SlideShare a Scribd company logo
AI Algorithms for Big Data
in Governance in India: Case
Studies world is looking into
Dr Neeta Awasthy
Technology Evangelist
Case Study I: Predictive Policing
 CCTNS (Crime and Criminal Network Tracking System) is an e-governance project
under the Digital India mission connecting 14000 police stations.
 Predictive Policing usually works in the following four ways
 Predicting places and times with an increased risk of crime,
 predicting potential future offenders,
 creation of profiles for past crimes, and
 predicting groups of individuals likely to be victims of crimes.
PREDICTIVE POLICING PROCESS
 Step 1. Data Collection
 Step 2. Analysis (Predictive
Model, Repeat Theory, Social Network Analysis & Regression Model)
 Step 3. Police Intervention
 Step 4. Criminal Response
Problems vs Benefits
 Inherent biases
 Opacity of predictive models
 Better allocation of resources
 Preventive Policing
 More holistic analysis
Case Study II: The Unique Identity Project
 As per official Aadhar database, 1.21 billion holders as of May 2018
 CIDR
 Seeding
1. Seeding
 Ginger Platform
 Manual or Algorithmic Aadhar Seeding
 https://www.youtube.com/watch?v=3MTp5euNzM4
Benefits
 Reducing frauds
 facilitating financial inclusion
 providing for efficient delivery of services
 enabling political empowerment
 facilitating economic growth
 security
Open Questions
 Lack of data protection regulation
 Convergence
 Technological failure
2. Cradle to Grave
Pros and Cons
 Efficient service delivery
 Convenience for the citizen
 Better fraud management
 Better information dissemination and training
 Profiling
 Lack of trust
 Knowledge gap
3. Indiastack
Pros
 Presence-less use
 Speedy and more efficient transactions
 Reduce fraud
 One stop decentralized privacy control
Cons
 Complete loss of anonymity
 Potential denial of financial agency
 Predatory practices
 Doubts over the consent layer
 Regulation by code
Case Study III: Intelligent Transport System
 Overview:
Sources of Big Data in Transport :
 Vehicle Tracking System
 Passenger Information System
 Mobile Application- App collecting PI –
 SMS,
 Camera,
 wi-fi connection information,
 device ID
 and call information
 Electronic Ticketing System
 Call Data Records (CDR)
Potential users of Data
Open Questions!
 Privacy
 Exclusion
Pros
 For Organisations:
 Reduce project costs
 Incident management
 Promotes reliability on transports
 Reduce traffic congestion
 For Individuals:
 Improved user experience
 Targeted services
 Reduction in traffic congestion in cities
 PIS
Cons
 Privacy and data security
 No or inadequate Privacy Policies
 No opt-out
 Unplanned use of data
 Lack of accountability and transparency
 Data quality
 Exclusion
Case IV: Smart Meters
 Project Conceptualisation
 & Objective
DATA COLLECTED IN REAL TIME
Regulatory Response
 Deregulation for innovation
 Regulation for public interest
 Regulation to encourage technical measures that mitigate harm
 Regulation for interoperability
Pros
 Efficient Demand Side Management (DSM)
 Accurate shaping of the market and industry
 Security of supply
Cons
 Unintended behavioral analysis tool
 Social polarisation
 Social dumping
Contact me @
 drneetaa@gmail.com
 LinkedIn
 Thanks
Case study of digitization in india

More Related Content

What's hot

What's hot (20)

Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
Rajan Raj Pant
Rajan Raj PantRajan Raj Pant
Rajan Raj Pant
 
Adoption of Technologies for Claims Management in the Health Insurance Sector.
Adoption of Technologies for Claims Management in the Health Insurance Sector.Adoption of Technologies for Claims Management in the Health Insurance Sector.
Adoption of Technologies for Claims Management in the Health Insurance Sector.
 
How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
 
Biometric
 Biometric Biometric
Biometric
 
Dpa bims 2015_eng
Dpa bims 2015_engDpa bims 2015_eng
Dpa bims 2015_eng
 
How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
 
The Mobile Lawyer: 2014
The Mobile Lawyer: 2014The Mobile Lawyer: 2014
The Mobile Lawyer: 2014
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
 
Future value of data world map infographic 2018
Future value of data world map infographic 2018Future value of data world map infographic 2018
Future value of data world map infographic 2018
 
Smart banking system
Smart banking systemSmart banking system
Smart banking system
 
Artificial Intelligence (AI) for Financial Services
Artificial Intelligence (AI) for Financial Services Artificial Intelligence (AI) for Financial Services
Artificial Intelligence (AI) for Financial Services
 
Application of artificial intelligence in banking venkat vajradhar - medium
Application of artificial intelligence in banking   venkat vajradhar - mediumApplication of artificial intelligence in banking   venkat vajradhar - medium
Application of artificial intelligence in banking venkat vajradhar - medium
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 

Similar to Case study of digitization in india

1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
aulasnilda
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
RAJU852744
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ijaia
 

Similar to Case study of digitization in india (20)

1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
A proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioA proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectio
 
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
Unlocking the Power of Identity Verification in India A Step Towards a Safer ...
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
From Reactive to Proactive City Driving trust through transparency and fair u...
From Reactive to Proactive City Driving trust through transparency and fair u...From Reactive to Proactive City Driving trust through transparency and fair u...
From Reactive to Proactive City Driving trust through transparency and fair u...
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptx
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptx
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
160987-time-template-4x3.pptx
160987-time-template-4x3.pptx160987-time-template-4x3.pptx
160987-time-template-4x3.pptx
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 

More from Prof. Neeta Awasthy

More from Prof. Neeta Awasthy (20)

NEP 2020 .pptx
NEP 2020 .pptxNEP 2020 .pptx
NEP 2020 .pptx
 
Subhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to FreedomSubhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to Freedom
 
# 21 tips for a great presentation
# 21 tips for a great presentation# 21 tips for a great presentation
# 21 tips for a great presentation
 
Comparative Design thinking
Comparative Design thinking Comparative Design thinking
Comparative Design thinking
 
National Education Policy 2020
National Education Policy 2020 National Education Policy 2020
National Education Policy 2020
 
Personalised education (2)
Personalised education (2)Personalised education (2)
Personalised education (2)
 
Student dashboard for Engineering Undergraduates
Student dashboard for Engineering UndergraduatesStudent dashboard for Engineering Undergraduates
Student dashboard for Engineering Undergraduates
 
Handling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering ColllegeHandling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering Colllege
 
Engineering Applications of Machine Learning
Engineering Applications of Machine LearningEngineering Applications of Machine Learning
Engineering Applications of Machine Learning
 
Design thinking in Engineering
Design thinking in EngineeringDesign thinking in Engineering
Design thinking in Engineering
 
Data Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALLData Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALL
 
Big data and Artificial Intelligence
Big data and Artificial IntelligenceBig data and Artificial Intelligence
Big data and Artificial Intelligence
 
Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3
 
AI in Talent Acquisition
AI in Talent AcquisitionAI in Talent Acquisition
AI in Talent Acquisition
 
Big data in defence and national security malayasia
Big data in defence and national security   malayasiaBig data in defence and national security   malayasia
Big data in defence and national security malayasia
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Ann a Algorithms notes
Ann a Algorithms notesAnn a Algorithms notes
Ann a Algorithms notes
 
Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17 Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17
 
Steepest descent method
Steepest descent methodSteepest descent method
Steepest descent method
 
Gradient descent method
Gradient descent methodGradient descent method
Gradient descent method
 

Recently uploaded

一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
zahraomer517
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
MAQIB18
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 

Recently uploaded (20)

How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Uber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis ReportUber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis Report
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 

Case study of digitization in india

  • 1. AI Algorithms for Big Data in Governance in India: Case Studies world is looking into Dr Neeta Awasthy Technology Evangelist
  • 2. Case Study I: Predictive Policing  CCTNS (Crime and Criminal Network Tracking System) is an e-governance project under the Digital India mission connecting 14000 police stations.  Predictive Policing usually works in the following four ways  Predicting places and times with an increased risk of crime,  predicting potential future offenders,  creation of profiles for past crimes, and  predicting groups of individuals likely to be victims of crimes.
  • 3. PREDICTIVE POLICING PROCESS  Step 1. Data Collection  Step 2. Analysis (Predictive Model, Repeat Theory, Social Network Analysis & Regression Model)  Step 3. Police Intervention  Step 4. Criminal Response
  • 4. Problems vs Benefits  Inherent biases  Opacity of predictive models  Better allocation of resources  Preventive Policing  More holistic analysis
  • 5. Case Study II: The Unique Identity Project  As per official Aadhar database, 1.21 billion holders as of May 2018  CIDR  Seeding
  • 6. 1. Seeding  Ginger Platform  Manual or Algorithmic Aadhar Seeding  https://www.youtube.com/watch?v=3MTp5euNzM4
  • 7. Benefits  Reducing frauds  facilitating financial inclusion  providing for efficient delivery of services  enabling political empowerment  facilitating economic growth  security
  • 8. Open Questions  Lack of data protection regulation  Convergence  Technological failure
  • 9. 2. Cradle to Grave
  • 10. Pros and Cons  Efficient service delivery  Convenience for the citizen  Better fraud management  Better information dissemination and training  Profiling  Lack of trust  Knowledge gap
  • 12. Pros  Presence-less use  Speedy and more efficient transactions  Reduce fraud  One stop decentralized privacy control
  • 13. Cons  Complete loss of anonymity  Potential denial of financial agency  Predatory practices  Doubts over the consent layer  Regulation by code
  • 14. Case Study III: Intelligent Transport System  Overview:
  • 15. Sources of Big Data in Transport :  Vehicle Tracking System  Passenger Information System  Mobile Application- App collecting PI –  SMS,  Camera,  wi-fi connection information,  device ID  and call information  Electronic Ticketing System  Call Data Records (CDR)
  • 18. Pros  For Organisations:  Reduce project costs  Incident management  Promotes reliability on transports  Reduce traffic congestion  For Individuals:  Improved user experience  Targeted services  Reduction in traffic congestion in cities  PIS
  • 19. Cons  Privacy and data security  No or inadequate Privacy Policies  No opt-out  Unplanned use of data  Lack of accountability and transparency  Data quality  Exclusion
  • 20. Case IV: Smart Meters  Project Conceptualisation  & Objective
  • 21. DATA COLLECTED IN REAL TIME
  • 22. Regulatory Response  Deregulation for innovation  Regulation for public interest  Regulation to encourage technical measures that mitigate harm  Regulation for interoperability
  • 23. Pros  Efficient Demand Side Management (DSM)  Accurate shaping of the market and industry  Security of supply
  • 24. Cons  Unintended behavioral analysis tool  Social polarisation  Social dumping
  • 25. Contact me @  drneetaa@gmail.com  LinkedIn  Thanks