Students and educators alike know that project groups (including problem based learning or PBL) can be a dream or a nightmare depending on how you run them, so here are 5 tips (from experience working with both types of student groups) on how to make your project work
Everyone in their life at least once have faced difficulty in saying NO to someone. Although in some it is very usual happening. In this presentation some techniques are explained through which anyone can learn to say NO.
Learning how to say “No” is part of success, but it’s sometimes hard to understand WHY and HOW to effectively say it.
To learn to say “No” you need to: admit it, and practice it with these 9 smart strategies that leads you to happy and mindful decisions.
Everyone in their life at least once have faced difficulty in saying NO to someone. Although in some it is very usual happening. In this presentation some techniques are explained through which anyone can learn to say NO.
Learning how to say “No” is part of success, but it’s sometimes hard to understand WHY and HOW to effectively say it.
To learn to say “No” you need to: admit it, and practice it with these 9 smart strategies that leads you to happy and mindful decisions.
Why are retrospectives always at the end of a sprint only? Why do we always cut retros first? What the heck is the reason for a retro? Just a few ideas around this topic.
How To Overcome Fear Of Failure In 3 Easy StepsMichael Lee
Nobody likes the idea of failing. Unfortunately, not everyone knows how to overcome their fear of failure. If you find yourself dealing with this kind of situation, then viewing this presentation could help you conquer your fear.
How To Win Friends And Influence People by Dale CarnegieSameer Mathur
We all face problems maintaining our relationship with friends and family. There are various dynamics to all relations and it can get very complicated if you don't do it right. Dale Carnegie's "How To Win Friends and Influence People" is humbling yet empowering. The book is a guide to 'live life'. For book summary prepared by Prof. Sameer Mathur, click here.
5 Tips To Thrive As An Immigrant - Essential Skills To Be Successful In A New...AssertiveWay
To thrive in a new culture, immigrants must be selective with the advice they get, reach out to more people, ask for support sooner than later, advocate for themselves, and embrace negative feedback.
Immigrating to a new country can be overwhelming, lonely, and stressful. That is why it is essential to get the right people to support you, to be adaptable, and take command over your experience.
I interviewed Henri Nkuepo, international lawyer and author of “New Immigrant Playbook – Strategies for Success in Your New Country” about how immigrants can find success faster and with less hardship.
Henri talks about the importance of being selective in the advice you welcome, reaching out to the right people, speaking up at work and in life while being your own best advocate, not shying away from asking for support, and embracing negative feedback.
Here are my favorite quotes from my interview with Henri Nkuepo.
“How can I successfully lead a remote team when we’ve always been in an office?” This is just one of the many questions we've been asked lately from leaders about transitioning their organizations to work remotely while maintaining growth and employee engagement.
Learn more about how you can lead remote teams from industry experts and practical next steps you can take now.
It's the summary of the book "The power of a positive No" -A positive No balance power and relationship in the service of your interests.
The presentation will tell you 1> Prepare-Uncover your core interests 2>Deliver a positive No 3>Follow through
Facilitator notes for a 90min feedback workshop for teams that includes role playing with cards. See cards here: https://www.slideshare.net/JorgeBalden/continuous-feedback-cards
Read article: https://www.linkedin.com/pulse/building-continuous-feedback-culture-your-team-jorge-balde%C3%B3n/?published=t
Accelerating and Amplifying Success with High Performance Strategies
In this presentation, you learn how to Accelerate and Amplify your results with High Performance Strategies that you can immediately implement and fast-track your journey to success.
Raising the subject of justice or highlighting the injustice, takes courage. How do we challenge someone or your organisation without creating conflict and in a way that means you make allies not enemies?
A concrete approach to having the most discussions well.
Knowing how to say NO with positive results is a big boost in career development, management excellence, time management and stress release ... resulting in better performance at work and higher personal satisfaction. A work-life balance best practice.
One of our greatest problems as humans is procrastination. It could be procrastination on homework, getting ready for an event, finishing a short task your boss asked you of, etc. However, the solution to procrastination is simple--it's taking action.
Learn more here about how to taking action can empower your self-confidence and boost happiness while fighting against procrastination.
How to navigate being a junior member of development team that is not doing good work and/or is a bad team
Presentation for Coder Academy mentor session 10th Sept 2020
How open is the Internet in Singapore? This presentation looks at different factors of openness and lists the relevant regulations and common law principles involved
Why are retrospectives always at the end of a sprint only? Why do we always cut retros first? What the heck is the reason for a retro? Just a few ideas around this topic.
How To Overcome Fear Of Failure In 3 Easy StepsMichael Lee
Nobody likes the idea of failing. Unfortunately, not everyone knows how to overcome their fear of failure. If you find yourself dealing with this kind of situation, then viewing this presentation could help you conquer your fear.
How To Win Friends And Influence People by Dale CarnegieSameer Mathur
We all face problems maintaining our relationship with friends and family. There are various dynamics to all relations and it can get very complicated if you don't do it right. Dale Carnegie's "How To Win Friends and Influence People" is humbling yet empowering. The book is a guide to 'live life'. For book summary prepared by Prof. Sameer Mathur, click here.
5 Tips To Thrive As An Immigrant - Essential Skills To Be Successful In A New...AssertiveWay
To thrive in a new culture, immigrants must be selective with the advice they get, reach out to more people, ask for support sooner than later, advocate for themselves, and embrace negative feedback.
Immigrating to a new country can be overwhelming, lonely, and stressful. That is why it is essential to get the right people to support you, to be adaptable, and take command over your experience.
I interviewed Henri Nkuepo, international lawyer and author of “New Immigrant Playbook – Strategies for Success in Your New Country” about how immigrants can find success faster and with less hardship.
Henri talks about the importance of being selective in the advice you welcome, reaching out to the right people, speaking up at work and in life while being your own best advocate, not shying away from asking for support, and embracing negative feedback.
Here are my favorite quotes from my interview with Henri Nkuepo.
“How can I successfully lead a remote team when we’ve always been in an office?” This is just one of the many questions we've been asked lately from leaders about transitioning their organizations to work remotely while maintaining growth and employee engagement.
Learn more about how you can lead remote teams from industry experts and practical next steps you can take now.
It's the summary of the book "The power of a positive No" -A positive No balance power and relationship in the service of your interests.
The presentation will tell you 1> Prepare-Uncover your core interests 2>Deliver a positive No 3>Follow through
Facilitator notes for a 90min feedback workshop for teams that includes role playing with cards. See cards here: https://www.slideshare.net/JorgeBalden/continuous-feedback-cards
Read article: https://www.linkedin.com/pulse/building-continuous-feedback-culture-your-team-jorge-balde%C3%B3n/?published=t
Accelerating and Amplifying Success with High Performance Strategies
In this presentation, you learn how to Accelerate and Amplify your results with High Performance Strategies that you can immediately implement and fast-track your journey to success.
Raising the subject of justice or highlighting the injustice, takes courage. How do we challenge someone or your organisation without creating conflict and in a way that means you make allies not enemies?
A concrete approach to having the most discussions well.
Knowing how to say NO with positive results is a big boost in career development, management excellence, time management and stress release ... resulting in better performance at work and higher personal satisfaction. A work-life balance best practice.
One of our greatest problems as humans is procrastination. It could be procrastination on homework, getting ready for an event, finishing a short task your boss asked you of, etc. However, the solution to procrastination is simple--it's taking action.
Learn more here about how to taking action can empower your self-confidence and boost happiness while fighting against procrastination.
How to navigate being a junior member of development team that is not doing good work and/or is a bad team
Presentation for Coder Academy mentor session 10th Sept 2020
How open is the Internet in Singapore? This presentation looks at different factors of openness and lists the relevant regulations and common law principles involved
Copyright for Artists - including Creative CommonsBenjamin Ang
A quick guide to Copyright Law (based on the Copyright Act, Singapore) and the rights that Artists (visual artists) have under the Act. Covers Exclusive Rights, What is an Artistic Work, Fair Dealing, Creative Commons and Public Domain. The author is a lecturer in Intellectual Property and Media Law, Copyright lawyer, and former in house counsel for a comic book company
Election Blogging and Social Media 2015Benjamin Ang
Talk by Benjamin Ang, Education Chair (2015) of the Internet Society Singapore Chapter, on the legal issues around blogging and social media during the General Elections 2015 in Singapore, especially on Cooling Off Day (Polling Day Eve). Topics included laws and legislation such as the Parliamentary Elections Act, Internet Advertising Rules, Sedition Act and MDA Class Licensing. Presented at the workshop on Election Blogging and Social Media, organized by the Internet Society Singapore Chapter.
Intellectual property in music (Copyright and Creative Commons)Benjamin Ang
This was a talk given on invitation of the Intellectual Property Office of Singapore (www.ipos.gov.sg) explaining what rights musicians have to protect their music, and how these rights can be assigned or licensed to other creators
Singapore's National Cyber Security StrategyBenjamin Ang
Singapore's National Cyber Security Strategy was launched by the Singapore government at the inaugural Singapore International Cyber Week 2016. This presentation gives an overview of the 4 pillars of the Strategy and some of its implementation steps so far, including the upcoming new Cybersecurity Act, and the SGD 10 million fund for capacity building in ASEAN. You can download the full Strategy at www.csa.gov.sg
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
These slides summarize the activities of the Internet Society Singapore from 2015 to 2016, and were presented at the Annual General Meeting on 24 August 2016
Lecture on copyright - what is protected, what rights you have as artists, what is infringement, fair use / fair dealing, sharing with creative commons licenses - presented to Visual Arts students at Lasalle School of the Arts, Singapore
3 types of legal technology that work (2016)Benjamin Ang
Lecture presented for Temasek Polytechnic Diploma in Law and Management - Subject: Management of Law Office and Court Technology - Topic: Legal Technology
Presented by Ms Goh Tsu Lynn, Senior Manager, Workforce Singapore (WSQ) at NUS-ISS Briefing Session for Employers on Professional Conversion Programme on 9 Dec 2016.
Cybersecurity and Legal lessons after Apple v FBIBenjamin Ang
After the case of Apple v FBI was not resolved in court, question of security vs privacy in the cybersecurity field still remain. Is encryption good or bad or is there a better way to balance the interests of law enforcement, business, end users and regulators? This presentation gives special emphasis to Singapore law.
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
This is my talk on Legal and Cybersecurity issues of Disclosure on the Internet. The Internet Society was invited to co-host this event "Unraveling the Panama Papers (and Bahamas Leaks) - Secrecy for Sale" organized by REAL Analytics Pte Ltd.
Election Blogging and Free Speech (Internet Society Singapore)Benjamin Ang
Talk by Mr Jack Lee, Associate Professor, Singapore Management University, on Election Blogging and the Free Speech framework in Singapore Law. Topics covered: General Election 2015 Singapore, Constitution of Singapore, Defamation Law. Presented at the workshop on Election Blogging and Social Media, organized by the internet Society Singapore Chapter, August 2015, panel discussion co-moderated by Prof Ang Peng Hwa (NTU) and me (Benjamin Ang).
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
When Companies are hit by cyber security breaches, they and their directors may have legal liabilities to employees, customers, regulators and the authorities. This presentation gives special emphasis to Singapore law.
Here's a step-by-step guide to launching your product or service. Includes a detailed case study of how I launched my product and made over $70k in sales.
You will learn how to set the stage and provide clear boundaries within each ceremony. Heck, this practical knowledge will help you in any meeting, not just Scrum. With this knowledge you will get the team to collaborate with each other and with you.
Target audience: Fresh and experience scrum masters wishing to acquire additional tools and skills and agile coaches leading organizational change.
Not getting things done the way you could? Want to be more productive? And less stressed? Here is what you can do, how you get it to work and why it works this way!
My name is Chris, I'm a corporate psychologist. My job is to help people to live up to their potential. The 10 stages in this booklet summarize what my clients found the most helpful advice to get organized.
The Path of Pain: Mastering Game Design in 20 steps - takeawayKacper Szymczak
We all have a Design Muscle. In order for it to create what one wishes it to, it must be trained. It must be submitted to painful exercise. It must be strengthened to the level where it won't matter if the time is lacking, if your boss wants 10 versions just to scrap them all, if the editor is crashing, if the topic is boring, or you're working on a clone. The philosophy the speaker will present is grounded on mastering excellence and focusing on the fascinating craftsmanship of game design, which is - as often forgotten - a world of fun in itself.
Performed live at Game Industry Conference 2016.
Getting Things Done - Tips from someone with ADHD and OCDJason Lotito
I've had ADHD and OCD my entire life, but didn't get diagnosed with it until I was 33. Up to that point, I struggled as a developer to get things done. This talk is all about the tips, tricks, and techniques I used to get things done. From managing your time, prioritizing, and being a better leader, this talk is full of the things I still use on a daily basis to overcome having both ADHD and OCD.
Having trouble defining yourself? Here's a quick tutorial on how to at least get started. I hope this finds you well.
Please get into touch with me if you have any questions at all! To your monumental success!
Recruitment trainer Nicky Coffin talks though 6 steps to high billing success. Includes staying focused on key tasks, quarterly achievements and pro actively making long term gains in your business
Introduction to solution focused approachesPeter Hook
A half-day intensive introduction to solution focused approaches in organisations used with delegates on the ED1 International Management Development Programme for the NSG Group.
Hayden Shaw - Transforming Your Generational Sticking PointsJohn Blue
Transforming Your Generational Sticking Points - Hayden Shaw, People Driven Results, from the 2019 Minnesota Pork Congress, February 5 - 6, 2019, Minneapolis, MN, USA.
More presentations at https://www.youtube.com/playlist?list=PL_5bHW6MgRAxR_WyINKBPyCwAeXFJ5CfZ
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Benjamin Ang
Lecture on cybersecurity in ASEAN and Singapore
- Definitions of cybersecurity in ASEAN (vs western definitions)
- Cyber threat landscape in ASEAN / types of cyber incidents and cyber crime in ASEAN
Why ASEAN is vulnerable
- Characteristics of ASEAN in cyberspace
non-interference, sovereignty
non-attribution of cyber attackers
- ASEAN cooperation in cyberspace
AMCC (ASEAN Ministers Cyber Conference)
ACICE (ADMM Cyber Info Centre of Excellence)
INTERPOL
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
Session 4 - International Cooperation to Impose
Consequences on Malicious Cyber Activities
Many states are concerting joint efforts to impose costs for irresponsible behaviors in
cyberspace by sharing information, jointly disclosing attribution, or issuing joint statements with allies, partners, or like-minded states. Being aware of the importance of the roles played by private sectors for national cybersecurity, states are seeking ways to induce cooperation from private sectors as well.
Session 4 covers cooperation efforts at the international level for imposing consequences on irresponsible state behavior in cyberspace. Speakers are expected to address the following
points.
H. Introduce cases where costs for irresponsible state behavior in cyberspace are effectively
imposed with joint efforts among states.
I. Introduce cases where cooperation between private and public sectors has contributed to
impose costs for irresponsible state behavior in cyberspace.
J. Underscore specific areas where efforts for international cooperation need to be concerted
to effectively impose consequences for irresponsible state behavior in cyberspace.
[Panel]
Moderator: Caitriona Heinl (Azure Forum for Contemporary Security Strategy)
Speaker: James Lewis (Center for Strategic and International Studies)
Speaker: Benjamin Ang (Nanyang Technological University)
Speaker: Karsten Geier (Centre for Humanitarian Dialogue)
[12:00-13:30, KST (GMT+9)] Luncheon
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
CYBERSPACE: A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
Definition
Foreign interference occurs when a foreign entity (state or non-state actor),
with hostile intent,
takes actions to deliberately, covertly and deceptively
disrupt the politics and policies of the target state
Source: Fog of war: how the Ukraine conflict transformed the cyber threat landscape, published by Google TAG (Threat Analysis Group)
Overview
1. Russian government-backed attackers have engaged in an aggressive, multi-pronged effort to gain a decisive wartime advantage in cyberspace, often with mixed results.
2. Moscow has leveraged the full spectrum of IO – from overt state-backed media to covert platforms and accounts – to shape public perception of the war.
3. The invasion has triggered a notable shift in the Eastern European cybercriminal ecosystem that will likely have long term implications for both coordination between criminal groups and the scale of cybercrime worldwide.
Sources: Defending Ukraine: Early Lessons from the Cyber War (Microsoft)*
Defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries.
Recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks.
As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine.
In coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts.
This calls for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations.
The Strontium group was targeting Ukrainian institutions, media organizations, and government institutions and think tanks in the United States and the European Union
Microsoft got court orders 16 times to redirect internet traffic from Strontium domains into a ‘sinkhole’
How to defend the information domain
Public coverage and exposure
Clear counter-messages
Legislation
Build media and digital literacy
Work with citizens, influencers
Detect and expose fake accounts
Active measures
Work strategically, not reactively
Build a strong narrative that is more attractive than the adversary
Cooperation between ASEAN military civil academic in international cybersecur...Benjamin Ang
3 areas of cooperation
Council for Security Cooperation in the Asia Pacific (CSCAP)
Track II Network of ASEAN Defence and Security Institutions (NADI)
UN OEWG Open-ended Working Group on security of and in the use of information and communications technologies
Council for Security Cooperation in the Asia Pacific (CSCAP)
non-governmental (second track) process for dialogue on security issues in the Asia Pacific
informal mechanism for scholars, officials and others in their private capacities
to discuss political and security issues and challenges facing the region
provides policy recommendations to inter-governmental bodies
convenes regional and international meetings
establishes linkages with institutions and organisations in other parts of the world
exchanges information, insights and experiences in the area of regional political-security cooperation.
Track II Network of ASEAN Defence and Security Institutions (NADI)
Secretariat is RSIS
Aims of the forum
network and to build confidence and familiarity among the Asean think tanks and research institutions to facilitate closer cooperation.
policy analysts specialising in defence and security issues, academics researching security cooperation and defence officials to discuss issues of security cooperation that the Asean Summit and Asean Defence Ministers have raised
participants to think beyond their governments’ positions and to provide timely fresh ideas and relevant recommendations for the Asean defence track to consider.
UN OEWG on Cyber
Open-ended Working Group on security of and in the use of information and communications technologies
The group is mandated to
further develop the rules, norms and principles of responsible behaviour of States;
consider initiatives of States aimed at ensuring security in the use of information and communications technologies;
establish, under the auspices of the United Nations, regular institutional dialogue with the broad participation of States;
continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security, inter alia, data security, and possible cooperative measures to prevent and counter such threats, and how international law applies to the use of information and communications technologies by States,
as well as confidence-building measures and capacity-building.
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
What is technology disruption?
A new technology that changes
The way things are done
Expectations and behaviors
Market or industry
Uber/Grab vs taxi business
Airbnb vs hotel business
Netflix vs TV, DVD, cinemas
Blockchain vs financial institutions
Google vs books, libraries
ChatGPT vs Google
How can technology disrupt the Law?
DoNotPay
https://donotpay.com/
Bizibot
https://www.btlnet.co.uk/digital-transformation-solutions-overview/bizibot
WeVorce
https://www.wevorce.com
OCBC Online Will Generator
https://www.ocbc.com/personal-banking/lifegoals/willgenerator/#/
Transcripts
https://fortherecord.com/transcript-express/
Law firms using Blockchain
https://www.raconteur.net/technology/blockchain/blockchain-revolutionising-legal-sector/
LawGeex AI vs human lawyers, on reviewing standard contracts
Accuracy
Time taken to review contract
Courts used technology to deliver justice during COVID
But litigants with resources had the advantage
https://www.pewtrusts.org/en/research-and-analysis/reports/2021/12/how-courts-embraced-technology-met-the-pandemic-challenge-and-revolutionized-their-operations
Disruption has no ethics. But we do.
Must bridge the Digital Divide
Parties may need help
https://www.ncsc.org/__data/assets/pdf_file/0026/53738/PPP-Technology-Digital-Divide-Considerations.pdf
Using AI for judgments
Benefits
Exclude legally irrelevant factors
Standardise decisions
Help courts to prioritise cases, increase efficiency
Encourage parties to settle if success is predicted to be unlikely
https://www.cppr.in/articles/predictive-justice-using-ai-for-justice-introduction
Risks
Over reliance on machine decisions
Algorithmic bias: bad history = bad future
Bad data feedback into bad data
Inability to explain decisions: bad for rule of law
https://www.suls.org.au/citations-blog/2020/9/25/predictive-judicial-analytics-implications-for-rule-of-law-and-the-legal-profession
Cases of AI bias in justice system
COMPAS (for probation)
Black defendants were 2x wrongly predicted to be high risk of recidivism
White defendants were 2x wrongly predicted to be low risk of recidivism
Black defendants were 2x more likely to be misclassified as high risk of violent recidivism
White violent recidivists were 63% more likely to have been misclassified as low risk
https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm
Public Safety Assessment (for bail)
More likely to recommend high bail for males than females
https://venturebeat.com/ai/study-finds-crime-predicting-judicial-tool-exhibits-gender-bias/
How does this type of AI work?
How does this type of AI work?
Where did the ML (Machine Learning) come from?
Garbage In = Garbage Out
Always check what’s going in and what’s coming out
Rand Report on Protecting Individuals using tech in the Justice
Why Application of International Law Applies to ASEAN.pdfBenjamin Ang
There is no international definition of these concepts in cyberspace
Armed attack
Use of force
Act of war
Traditional definitions require physical damage or physical injury
Rules of Law of Armed Conflict / International Humanitarian Law(but in cyber?)
Distinction – must distinguish between civilians and military targets
Proportionality – must avoid excessive harm to civilians / objects
Military necessity – allows force that is reasonable, lawful (see above), and operationally justified
Limitation – prohibits tactics that cause unnecessary suffering
Humane treatment – e.g., of captured prisoners
Do we need a Binding Legal Instrument?
US - No new international legal instrument needed, can interpret existing law
China - States must reach international consensus, new international legal instruments
EU - No new international legal instrument needed, can interpret existing law
ASEAN chooses its own terms on norms/law
ASEAN supported both UNGGE and OEWG tracks in 2018 – Indonesia, Singapore, and the Philippines said both processes were not incompatible
ASEAN has always followed its instinct of creating an internationally agreed, rules-based order based on its own interests, which is consistent with other arenas where international law or rules are unsettled
ASEAN may even consider plurilateral treaties
What ASEAN states need to move forward
Common language related to cyberspace
Legislation that can be translated across members
Capacity building in
Cyber issues, policy making, critical infrastructure protection (ASCCE) and
Military operations (ADMM Cyber and Information COE)
Confidence building measures e.g., CERT-CERT communications, contact lists
More participation from states, academia, and civil society
What is Cybersecurity – C, I, A?
Cybersecurity or Information Security?
Activities of foreign political, economic, military, intelligence, and information entities
The striving of countries toward dominance in the world information space
Development (by states) of information war concepts that create means for dangerous attack on the information spheres of other countries
Infringing the state’s control over information flows and public opinion (called “cyber sovereignty”)
ASEAN leaders
Value the principles of “mutual respect” and “non-interference”
View sovereignty as sacrosanct principle among ASEAN member states
Do not define ‘sovereignty’ – this provides flexibility in foreign and domestic policy
ASEAN member states also attach great importance to the creation of an international rules-based order,
which includes forming and adhering to international law and norms.
like the UN Convention of the Law of the Sea or UNCLOS.
Lessons learned from Capacity Building on International Cyber Norms in Southe...Benjamin Ang
Capacity building is recognized as a key to promote the adoption and implementation of international norms of responsible state behaviour in cyberspace. States at varying levels of cyber maturity benefit from these efforts, to develop a shared understanding of how international cyber norms support the stability of cyberspace, and to grow their own capacity and capabilities to implement these norms. This presentation draws on the experiences of the academics and practitioners who have been conducting cyber capacity building activities in southeast Asia and beyond, to derive lessons of what has (or has not) worked, some potential best practices, and to provide suggestions on how cyber capacity building can provide more value to the further growth of international cyber norms in the world.
UNGGE 2015 Cyber Norms
UN Open Ended Working Group (UN OEWG)
UN Singapore Cyber Programme (UNSCP)
Norms Implementation Checklist
RAP Matrix
ASEAN Ministers Cyber Conference (AMCC)
Capacity building
Confidence Building Measures (CBMs)
Cybersecurity and Geopolitical Risk.pdfBenjamin Ang
Two mistaken views of Cybersecurity and Geopolitical Risk:
1. “It doesn’t affect me because I’m not a government entity or major target”
2. “There’s nothing I can do about it anyway”
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Benjamin Ang
Slides from a talk given to Eunoia Junior College, Singapore
-------------------
Cyber Warfare questions
Are the concerns about cyber warfare overblown?
Why should young people care about cyber warfare?
What are the national/international systems or structures currently in place to protect us from cyber warfare? Are these protections adequate?
Considering that Singapore is a small country, is there really anything we can do in the face of the challenges posed by cyber warfare?
-------------------
Cybercrime Questions
How do scammers make Singaporeans lower their guard despite them already knowing that scams are prevalent in our society? Why do you think people still fall for scams?
By the time new types of scams are reported, new types of scams are already being created. How do you think the Singapore government can break this cycle?
How hard is it to find out criminals behind cyber attacks?
-----------
Information Operations questions
The Russo-Ukraine War, what are your thoughts on it being publicized on social media unlike many wars from the past?
Are there any political implications regarding the publication of the war on TikTok? Could posting the war on TikTok create any social issues?
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesBenjamin Ang
Case studies of disinformation and misinformation from Southeast Asia including Asian examples of Pro-Russia Anti-Ukraine narratives at the start of the Russian invasion of the Ukraine. Presented at the Conference on Disinformation and Cybersecurity of the War Studies University, Warsaw Poland, in 2022. Refers to the RSIS Framework on Information, Influence and Interference, from the Centre of Excellence for National Security at the S Rajaratnam School of International Studies (RSIS) at Nanyang Technological University (NTU) Singapore
Foreign Interference and National Security - Law Society Public Law conferenc...Benjamin Ang
[ To read and download the Policy Report that this presentation is based on, see https://www.rsis.edu.sg/rsis-publication/cens/cases-of-foreign-interference-in-asia/ ]
The Public and International Law Committee of the Law Society of Singapore invites you to join us for the Public Law Conference 2021 which aims to promote interest in the administrative and constitutional law of Singapore, highlight new judicial decisions, and facilitate discussion of recent developments.
To be held online on 15 September, we are pleased to have the Minister for Home Affairs and Law, Mr K Shanmugam, deliver a keynote speech on the public law issues relating to online harms and foreign interference. These issues are important and topical as they have a significant impact on society today, not just in Singapore, but worldwide. This will be followed by a panel that will analyse and develop the themes raised in the keynote, as well as discuss possible solutions, including legislative solutions, to such issues, in the context of public law. The panellists will comprise the Honourable Minister himself, practitioners, legal officers and academics active in the fields of administrative and constitutional law.
This conference provides a platform to hear from legal experts, and for different sectors of the legal industry to share ideas. We hope it will be relevant to all legal practitioners, government decision-makers, public-sector policy makers, academics and law students interested in public law.
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
Infographic of the flow of Contract Law
Formation of Valid Contract
Offer, Acceptance, Consideration, Intention
Vitiating Factors which make a contract not valid
Misrepresentation, Mistake, Minor
Terms of Contract
Promises, Representations vs Warranties
Express vs Implied Terms
Discharge of Contract
Discharge by Breach - Actual and Anticipatory
Discharge by Agreement, Frustration of Contract
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Benjamin Ang
Covers 1. Cyber threats to ASEAN and recent incidents, 2. International Law relating to cyber conflict, Gaps in IHL and LOAC, 3. UN and ASEAN steps to prevent cyber warfare. Lecture for the National Defense College of the Philippines (NDCP), government’s highest center for education, training, and research on defense and national security, in the National Security Studies Program (NSSP) for Armed Forces of the Philippines (AFP) officers.
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
Lecture on the different cyber norms frameworks for responsible state behaviour in cyberspace - describing Paris Call, Charter of Trust, Microsoft Digital Geneva Convention, Tech Accord, GCSC, Shanghai SCO, UN GGE, UN OEWG - explaining each of the 11 cyber norms from the UN GGE 2015 meeting, and concluding with a case study on ASEAN's approach to international law in cyber operations
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
Lecture outline
1. Comparative analysis of cyber threats and their evolution in South East Asia
2. Digitization of critical infrastructure and growing security risks
3. Conceiving of and preparing for cyber warfare
Delivered to the French Institute for International Relations
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
This public, 90-minute session examined the prevalence of cyber threats in the Indo-Pacific region based on some of the high-profile cyber-attacks and data leaks, as well as advanced persistent threat campaigns. It assessed the growing prominence of information warfare, especially in the current pandemic. The session highlighted the most common tactics, techniques and procedures used by malicious actors, and the countermeasures that governments and the private sector have undertaken to fortify their cyber defenses in the emerging data-driven economy. This session then examined the role played by the US and Singapore in enhancing regional cybersecurity as well as clarify the points of convergence and divergence between Singapore and the US to improve future cooperation.
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Benjamin Ang
lecture for Columbia University - Cyber Conflict and Cybersecurity in East Asia course (Prof Adam Segal) on the challenges for cybersecurity in South East Asia, and ASEAN efforts to develop robust cyber norms
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Benjamin Ang
This lecture covers the The Legal Technology Vision which is a five-year roadmap to help the legal industry in Singapore to leverage technology to enhance their practice. It is also a call to action for legal technology providers to engage in public-private collaboration for the building of a legal tech ecosystem. You can find it at https://www.sal.org.sg/Resources-Tools/Legal-Technology-Vision
You can follow Benjamin Ang on Twitter for updates and commentary on technology policy and legal issues at http://twitter.com/benjaminang
Thinking of a career as a paralegal, lawyer, prosecutor, in-house counsel, or even outside the legal industry, or starting your own business as an entrepreneur? You'll be surprised what Legal Technology could mean for your future.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
1. 5 Steps to Do Great Project Work and Prevent Project Team Meltdown
Benjamin Ang
2. Your Project Group can be a HIGH PERFORMANCE TEAM or HIGH STRESS NIGHTMARE
Which would you prefer?
3. There are 5 common reasons for disaster
And there are 5 steps you can take to make a success instead
4. 1. Communication Failure
is not enough
Can you get your part done by Sat?
BBQ on Sat?
LOL, IDK
Sat, OK
5. Step 1: Make a WEEKLY appointment now
“We will meet face to face every Wednesday at 10 am”
Every meeting must end with a WRITTEN NOTE of
What each person has done so far
What each person is supposed to do next
When it has to be done
6. 2. Wrong Assumptions
Obviously she
should ask me
when the
deadline is
Obviously he
should tell me
when the
deadline is
7. Step 2: Clearly Define Roles and Check at Every Meeting
“John will be in charge of patents. Mary will be in charge of trade marks”
At the meeting: “John, please brief us on patents. Mary please brief us on trade marks”
8. 3. No Knowledge Sharing
I only know
what I was
assigned.
I don’t know
anything the
others are
doing
How will I
pass the
exam?
9. Step 3: Brief one another
(and I will quiz you)
John, since you
were assigned
to patents, I will
ask Mary about
patents
10. 4. Poor Timekeeping
Whatsapp “Where is your section? The project is due tomorrow 9am!”
“Sorry I am sick, I will send to you by 11 pm tonight.”
OR worse … silence …
11. Step 4. Set Pre-Deadlines and Milestones; Appoint a Time Keeper
At the MEETING: “John, where are the patents? Mary, where are the trade marks? First draft is due in one week!”
12. 5. Not getting help
Things are not
working.
Maybe if ignore
the problems,
they will just go
away
14. Recap of the 5 Steps
Make a WEEKLY appointment now
Clearly Define Roles - and Check at Every Meeting
Brief one another (and I will quiz you)
Set Pre-Deadlines and Milestones; Appoint a Time Keeper
Tell your Tutor (me) if you need help