We’re all living in a disruption society. Hundreds if not thousands of new e-mail
messages hit our inbox every day. Social media notifications pop up around the
clock. With all of these daily distractions, how is a professional supposed to stay
focused? And to an even greater degree, as a leader how do you help your team
minimize distraction to maintain productivity and produce innovative ideas?
The document provides an annual report for Soroptimist International of the Americas for 2013-2014. It discusses three areas where Soroptimist grew dreams into successes over the past year: 1) The Live Your Dream Awards program which provided $1.74 million in education funding to 1,277 women; 2) The LiveYourDream.org online strategy which saw major increases in engagement; and 3) Record contributions of $2 million, surpassing member dues as the largest revenue source. The report highlights the impact of Soroptimist's programs and discusses goals for continued growth and impact.
Hola cacatúas!!! Aquí tenéis un Power Point de los diferentes tipos de cacatúa que hay, además tenéis la lista más abajo. Así podeis conocer más a nuestas especies y definiros como una, la que mas os guste. Esperemos que os guste este Power Point hecho por nosotras y que os identifiqueis con alguna de las especies. Besis cacatúas!!!;)
O documento descreve o patrimônio histórico, o processo de tombamento e os órgãos responsáveis pela preservação do patrimônio cultural em Belo Horizonte. Inclui exemplos de bens tombados na cidade e explica os conjuntos urbanos protegidos e os diferentes graus de proteção dentro desses conjuntos.
Above the line refers to making good choices even when others disagree and requires courage so one does not have regrets. It includes behaviors like arriving at school on time, following teacher instructions, and completing daily work. Below the line means choosing wrongly, such as joking during lessons, to get attention rather than learning. Examples are playing around in class, skipping class, and not doing assignments.
This document outlines a proposal for a photography magazine targeted at 17-24 year olds. It discusses constraints from the IPSO regulator around harassment, trespass, copyright and discrimination. Two mock-ups are presented and feedback shared. The final magazine outline includes articles on inspirational photographers, up-and-coming photographers, and photography techniques. Details of costs such as printing, personnel, equipment and estimated profits are provided.
Your office, its look and its location say a lot about your brand, which is why choosing to make a move is such a big decision.
Explore why businesses move, the benefits of a new space and how to choose the location that’s right for you in this infographic. We also discuss determining whether to rent or to buy and ways to avoid common pitfalls.
We’re all living in a disruption society. Hundreds if not thousands of new e-mail
messages hit our inbox every day. Social media notifications pop up around the
clock. With all of these daily distractions, how is a professional supposed to stay
focused? And to an even greater degree, as a leader how do you help your team
minimize distraction to maintain productivity and produce innovative ideas?
The document provides an annual report for Soroptimist International of the Americas for 2013-2014. It discusses three areas where Soroptimist grew dreams into successes over the past year: 1) The Live Your Dream Awards program which provided $1.74 million in education funding to 1,277 women; 2) The LiveYourDream.org online strategy which saw major increases in engagement; and 3) Record contributions of $2 million, surpassing member dues as the largest revenue source. The report highlights the impact of Soroptimist's programs and discusses goals for continued growth and impact.
Hola cacatúas!!! Aquí tenéis un Power Point de los diferentes tipos de cacatúa que hay, además tenéis la lista más abajo. Así podeis conocer más a nuestas especies y definiros como una, la que mas os guste. Esperemos que os guste este Power Point hecho por nosotras y que os identifiqueis con alguna de las especies. Besis cacatúas!!!;)
O documento descreve o patrimônio histórico, o processo de tombamento e os órgãos responsáveis pela preservação do patrimônio cultural em Belo Horizonte. Inclui exemplos de bens tombados na cidade e explica os conjuntos urbanos protegidos e os diferentes graus de proteção dentro desses conjuntos.
Above the line refers to making good choices even when others disagree and requires courage so one does not have regrets. It includes behaviors like arriving at school on time, following teacher instructions, and completing daily work. Below the line means choosing wrongly, such as joking during lessons, to get attention rather than learning. Examples are playing around in class, skipping class, and not doing assignments.
This document outlines a proposal for a photography magazine targeted at 17-24 year olds. It discusses constraints from the IPSO regulator around harassment, trespass, copyright and discrimination. Two mock-ups are presented and feedback shared. The final magazine outline includes articles on inspirational photographers, up-and-coming photographers, and photography techniques. Details of costs such as printing, personnel, equipment and estimated profits are provided.
Your office, its look and its location say a lot about your brand, which is why choosing to make a move is such a big decision.
Explore why businesses move, the benefits of a new space and how to choose the location that’s right for you in this infographic. We also discuss determining whether to rent or to buy and ways to avoid common pitfalls.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Is technology a_double-edged_tool_today
1. CMYK
Technology
Tech as Deadly Tool
To use or not to
use - that’s the
Cyber Question!
- Vicky Shah
A decade ago we
were afraid of
aircrafts causing
d a m a g e t o the security of state or friendly relations with foreign states.
infrastructure; today
we are afraid of Section 66 F: A. Whoever with intent to threaten the unity,
software and integrity, security or sovereignty of India or to strike terror in
technology that can the people or any section of the people by
be used to cause i. Denying or cause the denial of access to any person
damage. The World authorised to access computer resource; or
of Technology is
almost seven times ii. Attempts to penetrate(enter) or access a computer
faster than the real world. There is no doubt that resource without authorization or exceeding authorised
technology is a double edged sword. With good access; or
comes evil and the realty is that technology can be iii. Introducing or causing to introduce any computer
misused. The ease that technology provides makes contaminant, and by means of such conduct causes or is
it the best tool to be used by everyone. This is a likely to cause death or injuries to persons or damage to or
global issue and not only specific to India. destruction of property or disrupts or knowing that it is
Borderless incidents and activities have become likely to cause damage or disruption of supplies or services
difficult to regulate. essential to the life of the community or adversely affect the
According to the Anti-Terrorist Act - 1985 a terrorist critical information infrastructure specified under section
is “a person who indulges in wanton killing of 70, or
persons or in violence or in the disruption of B. knowingly or intentionally penetrates(enters) or
services or in damaging property or disrupting accesses a computer resource without authorisation or
means of communication essential to the exceeding authorised access, and by means of such
community with a view of putting the public in fear conduct obtains access to information, data or computer
affecting adversely the harmony between religions database that is restricted for reasons for the security of the
of different races, coercing or awing the State or foreign relations; or any restricted information,
government established by law or endangering the data or computer database, with reasons to believe that
sovereignty and integrity of India.” such information, data or computer database so obtained
According to Information Technology Act 2000 may be used to cause or likely to cause injury to the
(Amendments) 2008 Sub-section 66F there is interests of the sovereignty and integrity of India, the
punishment for cyber terrorism up to life security of the State, friendly relations with foreign states,
imprisonment. Cyber terrorism is defined as public order, decency or morality, or in relation to
causing denial of service, illegal access, contempt of Court, defamation or incitement to an
introducing a virus in any of the critical information offence, or to the advantage of any foreign nation, group
infrastructure of the country defined u/s 70 with the of individuals or otherwise, commits the offence of cyber
intent to threaten the unity, integrity, security or terrorism.
sovereignty of India or strike terror in the people or There is an old truism - we cannot stop progress. The
any section of the people; or gaining illegal access truism has been used to justify investments in technologies
to data or database that is restricted for reasons of that could potentially not only harm people but wipe out
The Mumbai PROTECTOR March - April 2010 66
CMYK
2. CMYK
Technology
the entire planet. While we cannot stop the but GPS & networks
progress, we still should think carefully about
Recent Past Incidents where technology was misused:
the consequences of the technologies that we
invent.1 • 26/11: Global Positioning Satellite systems, Blackberry, CDs
with high resolution satellite images, Multiple cell phones with
“A computer keyboard can be a very useful
switchable SIM cards, Satellite phones
tool for the progress of humanity, but it can
also become a dangerous weapon capable • September 13, 2008: Indian Mujahideen militants used
of producing enormous economic damages unsecured WiFi system of a company in Chembur.
to the infrastructure of a state or company, • August 2008: A stray terror e-mail was traced to the Khalsa
and even against the integrity and the life of College, Matunga, Mumbai.
human beings” - Secretary General Cesar
Gaviria, OAS, Us2 • July 2008: E-mails were sent before and after the Ahmedabad
blasts. One was traced to Navi Mumbai and the other to an IP
Technology Platforms that have been address in Vadodara.
misused:
• May 2008: A terror e-mail was sent before the Jaipur blasts
• Social Networking Sites • Blogs • Email from a cyber cafe in Ghaziabad.
Services • SMS Services • VoIP • GPS and
GIS based Applications and Equipments • November 2007: Serial blasts in Lucknow, Varanasi, and
Faizabad courts in UP The terror e-mail was sent by Indian
.
Growing Challenges faced by India: Mujahideen (IM) from a cyber café in Laxmi Nagar, Delhi.
• Exponential growth of Internet and Mobile (Source: Internet and Newspapers)
Phone use
• 3G technology to be started very soon The Wi-Fi misuse could have easily prevented had the
• Interconnected business and government users/or their network administrators would have been
• E-governance growth has implications for alert and careful in securing the connections. It only takes
Information Security, Privacy and Cyber following steps to secure a Wi-Fi Connection:
Security • Change Default User names & Passwords
• Income Tax, Excise, Customs, Sales tax • Use Strong Passwords
networks connected • Enable Wireless Security (WPA2)
• Smart cards, UID being issued • Change your SSID
• Land records computerized • Do not show Broadcast SSID
• Police networks • Use MAC filtration
• Defense is no longer arms & ammunition • Use Static IP Address
• Use firewalls
• Use Latest Antivirus Pack
An interesting article has been written by Bruce Schiner about
“Terrorists May Use Google Earth, But Fear Is No Reason to Ban
It” he talks about how surprising it is to the people that their own
infrastructure can be used against them. And in the wake of
terrorist attacks or plots, there are fear-induced calls to ban,
disrupt or control that infrastructure. This isn't the only way our
information technology helps terrorists. We already know they
use websites to spread their message and possibly even to
recruit.3
Let's all stop and take a deep breath. By its very nature,
communications infrastructure is general. It can be used to plan
both legal and illegal activities, and it's generally impossible to
tell which is which. When we send and receive email, it looks
exactly the same as a terrorist doing the same thing. To the
mobile phone network, a call from one terrorist to another looks
exactly the same as a mobile phone call from one victim to
another. Any attempt to ban or limit infrastructure affects
The Mumbai PROTECTOR March - April 2010 67
CMYK
3. CMYK
Technology
everybody. Clearly the technologies that are being developed and
that would be developed in future can be used in a bad
Terrorist attacks are very rare, and it is almost always a
way by the "evil doers". But this is really nothing new,
bad trade-off to deny society the benefits of a
and as I said in the beginning of this article -
communications technology just because the bad guys
technological progress is unstoppable. So why do we
might use it too. Communications infrastructure is
need to think about these things? Simply because it is
especially valuable during a terrorist attack. Twitter was
always better to pause and think about the
the best way for people to get real-time information
implications, than blindly rush through things. Just
about the attacks in Mumbai. If twitter was banned
because something is cool does not mean that it is not
would it have been helpful for people to know about
dangerous. And beyond cool, we can be just a bit more
the updates? Information lessens fear and makes
careful. These are debatable and should be debated at
people safer.
the right level with right channel.
None of this is new. Criminals have used telephones
The Way Ahead:
and mobile phones since they were invented. Drug
smugglers, Bank robbers, terrorists, etc... everyone. • Government's positive and critical role in Proactive,
Society survives all of this because the good uses of Active and Reactive strategies.
infrastructure far outweigh the bad uses, even though • Protecting, Preventing, Mitigating and Investigating
the good uses are - by and large - small and pedestrian against all forms of incidents
and the bad uses are rare and spectacular. And while • Citizens alertness and cooperation to Law Protectors,
terrorism turns society's very infrastructure against Law Enforcement Agency, etc…
itself, we only harm ourselves by dismantling that • A statewide and overall national approach to
infrastructure in response - just as we would if we technology security is required for protecting citizens
banned technology because anti social elements used from the menace of Technology Abuse.
them too. • Government lacks expertises which are available
with Private Sector Direct capitalization of talent
"Where in the rule book does it say that terrorists are
available in the industry.
not allowed to use technology that is readily available
• Government playing instrumental role in raising
to almost anyone?" said Ajay Sahni, executive director
awareness about existing risks, creating state
of New Delhi's Institute for Conflict Management. "The
infrastructure to address technology security issues,
only people out of the loop seem to be the Indian
and create confidence for the citizens.
security forces. They are a generation behind in
• Government helping in preventing economy losses
understanding the technology that the terrorists
faced by community.
used."4
• Cert-In to play an important role in critical
Lastly, this is terrorism in the digital age. "Technology is infrastructure as they are appointed as nodal agency
advancing every day. We try to keep pace with it." as per the Information Technology Act 2000
Hasan Gafoor, IPS Mumbai CP during the 26/11 press Amendment 2008.
conference.
Credits, Reference and Acknowledgements:
1)Technology and Terrorism: Are we being too naive? -
Written by Alex Iskold / June 2, 2007
2)http://goliath.ecnext.com/coms2/gi_0199-
3159573/Confronting-cyber-crime.html
3) http://www.schneier.com/essay-258.html
4)http://www.washingtonpost.com/wpdyn/content/ar
ticle/2008/12/02/AR2008120203519.html
Disclaimer:
This article is for non-profit, knowledge sharing, awareness and
educational purpose. Please feel free to write your view, criticism,
comments to the author at vicky@cybercrimes.in. Information
available in this article is not enforceable by law; however these are
my personal views about the topic which i feel should be shared. Any
errors, omissions, misstatements, and misunderstandings set forth in
the article are sincerely apologized. Relying on the contents will be
sole responsibility of the users. +
The Mumbai PROTECTOR March - April 2010 68
CMYK