IoT On National Sovereignty. Professor Dr Abdullah Gani Dean Faculty of Computer Science & Information Technology University of Malaya

Similar documents
EAST ASIA AND THE PACIFIC

Recommendation CP(2013)10 on the implementation of the Council of Europe Convention on Action against Trafficking in Human Beings by Spain

Concept note. The workshop will take place at United Nations Conference Centre in Bangkok, Thailand, from 31 January to 3 February 2017.

Item 4 of the Provisional Agenda

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Co-Chairs Summary Bali Process Workshop on Human Trafficking: Victim Support Bali, Indonesia, 7 9 November 2006

Ethical issues impacting on the UK seafood supply chain

SEVENTH ANNUAL MEETING

Ethical issues impacting on the UK seafood supply chain. Roger Plant, Ethics Consultant

REHIRING PROGRAMME. for Illegal Foreign Workers

onpeople Smuggling, Trafficking in Persons and Related Transnational Crime BALI PROCESS AD HOC GROUP

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

FAQ. What is evisa? How long does it take to obtain an evisa? It takes 48 hours for processing.

EAST ASIA AND THE PACIFIC

STUDENT VISA HOLDERS WHO LAST HELD A VISITOR OR WHM VISA Student Visa Grant Data

Working Groups Session 1: Human trafficking

TRAFFICKING IN PERSONS IN PAPUA NEW GUINEA: AN EMERGING ORGANIZED TRANSNATIONAL CRIMINAL ACTIVITY

Recommendation CP(2012)4 on the implementation of the Council of Europe Convention on Action against Trafficking in Human Beings by Denmark

Decent Work for All ASIAN DECENT WORK DECADE

Asia Pacific Council for Trade Facilitation and e-business

FY Purdue University Minority-Owned and Women-Owned Business Enterprise Utilization. Office of Supplier Diversity Development

Consortium of Non-Traditional Security Studies in Asia

Migrant Resource and Response Mechanisms

Forced labour Guidance note

FY Purdue University Minority-Owned and Women-Owned Business Enterprise Utilization. Office of Supplier Diversity Development

ITALY. The phenomenon

Cooperation on International Migration

Asia Pacific Council for Trade Facilitation and e-business

Trade Mark Snapshot. Filing, Non-Use & Opposition ASIA PACIFIC 2016

ABC and Integrated Border management

FAQ. What is evisa? How long does it take to obtain an evisa? It takes 48 hours for processing.

PREVENTING THE SEXUAL EXPLOITATION OF CHILDREN. Action for Children and Youth Aotearoa Incorporated

Counter Trafficking. IOM Sri Lanka

Malaysia experienced rapid economic

Immigration policies in South and Southeast Asia : Groping in the dark?

WORKING ENVIRONMENT UNHCR / S. SAMBUTUAN

1/7 Thailand's Anti-Human Trafficking Efforts: Latest & Key Progress

Tangier Model United Nations Human Rights Committee

Africa-Asia Pacific Symposium on Strengthening Legal Frameworks to Combat Wildlife Crime

SINGAPORE. SINGAPORE (Tier 2)

The Feminization Of Migration, And The Increase In Trafficking In Migrants: A Look In The Asian And Pacific Situation

ATTACHMENT A to State letter Ref.: FJ 2/5.1 AP0036/05 (ATO)

Roundtable Agenda Sign in/registration Introductions Presentation on immigration issues Roundtable discussion (concerns and issues from the community)

VIETNAM FOCUS. The Next Growth Story In Asia?

REPORT OF THE ILO TRAINING WORKSHOP ON RECRUITMENT COST SURVEYS

FAQ. What is evisa? How long does it take to obtain an evisa? It takes 48 hours for processing.

Opportunities for enhancing connectivity in Central Asia: linking ICT and transport

International Conference on On the Move: Critical Migration Themes in ASEAN"

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

Copyright Publisher Disclaimer Disclaimer

Responsible Sourcing Forced Labor Risks. Costco Case Study

COMBATING HUMAN TRAFFICKING IN THE UNITED STATES. What can Thailand learn from US approaches?

Voting Corruption, or is it? A White Paper by:

The Problem Our Solutions Expected Outcomes

Technology and Labor Trafficking Project Framing Document June 2014

BUYERS. Buyers have a responsibility to adopt the 3-pillar policy, and establish clear operational protocols stating requirements for their suppliers.

CHAPTER 3: MIGRATION. Key Issue Three: Why do migrants face obstacles?

Online Appendices for Moving to Opportunity

Click to edit Master title style

COUNTRY FACTSHEET: DENMARK 2013

Ministerial Consultation on Overseas Employment And Contractual Labour for Countries of Origin and Destination in Asia Abu Dhabi Dialogue

GLOBALISATION AND ASIAN YOUTH

Visa Information. - A diplomatic Note Verbal or an appointment letter stating detailed description of the posting and entry to Myanmar

End poverty in all its forms everywhere

Featured Project for June 2016 CATW-LAC. Access to Justice and Due Diligence for Sex Trafficking Victims Red Alert System

Non-Traditional Maritime Security Cooperation in Southeast Asia

Findings from the Survey on Crime and Criminal Justice Statistics in Asia and the Pacific Countries

Identification of Potential Victims: The Role of Immigration Services. A Dutch Perspective

Sri Lankan Migrant Workers in Israel A Report by Kav LaOved (Worker's Hotline)

WORLD BANK REGIONAL WORKSHOP WORLD BANK REGIONAL WORKSHOP

Tripartite Regional Meeting on Employment in the Tourism Industry for Asia and the Pacific. Bangkok, September 2003.

Modern Slavery and Labour Exploitation. Guidance and Requirements for Suppliers. Balfour Beatty UK January 2018

Reflection on the International Labour Organization Multilateral Framework on Labour Migration

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

INTERNATIONAL TRAINING WORKSHOP ON THE IMPLEMENTATION OF CEDAW MIGRANT DOMESTIC WORKERS IN TAIWAN. By : Hope Workers Center, Regina Fuchs OUTLINE

Human Trafficking in the Agricultural Industry: Prevalence and Risk Factors. By: Mónica Ramírez

CHINA: TIER 3 RECOMMENDATIONS FOR CHINA

Technology Transfer for Infrastructure Development in Nepal

Did you know! By 2025, India is expected to become the

SIXTH MINISTERIAL CONFERENCE OF THE BALI PROCESS ON PEOPLE SMUGGLING, TRAFFICKING IN PERSONS AND RELATED TRANSNATIONAL CRIME

What are the problems particular to the region/ to particular countries within the region?

UNDERSTANDING HUMAN TRAFFICKING CASES

United Nations Economic and Social Commission for Asia and the Pacific and The Royal Government of Cambodia. 6-7 December 2018 Phnom Penh, Cambodia

Regional guidelines on the return and reintegration of migrant workers participating in the Employment Permit System of the.

Intra-ASEAN Migration: Challenges and Good Practices for Replication by International Organization for Migration

Towards South Asian Economic Union- Trade Facilitation including Customs Cooperation

SOUTH ASIA LABOUR CONFERENCE Lahore, Pakistan. By Enrico Ponziani

APPENDIXES. 1: Regional Integration Tables. Table Descriptions. Regional Groupings. Table A1: Trade Share Asia (% of total trade)

PROFESSIONAL/ DP 10/ EXPATRIATE

CSE 520S Real-Time Systems

CONFERENCE COMMITTEE REPORT BRIEF HOUSE SUBSTITUTE FOR SENATE BILL NO. 40

STRATEGIES FOR IDENTIFYING VICTIMS OF HUMAN TRAFFICKING. Tim Jefferson ALERT Tucson Outreach Coordinator International Rescue Committee

ASEAN Emerging Growth, Opportunities & Challenges

Thailand Responses to Trafficking in Persons

FOURTH MEETING OF AD HOC GROUP SENIOR OFFICIALS BALI, INDONESIA, 9 MARCH 2011 CO-CHAIRS' STATEMENT

Child Trafficking. Colin Walker Deputy Director ECPAT UK

Ministerial Consultation On Overseas Employment and Contractual Labour for Countries of Origin and Destination in Asia

India & the United Arab Emirates

PHILIPPINES ASIA PACIFIC REGIONAL PREPARATORY MEETING FOR THE GLOBAL COMPACT ON SAFE, ORDERLY AND REGULAR MIGRATION

Migrants and the Global Economic Crisis

Transcription:

IoT On National Sovereignty Professor Dr Abdullah Gani Dean Faculty of Computer Science & Information Technology University of Malaya

National Sovereignty as of having supreme power or authority in government as possessed or claimed by a state or community to manage internal institutions or processes. This includes independent government possess in various economic environment world and institution settings. Kyle Bagwell and Robert W. Staiger, (2003). National Sovereignty in an Independent Government Possess in Various Economic Environment and Institution Setting. page 2,.

#IoT ConnectingEverything Any TIME connection Any PLACE connection Any THING connection On the move On the move Between PCs Outdoors and indoors Night Outdoors Indoors (away from the PC) Human to Human (H2H), not using a PC Human to Thing (H2T), using generic equipment Day time At the PC Thing to Thing (T2T)

Architecture of IoT 4 Layers Model for IoT Information Application Integrated Application Layer Information Processing Management Layer Information Transmission Network Construction Layer Information Generation Sense and Identification Layer

More on 4 Layers Model Integrated Application Smart Logistic Smart Grid Green Building Smart Transport Env. Monitor Information Processing Data Center Search Engine Smart Decision Info. Security Data Mining Network Construction WWAN WMAN Internet WPAN WLAN Sensing and Identification GPS Smart Device RFID Sensor Sensor

Illegal Human Migration Financial Sovereignty Human Trafficking National Sovereignty

Financial Sovereignty For example: Currency Ringette to US Dollar 214-2015

Human Trafficking The overwhelming majority of trafficking victims are among the two million documented and 1.9 million undocumented foreign workers in Malaysia from various countries including Indonesia, Nepal, India, Thailand, China, the Philippines, Burma, Cambodia, Bangladesh, Pakistan, and Vietnam. Many victims migrate willingly to Malaysia seeking employment opportunities in plantations, construction sites, textile factories, and as domestic workers but subsequently encounter forced labor or debt bondage at the hands of their employers, employment agents, or informal labor recruiters. While many of Malaysia s trafficking offenders are individual business people, large organized crime syndicates are also behind trafficking. A significant number of young foreign women are recruited for work in Malaysian restaurants and hotels, some of whom migrate through the use of Guest Relations Officer visas, but subsequently are coerced into Malaysia s commercial sex trade. The acquittal rate of alleged trafficking offenders was 68 percent during 2010, a rate attributed by observers to the lack of adequate victim-witness protection, victim assistance incentives, and poor judicial training on human trafficking.

Illegal Human Migration Irregular Foreigners by Citizenship (2012)

IoT in Financial Sovereignty Trading Decision- Massive Data Available To whom we should trade Remote Data Capturing Remote cheque deposit ATM, Credit/Debit Cards Sensing & decision making Trading and Illegal Goods Supply Illegal supplier Smart IoT Enabled Shopping Applications Fast shopping Geo-tracking Enabled Marketing Alerts

IoT in Human Trafficking Software Solutions That Take Inputs From A Vast Global Network of Mobile Sensors and The IoT Rapid Report and Response IoT Disperse information (GPS coordinates, pictures) to related authorities/ servers Report any incidence related to Human trafficking (mobile app) Photo recognition detection of frequent violators/suspects on the cloud Crowdsource Resources for Reporting if Conventional Communication Links Are Down Mobile Application Can Help in Three Dimensions Report, Awareness and Analyse Different stages of trafficking in human beings, recruitment, exploitation, escape, recovery, social reintegration A barcode scanning app can analyze the country/company of origin and trace HT/slavery statistics in database Trafficking Hotline Available Through Internet Report abductions

IoT in Illegal Human Migration Technologies Sea - Underwater sensors Land - Mine sensors - Human Movement Tracking

IoT Framework for National Sovereignty WSAN nodes National Security Adviser server RFID nodes GPS satellite Common Gateway for wireless sensors, RFID nodes, GPS satellite, Security Surveillance Cameras from various flashpoints & locations in the country Secure Centralized database Secure central internet Custom server Police server Surveillance IP camera (night vision enable) Navy server

Q & A Email: abdullah@um.edu.my http://mobcc.fsktm.um.edu.my