Al-Khouri, A.M. (2010) 'Trends and Development in Government Sector: Building e-Government Backbone', e-Government Conference, December 21, 2010, Dubai, United Arab Emirates.
Al-Khouri, A.M. (2011) 'The Development of a Federal Digital Identity', BIT's 1st Annual International Congress of u-World 2011, October 23-25, 2011, Dalian World EXPO Center (DWEC), China.
Al-Khouri, A.M. (2013) 'The Role of Emirates Identity Authority in Supporting the Development of Public Sector', The Bi-Annual IMAGE Users Group Forum, April 15 โ 18, Paris, France.
Al-Khouri, A.M. (2010) 'Facing the Challenge of Enrolment in National ID Schemes', The Biometric Landscape in Europe, BEST NETWORK โ BIOSIG, September 9-10, Darmstadt, Germany.
Al-Khouri, A.M. (2012) 'Strategic Vision: Public eID Programs in GCC Countries', World e-ID Congress, Identity Services for Government Healthcare & Enterprise, Sept. 19-21, Nice French Riviera, France.
This article provides some insight into the implementation of the national ID programme in the United Arab Emirates (UAE). The fundamental aim is to contribute to the existing body of knowledge in the field, as it sheds light on some of the lessons learned from the programme that is believed to widening the knowledge horizons of those involved in such initiatives.
Al-Khouri, A.M. (2011) 'The Development of a Federal Digital Identity', BIT's 1st Annual International Congress of u-World 2011, October 23-25, 2011, Dalian World EXPO Center (DWEC), China.
Al-Khouri, A.M. (2013) 'The Role of Emirates Identity Authority in Supporting the Development of Public Sector', The Bi-Annual IMAGE Users Group Forum, April 15 โ 18, Paris, France.
Al-Khouri, A.M. (2010) 'Facing the Challenge of Enrolment in National ID Schemes', The Biometric Landscape in Europe, BEST NETWORK โ BIOSIG, September 9-10, Darmstadt, Germany.
Al-Khouri, A.M. (2012) 'Strategic Vision: Public eID Programs in GCC Countries', World e-ID Congress, Identity Services for Government Healthcare & Enterprise, Sept. 19-21, Nice French Riviera, France.
This article provides some insight into the implementation of the national ID programme in the United Arab Emirates (UAE). The fundamental aim is to contribute to the existing body of knowledge in the field, as it sheds light on some of the lessons learned from the programme that is believed to widening the knowledge horizons of those involved in such initiatives.
To answer new digital challenges (faster business cycles, new risks and need for more firm-level integration), companies need firm-level governance around their digital initiatives. Too often digital is left to grow organically, generally in a series of silos or managed from just one perspective of the business. In this paper the importance of governance of digital initiative is explored in detail, with working models, and some case studies from companies across different industries.
โข Who we are. About Data Exchange m Agency, Our Activities and responsibilities.
โข Shorty about cyber activities in Georgia, Legislation and Strategies and Actions.
โข DEA Security and E-Government Projects.
โข Information Security Activities.
By Irakli Lomidze
Digital governance or e-Governance can be defined as the use of information and communication technology by the government to provide the quality information and services to citizens, businesses, voluntary organizations, and other government agencies in an efficient, cost-effective, and convenient manner and to bring transparency, accountability in government functioning to strengthen democracy.
The Digital India programme is a flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
iSPIRTโs Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
ย
It is widely known that the amount of data generated daily worldwide is rising at an incredibly exponential rate. Yet, what remains shrouded is how this data, particularly those data types concerning or generated by us, as individuals, are being used and stored by both the public and private sector. As we move into a data-driven world, it is crucial that the laws developed around Data center on the premise of both empowering and protecting the individual. In fact, the main purpose of the 4th layer of India Stack, the โconsent layerโ, is just this: to provide for a set of tools and utilities, as part of the Data Empowerment and Protection Architecture (DEPA), that empower citizens to assert control over their data.
The Justice Srikrishna led committee of experts has released a White Paper articulating their provisional thoughts on the Data Protection Framework, and are seeking public comments on the subject. iSPIRT has submitted a formal response to the White Paper. You can also read the blog post lays out our current views regarding Data Protection here: http://pn.ispirt.in/india-in-a-digital-world/
Al-Khouri, A.M. (2011) 'Case Study: Strategy Development at Emirates Identity Authority', 4th UAE 2015 Government Organisations Strategy Development Summit, April 5-6, Dubai, UAE.
Al-Khouri, A.M. (2013) ' Nationalization of the Workforce between the Supply and Demand: A Critical Study of the Nationalization Reality in the Arab World', The Second Arab Conference for Human Resource Management. The Arab Organization for Administrative Development, March 12-13, Dubai, UAE.
This presentation is written in Arabic.
ุงูุชูุทูู ุจูู ุงูุนุฑุถ ูุงูุทูุจ: ุฏุฑุงุณุฉ ููุฏูุฉ ููุงูุน ุงูุชูุทูู ูู ุงูุนุงูู ุงูุนุฑุจู
Al-Khouri, A.M. (2013) 'Developing More Inclusive and Innovative Government', The 5th Government Technology Summit โ Middle East, February 5 โ 6, Abu Dhabi, UAE.
To answer new digital challenges (faster business cycles, new risks and need for more firm-level integration), companies need firm-level governance around their digital initiatives. Too often digital is left to grow organically, generally in a series of silos or managed from just one perspective of the business. In this paper the importance of governance of digital initiative is explored in detail, with working models, and some case studies from companies across different industries.
โข Who we are. About Data Exchange m Agency, Our Activities and responsibilities.
โข Shorty about cyber activities in Georgia, Legislation and Strategies and Actions.
โข DEA Security and E-Government Projects.
โข Information Security Activities.
By Irakli Lomidze
Digital governance or e-Governance can be defined as the use of information and communication technology by the government to provide the quality information and services to citizens, businesses, voluntary organizations, and other government agencies in an efficient, cost-effective, and convenient manner and to bring transparency, accountability in government functioning to strengthen democracy.
The Digital India programme is a flagship programme of the Government of India with a vision to transform India into a digitally empowered society and knowledge economy.
iSPIRTโs Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
ย
It is widely known that the amount of data generated daily worldwide is rising at an incredibly exponential rate. Yet, what remains shrouded is how this data, particularly those data types concerning or generated by us, as individuals, are being used and stored by both the public and private sector. As we move into a data-driven world, it is crucial that the laws developed around Data center on the premise of both empowering and protecting the individual. In fact, the main purpose of the 4th layer of India Stack, the โconsent layerโ, is just this: to provide for a set of tools and utilities, as part of the Data Empowerment and Protection Architecture (DEPA), that empower citizens to assert control over their data.
The Justice Srikrishna led committee of experts has released a White Paper articulating their provisional thoughts on the Data Protection Framework, and are seeking public comments on the subject. iSPIRT has submitted a formal response to the White Paper. You can also read the blog post lays out our current views regarding Data Protection here: http://pn.ispirt.in/india-in-a-digital-world/
Al-Khouri, A.M. (2011) 'Case Study: Strategy Development at Emirates Identity Authority', 4th UAE 2015 Government Organisations Strategy Development Summit, April 5-6, Dubai, UAE.
Al-Khouri, A.M. (2013) ' Nationalization of the Workforce between the Supply and Demand: A Critical Study of the Nationalization Reality in the Arab World', The Second Arab Conference for Human Resource Management. The Arab Organization for Administrative Development, March 12-13, Dubai, UAE.
This presentation is written in Arabic.
ุงูุชูุทูู ุจูู ุงูุนุฑุถ ูุงูุทูุจ: ุฏุฑุงุณุฉ ููุฏูุฉ ููุงูุน ุงูุชูุทูู ูู ุงูุนุงูู ุงูุนุฑุจู
Al-Khouri, A.M. (2013) 'Developing More Inclusive and Innovative Government', The 5th Government Technology Summit โ Middle East, February 5 โ 6, Abu Dhabi, UAE.
Al-Khouri, A.M. (2011) 'Driving Forces: The Role of Advanced Biometric Systems in Building Modern Societies', Abu Dhabi Global ID Summit for Advanced Identity Systems, April3-4, Abu Dhabi, UAE.
This is a presentation developed and presented in an international conference in Abu Dhabi, UAE in 2011. The language of the presentation is Arabic.
Dr. Ali M. Al-Khouri
Al-Khouri, A.M. (2008) 'Challenges in the Management of Strategic Government Projects: The Case of the UAE National ID Program', e-Identity and Access Asia 2008, July 8-9, Singapore.
"No. 1.. How to achieve it and sustain?" |
A forum organised by Dubai Government Excellence Program | Tuesday 28 January 2014 | Emirates Towers, Dubai, United Arab Emirates.
ู ูุชูู ุญูุงุฑู ุจุนููุงู: ยซุงูุฑูู 1 ... ููู ูุญูู ุงูุฑูู 1ุ ูููู ูุญุงูุธ ุนูููุ
ุชูุธูู : ุจุฑูุงู ุฌ ุฏุจู ููุฃุฏุงุก ุงูุญููู ู ุงูู ุชู ูุฒ
Al-Khouri, A.M. (2010) 'The Development of a National Identity Management System to Support National Security and Economy', World Hi-Tech Forum, October 14 2010, London, UK.
Al-Khouri, A.M. (2011) 'Biometric Applications in Public Sector', VI Biometrics International Conference of the Argentine Republic (CIBRA 2011), November 14-16, 2011, Ciudad Autonoma de Buenos Aires, Argentine Republic.
Al-Khouri, A.M. (2012) 'Human Resources at Emirates Identity Authority: A Building Block of the New Strategic Plan', Sharing Best Practices of Investors in People Forum, Feb24, Dubai, UAE.
Al-Khouri, A.M. (2010) 'The Question of Identity in GCC Countries', The 21st-Century Gulf: The Challenge of Identity, June30 - July 3, University of Exeter, Exeter, U.K.
Al-Khouri, A.M. (2010) 'Customer Centricity and National Identity Infrastructure: Key Thoughts & Reflections', ID World Congress, November16-18, Milan, Italy.
Al-Khouri, A.M. (2012) 'The Government Role in improving Service Quality in Public Sector: The Case of the Emirates Identity Authority', Customer Service Conference, June 24, 2012, Rome, Italy.
Unique ID Authority of India, Design and Cloud ConnectionSuhas Kelkar
ย
UID project in India is a showcase example of Cloud based services. And that too at a massive scale. It is both ambitious and elegant in it's approach for solving identity issues.
Al-Khouri, A.M. (2012) 'e-Government Transformation: A Proposed Innovative Model', The 2nd Annual IT for Government Summit 2012, November 19-21, Dubai, UAE.
Al-Khouri, A.M. (2011) 'Emerging Markets in Digital World', Summit on Information and Network Security for Emerging Markets, September 20-21, Helsinki, Finland.
This is a presentation by Yodahe A. Zemichael, Principal Technical Advisor, Office of the Ethiopian Prime Minister, at the 3rd Annual East Africa FInance Summit
The study highlights the effects of the revolutions and unrest in Arab countries with an attempt to provide an overview of Arab present and its prospects. It primarily recommends the adoption and employment of advanced technologies in reconstruction efforts and supporting the development of resilient and sustainable economies.
The book is designed to promote understanding of conflicts in organisations, and establish how they can be handled effectively, and make them work as opportunities for improvement and constructive change.
The book pinpoints that the digital future is exposed to the danger of chaotic, unregulated growth, which constitutes a challenge for countries that still operate according to traditional economic models, and that public thinking in the Arab region in facing challenges still follows the "reaction methodology" and temporary solutions with short-term prospects, and that this is confirmed by the current international indicators of its competitiveness. The book proposes that in order to address this, visions and efforts should be based on strategies driven by scientific methods, and with it the Arab countries must develop a clear understanding of the main challenges before jumping to seize opportunities.
The book shows that it is fundamental for policymakers and decision-makers to have precise and accurate understanding of the intricate details in digital transformation initiatives and the role that modern technologies can play in changing the rules and systems of current practices, and in how to develop digitized, more innovative business models with which to build resilient and sustainable social economies and systems.
The book also draws on the current data and indicators of the global economy and that they are pushing to form a worrying picture of weaknesses in Arab countries, which in turn may threaten the stability of the entire region, especially with regard to the "cognitive decline" and โincreasing unemployment ratesโ and โpoor economic performance"; and that these challenges call for dealing with it as key strategic indicators that require urgent action plans; with emphasis that these plans need to be designed to reflect different ways of thinking and adapted to the nature of the requirements and challenges of the 21st century and treat them as forces and positive factors.
The book highlights the importance of accelerating the implementation of a set of initial reform projects to encourage the development of more dynamic and developed digital business environments in the Arab region, in parallel with the development of educational systems and healthcare, and strengthening agricultural capabilities to achieve food security targets, and focus on economies based on industry and production, and promoting the development of Arab digital platforms to support e-commerce practices.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
ย
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more โmechanicalโ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
ย
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
ย
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties โ USA
Expansion of bot farms โ how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks โ Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder โ active learning and UiPath LLMs for do...UiPathCommunity
ย
๐ฅ Speed, accuracy, and scaling โ discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Miningโข:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing โ with little to no training required
Get an exclusive demo of the new family of UiPath LLMs โ GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
๐จโ๐ซ Andras Palfi, Senior Product Manager, UiPath
๐ฉโ๐ซ Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
ย
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
ย
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
โข The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
โข Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
โข Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
โข Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
ย
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
ย
Trends and Development in Government Sector: Building e-Government Backbone
1. 2010 21 December 2010
Trends and Developments in Government Sector
โBuilding e-Government Backboneโ
Conference: e-Government Institute
Dubai, United Arab Emirates
Date: 21 December 2010
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ www.emiratesid.ae
Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE ยฉ 2010 Emirates Identity Authority. All rights reserved
2. Presentation Overview
โข Introduction: National Identity Infrastructure
โข The challenge of assured identification?
โข The digital identity project
โข Reflections and Concluding Remarks
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved 3/15/2013
3. Agenda
โข Introduction
Introduction: National Identity Infrastructure
โข The challenge of assured identification?
โข The digital identity project
โข Reflections and Concluding Remarks
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved 3/15/2013
4. Population Census
8.2 M
Total Population
4.1 M
950,000
825,000
2010 Census 2005 Census
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
5. Identification Cards ID, DL, Health, Labour, eGate, Residency, Work
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
6. UAE Vision 2021
Safe and Secure Nation
โThe UAE Government will continue to be the
custodian of a safe and secure nation, ensuring
economic resilience and stability, upholding fairness
and justice, and offering an advance welfare system
to allow all Emirates to overcome adversity and
contribute positively to society.โ
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
7. National
Identity Security
Management
Infrastructure
Economic
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
8. Program Components
Centralised Identity
Database Verification
Identity
Management โซุฑูู ุงููููุฉโฌ
System
Population Register ID Card
Smart Card + PKI + Biometrics
7/34
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
9. Agenda
โข Introduction: National Identity Infrastructure
โข Thechallenge of assured identification?
โข The challenge of assured identification?
โข The digital identity project
โข Reflections and Concluding Remarks
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved 3/15/2013
11. The ability of unique identification of individuals?
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
12. Analyzing the requirements
Determining the identity of an
individual by comparing a
presented characteristic to all
Identification pre-enrolled in the database.
WHO ARE YOU?
Recognition
Authenticating identity of an
individual by comparing a
Verification presented characteristic to a
pre-enrolled characteristic
ARE YOU WHO YOU
SAY YOU ARE?
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
13. Multi-Biometric Systems
Facial Recognition Iris Recognition Fingerprints
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
14. Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
15. Anti Counterfeit Physical Features
Guilloches & Rainbow Special Raster
Micro Text
Variable fine lines
Module
UV ink Photo Box Area
Guilloches & Rainbow OVI
Hidden word area
Special Raster
Micro Text Ink Jet Chip Serial
No.
Variable fine lines
OCR-B Area UV ink
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
16. Collaborative Government Environment
๏ฎ interoperability & integration with Eliminating vital static
other systems documents issuance by
uncoordinated
General Info. Local Ministry of jurisdictions.
Authority Authorities Justice
Private Ministry of
Ministries
companies & org. Education
Economics & Ministry of
Planning Police
Ministry
Interior
Ministry of Ministry of Central Database
Central Bank
Labour Health
ID Numbers
... facilitate communication among government, industry and society
19/34
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
17. ID Number based databases
Public Sector
Private Sector
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
18. Agenda
โข Introduction: National Identity Infrastructure
โข The challenge of assured identification?
โข Thedigital identity projectProject
โข The Digital Identity
โข Reflections and Concluding Remarks
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved 3/15/2013
19. Digital
World
The raise of digital era
- Society, Economy,
Network, Crimeโฆ
- more and more are
conn cted. e
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
21. The Problem with Cyberspace
โข Where is it?
โข Not a physical โplace.โ
โข Criminal and victim are often miles apart
โข Criminal may never set foot in state or country
in which the crime occurs
โข Some consider the Internet to be a โFREE ZONEโ of
no laws?
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
22. Identity Theft
โฆ an IDENTITY is stolen
every 4 seconds.
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
23. Financial Impact of Identity Theft
Worldwide
$ 300-500 billion
each year
Source:
* Privacy Clearing House,
http://www.privacyrights.org
* Forbes
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
24. Digital Identity Project
Digital Certificate
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
25. Digital Identity Project
Encryption Digital Signature
Authentication: Ability to verify the identity of an individual
or application.
Confidentiality: Protection of info. from unauthorized disclosure
(info. kept private).
Data Integrity: Protection of info. from undetected modification
(info. cannot be manipulated).
Nonrepudiation: Prevention of an entity from denying previous
actions (transaction cannot be disowned).
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
26. Digital Identity Project
Certification
Authority Validation
Authority
Bank Website
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
27. 144K Contactless Smart Cards
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
28. ID Card Readers Mass Dissemination Project
Card Reader
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
29. Agenda
โข Introduction: National Identity Infrastructure
โข The challenge of assured identification?
โข The digital identity project
โข Reflections and Concluding Remarks
โข Reflections and Concluding Remarks
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved 3/15/2013
30. Evolving role of e-Government
One of the engins of a
nationโs economic thrust
E-services to
constituents
Internal efficiency,
automation
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
31. The need to learning about our own capabilities?
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
32. E-government Profile in the UAE
Inter-agency
integration
and unified Online
citizen services Tranformation
0% citizen
transaction
Transaction
23%
Information Interaction
57% 20%
Web Intake
Presence for Process of
Publishing citizen
Information interaction
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
33. Everybodyโs Objective โฆ
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
34. The 4 Project Dimensions
All government projects Expected
fail to deliver within the Functionalities
four dimensionsโฆ
Initial
Agreed Schedule
Budget
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
35. It is always about perceptions?
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
36. Narrow Thinking !
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
37. Aggressive Technology Marketing by Vendors
Supplier
Practitioner
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
38. Management Targets
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
39. EFQM Excellence Model
Organisational Development Principles
Results
HR
Development
Learning and Innovation
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
40. The Core Pillars of Organisations
People Process Technology Resources
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
41. Organisational Pillars
People Each of these
integrates
pillars may pull
enables the organisation
in different
directions
Supports Management adds benefits
Process
Focus Technology
enables Drives 15%
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
42. Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ
When Technology in Charge!
ยฉ 2010 Emirates Identity Authority. All rights reserved
43. Organisational Pillars
People Each of these
integrates
pillars may pull
85% enables the organisation
in different
directions
Supports Management adds benefits
Process
Focus Technology
enables Drives 15%
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
44. Federal Authority
Consequences of weak resources!
| โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
45. Developing Business Agility
in public Sectors
Need to be dynamic to adapt
to changing world, we live in
different countries, that has its
own culture and uniqueness ..
What worked in one project,
may not yield the same
results even if implemented
by the same people,
Thank you
and even in same
settings !
Ali M. Al-Khouri | Director General |
Emirates Identity Authority | ali.alkhouri@emiratesid.ae
Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved
46. Federal Authority | โซููุฆููููููููุฉ ุงุชุญููููููููููููุงุฏูุฉโฌ ยฉ 2010 Emirates Identity Authority. All rights reserved