the airport’s own rules on safety management, which include measures against terrorism and hijacking. It seems the company lacks awareness as an airport operator, whose most important role is to ensure the safety of airport users. Last summer, similar information exposures involving Google Groups took place at central government offices such as the Environment Ministry. There have been a series of cases in which personal information stored by medical institutions and schools was exposed online. There are other online bulletin board services that have functions similar to those of Google Groups. Users should check once again whether they are appropriately managing information in online services.

From http://the-japan-news.com 04/16/2014

TOP↑

 

Gov't Looks to Mobilize SDF to Defend Nuclear Plants from Cyber-Attacks

 

The government is working out rules on mobilizing Self-Defense Force (SDF) troops to defend key infrastructure, such as nuclear power plants and communications facilities, from large-scale cyber-attacks, government sources said. Officials are considering whether to authorize the SDF to send viruses to computers used for such attacks to cause the machines to malfunction. The Defense Ministry launched about a 90-member anti-cyber-attack unit at the end of March to maintain the chain of command should a cyber-attack be launched on the SDF and prevent such an attack from adversely affecting its operations. However, the team is only allowed to defend a computer network system connecting the ministry with SDF bases across the country. Since the SDF's activities rely largely on infrastructure, such as electric power grids as well as transportation and communications systems, a growing number of government officials are demanding that the SDF be empowered to defend such key infrastructure as well. It is difficult to ascertain whether cyber-attacks have been launched by hackers in Japan or by other countries.

 

Washington has repeatedly blamed Chinese forces for its involvement in cyber-attacks on U.S. government organizations. As U.S., Chinese and British forces have capabilities to launch cyber-attacks, questions have been raised within the Japanese government as to whether the SDF, which is supposed to defend Japan, should be allowed to only defend itself from cyber-attacks. In response to these opinions, the government has begun working out criteria for judging whether cyber-attacks on Japan constitute military attacks, for which Tokyo can exercise the right to self-defense permitted under the war-renouncing Constitution. Furthermore, the government is studying whether counterattacks, such as sending viruses to computers used to launch cyber-attacks on infrastructure in Japan, would overstep the boundary of self-defense permitted under the Constitution. The government had initially explored the possibility of constantly monitoring nuclear power stations and other facilities to prevent an attack. However, such surveillance has proven unrealistic because such activities could violate the constitutionally guaranteed secrecy of communication, and would require a massive number of personnel. Therefore, the government is working out criteria for responding after cyber-attacks are launched.

From http://mainichi.jp 05/09/2014

TOP↑

 

EU, Japan to Start Cyber-Security Dialogue

 

The European Union will discuss Internet security during talks this week in Brussels with Japanese Prime Minister Shinzo Abe, a senior EU official said Monday. Speaking ahead of Abe's arrival on Tuesday, the official said a Strategic Partnership Agreement (SPA) being negotiated with Japan would now include closer cooperation on cyber-security. "We are encouraged by the deepening cooperation (with Japan) in the security sphere through the launch of new dialogue on cyber issues," the official said. Japanese media reports say Abe and EUnion leaders are expected to agree the issue at a summit Wednesday, with a draft joint statement calling for the "protection of a safe, open and secure cyber-space." Cyber-attacks occur when the computer information systems of individuals, organisations or infrastructure are targeted, whether by criminals, terrorists or even states with an interest in disrupting computer networks. The EU says there has been an increase in cyber-crime and that attacks go beyond national borders, making international cooperation a vital part of cyber-security. Abe arrives in Brussels on the last leg of a nine-day tour of six EU countries. The SPA negotiations were launched in early 2013 and an agreement would cover more than 30 policy areas, ranging from political to scientific and cultural cooperation.

From https://au.news.yahoo.com 05/05/2014

TOP↑

 

Fujitsu Cuts Response Time to Cyberattacks by 97%

 

Fujitsu has announced the availability of Japan’s first software to automate detection of cyberattacks and response. The software, FUJITSU Software Systemwalker Security Control, dramatically shortens the initial response time after malware has been detected to prevent damage from spreading.  Also being offered is FUJITSU Security Solution Information Security Enhancement Support Consulting, which are services designed to improve the security of control systems. Both are part of the FUJITSU Security Initiative, a systematized suite of products and services that support safe and secure ICT for customers and society, with FUJITSU Software Systemwalker Security Control planned to be rolled out to other markets outside of Japan later in fiscal 2014.  Systemwalker Security Control automates what has previously been a manual process of responding to cyber attacks, dramatically shortening the response time and limiting the extent of the attack. In Fujitsu’s own experience, this product has cut initial response times by roughly 97%.

 

There are two services being offered as a part of Information Security Enhancement Support Consulting. One is the identification of security risks, and the other is training services for establishing security policies. Both are aimed at strengthening the security of control systems.

As ICT is used more widely, companies are being challenged to respond to increasingly sophisticated and damaging cyber attacks. These responses require both preventing intrusion in the first place and reacting quickly and effectively to those intrusions that succeed, as that will largely determine the extent of privacy breaches and attendant problems. In the past, measures taken after malware had been detected included determining the risk level of the attack, identifying the vulnerable terminal and requesting the responder to take action.  Fujitsu said it was necessary to have a process that used automation to respond swiftly and appropriately. Moreover, automating a response process would also enable action to be taken with limited resources. Cyberattacks do not stop at information systems; their scope has expanded to the control systems essential to infrastructure and that are used at manufacturing facilities. Given the deep concern that control systems infected by malware will cause machinery or entire systems to stop work or break down, Fujitsu said it recognized the need to strengthen the security management of these systems.

From http://www.japantoday.com 05/12/2014

TOP↑

 

Japanese-Israel Defense Accords Cover Cyber Security Cooperation Against China, North Korea and Iran

 

Japanese-Israel military intelligence collaboration in cyber security was at the center of bilateral defense agreements reached in Tokyo Monday, May 12, between Prime Minister Shinzo Abe and visiting Prime Minister Binyamin Netanyahu, debkafile’s military and intelligence sources report. The two leaders agreed to join forces against China’s cyber war capabilities, some of which Beijing has transferred to Iran’s Revolutionary Guards and the North Korean armed forces. Netanyahu and Abe agreed that Israeli cyber specialists would visit Japan to help set up cyber security programs for combating potential attacks on military infrastructure, strategic utilities and companies. Officers of Japan’s Self-Defense forces would also visit Israel to attend Israel Defense Forces courses on this subject. At a meeting with Japanese politicians Monday, Netanyahu remarked: “You face North Korea, which is a rogue regime with nuclear weapons. We face the same possibility from Iran, which is a rogue regime that wants to have nuclear weapons. They're cooperating between them, and we should cooperate between us.” Speaking at a joint news conference after their meeting, the two prime ministers "expressed their strong hope for the early resolution of various issues of concerns regarding North Korea, including its nuclear development," Netanyahu added that Abe had told him in no uncertain terms that “Japan was facing a very real threat from North Korea,” which is believed to be preparing for a fourth nuclear test. “The same words - 'clear and present danger' - certainly apply to the Iranian nuclear program as well," the Israel prime minister said.

 

debkafile adds: This was the first time the Israeli prime minister had openly mentioned a prospective Iranian nuclear test like those carried out by North Korea. "Like North Korea before it, Iran wants to keep its military capabilities, military nuclear capabilities while easing the sanctions that are applied to it,” Netanyahu said. "We cannot let the ayatollahs win." Tuesday, May 13, Iran and the five permanent members of the UN Security Council plus Germany are scheduled to meet in Vienna and begin drafting the text of a comprehensive and nuclear deal, which Israel has challenged for failing to dismantle Iran’s nuclear military capacity. Sunday, on his first day in Tokyo, Japan’s Kyodo news agency, citing an unidentified government source, reported that Netanyahu is also set to hold talks with Abe on bilateral cooperation in dealing with cyber attacks. This kind of comment is rarely heard from Japanese officials who tend to be tight-lipped on the highly sensitive military issue. However, the Israeli prime minister’s visit to Tokyo coincided with Abe’s push for Japan's highly competent military to take a more active role in world affairs, and expand the scope of is activities beyond the limitations placed by its constitution since World War II.

From http://www.debka.com 05/12/2014

TOP↑

 

Ruling Parties to Establish Cybersecurity Headquarters

 

The ruling parties plan to submit a bill aimed at establishing a government cybersecurity headquarters and obliges ministries and agencies to provide information about cyber-attacks they are subjected to, The Yomiuri Shimbun has learned. The bill, which the Liberal Democratic Party and New Komeito plan to submit at the current Diet session, would be the first basic law on cyberdefense stipulating the government’s duties on cyberdefense. According to the bill, the headquarters will be headed by the chief cabinet secretary. The aim of the bill is to reinforce the nation’s defenses against cyber-attacks ahead of the 2020 Tokyo Olympics and Paralympics, according to sources. Currently, there are two government organizations in charge of measures against cyberattacks: the Information Security Policy Council, which is chaired by Chief Cabinet Secretary Yoshihide Suga, and the National Information Security Center, which is the council’s secretariat. As the council is set up by the prime minister with no laws concerning its establishment, the council is not authorized to carry out investigations at ministries and agencies nor to issue recommendations to them. Therefore, some experts argue that the current system is inadequate for detecting problems or developing preventive measures against cyberattacks on government offices, as the council has no mandate if a ministry is reluctant to reveal damage in such cases.

From http://the-japan-news.com 05/15/2014

TOP↑

 

Japan Govt Prepares to Deal with Issue of Cybersecurity

 

In line with Japan’s move to counter cyber crime, the government is preparing to establish a policy forum next year that would be in charge of creating much-needed laws. Japan has been exerting more efforts to prevent attacks on cyber security amid increasing number of online criminal activities all over the world. While the idea of beefing up cyber security measures has been given priority the past month in the run-up to the 2020 Summer Olympics in Tokyo, it has been an ongoing concern even before this year began. A government panel established for the sole purpose of addressing cybersecurity is seriously considering upgrading it into a policy forum to better come up with laws that would be essential in preventing and criminalizing the act. Speaking to the panel which included Defense Minister Itsunori Onodera, Japanese Prime Minister Shinzo Abe said, “Ensuring cybersecurity is an extremely important challenge in terms of national security and crisis management.” The projected policy forum will collaborate with other government departments including the National Security Council to come up with concrete measure in addressing the issue. Abe vowed to continue talks on the matter. “We will tackle the issue more aggressively,” he said. The recommended policy forum hopes to extend its relationship with private sectors in Japan and authorities from other countries to better formulate a policy. The ruling Liberal Democratic Party is already working on a draft bill proposal that would envisage the panel to a policy forum. It plans to submit the bill in the next Diet session.

From http://japandailypress.com 05/20/2014

TOP↑

 

SOUTH KOREA: Telecom Ministry to Crack Down on Pirate Phones

 

South Korea's telecom ministry said Wednesday it will seek a law revision to slap fines of up to 100 million won (US$96,311) on those using mobile phones under borrowed names, a practice used widely in crimes and illegal activities to evade investigation. The Ministry of Science, ICT and Future Planning said it hopes to establish legal grounds by June to punish any activities related to using or inducing, advertising, and mediating the use of such "pirate" phones, with possible penalties also including a prison term of up to three years.

From http://english.yonhapnews.co.kr 04/23/2014

TOP↑

 

S. Korea, U.S. Agree to Expand Joint R&D into Cyber Security, Disaster Management

 

South Korea and the United States agreed to jointly develop new technologies for cyber security and explore the possibility of a research and development program for an IT-based crisis management system, the South Korean government said Wednesday. The agreement came at the eighth Korea-U.S. Science and Technology Joint Committee meeting in Washington this week. The two-day meeting, the first of its kind since 2010, ended Tuesday (Washington time), according to the Ministry of Science, ICT and Future Planning.

From http://english.yonhapnews.co.kr 05/21/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

SINGAPORE: Government Tightened Mobile Prepaid SIM Cards Regulation to Prevent Criminal Use

 

As part of Singapore government’s ongoing security review, the Ministry of Home Affairs (MHA) and Infocomm Development Authority of Singapore (IDA) has reduced the maximum number of prepaid SIM cards per subscriber from 10 to three. Criminals continue to exploit prepaid SIM cards as an anonymous channel of communications for their illicit activities. This revised limit will reduce the security risks associated with the anonymous use of prepaid SIM cards. Fraudulently registered prepaid cards have been used to perpetuate criminal activities including unlicensed moneylending, cheating scams, vice-related and gambling-related activities. For example, unlicensed moneylending syndicates have been found to make use of prepaid SIM cards for communications with debtors and among syndicate members in support of their illegal activities. This revised limit makes it more onerous for errant dealers to sell prepaid SIM cards that could potentially be used for such illegal activities. From 1 April 2014, a subscriber can only register up to a maximum of three prepaid SIM cards in total, regardless of whether they are purchased from one or more mobile service providers. In determining this new limit, MHA and IDA have consulted the mobile service providers and taken into consideration the prevailing prepaid SIM card ownership patterns among consumers. The majority of prepaid SIM card subscribers today hold three or fewer prepaid SIM cards. The new limit will only be applied to new prepaid SIM card registrations. Existing subscribers can continue to use their prepaid SIM cards. However, they will not be allowed to register additional prepaid SIM cards. In addition to the above changes, Singaporeans will now be allowed to use their passports to register for prepaid SIM cards, in addition to NRICs.

From http://www.futuregov.asia/ 04/02/2014

TOP↑

 

Singapore Government to Get Cyber Security Lab by NEC and Sypris

 

NEC Asia Pacific, an infocomm technology provider, and Sypris Electronics, a provider of high-end global cybersecurity solutions, will jointly develop a Cyber Security Laboratory for the Singapore Government. It was announced today the their team was awarded this multi-year contract by the Ministry of Home Affairs. The lab will include a simulation-based training and modeling platform that will provide a safe, realistic hands-on environment for the participants to hone their skills in countering cyber attacks. Toshiya Matsuki, Chief Executive Officer, NEC Asia Pacific, said that the technologies deployed will address the cyber security needs of the Singapore Government to prevent and mitigate against potential attacks. “With the increasingly complex and sophisticated attacks from cyber criminals, an organisation faces a multitude of cyber security risks to its IT system, ranging from web defacement and malware infections to network and operation system attacks,” he warned.

From http://www.futuregov.asia/ 04/02/2014

TOP↑

 

Singapore Government Focuses on Big Data, Open Data, Cloud & Security

 

Technology will continue to revolutionise the way governments operate. The Singapore government will be leveraging the opportunities provided by Big Data, sensors, cloud and open data to improve productivity and citizen services, while ensuring information security, said Zaqy Mohamad, Member of Parliament & Chairman for the Government Parliamentary Committee, Ministry of Communications and Information (MCI), Singapore. Speaking to over 240 public sector leaders at the 11th annual FutureGov Forum Singapore, Mohamad emphasised the growing importance of ICT in Singapore’s journey of becoming an intelligent city. Singapore has come up top in many of the international e-government rankings and the Government is not resting on its laurels. “In order to prepare for the next 10 years, Infocomm Development Authority of Singapore and MCI are now embarking on the Infocomm Media Masterplan 2025 Consultation to crowdsource ideas that can benefit citizens and businesses, as well as make Singapore a Smart Nation,” he said. The Government is seeking to provide consistent, high quality and seamless broadband experience for residents by improving pervasiveness and connectivity. “There should be seamless data access over different wireless networks with HetNet so users do not have to constantly log in or change their network.”

 

Above-Ground (A-G) Boxes will also be rolled out to improve city management and services. These boxes have sensors for better monitoring and enable intelligent services, such as traffic monitoring cameras, environmental sensors, pedestrian crossing monitors, speeding monitors, traffic light control system, junction crowdedness, street lighting control systems and more. Big Data analytics is another area of focus for Singapore. “By harnessing the value of data, we can transform our e-service delivery. Data is a powerful tool to better the lives of citizens, enhance policy decision making, and provide feedback for better programmes by understanding trends,” said Mohamad. He cited the example of the recent Apps4SG competition organised by IDA, Singapore Land Authority and Ministry of Finance. It received over 80 applications from participants from all walks of life, who are keen to use government data sets to create innovative apps. This will not be possible without open data. Singapore’s Data.gov.sg portal has published 8800 data sets from some 60 government ministries and agencies. “The data sets are now available so businesses and individuals can uncover opportunities to provide services to the people,” he continued. Cloud technology can support the growth of data as it provides a cost-effective means of applying and storing data, particularly for small- and medium-sized enterprises (SMEs). These companies can benefit from leading technologies without hefty IT investment.

 

The Singapore government has invested in G-Cloud, a whole-of-government hosted infrastructure that provides agencies with services such as hosting of web sites, e-services, storage, database, middleware, analytics and content management services. As the ICT component grows in the operation of the government, cyber security has become increasingly important, Mohamad added. A number of cyber attacks on government web sites last year have revealed the need to be more vigilant.

 

Finally, while technology provides ample opportunity to improve government administration and services, it can also benefit the industry. “This year, the Singapore government has set aside S$500 million to help businesses, particularly SMEs, to adopt technology to improve productivity. Part of this fund will be used to subsidise up to 70 per cent of ICT products and services costs,” he said. The Singapore government is continuing to deploy and facilitate the use of the Next Generation Nationwide Broadband Network among the industry. There will be support for SMEs to implement Wireless@SG, subsidies for SMEs to subscribe to fibre broadband, and up to 80 per cent subsidies for building owners for cost of new in-building infrastructure. “Productivity, transformation, innovation and collaboration are major themes in the restructuring efforts of the Singapore government and I believe that technology will continue to play a major role in helping the government be more productive and provide better services for citizens and businesses,” Mohamad concluded.

From http://www.futuregov.asia/ 04/22/2014

TOP↑

 

VIETNAM: Government and Microsoft Sign Cybersecurity Deals

 

Vietnam’s Ministry of Information and Communications (MIC) has given cybersecurity a high priority for 2014. Acting on this, MIC and the Vietnam Computer Emergency Response Team (VNCERT) have inked two deals with Microsoft to combat cybercrime. Director of VNCERT, Vu Quoc Khanh, highlighted that the Memorandum of Understanding (MoU) is a promise to bring positive change to information security in Vietnam by addressing large-scale issues such as business espionage and access to government information. VNCERT will work with Microsoft to coordinate computer emergency assistance and inspect security breaches as the country witnesses a rise in cybercrime. The agency rates 78 out of 100 websites on the gov.vn domain to have “seriously” poor security systems. Apart from cybersecurity, MIC’s agreement with Microsoft covers IT infrastructure, cloud apps development and education. Microsoft will also support training of local IT workforce.

From http://www.futuregov.asia/ 03/10/2014

TOP↑

 

VN Faces High Risk of Cyber Attacks

 

Viet Nam ranks 12th in the list of countries facing the maximum cyber attacks, according to the Internet Security Threat report (ISTR19) released by the Symantec Corporation last week. Director for Systems Engineering, Asia South Region, Symantec, Raymond Goh said that Viet Nam had jumped nine spots because of the rapidly increasing number of mobile internet subscribers and users who lack good cyber security skills. The report showed that a series of attacks in 2013 caused the greatest loss in history. The total number of leaked documents in the world increased by 62 per cent compared with 2012, resulting in the identities of 552 million users being revealed. Hacking attacks rose 91 per cent, with assistants and people working in public relations being targeted more because cyber criminals were targeting celebrities or business leaders. According to Goh, the level of attacks has increased, with hackers continuously innovating and improving their methods to avoid IT surveillance and defence. Goh recommended that enterprises should protect their information data, instead of their equipment or data centers. He also said that firms should strengthen their safety infrastructure solutions to prevent loss of data. Goh added that users should look for strong passwords by using password management software, and also keep an eye on their bank accounts to detect unusual transactions.

From http://vietnamnews.vn/ 05/12/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

INDIA: Cyber Criminals Using Malware That Act as Sleeper Cells

 

NEW DELHI: As enterprises are increasingly adopting technologies like cloud and mobility, they are also facing more security challenges with cyber criminals using malware that are dormant while entering a secure network and then becoming active, networking solutions giant Cisco said. With companies increasingly adopting concepts like BYOD (bring your own device) and cloud services, they face more security challenges and complexities. Besides, 'Internet of Everything' (IoE) that connects all devices and grids, also opens them to heightened security threats. "In a world that is rapidly moving towards connecting everything, the security risks are also increasing. Now there are dormant cells, which could suddenly get active and how would you then seek protection," Cisco Worldwide Director (Security) Jawahar Sivasankaran told. The basic action that can be taken when there is a suspected intrusion is to pull the plug and shut down the system, he added. Cisco is working on a solution called 'Before, During and After' to check such dormant cells. Organizations are putting a lot of focus on the 'before' part with strategies like security walls. Cisco continues to invest in innovative technologies in the 'before' area, Sivasankaran said.

 

"There is a critical need to protect the customers in the 'during and after' phase as well. In our 'Before, During and After' strategy we have focus on visibility driven, threat focus and platform based intrusions," he added. The focus is continuous security and retrospective analysis. This is what the company is doing through its 'Fire amp Advanced Malware Security' solution, he said. Mobile security today has become mainstream and people expect more from their IT and security programmes.

From http://www.siliconindia.com/ 03/23/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

AZERBAIJAN: Preparing for Major Protection of Aznet Network

 

A Computer Emergency Response Team (CERT), functioning under the State Agency for Special Communications and Information Security of the Azerbaijani Special State Protection Service is preparing for a large scale project for the protection of the Azerbaijani segment of the Internet from attacks and hackers, CERT told Trend on Feb. 25. The necessary hardware and software are planned to be bought and installed as part of the scheduled work. The project will be implemented by late 2014, CERT said. The project envisages the filtering of incoming Internet traffic to protect the AzNET network. The main task is to ensure the information security of not only state agencies but also consumers. A new technology will detect malicious threats and protect against frequent DDoS- attacks. CERT uses the most advanced technology solutions, including special software products developed by its own programmers to combat the adverse effects of the Internet. The vast majority of attacks occur during important events in Azerbaijan. It can be both holidays and days of mourning, CERT said earlier.

From http://en.trend.az/ 02/28/2014

TOP↑

Users of Azerbaijani State-Owned ISP Suffer Hacker Attack

 

Users of AztelekomNet, an Azerbaijani state-owned internet service provider (ISP), faced problems in accessing the internet due to hackers' activities, Aztelekom Production Association (PA) told Trend on March 6. Aztelekom PA said the problem's cause was in TP-LINK modems, which have vulnerability, allowing hackers to gain unauthorized access to user devices and restrict access to the internet. To resolve this problem, AztelekomNet posted a video tutorial on its website on setting up ADSL-modems.

From http://en.trend.az/ 03/06/2014

TOP↑

 

Security of Websites Satisfactory in Azerbaijan

 

Information security of the Internet resources in the Azerbaijani segment of the Internet is at a satisfactory level, E-security Center under the Azerbaijan Ministry of Communications and High Technologies told Trend. E-security Center noted that while nearly 500 websites including those of government agencies faced hacker attacks last year, the functions of most resources have been fully restored. "Taking into account the fact that one website is hacked every three minutes in the world, then the situation in Azerbaijan can be considered satisfactory. Taking into account last year's figures, the daily number of websites breakups in the AzNET segment equals one or two," the center said. At present, E-security Center started to provide services to audit Internet resources. Two types of audit services (passive and active) are offered to website owners. Passive audit provides a cursory analysis for identification of emptiness of Internet resources, and prepares a detailed report on the presence of vulnerabilities and gaps. Active audit is conducted at a higher level, and the process involves high profile experts, and the audit lasts approximately for a month. During this period the website undergoes thorough verification, and all identified vulnerability is assessed in terms of its criticality. "All the resources of the structural units of the Ministry of Communications and High- Technologies of Azerbaijan were audited, and the obtained results were presented to the E-security center. Certainly, the obtained results can not be publicized and can provide only a brief example that information security of TASIM resource is at the highest level," the center said. The decree on the ensuring activities of Centre of Electronic Safety under the Ministry of Communications and information technologies of the Azerbaijan was signed on March 5, 2013.  The decree also approved the regulation of the center. The state body ensuring coordination of activities of subjects of information infrastructure in the field of cybersafety, informing at level of the country about existing and possible electronic threats, education of the population, quotients and other structures (further - users) in the field of cybersafety, and rendering of the methodical help.

From http://en.trend.az/ 03/31/2014

TOP↑

 

Azerbaijan’s Telecommunication Infrastructure to Be Thoroughly Checked

 

Azerbaijan's telecommunication infrastructure will be thoroughly checked in the near future as part of the preparation for the first European games, to be held in Baku in 2015, Azerbaijani Minister of Communications and High Technologies Ali Abbasov told the media on May 6. "Work in this area includes improving the quality of telecommunication services for the upcoming European Games," he added. "We have asked some technology companies to check our communication services by using special standards," the minister said. "The inspection will be held within one or two months. Afterwards, the relevant measures will be taken." A decision was made at the 41st General Assembly of the European Olympic Committee in Rome to hold the European Games in Baku for the first time in its history. The Games will be held in Baku on June 12-28, 2015.

From http://en.trend.az/ 05/06/2014

TOP↑

 

Azerbaijan Develops Encryption Software for Protecting E-Documents

 

Data Processing Center (DPC) of Azerbaijani Communications and High Technologies Ministry has created software for encryption of e-documents signed with an e-signature, according to a message from the DPC. The software helps to protect documents circulation and runs on Microsoft Windows. The encryption software was developed on the basis of a public-key cryptographic system that allows authenticating the user's identity. To use the encryption, it is necessary to have an e-signature card, a card reader, and internet access. The software is activated by means of e-signature. The encryption software, as well as a manual on operating it, can be found on e-imza.az website.

From http://en.trend.az/ 05/15/2014

TOP↑

 

KAZAKHSTAN: State Security Service Created

 

Kazakh President Nursultan Nazarbayev ordered creation of the State Security Service of Kazakhstan. "The President decreed to reorganize Presidential Guard Service and the Republican Guard through merging into the State Security Service of Kazakhstan," Kazakh presidency wrote in the official account in Twitter on April 21. Anuar Sadykulov was appointed to the post of State Security Service's head. Earlier Sadykulov served as a chief of the Presidential Guard Service.

From http://en.trend.az/ 04/21/2014

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

AUSTRALIA: Government Launches National Ballistics System for Police to Target Firearm Crime

 

Australia Department of Justice has launched the Australian Ballistics Information Network (ABIN), the latest-technology ballistics matching system to track illegal firearms. Launched by the Federal Minister for Justice Michael Keenan, the system will be accessible by all Australian policy agencies from July. “CrimTrac‘s new $9.6 million ABIN provides national capability that is equivalent to a ‘fingerprint’ system for guns and assists police to link guns to the crooks who use them,” said Keenan. “ABIN will link local and national incidents involving a firearm”. Keenan was joined at the launch by NSW Minister for Police and Emergency Services Stuart Ayres, CrimTrac CEO Doug Smith and NSW Police Commissioner Andrew Scipione yesterday in Sydney. “The ABIN will give police the edge in the fight against gun crime by increasing the speed they can match ballistic evidence and link firearms to both suspects and crimes, no matter which state or territory the crime took place,” Keenan said.

 

“This will link the Integrated Ballistics Identification Systems (IBIS) already in use by the Australian Federal Police, NSW Police Force, Queensland Police Service and South Australia Police, and allow for the input of ballistic data from all states and territories. With all Australian police agencies sharing electronic ballistic information through the ABIN, we will have a capability to store, analyse and share evidence to solve gun-related crime nationwide,” Keenan said. New South Wales Minister for Police and Emergency Services Stuart Ayres said firearm related crime in Australia, and particularly in New South Wales required a national law enforcement response. “Modern policing demands a constant ability to adapt and respond to changing crime types and crime groups and this cross-border operating model will get us closer to those offenders using illicit firearms,” Ayres said. NSW Police Commissioner Andrew Scipione said the ABIN will have a significant impact on the way Australian police agencies investigate gun-related crime by linking ballistic evidence from incidents involving firearms both locally and nationally.

 

“Since the NSW Police Force acquired the IBIS in 2000, we have had 636 ‘hits’ or ballistic matches, providing over 1200 links to crimes and crime evidence,” Scipione said. While it has been an invaluable tool in investigating gun-related crime, like all technology, the IBIS has its limitations – the information it outputs is only as good as the information that is input. With all Australian police agencies sharing electronic ballistic information through the ABIN, we will have a capability to store, analyse and share evidence to solve gun-related crime nationwide.” CrimTrac CEO Doug Smith said Australia does not currently have a system for police to nationally match ballistic evidence. “Many Australian police agencies currently use a manual process to match ballistic evidence, which is both time consuming and resource intensive,” Smith said. “A national ballistic matching system will increase the capability of all Australian police agencies to investigate firearm-related crime. Once again, CrimTrac is helping us break down information-sharing barriers to better target serious and violent offenders in our community,” Smith said.

 

CrimTrac is the Australian Government Agency responsible for delivering national information sharing services between state, territory and federal police agencies. Since coming to Government the Coalition has introduced a range of measures to make Australia safer and more secure, including:

# introducing Anti-Gang Squads in New South Wales, Queensland, Victoria and Western Australia to detect and disrupt national and international criminal gangs

# opening the Anti-Gangs Intelligence Coordination Centre within the Australian Crime Commission to collate federal and state law enforcement intelligence on criminal gangs

# strengthening unexplained wealth laws to crackdown on criminals who flout their criminal activities, and

# using proceeds of crime to fund crime prevention projects under the A$50 million (US$46 million) Safer Streets Programme which delivers measures such as CCTV and security lighting in entertainment and commercial precincts of local communities.

“Now, this new network of gun crime intelligence increases the capability of all Australian police agencies to investigate firearm-related crime,” Keenan said.

From http://www.futuregov.asia 05/23/2014

TOP↑

 

NEW ZEALAND: Cyber Security Tsars Lay Down Rules for Network Operators

 

New Zealand's two leading communications security agencies have defined the new working environment for network operators in the country. Guidance released recently follows the controversial passage into law of the Telecommunications (Interception Capability and Security) Act (TICSA) last November. Among other matters, the law established new obligations on network operators to report details of their operations and infrastructure. The guidance fleshes this out, saying network operators are required to engage with Government Communications Security Bureau (GCSB) through the National Cyber Security Centre (NCSC) about changes to their networks. "The GCSB will work cooperatively and collaboratively with network operators on how the GCSB and network operators will interact to fulfil each otehr's responsibilities inder TICSA," the guidance says. The guidance defines the term "network operator" and the process for operators to register as well as their notification requirements. These focus on identifying and addressing risks arising from the "design, build or operation of public telecommunications networks and their interconnection to other networks both domestically and overseas".

 

Network operators may apply for some employees to be granted "Secret" level security clearances from GCSB to allow risk information to be shared. The guidance suggests those staff should be citizens who have lived in New Zealand for at least 10 years. Network operators must notify GCSB when changes to their networks are proposed and GCSB may need to be involved ahead of any network infrastructure purchases. "These requirements are to ensure GCSB has sufficient time to consider proposals and take action if needed," the guidance says. The guidance does not deal with obligations under part 2 of the Act, which came into effect on 11 May, requiring networks to be open for lawful interception. New Zealand, along with Canada, the UK, Australia and the USA, is part of the "Five Eyes" signals intelligence alliance of English speaking countries.

From http://www.zdnet.com 05/12/2014

TOP↑

 

Some Facts About Net Neutrality

 

The Federal Communications Commission has taken the first step toward adopting new regulations that could create fast lanes for Internet traffic from websites that can afford to pay for the privilege. The recommendation, passed by a 3-2, vote, moves the proposed rules governing "net neutrality" into a formal public comment period. After the 120-day period ends, the FCC will revise the proposal and vote on a final set of rules. FCC Chairman Tom Wheeler has said he wants the rules in place by the end of this year. Here are some things to know about the proposed rules and net neutrality:

 

What the rules call for

Under the proposed rules, Internet providers would be able to charge other companies for priority, high-speed, access to their users. A previous set of rules adopted in 2010 was struck down by an appeals court in January after Verizon challenged them. The FCC says the revised regulations now under consideration follow the blueprint set forth by that court decision. The commission also will consider the possibility of defining Internet service providers as "common carriers," like telephone companies, which are subject to greater regulation than Internet providers, under Title II of the Communications Act of 1934. If the FCC adopts the common carrier option, then Internet service providers would be required to treat all traffic on their networks equally, just as telephone companies have had to do on their lines for decades.

 

Why some oppose the proposed rules

Internet companies such as Netflix that do a lot of business online, and use a significant amount of data, don't want to have to pay for reliable and fast delivery of online video, music and other content. They contend that's something consumers are already financing when they pay $50 to $80 per month for high-speed Internet service from companies such as Comcast Corp., Time Warner Cable Inc. and Verizon Communications. Netflix released a statement Thursday saying that it is still concerned that the proposed approach could "legalize discrimination, harming innovation and punishing U.S. consumers with a broadband experience that's worse than they already have." Meanwhile, smaller companies say they can't afford to pay. And conservatives don't like the idea of additional regulation over the Internet and the companies that provide it. Advocates for an open Internet are outraged. Some protested Thursday's hearing, banging drums and holding signs calling for net neutrality. The American Civil Liberties Union released a statement saying that the proposed rules would put individuals at the mercy of Internet providers, who would be able to decide what is seen and how fast. The ACLU saw one ray of hope in Thursday's developments, endorsing the FCC's willingness to consider reclassifying Internet providers as common carriers.

 

What others are saying

The White House released a statement saying that President Barack Obama strongly supports net neutrality and an open Internet. But it added that the FCC is an independent agency and that it will carefully review its proposal. George Foote, a partner at the law firm Dorsey & Whitney who works with the FCC, argues that the proposed rules don't threaten the Internet, free speech or capitalism. "Attempts to say otherwise are merely attempts to force the order into some self-serving narrative of disaster," Foote said in a statement. Meanwhile, Chris Riley, senior policy engineer at Mozilla, the nonprofit that makes the Firefox browser, said he's glad the FCC is considering the possibility of "real net neutrality," including the Mozilla-backed proposal to reclassify Internet providers under Title II.

From http://www.nzherald.co.nz 05/16/2014

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/ICT_.gif

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/01.gif

 

 

 

EUROPE: Spain Pledges EUR 98 Mln to ICT Development

 

Spain's industry ministry has announced that it will be allocating grants totalling EUR 98.3 million to 720 ICT projects promoted by SMEs, technology companies and young entrepreneurs. The grants will be distributed by the state innovation agency, ENISA, which expects around 230 companies and 2,900 jobs to be created as a result of the increased funding.

From http://www.telecompaper.com/ 05/06/2014

TOP↑

 

NORTH AMERICA: IT in Canada’s Post-secondary System Key to Economic Impact

 

Colleges in Canada were created to broaden access to post-secondary education, and their economic value has proven itself again and again. In British Columbia the numbers are in for 2014 and they are definitive.  A recent economic impact study conducted for the BC Colleges, a consortium representing the province’s 11 public, community colleges, found its colleges and their students contributed $7.8 billion to the provincial economy, equal to approximately 4.2 per cent of GDP. That demonstrated that BCs colleges have an effect comparable to industry sectors such as, finance or food services, the report said. It also found that B.C. college students gain valuable skills to advance in the workforce, strengthening the economy and adding $7.1 billion in income annually.  ”These students also earn 51 per cent more than their peers with a high school diploma. The result is college students can earn more, pay more taxes and therefore are active contributors to the BC economy,” the report said. Information and Communications Technology (ICT) is a critical enabler of this access and the resulting provincial and national economic benefit.

 

In 2014 we have reached a point in the post-secondary education system where ICT services are mission-critical and a significant contributor to the economic benefits colleges create in Canada.  This is aligned with many other sectors including health and finance where ICT is critical to daily operations and a top consideration in strategic planning and goal setting. In British Columbia, post-secondary ICT relies on BC NET to co-ordinate and optimize ICT province wide strategy and infrastructure.  BCNET is a not-for-profit, shared information technology (ICT) services organization led by and for its members, British Columbia’s higher education and research institutions. BCNET is owned, governed and funded primarily by its members, and facilitates a unique, collaborative, inter-institutional environment—one based on equality and common goals—to explore and evaluate shared IT solutions for mutual technology challenges. Michael Hrybyk is the CEO of BCNET and has managed the organization since 1994. 

 

“IT and attendant digital content is strategic to almost every facet of college operation and life,” he says. “Students want e-textbooks and mobile facilities for communicating with peers, faculty, and administration. The need for network infrastructure, mobile apps, conferencing systems, and content management is now necessary. Digital infrastructure and applications are every bit as important as bricks and mortar for the college system. Given the constrained budgets and competition for IT talent to provide such systems and services, colleges will need to more extensively use third party suppliers (“the cloud”) or consortia to ensure facilities are in place and keep pace.”

 

Mike is noted as an innovative leader in the sector and pioneered the concept of transit exchanges as a method of linking research and education networks to their local communities as well as to national and international peers.  When asked what the best possible IT environment for the post-secondary system in BC might look like, Mike sees it this way.  “IT in higher education needs wholesale improvement to meet the demands new learners are bringing to the environment. Better networks, data centres, and applications infrastructure are necessary for this improvement to happen. Excellent network infrastructure is needed, emphasizing connectivity to content providers (e.g., Google, Microsoft, etextbook sources, …) and the general Internet.” As for the traditional bricks and mortar and the more recent networked approach to delivery, Mike recommends “Rethinking the institution as more than just disparate campuses that need to be connected, but insisting on the primacy of connectivity to the outside world.”

 

On the infrastructure side, a constant challenge for colleges, institutes and CEGEPs in Canada, Mike suggests that “given the network, (we need) access to state-of-the art data centres with cheap computing and storage facilities. Basically, the ability to use Google-like facilities, located locally or regionally as needed.”  This would allow post-secondary institutions “not to rely on institutional data centres, which are typically difficult to maintain and modernize, as well as being costly.” While in house and system infrastructure are critical a new challenge has emerged. Canada’s post-secondary system is not immune from the growing appetite for mobile access.  In the ideal IT world for this sector in British Columbia Mike envisions the “ability to stage applications which integrate tightly with mobile devices. The applications would utilize servers in modern data centres properly maintained. Applications can run the gamut from student registration to video/voice for distributed teaching and learning.”

From http://www.itworldcanada.com/ 04/15/2014

TOP↑

 

U.S.: How IT Jobs Have Changed in 15 Years

 

Think about your current information technology job – would it even have existed 15 years ago? Even if it did, it’s likely to have either dramatically grown or shrunk, depending on your job description. That’s according to the Pew Research Center, which analyzed data from the joint federal-state Occupational Employment Statistics program that sorts wage and salary workers into more than 800 different occupations. The program’s most recent estimates, which are based on data collected from November 2009 to May 2012, show that around 3.9 million workers – or 3 percent of the nation’s wage and salaried workforce – work in core IT jobs. How have IT jobs changed in the past 15 years? According to Pew’s analysis, some IT jobs, namely information security analysts and Web developers, simply didn’t exist, or at least did not fall under those titles. Other jobs, such as database administrators, software developers and computer support specialists, have expanded dramatically, while occupations like computer programming and computer operating have shrunk. “Since the World Wide Web was conceived 25 years ago, it’s become a major reason why computers, smartphones and other data/communication technologies are integral parts of most everyone’s daily lives,” Pew’s Drew DeSilva writes on Fact Tank. “Among other things, that means many more Americans are employed in developing, maintaining and improving those devices and the communications networks they use.”

From http://www.nextgov.com/ 03/17/2014

TOP↑

 

San Francisco Is the Best City for Open Data

 

While the “best” municipality using open data is still yet to be known, a new census has identified 36 cities making progress opening their data. The census, officially named the U.S. Open Data Census, has scored 36 cities based on the type and quality of their open data efforts. San Francisco was listed with the highest score, and was followed by Sacramento, Calif., in second place and Salt Lake City in third. The project — a collaboration among the Open Knowledge Foundation, the Sunlight Foundation and Code for America — reviewed cities based on 17 categories of data sets that included information on crime, transit operations, construction permits, emergency management, GIS zoning and more. “Eventually, the value would be that if every city has similar information online, you could compare and contrast across locations,” said Emily Shaw, the national policy manager for the Sunlight Foundation.

 

Shaw said the list is still not final, with new municipalities expected to be reviewed and added in the next couple of months. She cautioned the list shouldn’t be taken as a type of final word or even as a comprehensive evaluation since some data sets of the cities extend beyond the 17 listed categories, and the rubric for vetting and defining best practices in is an ongoing work. “I think we’re really happy to hear about cities’ success in putting open data online and making data machine processable," Shaw says, "but this is not the sum final word on what the most necessary data sets are. It gives cities a point of pride to say, 'We have these data sets available and easily findable on our website, and those are all good things from our perspective.'” As one of the first national attempts at cataloguing open data city by city, Shaw said, it’s anticipated to be fine tuned year by year. Major benefits of the listing, and the cataloging behind it, are hoped to support cities and app makers alike.

 

“It’s not just good for cities, but also for civic hackers who are making apps for cities,” said Lauren Reid, a spokesperson at CfA. Reid said there’s an emphasis at CfA -- and for civic hackers and entrepreneurs -- to make sure efforts touch the widest audience possible. The U.S. Open Data Census is hoped to become a listing that connects app makers to data sets offering greatest exposure to cities. “The more data we have," Reid said, "the better picture we have of the open data landscape."

From http://www.governing.com/ 03/24/2014

TOP↑

 

4 Key Trends That Every CIO Should Watch

 

The dominant public-sector technology trends of 2013 -- which include cloud, big data, cybersecurity and software as a service -- are here to stay, and they continue to evolve in ways that open up new challenges and opportunities for federal CIOs. Four technology trends in particular are shaping up to occupy growing mindshare among government CIOs in the months ahead, and they are worth watching as the year progresses.

 

1. The CIO's role will expand to being a 'broker of things'

A key benefit of accessing IT services such as software, storage and security "on demand" is that it frees agency CIOs from time-consuming implementation issues. Instead of being mired in buyer/builder obligations, CIOs can use their significant product knowledge to evaluate technology options as "brokers of things." CIOs' ability to play that role is enabled by adoption of on-demand services as a way to acquire the highest level of technology at the lowest investment cost. The CIO becomes a broker to mix and match opportunities based on cost, available internal resources and other critical factors. Examples of the broker role will be increasingly evident as agencies adopt multiple cloud models. CIOs will sort their IT portfolios into applications that they must control entirely (in on-premise private clouds), applications they must control partially (in enterprise-grade public clouds), workloads that are more transient (in public hyperscalar clouds) and those best purchased as SaaS. Then CIOs and other IT decision-makers will act as brokers across those diverse cloud models to arrive at the optimal posture.

 

2. Hybrid clouds will grow in appeal

To date, agencies assembling their cloud strategies have tended to focus on moving to a single public or private cloud architecture as dictated by their specific requirements. Public clouds tempt agencies with cost savings through pay-as-you-go pricing and the flexibility to scale up and down, while private clouds allow agencies to more directly control data and infrastructure and offer more security assurance. Deltek's Federal Cloud Computing Market Outlook predicts that the federal cloud computing market will grow at a compound annual growth rate of 32 percent over the next three years. There is little doubt that cloud adoption in the public sector will continue to grow, but every CIO must wrestle with whether the optimal path is a public cloud, a private cloud or the emerging hybrid cloud approach. The hybrid cloud model has been the least tapped in the public sector, but it offers the most potential. Agencies seeking a balance between scalability and security will gravitate toward public computing power coupled with private cloud storage that preserves their control over their most sensitive asset: data. In other words, the hybrid cloud model allows agencies to maintain control of their data while fully maximizing cloud computing economics.

 

3. There will be no flash (storage) in the pan

For government agencies facing exploding data storage requirements, cost and scalability are important. However, for many critical applications, the chief pain point is performance because scaling disk drives or even using hybrid solutions cannot deliver the mission-critical sub-millisecond response times necessary. Last year saw dozens of flash storage startups nudge into the public sector and onto the radars of CIOs. Those startups recognized that federal agencies could use flash-array storage for enhanced performance via solid-state drives with flash memory drives rather than hard-disk drives. CIOs will find the competitive landscape for flash storage expanding in 2014 as larger, industry-leading vendors launch compelling all-flash storage solutions alongside the startups. The battle will be won by providers that can demonstrate to CIOs that their solutions deliver reliability, scalability and non-disruptive operations.

 

4. Software will define more government IT

Software-defined networking (SDN) and software-defined storage (SDS) will move further to the forefront in the public sector. As an architectural approach to managing data storage, the SDS infrastructure is automated via intelligent software as opposed to the storage hardware itself. SDS virtualizes and encapsulates the entire infrastructure into a container that can be logically partitioned. Therefore, the pooled storage infrastructure resources in an SDS environment can be automatically and efficiently allocated to match the application needs of an enterprise.

 

The multitenant environment of SDS allows agencies to optimize management and control of the data and the environment through separation and control of the data planes. Inefficient data storage typically represents as much as 15 percent to 20 percent of IT infrastructure budgets. SDS prevents overspending on data storage by:

?Including efficiency technologies such as deduplication and compression.

?Extending backup technology to take efficient volume-based backups over the network.

?Preserving compression and deduplication over the network and at the remote site.

 

Although SDN and SDS made strides in the public sector last year, there remains significant room for improvement, innovation and education. In a NetApp survey released in January, public-sector respondents cited reducing storage costs as the top benefit of SDS, yet 33 percent were not familiar with SDS and only 7 percent described themselves as very familiar. Translation: More education and awareness of the benefits of SDS will spur broader adoption. Those four trends are being driven by agency pain points and a consistent stream of innovation that is expanding opportunities for government CIOs to succeed with their missions in 2014 and beyond.

From http://fcw.com/ 03/27/2014

TOP↑

 

FCC Seeks $13.5 Million for IT Modernization

 

The Federal Communications Commission is looking for an IT upgrade. The regulatory agency has 207 computer systems for just 1,700 employees, Chairman Tom Wheeler said. He made his case for $35 million in new funding, including $13.5 million for IT upgrades, during testimony before House and Senate appropriations subcommittees this week. "Our systems are incompatible, they can't talk to each other, and they're highly inefficient. Worst of all, they're insecure," Wheeler said on March 25. "There are serious challenges. $13 million is a lot of money, but the reality here is if we don't spend that now, we'll spend that in the next two years in the baling wire and glue we need to hold existing systems together." Wheeler noted that 40 percent of the FCC's IT systems are more than 10 years old, and many are so out of data that they lack vendor support. The agency's budget request of $13.5 million for IT upgrades includes $9.2 million for modernizing IT systems, $2 million for cybersecurity programs and about $1.3 million for improvements to the National Broadband Map, an open-data project that tracks the availability of high-speed Internet connections nationwide.

 

FCC CIO David Bray has ambitious plans for an IT turnaround and said the FCC could have "some of the best IT in government" in an 18-month time frame. On Twitter and in recent public appearances, he has noted that the agency reduced its use of the soon-to-be-unsupported Windows XP operating system to fewer than 3 percent of its computers. A rapid IT turnaround at a small agency like the FCC could be more manageable than an effort to transform the infrastructure at a larger agency with multiple components -- perhaps more akin to turning around a destroyer than the proverbial aircraft carrier. There are headwinds, however, particularly when it comes to streamlining procurement. At a March 27 event sponsored by Nextgov, Bray said it took the FCC about a month and a half to buy some $60 licenses to test code development in the cloud and discovered that a $90 Apple iOS developer's license couldn't be done with an agency credit card and required a purchase order. Wheeler's budget request includes funding for 10 new IT positions at the FCC, and the modernization projects will likely involve dozens of contract workers as well.

From http://fcw.com/ 03/28/2014

TOP↑

 

 

Industry Perspective - Keeping IT (Procurement) Simple

 

The most successful IT procurements follow a simple formula: Identify a business need, define success and how you’ll measure it, then carefully communicate and reward that success. Government IT procurement is more of a challenge than ever before. Agencies are forced by economic conditions and fewer resources to leverage IT for everything from survival to innovation, and the challenge comes from two things: the increased complexity of the requirements and the lack of commensurate IT procurement experience. A good example of this trend is the legislation introduced recently by Rep. James Lankford (R-Okla.) and Rep. Mike Honda (D-Calif.) -- bipartisan entrepreneur-in-residence legislation that aims to make it easier for entrepreneurs to work with government, and inspire more innovation and better use of technology. I assert that procurement tools aplenty exist to enable the procurement process to tame the IT monster. The issue, however, is a severe shortage of trained or experience IT procurement professionals to break down the requirements of today’s IT monster into manageable, bite-size pieces. In that vein, let me break this discussion down into more manageable pieces.

 

Many government executives and IT professionals are often heard complaining about the IT monster — there’s either too much, not enough, or its running or ruining life as we know it. On the other hand, most of those same executives are very interested in what they think IT can do for them in solving their business challenges. Think about it: Haven’t we all heard some form of the following statements?

- IT has become too complex; my contracts shop doesn’t know how to write IT contracts based upon today’s technology!

- I know we got into this mess (i.e., large number of older/out-of-date/unsupportable systems) by letting each business unit do their own thing; how do we get all of it under control as we try to modernize?

- Our developer is adequate, but we’re concerned about the quality of their work and the lack of innovation — I’m not sure what to do.

 

Of course, the challenge we face, thanks to Mr. Moore (of Moore’s Law, who recognized in 1965 how it would grow), is that technology has outpaced our ability to manage it properly. Therefore, we find organizations of all shapes and sizes facing one or many of the following subset of common IT project characteristics:

- Under-utilized IT capacity and capability

- Unsupported products and technology

- Delayed or cancelled IT projects

- Mismatched expectations for IT projects

- Poor system performance

- Poor user acceptance

- Under-achievement of business value

- Declining system health (e.g., reliability)

 

In these instances, you might need more than the “Geek Squad” to save the day, but most of the remedy lies in the solicitations and contracts we write when we procure the hardware, software and services to feed the IT monster. Here’s a simple example based upon concepts of standardization and consolidation.  As City XYZ grew, it invested in separate systems for Human Capital Management, Financial Management and Contract Management. Because they probably seemed like the best decisions at the time, they were made, and each system now runs on different hardware and operating systems. Given the current situation, how should City XYZ’s CIO procure support for these systems?

 

Simply put, there are three ways to go: the easy way, the wrong way and the right way. In this case, the easy and wrong ways are the same — to continue to compartmentalize the support for these systems allowing them to be unique. The right (or better) way to proceed is to procure support to standardize and consolidate these systems under a single project or contract. There are many reasons why, including: Your support staff model becomes simpler and personnel more proficient (one architecture versus three); you’re using a higher quantity of like hardware and software products, which may enable higher discounts; and resources can now be shared between systems to further reduce costs and improve performance/utilization. Not as simple as the “easy” way, but not beyond the realm of what any contracts shop can produce.

 

Thankfully, you don’t need to be an expert in IT procurement to produce similar results. After 30 years in this business, I’ve found that a handful of fundamental procurement tenets will help to tame the IT monster. Try these on for size and see what you think:

?Don’t reinvent the wheel. Why hire somebody to make something when there’s an 80 percent solution available off-the-shelf.

?Nobody supports Product X better than the original equipment manufacturer (OEM) of Product X. If a product has OEM support available, most of the time it’s the right way to go.

?Don’t buy technology for technology sake. I know, you saw it at some trade show and can’t get it out of your mind. The smarter move is to contract for the business capability the technology is meant to provide to you and hold the professional system integrator with proven past performance responsible for delivering.

?Accountability is key. Make IT decisions for business reasons and hold your IT contractor accountable for delivering that business value.

?Standardization is key. It’s easier to contract for one order to support 9 standard systems than it is to contract for 9 orders for 9 non-standard systems.

?Consolidation is almost without limit. There is almost no limit to the size of an IT enterprise, so when it makes sense, consolidate similar capabilities, technologies and values under incrementally larger and larger contracts. Then provide incentives for industry to accomplish what your organic staff couldn’t.

?Finally, remember (despite my last bullet) there is a limit!  Define your procurement objectives to incrementally face and tackle areas of risk representing obstacles to your success. Ensure increments are valuable, severable and measurable.

 

With any challenge IT professionals in government face, it’s best not to venture down an IT path without a definition of success.  The most successful IT procurements follow a simple formula: Identify a business need, define success and how you’ll measure it, then carefully communicate and reward that success. Happy hunting!

From http://www.govtech.com/ 04/03/2014

TOP↑

 

 

IT Testing for 2020 Count Running Behind

 

Testing of IT options for the 2020 census might not be completed before the Census Bureau has to decide on the operational design of the decennial count. Bureau officials plan to make that call in September 2015. Although the agency has made progress in research and testing the IT it plans to use, several of the supporting projects have neither a schedule nor a detailed plan, according to a Government Accountability Office report released April 3. GAO auditors said the bureau has begun research on six IT-related projects, including a proposal to use the Internet for survey response, for which the bureau has been buying up URLs, and allowing census workers to use their own mobile devices to collect data. The goal is to have at least 60 percent of responses submitted electronically, which should drive down costs for postage, paper and staff time, Census Bureau CIO Brian McGrath told FCW late last year. But four of the six projects do not have finalized schedules, three have no plan for gauging progress, and the two projects that do have schedules are not expected to be completed until after the September 2015 decision on the census' design, GAO said.

 

The decision must be made around the midpoint of the 10-year cycle so that the acquisition process can begin in fiscal 2017 or 2018 and allow provide plenty of time to test and deploy equipment. GAO also criticized the Census Bureau for failing to determine which projects are the most important to complete before the decision on deployment must be made. "Officials stated that they are working with project teams to determine what needs to be completed and by when to support the design decision, but as of December 2013 they had not specified when this would be completed," the report states. "Without prioritizing its projects and establishing schedules and plans, the bureau risks not making a timely and well-informed design decision for the 2020 census." The bureau has identified potential risks with its IT programs "but has not consistently developed mitigation plans for all of them," GAO auditors wrote. They recommended that the bureau set priorities for its IT-related research and testing projects and develop project schedules to reflect those priorities. The Commerce Department, of which the Census Bureau is a component, concurred with GAO's recommendations and said it had already begun to address them.

From http://fcw.com/ 04/03/2014

TOP↑

 

 

Pentagon Looks to Build a Bridge Between Military, Intelligence IT Consolidation Efforts

 

The federal government's intelligence community is in the process of building an interdependent system of shared IT services for all 17 of the nation's intelligence agencies. The Pentagon, meanwhile, is on its own path to doing roughly the same thing between the military services and defense agencies. While the governing bodies that oversee those two parallel efforts do communicate with one another, they have different operating models and objectives. DoD is still struggling to chart the way forward for agencies that have one foot in the intelligence world and another in the military. James Clapper, the director of national intelligence announced earlier this week that the intelligence community's shared services plan, ICITE, is ready to start deploying capabilities to agencies, after more than two years of development. Much like the IC, the Defense Department is making incremental progress on collapsing its own IT stovepipes into a set of standards it calls the Joint Information Environment (JIE). Bridging those two still-evolving worlds has now become the job of the Defense Intelligence Information Enterprise (DI2E), and its governing body, the Defense Information Integration (DI2) council.

 

"This bridging function is a critical strategic function, and it probably makes the DI2 council more critical than it's been in the past," said James Martin, the deputy undersecretary of Defense for intelligence for portfolio, programs and resources. To complicate matters further, DoD needs to bring into the fold a third effort it's been working on for years: creating a framework to exchange intelligence information with foreign allies. "We have to work that overlap between those three large efforts," he said. "ICITE is very intelligence-focused, but it's also very national-focused as it works toward our new cloud architectures. JIE has a much larger user base, including logistics, administration, command and control networks, as well as the defense intelligence piece. It's a much larger population, and we need to figure out how to connect these Venn diagrams." To build that bridge, Defense officials say they want to repurpose as much construction material as they can from what the architects of JIE and ICITE are already designing, even if those two enterprise IT models didn't start from the same drawing board.

 

With input from all of the military's intelligence components, the council concluded that there are 183 individual IT "services" that handle everything the intelligence community does as of today. Out of that huge number, it identified 10 separate focus areas that it thinks should make up the tie-lines between JIE and ICITE, including identity and access management, data tagging and time synchronization. "We have to get those right, and they're evolutionary right now," Martin said. "They're being worked at different levels of maturity and agreement, and we need to be part of the negotiation process between our own CIO and the intelligence community's CIO, and they're the ones we need to converge on and use as a common framework to do this bridging function. Once that happens, we believe that everything else will be much easier. Everything else that will ride on that common framework will achieve the kind of interoperability and efficiencies that we need to."

 

The DI2 council assigned most of the technical work to the National Reconnaissance Office, which is now working through the nitty-gritty details of how the fundamental elements of JIE and ICITE will work together. Ed Lane, the director of NRO's enterprise management group, said his agency is using an approach that will make use of components of both ICITE and JIE in order to minimize the amount of purpose-built work that must be done to suit DoD's intelligence agencies. "We ultimately want to have the applications separate from the data so that we don't have to deliver end-to-end stovepiped systems," he said. "We are really walking away from the old way of having systems and then integrated systems. We are really moving into Web-based services and composite services. The ten touch points are one of the ways we're tied together, but the shared service concept is the same. We don't care whether the service comes from ICITE or from JIE. The key is whether we can document it, componentize it, and make it available for reuse. That's really our goal."

 

The top-level push toward JIE and ICITE also has implications for a DoD initiative to integrate the military services' intelligence collection and processing systems, and that pre-dates either one of them. The DI2 council and its predecessor body have spent most of their time over the past decade on the Distributed Common Ground System (DCGS). Each military service has its own variant of DCGS, each in varying phases of deployment. Robert Marlin, the Air Force's deputy director for intelligence, surveillance and reconnaissance capabilities, said his service has had a fully-functional DCGS system up and running since 2008, and it has already been working on plans to make it more agile and better able to absorb new capabilities into the structure.

 

But the Air Force has spent the last several months figuring out ways to make its version of DCGS compliant with ICITE. It plans to deliver that plan to the ODNI by September. "In a nutshell, that plan is going to involve examining all of the potential enterprise and commodity solutions we have available to us to adopt and reuse — and I would emphasize reuse — to meet our IT requirements for DCGS and minimize the amount of new development and unique applications that have to be used and developed." he said. "We'll continue to work with the IC mission users' group and the DI2E council to ensure our service-specific requirements are known. Any IC or JIE solutions that are developed in the future will hopefully include our needs."

 

Patricia Guitard, the deputy chief information officer for the Army's deputy chief of staff for intelligence said the JIE and ICITE models pose another big question for those organizations that occupy space in both the DoD and the IC's organizational charts. If the military departments are going to be paying for IT as a service, it is difficult to plan for the final price tag, since those services are organized around at least two different constructs. "In the JIE environment, the Department of Defense says you're going to pay for your infrastructure as a service, you're going to pay to maintain your applications inside of the Defense infrastructure. That's wonderful, but then I turn around to the IC side, and we end up paying a different set of service providers for a variety of things," she said. "Our budget constraints really restrict us from being able to pay six different service providers. It's a combination of budgeting and a cost model that puts you in a position where you have to sort of rent services from a variety of organizations when your dollars just won't support that."

From http://www.federalnewsradio.com/ 04/18/2014

TOP↑

 

Senate Appropriators Signal Support for IT Reform

 

Federal CIO Steven VanRoekel cautioned that the roles of agency-level CIOs, just like those in the private sector, continue to evolve. The botched launch of HealthCare.gov last October continues to drive conversation about federal IT reform, with an eye to making the buck stop with agency CIOs. Sen. Tom Udall (D-N.M), chairman of the Senate Appropriations subcommittee that funds the federal CIO's office, is continuing to fine-tune legislation to "empower federal agency CIOs to drive more effective IT investments," he said at a May 7 Senate hearing. Udall and Republican colleagues Mike Johanns (R-Neb.) and Jerry Moran (R-Kan.) were among the members who sought to add aspects of the Federal IT Acquisition Reform Act (FITARA) to the Defense bill in late 2013, and they introduced a stand-alone bill in December that tracks closely with FITARA.

 

The Obama administration still does not appear to be ready to go quite that far. Dan Tangherlini, head of the General Services Administration, said that while his agency had consolidated all IT policy around its CIO office, that approach "may or may not be a useful model for other agencies, depending on how interrelated their functions are." Federal CIO Steven VanRoekel said there is room for "policy and discussions" around expanded agency CIO authorities, but he cautioned that the roles of the agency-level and private-sector CIO alike continue to evolve -- implying that legislation might not precisely capture the authorities a CIO may need in the future. IT oversight expert Dave Powner of the Government Accountability Office suggested that CIO authority over spending on commodity IT projects like data centers and email would make sense, and noted that policies at the Office of Management and Budget overseen by the federal CIO are designed to do precisely that -- give agency CIOs more control over commodity spending and more visibility into large scale IT projects at agency components. Powner said that "good leaders in certain agencies" were getting the job done in the absence of legislation.

 

Separately, VanRoekel released new policy on the next round of PortfolioStat meetings for agency officials. More senior leadership will be included. Alongside CIOs, the deputy secretary and the human capital, financial, acquisition, and performance improvement chiefs will attend sessions. Agency submissions to OMB to prepare for sessions will include an emphasis on the "effectiveness of high impact investments," a measurement that goes beyond the on time/on budget metrics of the federal IT Dashboard. At the hearing, VanRoekel explained that he was seeking to ramp up the staff at the federal CIO shop to spend more time looking at investments as they are being prepared. He's looking to shift focus "from reactive to proactive," he told lawmakers. VanRoekel said his staff spends 40 percent of its time engaging with GAO, and much of the rest of the time goes to statutory duties such as preparing budget submissions and other reports to Congress. He said more staff -- the CIO is seeking a $20 million appropriation for his office -- is about additional capacity to hire experts from the private sector to scope out troubled projects, and rotate through the government on a temporary basis.

 

"What we've seen is a very small number of people that have a notion of how to deliver things in modern technology terms can really change the game. It doesn't take an army of new people," VanRoekel said. Tangherlini explained that his new 18F project management team is a complement to this proposed new OMB capacity. "We're trying to build an additional level of capacity beyond providing agencies with contract solutions," he said. "We can help agencies through having internal capacity, programming capacity, and a better understanding of how you build IT systems." Another benefit, Tangherlini said, was using lessons learned from 18F efforts as a "feedback mechanism" so that mistakes made on individual projects aren't repeated across government.

From http://fcw.com/ 05/07/2014

TOP↑

 

The World Wide Web Turns 25 

 

It's difficult to imagine life without the Web, even though a large majority of Americans spent part or most of their lives without it. But it was only 25 years ago this week that British computer scientist Tim Berners-Lee published the proposal that is widely considered to be the birth of the World Wide Web. When Berners-Lee published "Information Management: A Proposal" at the European Organization for Nuclear Research, he set out to achieve a practical goal: to make the troves of information at CERN more accessible to the institute's scientists by using hypertext to share information. Instead, he touched off a revolution. Today, more than 2.7 billion people around the world acess the Web. Here is a look back at the Word Wide Web's meteoric rise since 1989.

 

1990: Berners-Lee develops the first Web page and server, naming it the WorldWideWeb, on a NeXT computer for scientists at CERN.

1992: A photo of the musical group Les Horribles Cernettes, featuring the wives and administrative assistants of CERN scientists, is the first photoposted to the Web. Jean Armour Polly popularizes the phrase "surfing the Internet."

1993: On April 30, CERN makes the WorldWideWeb software available to the public. The Massachusetts Institute of Technology's student newspaper, The Tech, is the first newspaper to develop a web presence. In December, The New York Times publishes its first article about the Web, in which the print paper describes Mosaic, one of the earliest Internet browsers, as a "map to the buried treasures of the Information Age."

 

1994: Netscape—the brainchild of Marc Andreessen and Jim Clark—launches. Yahoo also gets its start this year, and the first banner ad appears. By the end of the year, there are 11 million Americans online and the White House and United Nations are both online. Tim Berners-Lee founds the World Wide Web Consortium (W3C) to create worldwide standards for the Web.

1995: Microsoft introduces the new Web browser, Internet Explorer, setting off a "browser war" with Netscape. Jeff Bezos and Pierre Omidyar touch off the e-commerce revolution with the launches of Amazon and eBay. John Wainwright orders the first book off Amazon: Douglas Hofstadter's Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought. Omidyar is baffled by one of the first items auctioned off over eBay: a broken laser pointer. Quietly, Craig Newmark starts Craigslist as a way to advertise events in San Francisco.

1996: Hotmail becomes one of the first Web mail services. An animated baby dancing to "Hooked on a Feeling" captivates the country, becoming one of the earliest viral videos.

 

1997: Netflix opens for business, mailing DVDs to subscribers. John Barger originates the term "Web log"—known today simply as the "blog"—on his online journal, Robot Wisdom, that chronicles everything from James Joyce to artificial intelligence.

1998: Sergey Brin and Larry Page officially launch Google, setting up shop in Susan Wojcicki's garage. Pew Research finds that 20 percent of Americans are getting their news via the Web, up 16 percentage points in three years.

1999: One year after the Digital Millenium Copyright Act becomes law, 19-year-olds Shawn Fanning and Sean Parker launch the file-sharing service Napster, to the chagrin of music executives but the delight of college students. The Internet Corporations for Assigned Names and Numbers (ICANN) takes over management of the Web's domain names.

 

2000: On March 10, the NASDAQ reaches a high of 5,048.62. By the end of the year, it is down more than 72 percent–the dot-com bubble has burst. AOL buys Time Warner for a whopping $165 million. The New York Times predicts the future convergence of old and new media.

2001: Jim Wales creates Wikipedia. A Federal Judge shuts down Napster. Google awes everyone with launch of Google Earth. Americans are spending an average of 83 minutes online per session.

2003: The social-media revolution begins with the introduction of Myspace, and Apple debuts its Web browser, Safari. Britney Spears and Harry Potter are the two most popular searches on Google.

 

2004: Google moves into Web mail with the launch of Gmail. Mark Zuckerberg creates thefacebook.com in his Harvard dorm, initially only available to college students.

2005: Reddit is founded. YouTube debuts with a video posted by cofounder Jawed Karim about the awesomeness of elephants' trunks. The number of people connected to the Internet worldwide tops 1 billion, and broadband overtakes dial-up connections.

2006: Jack Dorsey inaugurates the launch of Twitter with the tweet: "just setting up my twttr." Republican Sen. Ted Stevens is lampooned by the media after describing the Internet as a "series of tubes" during a hearing on net neutrality.

 

2007: Chris Messina proposes the first hashtag (#barcamp). Steve Jobs unveils the iPhone. "Charlie Bit My Finger" becomes a YouTube video sensation, and remains the fifth most popular YouTube video of all time.

2008: Google launches Chrome. Barack Obama's presidential campaign makes savvy use of the Web. More than half the U.S. population used participated in the presidential campaign via the Web, according to Pew Research.

2009: Twitter breaks news of the U.S. Airways crash in Hudson River, revolutionizing how news is reported and consumed. The "Craigslist Killer" sends chills down America's spine.

 

2010: Facebook reaches 400 million active users. Pinterest and Instagram are founded. Wikileaks upends the U.S. intelligence and diplomatic community with the release of thousands of classified documents.

2011: Twitter and Facebook are used to organize the revolutions of the Arab Spring. The Egyptian Government responded to protests by unplugging the Internet.

2012: The e-commerce market tops $1 trillion, according to eMarketer. Internet companies flex their power with a widespread internet blackout to protest the Stop Online Piracy Act. President Obama's tweet declaring victory in the 2012 presidential election gets more than 800,000 retweets—making his tweet the most retweeted ever. South Korean performer Psy's "Gangnam Style" becomes the most watched YouTube video ever, with nearly 2 billion views to date.

 

2013: Eighty-seven percent of Americans are connected to the Internet, according to Pew Research. Twitter hits 143,199 tweets per second, a new record, during an airing of the animated film Castle in the Sky in Japan. Miley Cyrus is the most searched person on Google. Americans are spending on average more than five hours per day online, almost double the amount of time in 2010.

2014: The U.S. cedes remaining control of the Internet, partially a result of the damaging effects of ongoing revelations about the U.S. government's surveillance program.

From http://www.nextgov.com/ 03/17/2014

TOP↑

 

New Global Network Builders Emerge

 

New data from TeleGeography’s Global Bandwidth Research Service reveal that demand for international bandwidth grew 39% to 138Tbps in 2013, a 4.5-fold increase from the 30Tbps of bandwidth used globally in 2009. Internet backbones remain the primary users of international bandwidth, accounting for 75% of demand in 2013. However, the drivers of international bandwidth demand are changing. As private network operators, including large content providers like Google, Microsoft, and Facebook, expand their internal networks, their bandwidth requirements increasingly exceed those of the largest carriers. Private network bandwidth grew at a compounded rate of 55% annually between 2009 and 2013, while international internet bandwidth grew 44%. Private networks accounted for 25% of used international bandwidth in 2013, up from 20% in 2009. Given their massive capacity requirements, some of the largest content providers have moved towards owning infrastructure, as a means of lowering their costs. Global network expansion has undergone a long-term shift in focus, from connecting users to users, to linking users to data centers and—increasingly—data centers to each other. ‘Data replication and mirroring among data centres are key drivers in the rapid growth of private network capacity,’ said TeleGeography Research Director Alan Mauldin. ‘Private network operators are poised to play a leading role in future global network development, including as anchor investors and consortium members in submarine cable systems.’ TeleGeography’s Global Bandwidth Research Service provides detailed data for the long-haul networks and submarine cable industry, including supply, demand, cost and pricing analysis, and profiles for 346 network operators and 277 submarine cables.

From http://www.telegeography.com/ 04/23/2014

TOP↑

 

Global m-Education Market 2014-2018: Advancements in ICT Have Resulted in the Emergence of Virtual Classrooms

 

m-Education is the ability to provide educational-related content on smartphones and tablets. Educational-related content refers to all the digital learning content provided on personal devices. m-Education service providers deliver learning solutions using the latest tools and technology, providing users with rich media and graphic-based learning. Since this form of learning is cost-effective and helps enhance employees' efficiency and productivity, many educational firms across the globe are replacing the traditional forms of training with m-education to improve their geographical presence. The analysts forecast the Global Mobile Education market will grow at a CAGR of 20.65 percent over the period 2013-2018. The Global Mobile Education market can be divided into seven segments: E-books and E-courses, Game/Simulation-based Tools, LMS/Authoring Tools, Distance Tutoring, Collaboration Tools, Test Preparation and Assessment. The report, the Global Mobile Education Market 2014-2018, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the Americas and the EMEA and APAC regions; it also covers the Global Mobile Education market landscape and its growth prospects in the coming years. The report also includes a discussion of the key vendors operating in this market. The study was conducted using an objective combination of primary and secondary information including inputs from key participants in the industry. The report contains a comprehensive market and vendor landscape in addition to a SWOT analysis of the key vendors.

 

Key Topics Covered:

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

04. Market Research Methodology

05. Introduction

06. Market Landscape

07. Geographical Segmentation

08. Key Leading Countries

09. Buying Criteria

10. Market Growth Drivers

11. Drivers and their Impact

12. Market Challenges

13. Impact of Drivers and Challenges

14. Market Trends

15. Trends and their Impact

16. Vendor Landscape

17. Key Vendor Analysis

18. Other Reports in this Series

 

Companies Mentioned:

Amazon Inc.

Apple Inc.

Barnes & Noble Inc.

Blackboard Inc.

Google Inc.

Microsoft Corp.

Pearson plc

Sony Corp.

From https://ca.finance.yahoo.com/ 04/29/2014

TOP↑

 

Research and Markets: Global Telecom and ICT Augmented Reality Subscription

 

The Augmented Reality in Telecom and ICT subscription service focuses on strategies, applications, competitive analysis and business assessment for Augmented Reality within telecom and ICT as well as various industry verticals. In addition, Augmented Reality in Telecom and ICT provides the following benefits:

Regularly updated reports in key technology and market development areas

Custom report development for clients subscribing at higher levels

Dedicated analyst support addressing Google and related communications, commerce, content, and applications

 

Target Audience:

Wireless carriers and other service providers

Augmented Reality (AR) application developers

Telemetry, Telematics, and vehicle monitoring companies

Telecom (fixed and wireless) and ICT infrastructure providers

Government agencies, regulatory authorities, and commissions

 

Key Topics Covered:

Evolution of Augmented Reality, Wearable Wireless, and Body Area Networks

Wearable Technology in Industry Verticals 2013-2018

Augmented Reality: Vendor Assessment, Market Analysis, and Forecast 2013 - 2016

Augmented Reality in Gaming and Entertainment

Brave New World: Convergence of Broadband, Location and Augmented Reality

Next Generation Augmented Reality Applications

Regulation and Policy for Wearable Augmented Reality

Wearable Augmented Reality: Google Glasses and Beyond

Mobile Commerce in Virtual and Augmented Reality

Augmented Reality in the Cloud

Augmented Reality in the Battlefield 2012 - 2016

Market Opportunity: Mobile Phone Augmented Reality

Augmented Reality in Vehicular Safety Systems

Market for Embedded Computing + M2M Solutions + Wearable Devices + Augmented Reality

From http://finance.yahoo.com/ 05/08/2014

TOP↑

 

OneAsia First in Asia to Deploy Software-Defined Networking Solution in Data Centre

 

OneAsia, the leading cloud solution and data center services provider in Asia today announced that it has deployed the Pluribus Networks F64 Server Switch, the state-of-the-art software-defined networking solution ("SDN") in its enterprise-class data centers in Hong Kong and Shanghai, mainland China. The innovative SDN solution is supported by the PN Technology (Asia) Limited, a reseller of Pluribus Networks in Greater China. The rapid shift of enterprise market from desktop converting to cloud computing and surge of big data are driving the needs to have data centres transforming to a whole new platform. Staying at the forefront of the industry, OneAsia is the first data centre in Asia to deploy SDN solution to improve the overall operation efficiency. "The huge uptake of cloud applications and big data creates new infrastructure challenges to data centres," said Charles Lee, Founder & CEO of OneAsia. "Nonetheless, we are fast in adapting the changes, and are now coping well with the deployed SDN solution to our data centres. With our data centres at the best-in-class infrastructure, OneAsia has the best solutions to assist customers on their IT challenges to improve their business agility in order to response towards the dynamic marketplace."

 

The SDN is an approach to networking in which control is decoupled from hardware and given to a software approach. This allows network engineers and administrators to have more control over network traffic flow and shorten the respond time for changing business requirements. "Combining SDN approach with Pluribus Networks F64 Server Switch, OneAsia is the first in Asia to offer the virtual data centre services, we called 'OneDC' in the market," said Charles Lee. "With our unique OneDC solution, customer can pick and choose any computing, network and storage sources among our data centre footprint and group them as a single DC." OneDC is the solution offered by OneAsia to address the market demands for full suite of DC services in multiple regions.

 

By combining NaaS (Network as a Service) & DaaS (Data Centre as a Service), OneDC enables rapid deployment for MNC to build full suites of DC services in multiple regions in days rather than months with very limited capital investment. Fusing the latest technology and a wide range of technical expertise, OneAsia offers a robust and secured IT environment for data sensitive enterprises such as financial & banking institutions and insurance companies. OneAsia will showcase the Pluribus Networks solution at the upcoming International ICT Expo from 13 April to 16 April, 2014. Furthermore, OneAsia will demonstrate its 2014 HKICT award winning cloud based CCTV solution together with other cloud applications at its booth located at booth#3G-C10 in hall 3 of Hong Kong Convention & Exhibition Centre.

From https://ca.finance.yahoo.com/ 04/09/2014

TOP↑

 

 

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/02.gif

 

 

 

China Now Has Over 250,000 4G Base Stations

 

By the end of March 2014, China had built over 250,000 4G base stations, representing a solid step for 4G development in the country.Commenting on 4G wireless development, Liu Jie, deputy director of the Bureau of Telecommunication Administration at the Ministry of Industry and Information Technology, said that with the rapid development of mobile communications networking technologies, the mobile Internet sector is also becoming a hot spot and focus for investment.Liu highlighted that after the experiment of TD-LTE network technologies was successful and the various industrial conditions became mature, MIIT issued 4G operating licenses to the three major Chinese telecom carriers in April 2013. At present, the three telecom carriers are all actively promoting 4G network construction. Meanwhile, the entire 4G mobile communications industrial chain, covering system equipment, terminal chips, and mobile software, achieved fast development.The issuance of Chinese 4G licenses stimulated the rapid development of the entire industry; however, China's 4G development still faces difficulties and challenges. Liu said that MIIT, along with other related Chinese ministries, is currently taking action to support and promote 4G industrial development and network construction and optimization, aiming to improve industrial chain and network service level, enhance user service quality, enrich business applications, encourage information consumption, and effectively boost demand.

From http://www.chinatechnews.com/ 04/25/2014

TOP↑

 

Big Data Reveals Trend of Chinese Auto Market

 

Many cars at the ongoing Beijing auto show can momentarily seize the attention of visitors, but such scenes can hardly tell what sorts of automobile are customers' favorites.A new report based on big-data technology, however, discloses some clues in the world's largest auto market.Prior to the opening of the auto show, Baidu, a leading Chinese search engine, issued a report on the features and demands of Chinese car buyers, by analyzing massive search data in the past year generated by the country's 600-million-plus Internet users.The report has been upgrading with a real-time feed of search inquiries related to the show, which kicked off on April 21 and will conclude on April 29.One finding may get foreign investors excited is that the number of search queries for "imported cars" increases slightly year on year, up to 26.1 percent, though domestic automobiles still dominate the current Chinese vehicle market.

 

According to real-time results generated by Baidu Index, searchers of imported cars are mainly young people under 30 years old.Another surprising finding shows that 42.6 percent of web users searching cars come from the fourth-tier, or very small cities, and the number is almost three times that from first-tier cities like Beijing and Shanghai, which have rolled out car-purchase restriction policies to tackle traffic congestion and air pollution.Price-sensitive Chinese consumers are beginning to pay more attention to car's comfort and functions, as more than 50 percent of search queries are related to SUVs or compact cars, according to the report.The report also offers a list of popular search keywords, including "most popular new models", "new-energy cars", "Top 10 traffic violations" and hot issues related to car consumption.Though the data-based report seems only to include web users, it also reflects some changes and habits of Chinese car buyers."

 

It is becoming very important for people to get information about cars online, especially in cities with very few test-drives, " said one web user.One analyst added that the report may invoke a revolution in the auto industry, indicating that search engine marketing would be prevailing.It is not the first time that Baidu has used big data to launch hot issue discussions. In February, it applied the real-time result to trace human migration during the Chinese Spring Festival travel rush and made a similar quantitative report on the most popular issues during the annual political sessions in March.Baidu chairman Li Yanhong said at the sessions that the Internet is accelerating the transformation of traditional industries towards higher efficiency.Zhang Yi, CEO of an Internet consulting company iiMedia Research, said the report is not a piece of pioneering work as many conventional industries have begun to make use of big data."What I am concerned more is how to use big data to solve the problem that people face every day," said Zhang, who expresses the wish that Internet giants could develop new technology to tell people traffic conditions and offer drivers smart suggestions.

From http://www.news.cn/ 04/28/2014

TOP↑

 

SOUTH KOREA: Gov't to Invest 4.9 Tln Won in ICT in 2014

 

The government will spend 4.9 trillion won (US$4.6 billion) this year on the national information technology strategy that aims to enhance South Korea's overall competitiveness and fuel economic growth, the science ministry said Sunday. Of the total, 3.94 trillion won will go to 786 projects being pursued by central government agencies, with 978.2 billion won to be given to finance 5,990 projects initiated by regional administrations, according to the Ministry of Science, ICT and Future Planning.

From http://english.yonhapnews.co.kr/ 03/09/2014

TOP↑

 

Technical Competency of S. Korean SMEs Lags World's Best: Poll

 

The technical competency of South Korea's small and medium enterprises (SMEs) stands at an average of 76.6 percent of the levels reached by the world's best companies, a nationwide business poll suggested Thursday. In the poll of 355 companies carried out by the Federation of Korean Industries (FKI), 43.3 percent of respondents rated their technical and engineering prowess at 70-90 points compared to a hypothetical 100 points given to leaders in their respective industrial sectors.

From http://english.yonhapnews.co.kr 04/10/2014

TOP↑

 

Telecom Ministry to Allocate 2.5ghz Spectrum in Second Half

 

The telecom ministry said Thursday it plans to put up for auction the sole right to use the spectrum band of 2.5GHz, used for long-term evolution time-division duplex (LTE-TDD) and wireless broadband (WiBro), in the second half. The move comes as KMI, a South Korean telecom firm, seeks to become the fourth local mobile carrier with the LTE-TDD network. The ministry had said it will receive applications for the mobile business license through early June and later commence the auction among qualified bidders.

From http://english.yonhapnews.co.kr 05/01/2014

TOP↑

Gov't to Inject 50 Bln Won into loT Industry

 

South Korea's telecom and industry authorities said Monday they plan to invest 50 billion won (US$48.7 million) by 2019 into the Internet of Things (IoT) industry, seeking to tap deeper into a new source of profit in the country's technology realm. Under the plan, the Ministry of Science, ICT and Future Planning and the Ministry of Trade, Industry and Energy will allocate 37 billion won over five years from next year to develop core technologies related to the IoT.

From http://english.yonhapnews.co.kr 05/12/2014

TOP↑

 

 

KT to Invest 4.5 Tln Won to Tap 'Giga Internet'

 

South Korea's top fixed-line operator, KT Corp., said Tuesday it will invest 4.5 trillion won (US$3.9 billion) to launch an Internet service that is 10 times faster than the existing technology, while expanding its business portfolio to emerging industries. KT said it plans to establish what it calls "GiGatopia," a society in which all humans and devices will be connected via high-speed network, and create new opportunities for local businesses.

From http://english.yonhapnews.co.kr 05/20/2014

TOP↑

Nigeria, North Korea Sign Co-operation Agreement on ICT, Education

 

Nigeria and North Korea on Tuesday in Abuja signed Information Technology cooperation agreement to promote exchange of information using modern technology between public sectors of both countries. This is contained in a joint communiqué issued at the end of the 4th Session of the Nigeria-Democratic People's Republic of Korea (DPRK) in Abuja. The nine-point communiqué was jointly read by the Permanent Secretary, Ministry of Foreign Affairs, Dr Martin Uhomoihbi and Mr Rio Myong San, Vice Minister of Trade of DPRK. It stated that both also agreed on an education cooperation agreement to promote exchange of visits between university lecturers and educationist from both countries. Under the agreement, university professor and technicians from both countries could carry out joint research projects in each other's higher institutions in the field of science and technology. The agreement also encourages university professors to carry out joint research programmes in agriculture, geology, oil and gas, industrial technology, among others.

 

According to the communiqué, both countries agreed to create an implementation committee that would coordinate and advice the joint commission on identified issues of mutual interest.

It added that the 4th session of the joint commission also discussed draft agreements and MoUs in the other areas of common interest for both countries, including agriculture, trade and technical cooperation, irrigation and water management. Later, Uhomoihbi told newsmen that as developing countries, Nigeria and North Korea faced teething development challenges. He said the joint commission was a platform to "address and surmount" the challenges for the good of citizens of both countries. Relations between our countries date back to 38 years ago when diplomatic relations was established in May 25, 1976. "One remarkable thing about our relations is that it has never been for once disrupted or frosty and this, indeed, is a testimony to very cordial and warm relations existing between both countries." Also the leader of the delegation from the communist state said North Korea had been supportive of Nigeria at the multilateral level. He cited his country's support for Nigeria at the UN Security Council non-permanent seat election in 2013.

 

"We wish Nigeria becomes a permanent member of the UN Security Council and play a greater role in representing and protecting the interests of African people in the international arena," San said. San said the agreements reached at the end of the 4th session of the joint commission would go a long way in strengthening economic ties between both countries. The Nigeria Ambassador to the DPRK, Mr Alex Nwofe, told newsmen that at present "there is no form of trade between Nigeria and DPRK." Primarily the reason is because of the nature of their policies; it is a communist regime and every government and economic action is controlled by the state. Individuals find it difficult to come and stay or trade in DPRK but we are trying to promote trade and there is collaboration between the investment authorities in both countries. "In September this year, we are planning an investment forum in Pyongyang," Nwofe said. Nwofe expressed the hope that economic relations between Nigeria and DPRK would improve at the shortest possible time given the assurances and commitment shown by both countries.

From http://allafrica.com 05/06/2014

TOP↑

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/03.gif

 

 

 

INDONESIA: Deploys Advanced Disaster Monitoring System

 

Indonesia’s national disaster management agency (Badan Nasional Penanggulangan Bencana, or BNPB) recently deployed an advanced hazard early warning and monitoring system called InAWARE in a bid to enhance its disaster management and response capabilities. The project is funded by the United States Agency for International Development Office of Foreign Disaster Assistance. It aims to support the Indonesian government’s goals of reducing disaster risk and increasing disaster resilience, thereby safeguarding the lives of citizens and minimising economic losses during natural disasters. InAWARE is based on the Pacific Disaster Centre’s (PDC) DisasterAWARE platform which consolidates hazard information and alerts from various national and international sources. The system also facilitates information sharing within and between Indonesia’s national and provincial disaster management stakeholder agencies to help government authorities arrive at well-informed decisions during times of natural calamities. PDC was established by the US Government in 1996 and is currently being managed by the University of Hawaii.

From http://www.futuregov.asia/ 03/26/2014

TOP↑

 

How Big Data and GIS Will Plan a Livable Singapore

 

Kicking off the first FutureGov Cities and Big Data Summit, Peter Quek, CIO at the Urban Redevelopment Authority of Singapore, shared how they are using GIS to fully maximise the value of big data enabling them to design livable communities in the city state. Speaking to over a hundred senior IT decision makers from some of Asia’s fastest growing cities, Quek highlighted how GIS technology is the glue of Big Data for city planning. Apart from being one of the most densely populated countries in the world, Singapore’s limited land means that the margins of error associated with land use and resource allocation have also become smaller. “GIS is helping us overcome these challenges by allowing us to harness our data so that we can come up with innovative solutions that fit our requirements.” During his keynote, Quek also showed how URA is using today’s most advanced 3D smart city technology from Esri to help urban planners perform urban design simulations. The technology allows planners to simulate how different building forms affect the surrounding environment and safeguard view corridors to lush greenery. They can also conduct shadow studies on proposed developments to see how public spaces can be shaded for better comfort. “At the end of the day, urban planning is about the people. How can we make their lives better? How can we make the surrounding environment more livable and sustainable? By using GIS we can study different scenarios that can help us design the future of our communities,” he said.

From http://www.futuregov.asia/ 04/16/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/04.gif

 

 

 

BANGLADESH: Internet for Empowerment

 

Grameenphone aims to get 50 to 60 percent of the country's population online in the next three to four years, said the carrier's chief executive Vivek Sood at a roundtable yesterday. Currently 22 percent people use the internet, according to the data of Bangladesh Telecommunication Regulatory Commission. Sood urged all stakeholders including the government, regulator, carriers, application developers, equipment suppliers, device manufacturers to come forward in developing a comprehensive system for higher use of the internet in Bangladesh. Sood was addressing the roundtable “Telenor Exchange-Empowering Societies Through Internet For All” at The Daily Star centre jointly organised by Grameenphone, its majority shareholder Telenor Group, and The Daily Star. Grameenphone officials, ICT analysts, leaders of different trade bodies, journalists and officials of different IT firms took part in the discussion on the role of the internet in developing Bangladesh. The Grameenphone chief said his company acquired 4.8 crore subscribers over the 17 years of the company's operations. Its entire countrywide network had internet services along with the voice service. “Internet For All is the second step forward for Grameenphone. The previous was communication ... ”

 

 

He said with every “10 percent data penetration increase, 0.5 percent GDP (Gross Domestic Product) growth is observed”. “The telecommunication sector as a whole contributed 1.2 percent in the GDP but if you consider the productivity and other factors, the effect of the connections on the GDP is 5 percent,” Sood said. The effect of data connections in countries like Bangladesh was very significant on health, agriculture and education sectors when compared to developed countries. “For example, 80 percent students of Bangladesh go for private tuitions, which are expensive, but if we can provide them with facilities for online education the cost of education can be slashed significantly,” he said. Mahfuz Anam, Editor of The Daily Star, said Internet For All is doable in Bangladesh because of the technology revolution, the internet infrastructure is getting cheaper and better, and the high penetration of mobile phones in Bangladesh. “It is doable because people of the country learn new things very easily,” he said. “If you lay 1 kilometre of optical fibre line in the country, you may get far higher use of it compared to any other country in terms of per capita investment.”

 

The editor said the internet was great for bridging the gap between poor and rich countries and people, and the rural and urban population. The objective of the event was to discuss how to achieve the Internet For All goal. The discussion focused on the challenges of the internet penetration in Bangladesh, like affordability of smartphones for the masses, internet cost and speed, application development, and tax related issues. Anders Hallin, chief strategy officer of Telenor Digital of Telenor Group, said media could play a vital role in building the comprehensive system for the internet by covering success stories that encourage others to be innovative. Big companies could not build the comprehensive internet system, rather small entrepreneurs did, which has had happened in Bangkok over the last couple of years, he said.

Mustafa Jabbar, President of Bangladesh Computer Samity, said 15 percent value added tax (VAT) on internet usage should be withdrawn. He added that if the whole country could not be covered with 3G service, it would not be possible to achieve the goal of Internet For All. The country's five mobile phone carriers were providing 3G services mainly in the divisional cities and the government gave the spectrum in September last year, he said.

 

He said the government was selling 1 megabit per second for Tk 4,800 but it was asking businesses to sell the same bandwidth for Tk 200. Around 200 gigabits per second bandwidth remain unused due to high charges, he said. Aminur Rashid, chief executive officer of Symphony Mobile, said 97 percent internet users were mobile device users in Bangladesh even though 40 percent of the smartphone users do not use the internet. Salehuddin Ahmed, managing editor of The Daily Star, moderating the discussion said smartphone affordability was an issue, which should be addressed so that students could use them. SM Ashfaque Hussain, executive director of Bangladesh Computer Council, said the government was thinking about reducing the internet charges soon. He requested the carriers to reduce the internet rates. Russell T Ahmed, secretary general of Bangladesh Association of Software and Information Services, said the internet price was not an issue; rather mobile applications would pilot high use of the internet. If the government did not declare the internet a basic commodity, it would not be possible to expand its usage.

 

Munir Hasan, general secretary of Bangladesh Open Source Society, said young Bangladeshis were earning Tk 1.1 crore by doing freelance work over the internet. Now user-generated content should be developed, he said. Erlend Prestgard, head of strategy of Grameenphone, said currently carriers in Bangladesh were providing the lowest voice tariff in the world. If the government provided proper regulation and policy support, the same thing would happen for data services, he said. “We would love to provide WiFi support to the educational institutions but the regulations do not allow us.”

From http://www.thedailystar.net/ 03/09/2014

TOP↑

 

WB Funded ICT Project to Create Huge Employment

 

Government with support of the World Bank is implementing the “Leveraging ICT for Growth, Employment and Governance Project”, which is expected to create 30,000 direct jobs in Information Technology (IT) and Information Technology-enabled Services (ITES) sectors, says a press release. The project will help to catalyze the growth of Bangladesh's IT/ITES industry for employment creation and export diversification, and establish basic e-Government foundations to support public sector modernization. The project has the potential to create up to 120,000 indirect jobs. It is expected that the IT and ITES industry revenue will increase by over US$ 200 million by the end of the initiative, says the release. A recent review of the project implementation status found that it is on track to achieve its objectives but needs to be monitored closely to speed up implementation.  The Project Coordination Unit (PCU) has been established and it has been conducting extensive pre-implementation technical work. However, while the technical approach of project implementation is comprehensive, the contracting and disbursements are slow and below target with the project not contracting any firms for the larger sized activities as of date.

From http://www.theindependentbd.com/ 04/18/2014

TOP↑

IT Outsourcing – Emerging Forex Earner

 

The IT industry in Bangladesh is relatively new when compared to other business sectors. But the IT and IT-enabled services (ITES) industries have grown rapidly in the country in recent years. According to the Export Promotion Bureau (EPB), the country earned USD 101.63 million in the last fiscal (2012-13) by exporting software and IT-related products. The amount was USD 70.81 million in the previous fiscal (2011-12) and USD 45.31 million in 2010-11. Exports are increasing day by day. However, according to sources, the figures do not include remittances earned by the freelance community who do the outsourcing, as the payment procedures are cumbersome. Today, Bangladesh is quietly evolving from being a beginner to a serious contender in the global outsourcing market. According to the Bangladesh Association of Software and Information Services (BASIS), the country has more than 60,000 active freelancers working from home. At present, around 800 software and ITES companies are registered in Bangladesh. The size of the IT market, excluding telecom, in Bangladesh is estimated at USD 300 million in toto; the software and ITES industries share around 40 per cent (USD 120 million) of the market.

 

Out of 800 software and ITES companies in Bangladesh, more than 100 companies export their products to over 30 countries. ITES exports of Bangladesh have been increasing rapidly. The major export market is North America, but recently many IT companies have started exporting to EU countries and East Asian countries, especially Japan. At least 30 companies, among 100 companies that export their products, have been established through joint ventures with overseas companies. Most of the work by the Bangladeshi freelancers comprises low value-added jobs such as graphics design, data entry and search engine optimization (SEO), search engine marketing (SEM) and social media marketing (SMM). Freelancers skilled in web development, software development, writing, design, and multimedia and architecture can earn huge amounts of foreign currency. Bangladeshi freelancers will have to be more involved in work such as web or software development. Outsourced middle management is still scarce in our country. A search engine optimizer earns USD 3 to USD 5 per hour whereas a web developer, because of his/her excellence, earns USD 30 to USD 100 per hour.

 

Web designing, computer programming, mobile apps development, SEO, data entry, logo design, music video production, researching and editing books, legal work, consultancy, medical transcription, tax preparation and content development are some of the main areas in which Bangladesh can earn huge amounts of foreign currency through outsourcing. Some Bangladeshi companies also work on product development, mobile applications development and software development. Today many global companies – which were once clients of these companies — have bought into them, and are using them for mid-range software and IT outsourcing projects. Companies like Vizrt (Norway), Bording Data (Denmark) and WPP are examples. The global IT outsourcing industry has been growing steadily in the last decade. There has been continuous growth in the demand for global sourcing of IT services, with cost optimization being the primary driver for offshoring services. Bangladesh, with a population of over 160 million, can grab this opportunity. The mean population age is rather young and a significant portion of the total population (some 34 per cent) belongs to the productive age group of 16 to 35 years.

 

“I completed my Honours and Master’s degrees in Political Science, but I’ve been doing outsourcing and earning some Tk. 30,000 to Tk. 40,000 per month,” said Sultana Pervin , who received the BASIS Outsourcing Award 2014 in the women’s category for her outstanding performance among individuals in the field of outsourcing.  Many large companies in the US, the UK, Australia, Canada and other countries prefer outsourcing. It is done to save money, reduce risks, improve quality and free company resources for other activities. Freelancers complain that the main problem is that they feel insecure about payments. Sometimes freelancers do not get the payment as promised by clients. Also, getting paid is a hassle since a large number of clients want to pay via PayPal, a global online money transfer service, and PayPal does not operate in Bangladesh. ICT secretary Nazrul Islam Khan said, “PayPal is a US-based company; we tried to bring the service to our country, but they were not interested as our market is not large enough.” He added that attempts have been being made to bring PayPal services to Bangladesh for making online payments and hoped it would become possible one day. Software engineer Zia-ur-Rahman complained that the cost of internet use is much higher, making it inconvenient for freelancers. Zia added that an Indian or Filipino freelancer can easily get a Payoneer debit card, but it is very difficult to get such debit cards in Bangladesh.

 

Bangladesh was recently ranked no. 3 in oDesk, just behind freelancers from the Philippines and India. It appears consistently in top freelance work locations on sites like oDesk, eLance and the like. Like the readymade garment (RMG) sector, experts say the country’s IT industry may emerge as one of the key destinations for IT outsourcing if it receives adequate policy support. “It is clear that Bangladesh’s IT outsourcing industry has huge potential, and if this can be nurtured through proper incubation and educational support, this industry will earn Bangladesh more foreign currency than any other industry in Bangladesh,” said the industry insider. Many domestic business leaders conceded that the Bangladeshi outsourcing industry could better market its strengths to the international community if there was no negative perception about the country. The government needs to take a holistic approach towards promoting the IT and ITES industries, including improving the investment climate, taxation policies, the system of remittances and the legal framework, and promoting flexible working hours. Now that Bangladeshis have access to WiMAX and 4G networks, they can easily get connected to the world. Through mobile phones, a person can contact any corner of the country and even any place in the world.

 

To promote freelancing all over the country, the Bangladesh government has undertaken a special programme. ICT secretary Nazrul Islam Khan said the government has undertaken a project titled ‘Learning and Earning’ at a cost of Tk. 180 crore to train some 55,000 freelancers (self-employed persons) for developing skilled manpower in the field of outsourcing of software and IT services by creating employment opportunities and for earning foreign exchange. The government also plans to turn the country’s 4,516 union information service centres (UISCs) into outsourcing centres, aimed at facilitating outsourcing training and jobs that will ultimately boost earning of remittances, said Nazrul Islam Khan.

From http://www.theindependentbd.com/ 04/20/2014

TOP↑

 

BD Could Be Mighty Player in Global IT: Mozena

 

US Ambassador in Dhaka Dan Mozena on Saturday said Bangladesh can become a mighty player in the global IT and in other sectors by dint of hard and creative work by each young entrepreneur in the country. “I believe fervently that Bangladesh can become a mighty player in the global IT world and in other sectors as your startups take root,” he said. The US diplomat made the remark while addressing a prize distribution ceremony of Global Innovation through Science and Technology (GIST) DEMO Day at a city hotel. Mozena said he wants to see a Bangladesh that is the software development capital of the world, driven by Bangladeshis’ extraordinary brain power. “I see Bangladesh growing into the hardware development side of the equation, too. And I see other creative startups flourishing and prospering.” The UD envoy also said the vision will become reality and young entrepreneurs are the ones who will build the renaissance of Bangladesh.  

 

He said America will remain partner in helping bud Bangladeshi entrepreneurs connect with each other and connect with innovators around the world. Mozena said he is going back to America in June and lead a delegation of young entrepreneurs. “I travelled this country and I’ve seen so much in this country. I’ve that perspective…it’s incredibly positive stories,” he said adding that he encourages Bangladeshis to tell their own stories. The US Embassy in cooperation with Startup Dhaka, welcomed over 365 members of the Bangladeshi entrepreneurship community to the US Department of State’s Global Innovation through Science and Technology (GIST) DEMO Day. The morning included lectures on key entrepreneurship topics. Seven top Bangladeshi startups pitched their science and technology business ideas to the audience and showcased their innovative ventures. In the two days leading up to the GIST DEMO Day, GIST and Startup Dhaka worked with 30 Bangladeshi entrepreneurs, providing intensive training aimed at honing participants’ skills to advance their startups. US mentors traveled to Dhaka to share their expertise and business stories with the young innovators.  

 

Jim Bagnola, President of the Leadership Group International, worked with the entrepreneurs on building relationships and startup teams. Jim Chung, Executive Director of Entrepreneurship and Technology Transfer at George Washington University, discussed cost structure, revenue streams, and negotiating with investors. Thor Ernstsson, Founder of Casual Corp, taught a session on raising capital for startups. Each of the 30 Bangladeshi startups also received one-on-one mentorship from U.S. and local mentors, such as Riyad Husain of Magnito Digital and Nazmul Chowdhury, Senior VP of City Bank.   Launched in 2011, GIST is a partnership led by the US Department of State and CRDF Global. GIST focuses on empowering young science and technology innovators through capacity building, mentoring, and networking. Startup Dhaka founder and CEO Mustafizur Rahman and co-founder Fayaz Taher were also present.

From http://unbconnect.com/ 05/24/2014

TOP↑

Govt Picks 160 Youngsters in 1st Batch to Develop as IT Leaders

 

Dhaka, May 25 (UNB) – The government has finally selected the first batch of 160 youngsters, aiming to build them as future IT leaders, official sources said.   The Fast Track Furture Leader (FTFL) programme under the Leveraging ICT for Growth, Employment and Governance (LICT) project of Information and Communication Technology (ICT) Division selected them from among 3,313 graduate youngsters who appeared in the competitive online examination held from May 6 to 12 last.   IT industries and organisations will provide service to these selected youths in four tracks — IT Services (ITS), IT Enabled Service Track (ITES), IT Support Service Track (ITSS) and Management, said LICT acting project director Saker Abul Kalam Azad.   He said the youngsters will be given one-month residential training on soft skills and two months foundational training as per requirement of IT industries and organisations.   Information and Communication Technology (ICT) Secretary Md Nazrul Islam Khan at an orientation function on Saturday briefed the selected 160 youngsters and their parents about the training and prospect of the IT sector. 

 

Nazrul Islam Khan said the demand for skilled human resources in the ICT sector is growing fast with the implementation of various programmes and initiatives in line with the Digital Bangladesh vision.   “We’re creating about one lakh freelancers, 2,000 entrepreneurs and 2,000 mobile application developers who will make their contribution to the ICT sector,” he said.   According to the sources, the government is implementing the LICT project involving Tk 572 crore to flourish the IT sector. The World Bank is providing 70 million US dollars credit to implement the five-year project that began in 2013.

From http://unbconnect.com/ 05/25/2014

TOP↑

 

 

INDIA: Government IT Spending to Reach $6.4 Bn

 

IT spending by different government agencies in India will increase 4.3% annually to $6.4 billion this year, predicts research firm Gartner. This forecast includes spending by government on IT personnel, hardware, software, external IT services and telecommunications. “IT services, including consulting, implementation, IT outsourcing and BPO, will be the largest overall spending category throughout the forecast period within the government sector,” said Anurag Gupta, research director, Gartner. He added that IT services are expected to grow 3.8% in 2013 to reach $1.46 billion in 2014, up from $1.37 billion in 2013 – with the BPO segment growing 16.3% in 2014.” Software will achieve the highest growth rate within spending categories with 10.3% in 2014 to reach $758 million this year, up from $687 million last year, led by growth in vertical specific software. Gartner explains these software applications are unique to a vertical industry and are stand-alone applications that are not modules or extensions of horizontal applications. E-governance initiatives by various governments aided by expansion of affordable broadband connectivity and mobile solutions will generate more business for ICT service providers, says the report.

 

Moreover, salaries and perks paid to IT services staff that plan, develop, implement and maintain information systems of organizations will also grow 9.4% in 2014, says Gartner. Finally, more government agencies in India will spend in social media and the next one year will see widespread adoption of Facebook and Twitter account by government agencies – both Central and State governments, updating thier achievement and historical landmarks as well as for answering customer queries. In a recent interview to NDTV, I&B Minister Shri Manish Tewari mentions, “The prospect of social media as a governance tool has been recognized by the Government of India, and there will be a greater spends in this area.”

From http://www.cxotoday.com/ 02/26/2014

TOP↑

 

 

Internet of Things to Accelerate Supply Chains

 

Imagine never running out of a product or having surplus stock because you always know exactly what your customers want and when. The day may not be far as a recent Gartner study predicts that the Internet of Things (IoT) will enable supply chain leaders to offer more differentiated services to customers through a networked ecosystem that can formulate an intelligent response in the coming years. The research firm forecasts a 30-fold increase in Internet-connected physical devices by 2020 will alter supply chain leaders’ information access and risk exposure.“It’s important to put IoT maturity into perspective, because of the fast pace at which it is emerging, so supply chain strategists need to be looking at its potential now,” said Michael Burkett, managing vice president at Gartner. “Some IoT devices are more mature, such as commercial telematics now used in trucking fleets to improve logistics efficiency. Some, such as smart fabrics that use sensors within clothing and industrial fabrics to monitor human health or manufacturing processes, are just emerging.” As these capabilities become mainstream, they will allow modern supply chains to deliver more differentiated service to customers more efficiently. This will happen when many more physical assets will be communicating their state to a networked ecosystem that then formulate an intelligent response.

From http://www.cxotoday.com/ 03/25/2014

TOP↑

 

 

SRI LANKA: IT/BPM Achievements Shortlisted for Global Outsourcing Award

 

Recent outstanding achievement of having been selected as the Offshoring Destination of the Year 2013 by the National Association for Outsourcing (NOA) in UK, Sri Lanka's Outsourcing Industry has achieved another significant achievement by getting shortlisted for the Offshoring Destination of the Year Award by the European Outsourcing Association.The EOA Awards (EOAAs) now in its fifth year recognizes and celebrates the efforts of companies and individuals who have demonstrated best-practice in outsourcing.The Awards bring the best and brightest of Europe's outsourcing industry together, featuring a range of suppliers, end-users and support service providers and affiliate organizations from the UK, Austria, France, Germany, the Netherlands, Belgium, Italy and Spain, to reward European outsourcing successes.The CEO of the NOA, which manages the activities of the EOA, Kerry Hallard, said: "Once again the EOA Awards has seen a record-breaking year for submissions, featuring a host of best-practice examples from across the European outsourcing industry.

 

I am delighted to see such variety and detail within this year's entries, which goes to show the level of talent and professionalism that exists within our industry. All shortlisted applicants should be incredibly proud to have reached this stage". Expressing his views on Sri Lanka's short listing for this year's EOAAs in the Offshoring Destination of the Year Category, SLASSCOM Chairman Madu Ratnayake stated that" We are delighted to be shortlisted for the European Outsourcing Awards right on the heels of victory at the UK Outsourcing Awards. Sri Lanka offers a very compelling value proposition for European businesses as an outsourcing destination. Especially for Software Product Engineering and Financial Accounting Outsourcing (FAO) Sri Lanka is one of the best partners for Europe. Europe remains an important market for Sri Lankan Outsourcing companies and being short listed for this award is a singularly important achievement for the country. We hope the visibility that Sri Lanka get with this shorting would encourage European companies to explore the tremendous potential Sri Lanka has to offer."

 

Ranked among the Top 25 Global Outsourcing destinations by AT Kearney and among the Top 20 Emerging Cities by Global Services, Magazine, the Sri Lankan environment is highly conducive for allowing global enterprises to enjoy premium access to a high quality talent pool for small to medium scale engagements whilst establishing high-in-demand niche competency centers. Sri Lanka acts as an off-shore development centre and joint venture development centre to several Fortune 500 companies and industry leaders from the North American continent, Great Britain, Australia, Sweden, Norway, and Japan. Foreign entities that have invested in Sri Lanka have already begun to tap the local talent; HSBC, Industrial & Financial Systems (IFS), Amba Research, RR Donnelley, WNS,Virtusa, Pearson, Valista, Millennium Information Technology (owned by London Stock Exchange), and Innodata Isogen are overseas investors that have become firm believers. However, there are also over 300 other Local IT companies such as Informatics, hSenid, John Keells, DMS that also operate within a fiercely competitive environment.

 

Among Globally recognized customers of Sri Lankan ICT products and services are names such as JP Morgan, Google, Microsoft, Qatar Airways and Emirates. With more than 1,000 corporate members from the eight national trade associations the EOA chapters span across the following countries: Austria, Belgium, France, Germany, Italy, The Netherlands, UK and Spain. SLASSCOM acts as a catalyst of growth of the Sri Lankan IT and BPO industry by facilitating trade and business, propagation of education and employment, encouragement of research and innovation, and by supporting the creation of a progressive national policy framework.

From http://www.dailynews.lk/ 04/24/2014

TOP↑

 

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/05.gif

 

 

 

AZERBAIJAN: ICT Sector’s Revenues Rise by over 11%

 

In January-February 2014, the organizations and population in Azerbaijan were provided with information and communication services worth 243.9 million manats, which is 11.2 percent higher than the same period of 2013, Azerbaijani State Statistics Committee told Trend on March 13. Some 72.4 percent of the total volume of information and communication services accounted for services rendered for the population, according to the committee. Alongside this, some 58.1 percent of the total received incomes accounted for mobile services. The total revenues received from mobile services in Azerbaijan over this period stood at 141.7 million manats, which is 7.4 percent higher than the same period of 2013. The official exchange rate on March 13 is 0.7844 AZN/USD.

From http://en.trend.az/ 03/14/2014

 

TOP↑

 

Azerbaijan to Invest About $ 4 Billion in ICT Sector

 

It is expected that investment in the development of the ICT sector in Azerbaijan will amount to about $4 billion by 2020, the Azerbaijani Minister of Communications and High Technologies Ali Abbasov told local media.  The interview states that in accordance with the "Azerbaijan 2020: Vision for the Future" development concept, the volume of the ICT sector in the country will increase by 4.5-5 times at an average annual growth rate of 15-20 percent.  The minister stressed that Azerbaijan's ICT sector revenues will amount to 8-8.5 billion, or about 10 percent of GDP by 2020.  Abbasov also noted that the development project of broadband Internet ("Fiber to the home"), will initially cover 2014-2016 in Azerbaijan.  Some 103 million manat is to be allocated from the Azerbaijani State Oil Fund for the implementation of the project in the first stage.  The cost of the project " Fiber to the home " is estimated at more than 450 million manat. The project is considered highly profitable. Around 30-35 per cent of its total cost will be financed through reinvestments beginning from the second year of its implementation.  The ultimate goal of the project is to provide the whole country, including remote rural settlements with high-speed Internet in the range of 30-100 Mbit / s and bring the number of broadband Internet users up to 85 percent. This will allow Azerbaijan to reach the level of the world developed countries by 2017.  At present, around 70 per cent of the population uses the Internet in Azerbaijan. The penetration rate of broadband Internet among the population is 50 percent.

From http://en.trend.az/ 04/16/2014

TOP↑

 

Azerbaijan to Attract Consultant to Assess Prospects for ICT Development

 

The Azerbaijani Ministry of Communications and High Technologies intends to attract a consultant to prepare a package of proposals, Azerbaijani Minister of Communications and High Technologies Ali Abbasov said at the board meeting on April 17 dedicated to the results of the first quarter. This consultant will ensure the achievement of the objectives as part of the new state program for the development of the information society. The draft state program will be prepared within four months. The work on the preparation of the state program is being conducted as part of the "National Strategy for Information Society Development in Azerbaijan for 2014-2020". The national strategy will be implemented in two stages. The first phase will cover 2014-2017, the second one - 2018-2020. "A tender will be announced to choose the consultant," the minister said. "The leading international and local experts will be able to participate in it." Booz Allen Hamilton consulting company prepared a package of proposals for the further development of the ICT sector in Azerbaijan in 2008. The company unveiled a package of proposals. All work to be undertaken to achieve these goals was thoroughly described there. The package included the analysis of the country's export potential in the field of ICT. "Azerbaijan approved about 30 percent of the prepared proposals," Abbasov said. "Azerbaijan is between developed and developing countries in terms of ICT development today."

From http://en.trend.az/ 04/19/2014

TOP↑

 

ICT Sector Share in Azerbaijan's GDP to Reach 9% by 2020

 

The average annual growth in the ICT sector in Azerbaijan in 2020 is expected to be 18-20 per cent, and income of the sector will be approximately $8-9 billion, the Deputy Minister of Communications and High Technologies Elmir Valizade said. "This is a very important goal, and now the work is already being done in this direction," Valizade said during the first international Caspian Energy Forum - 2014. If in 2003-2009 the share of ICT in GDP was five per cent, it is expected that by 2020 this figure will reach nine per cent, according to the deputy minister. The ongoing reforms confronts the ministry with the new goals and objectives, among which are development of micro-, nano-, bio-, space and nuclear technologies, the introduction of high technology and obtaining of new materials on their base, including the creation of conditions for the production resource-intensive technologies and products. "It is necessary to create a favorable competitive environment and increasing staff potential in order toachieve these goals. It is important to strengthen cooperation with the private sector of economy," Valizade said. In general, an important component of doubling GDP of the country by 2020, in accordance with the "Azerbaijan 2020: A Look into the Future" Development Concept is the development of non-oil sector of the economy and the transition from a traditional to knowledge-based economy expansion of innovative activity, etc.

From http://en.trend.az/ 04/25/2014

TOP↑

 

Azerbaijan, Japan Sign Intergovernmental Agreement on Cooperation in ICT

 

The cooperation between Azerbaijan and Japan in the field of information technologies will be fixed by an intergovernmental agreement, the Azerbaijani Ministry of Communications and High Technologies said on April 28. The issue of developing the bilateral relations was discussed by Azerbaijani Minister of Communications and High Technologies Ali Abbasov and Japanese Deputy Foreign Minister for Parliamentary Affairs Takao Makino. Referring to the preparatory work carried out at the level of the working group, upon the conclusion of an intergovernmental agreement, Makino emphasized large prospects for determining the cooperation areas and their development and expressed confidence in further strengthening the mutual ties. "The participation of the Japanese companies in Azerbaijan's large projects in the field of ICT and high technologies is an encouraging fact," he said. At the meeting Abbasov spoke about the Azerbaijani-Japanese relations, stressed the mutual interest in the development of bilateral cooperation, favorable atmosphere created to intensify the relations between the two countries.

 

While recalling Azerbaijani President Ilham Aliyev's visit to Japan, which gave a new impetus to the development of bilateral relations between the two countries, the minister stressed the continued positive dynamics in the mutual relations. While speaking about the new opportunities for expansion and further development of the ICT sector and high technologies in the Azerbaijani-Japanese relations, the minister recalled the Azerbaijani delegation's visit to Japan in December 2013, successful meetings held with the management of the Japan Aerospace Exploration Agency, Mitsubishi, High Technology Center (TEPIA) and other leading companies. It was stressed that much attention is paid to the development of information and communication technologies (ICT), particularly, high-technologies to diversify the economy in terms of Azerbaijan's economic development. The government's actions on creating a liberal market economy, including an attractive, free, favorable business environment, expand the opportunities for attracting the foreign investors. "In such circumstances, Azerbaijan, like other countries, is interested in expanding the activity of Japanese companies in the country," the minister added.

 

 He highlighted three main directions (space technologies, nanotechnologies and microelectronics, creating digital infrastructure) of expanding the cooperation between the two countries. While stressing the importance of mutual visits for intensifying the relations, the head of the Japanese delegation mentioned that the Azerbaijani delegation's visit to Japan played a positive role in the development of a new stage of cooperation in the ICT and high technologies in the Azerbaijani-Japanese relations. The Japanese guest said that the establishment of the Azerbaijani Ministry of Communication and High Technologies shows that the goals in the area of high-technologies will be achieved. He also appreciated the interest of Japanese companies in the sphere of high technologies in Azerbaijan.

From http://en.trend.az/ 04/29/2014

TOP↑

 

 

UZBEKISTAN: Mobile Communication Penetration Level Exceeds 64 Percent

 

The level of mobile communication penetration in Uzbekistan stands at 64.3 percent, according to the InfoCom.uz magazine.  The number of mobile service users in Uzbekistan in early 2014 was 19.6 million out of a 30.5 million population of Uzbekistan, the magazine said.  Cellular services in Uzbekistan are rendered by four operators: Beeline (Unitel LLC) - GSM standard, Ucell (FE COSCOM LLC) - GSM standard, Perfectum Mobile (Rubicon Wireless Communication) - CDMA standard and Uzmobile (branch of JSC Uzbektelecom) - CDMA-450 standard.  Beeline is the largest cellular operator in Uzbekistan in terms of the number of subscribers standing at over 10.5 million. Beeline is a subsidiary of the Russian VimpelCom OJSC Company in Uzbekistan and has a market share of 53.6 percent.  The subscriber base of the COSCOM mobile operator which is Scandinavian TeliaSonera's subsidiary in Uzbekistan, operating under the Ucell trademark, is 8.5 million, or 43.4 percent of the country's mobile users market.  It is expected that the mobile subscriber numbers will increase and the market shares of the Uzbek mobile operators will be redistributed with regard to the Uzbek president's decree 'On measures to organise the activity of the national mobile operator' adopted in February, the magazine said.

From http://en.trend.az/ 04/02/2014 

TOP↑

 

 

 

 

 

http://www.unpan.org/information/RCOCI%20GovernanceWatch/images/new/06.gif

 

 

 

AUSTRALIA: IT Industry Facing a ‘Digital Leadership Vacuum’

 

Australia is lagging behind the rest of the world in the digital stakes when it comes to digital-leadership, according to a new global report which warns that our IT leaders need to take up the challenge of digitalisation or risk falling further behind. In its annual global survey of CIOs, Gartner highlights the fact that Australian organisations have fewer chief digital officers – 1.8% compared to a global average of 6.6% - and outsource less and consumer fewer public cloud services than worldwide averages. Gartner says that while Australian businesses expect IT to support growth, many are cutting IT budgets and falling behind the rest of the world in digitalisation, raising the prospect of a digital “leadership vacuum”. With IT budgets shrinking by 0.1% (compared to global growth of 0.2%), Gartner says that Australian IT leaders have less money to fund growth. And, according to Gartner vice-president Andy Rowsell-Jones, a closer look at IT spending in Australia shows 26% spending will be outside of the IT budget, which could raise “integration issues in the short term and governance issues in the long term.”

 

“If Australian IT leaders are to ‘tame the digital dragon’, they need to address three top priorities - developing digital leadership, renovating the core of IT, and building bimodal capability.” According to the Gartner report, most Australian businesses have established IT leadership, strategy and governance, but have a vacuum when it comes to digital leadership. Rowsell-Jones says that to exploit digital opportunities and ensure the core of IT services are ready, there must be clear digital leadership, strategy and governance. Gartner recommends that all business executives need to become “digitally savvy”, and says that digital leadership needs to be clear and unambiguous. “For Australian IT leaders, the challenge is making sure every business executive understands the importance and potential impact of the digital dragon,” Rowsell-Jones says. Whether your enterprise has a CDO or not (a role not yet common in Australia), we recommend that CIOs contribute to and, if necessary, lead the discussion about the implications of the ‘digital dragon’ on the enterprise. We expect the CDO role to become more common over the next five years. We expect its scope to grow, too. If your enterprise does not have a CDO, make sure you’re contributing to the debate.”

 

The Gartner survey reveals that, across the globe, 42% of CDOs are currently focused on digital marketing, but this number is falling as more CDOs become true advisors on digital business strategy to the CEO and board of directors, and so they move into the arena of business strategy. So, where are Australian CIOs spending their money? According to Gartner, the focus is clearly on new opportunities, such as big data and mobile, which Rowsell says is unsurprising given the rapid growth in market adoption of mobile-data-enabled smartphones and tablets, the increased popularity of BYODs, and the explosion in devices capable of participating in the Internet of Things. “However, a lot of new spending is also going into improving core systems and capabilities – in other words, ensuring the infrastructure is fit for purpose to make IT digital-ready.”

 

Table 1: Technology Spending Focus: Australia vs. Global

Australia               Global

1. Mobile                                        1. BI/Analytics

2. BI/Analytics                                        2. Infrastructure and Data Centre

3. Cloud                                         3. Mobile

4. ERP                                                     4. ERP

5. Digitalisation/Digital Marketing               5. Cloud

6. Infrastructure and Data Centre               6. Networking, Voice and Data Communications

7. Industry-Specific Applications                          7. Digitalisation/Digital Marketing

8. Networking, Voice and Data Communications      8. Security

9. Legacy Modernisation                     9. Industry-Specific Applications

10. Security                                            10. CRM

11. Cost/Efficiency                                11. Legacy Modernisation

12. CRM                                         12. Collaboration

Source: Gartner, March 2014

 

Gartner’s survey data shows that one-fifth of Australian businesses and governments have made significant investments in public cloud, placing them slightly behind their global peers. And, the analyst firm says that the other striking difference between Australian IT leaders and their peers is the type of cloud services being purchased. According to Gartner, only 43% of Australian businesses have invested in SaaS, compared to a “staggering” 72% globally, and they warn this could lead to Australian businesses missing out on the flexibility benefits of SaaS, which offer turnkey solutions to IT service needs. Gartner analysts said that for most organisations in Australia, the dialogue around public cloud has transitioned from concerns over service levels and security to a pragmatic discussion of what, when and how. This change, says Gartner, is driven by supply-side improvements from cloud services providers, an increasingly well-informed understanding of public cloud by business management, and pressure to achieve Web-scale architecture, performance and agility.

 

“Renovate the core of IT. Prepare it to be digital-ready. This includes making investments in mobile in the shape of app development, and bring your own device (BYOD) support,” said Rowsell-Jones. Underpin this with investments to make sure the IT ‘engine room’ is also digital-ready.” Rowsell-Jones highlight the fact that in 2013, federal and state governments announced ‘cloud first’ strategies and procurement models for IT infrastructure and applications, and says that  while Australia’s public-sector migration to cloud delivery models is currently in its early stages, “it’s indicated that IaaS and SaaS adoption will make significant progress in 2014.” 

 

On attitudes towards sourcing, Gartner says this about Australia:

• Australian IT leaders have long embraced strategic sourcing, mixing in-house with sourcing from offshore captive units, contractors and fully-fledged outsourcers. However, the survey data shows a different story. In contrast to the rest of the world, Australia is actually less ‘outsourced’ than its peers. Only 6% of Australian businesses are mainly or wholly outsourced, while 60% use mixed sourcing. This is compared to 10% and 63% respectively among global peers.

• However, Australian IT leaders expressed a strong intention to embrace strategic sourcing more wholeheartedly, with 76% saying they plan to change their technology and sourcing approach in the next two-to-three years.

And, on building bimodal capability:

• IT leaders are resorting to splitting their IT organisations in two, in response to the age-old tension between needing to provide safe, reliable and integrated enterprise IT, and being able to experiment with and capture value from new technologies and societal and industrial trends at high speed. Gartner calls this division into traditional and nonlinear IT functions ‘bimodal capability’ or ‘two-speed IT’.

• Australia is slightly behind the rest of the world in developing bimodal capability, with 41% operating some form of two-speed IT (compared to 45% ) but in touch with the adoption of this model.

 

“If you are not already bimodal, consider experimenting with separating conventional and "nonlinear" IT work streams, with conventional looking after more traditional waterfall development projects, and nonlinear looking after more short-term, agile and lean startup opportunities,” Rowsell-Jones concludes.

From http://www.itwire.com 05/12/2014

TOP↑

 

SMEs to Be Part of Australia’s Cloud Revolution: Turnbull

 

Federal communications minister, Malcolm Turnbull, wants Australian small businesses to play a major role in the "cloud revolution", with his department releasing a series of guides this week aimed at helping small businesses adopt and employ cloud services. The guides have been launched following the findings of the Department of Communication's Cloud Computing Government Stock Take report (PDF), which was released yesterday and reviews the existing regulation that applies to cloud services in Australia. The new series of guides for SMEs comprises four titles: cloud computing myths; questions to ask your cloud provider; small business privacy factsheet; and legal tips for small business using cloud services.

 

"The guides ... will assist Australian small businesses to be part of this revolution. They cover a range of topics from questions to ask your cloud provider, to legal issues to consider in the cloud," said Turnbull in a statement posted on his office's website. Cloud computing is already proving to be revolutionary for small businesses, as it significantly lowers cost barriers to ICT adoption," he said. "KPMG estimates the increased adoption of cloud services in Australian firms could boost the Australian economy by AU$3.32 billion a year." According to the Department of Communications, emerging business models for SMEs that incorporate cloud services can enable organisations to adopt information and communications technology services at a lower cost and with greater ease than those that do not. However, cloud services uptake in Australia amongst SMEs seems to be lagging behind international peers, according to the department, with the new guides intended to encourage a boost in local uptake.

 

"Despite the clear benefits that cloud computing can offer small businesses, adoption in Australia has been limited compared to other OECD countries," the Cloud Computing Government Stock Take document said, citing an MYOB Business Monitor study showing that only 16 percent of Australian SMEs are currently using cloud. "A vibrant Australian cloud services market, in which there is strong competition, benefits consumers through increased choice, better quality services and lower prices," it said. The document also said that although the current federal regulation supports the efficient functioning of the Australian cloud services market, there was also a need to "reflect on the extent to which existing laws may constrain competition and innovation" in the local cloud market. "It is government policy that regulation should not be the default option for policy makers and should only be imposed where it provides a net benefit to the community," the report said. "For this reason, sector specific regulation should be recognised as the very last option to be considered by decision makers."

 

The Department of Communication's push to encourage SMEs into the cloud seems to be at odds with the government's move to put off its own shift into the cloud, despite the Commission of Audit recommending it adopt a cloud-first strategy. In its report, the Commission called for the government to adopt a cloud-oriented strategy aimed at lowering IT costs over the next three to five years. However, Treasurer Joe Hockey and Finance Minister, Mathias Cormann, said that cloud computing would be considered following the 2014-15 budget.

From http://www.zdnet.com 05/22/2014

TOP↑

 

NEW ZEALAND: Hi-Tech Awards Finalists Show Wellington Is the High Tech Capital

 

Wellington has the highest number of companies per capita in this year’s Hi-Tech Awards, again confirming that Wellington is the high tech capital of New Zealand. Eight Wellington technology businesses are finalists in the 2014 NZ Hi-Tech Awards. Winners will be announced at a gala dinner on Friday 16 May. “It’s phenomenal how the Wellington high tech sector has grown in the past few years,” says Gerard Quinn, CEO of Grow Wellington, the region’s economic development agency. It still probably comes as a surprise to some that more people in the Wellington region work in technology-related sectors than in the public sector.” Wellington-based company Xero took out the top award last year and three other Wellington businesses won various award categories. This year Xero is again a finalist for the Hi-Tech Company of the Year. “All these rapidly-growing companies mean there are more and more opportunities for talented people here,” says Mr Quinn. “As well as these local success stories, our reputation as an innovative, well-connected region with a great culture and lifestyle is helping to attract international tech talent and investors.”

 

Wellington has the highest number of New Zealand companies (16 out of 40) in the 2013 Deloitte Technology Fast 500 Asia Pacific index, a ranking of the top 500 technology businesses based on revenue growth. Last year over half the revenue growth of the TIN 100 – the report that measures the performance of New Zealand's largest export-focused technology companies – came from the Wellington region. Wellington TIN 100 companies also grew close to three times faster than any other region. “We’re looking forward to seeing Wellington businesses succeed at this year’s awards and beyond that to the 2015 event which will be hosted in Wellington, the high tech capital,” says Mr Quinn. Grow Wellington is one of the awards supporters and is sponsoring the Innovative Hi-Tech Service Product category.

From http://www.ict.org.nz 03/27/2014

TOP↑

 

 

 

New Zealand’s Largest City Drives Open Data Release to Host First Civic Hackathon

 

New Zealand’s most populous city, Auckland, will be hosting its first civic hackathon, HACKAKL:Transport, bringing local government together with community members to innovate, problem-solve and create better communities with open data. Auckland Council aims to become the world’s most liveable city and transport services are seen as a key enabler of this goal. While Auckland Transport (AT) has a set of service improvements underway, it realises that its customer experience and connection with users of its services will drive the growth of its services. The hackathon is supported by AT in conjunction with AUT University and software house Propellerhead. It brings together members of the community who are interested in utilising open government data to develop fresh ideas that will help improve Auckland. A key goal of the event is to establish a community that will drive the civic hacking and open government agenda in Auckland. Roger Jones, General Manager of Business Technology at AT, said, “This is a great opportunity for AT to open itself up to new ideas and innovation.” As the event approaches, AT will publish a beta application programming interface or API that will open up a wide range of the organisation’s data, including real-time bus information, geo-coding, road and congestion data. The event highlights open source as key to supporting the evolution and democratisation of open data. The organisers have set up a community GitHub where collaborators can store, access and improve source code.

From http://www.futuregov.asia 05/09/2014

TOP↑

 

 

 

 

 

 

 

 

 

 

 

Powered by   UNPAN-AP Editorial Department