Over the past ten to fifteen years, there has been a significant increase in online shopping and electronic commerce. However, the rise of e-Commerce has also led to an equally significant increase in cyber-attacks and other cyber deviant behaviors related to e-Commerce fraud stakeholders, systems, and processes. These digital attacks and behaviors impact the industry worldwide by billions of dollars and the Asia Pacific region is not immune to these malicious acts. These cyber-attacks and other cyber deviant behaviors continue to evolve in sophistication and creativity to evade effective security measures, which makes it difficult for organizations to contend with. This webinar provides an overview of the e-Commerce Fraud Ecosystem with a particular focus on the Asia Pacific from the merchant/retailer perspective.
Dr. Dwight is an award-winning lecturer currently teaching at RMIT at the School of Science, Engineering, and Technology in Vietnam. He has previously taught at City University of Seattle and Washington Technology University. Additionally, he has been a visiting lecturer at the Banking Academy of Vietnam and Shenzhen Polytechnic University. He obtained his PhD of Information Technology from the University of the Cumberlands, MBA from Louisiana State University, MS Information Systems Management from Seattle Pacific University. His research focuses on ecommerce, ecommerce fraud, cyber security, IT operations, and cyber education. Before academia, Dr. Dwight spent over a decade in professional technical business roles at Costco as a technical ecommerce program manager and Boeing as an engineering analyst.
Over the past ten to fifteen years, there has been a significant increase in online shopping and electronic commerce. However, the rise of e-Commerce has also led to an equally significant increase in cyber-attacks and other cyber deviant behaviors related to e-Commerce fraud stakeholders, systems, and processes. These digital attacks and behaviors impact the industry worldwide by billions of dollars and the Asia Pacific region is not immune to these malicious acts. These cyber-attacks and other cyber deviant behaviors continue to evolve in sophistication and creativity to evade effective security measures, which makes it difficult for organizations to contend with. This webinar provides an overview of the e-Commerce Fraud Ecosystem with a particular focus on the Asia Pacific from the merchant/retailer perspective.
Digital ownership has become increasingly important in recent years, and Non-Fungible Tokens (NFTs) have emerged as a way to verify and authenticate ownership of digital assets like art, music, and video games. The gaming and entertainment industries have been quick to adopt NFTs, creating unique experiences, rewarding fans, and exploring new revenue streams. NFTs are also being explored in finance, real estate, and identity verification, and have the potential to revolutionize how we think about ownership and transfer of digital assets. This webinar will delve into the origins and latest trends of NFTs. It will explore how this technology has evolved and how it has been applied in various industries. It will discuss the challenges that come with implementing NFTs and the potential impact they could have on digital ownership.
Application security assessment is the process of evaluating the security of an application or system by identifying potential vulnerabilities and threats. It involves testing an application or system to determine its security posture and to identify any weaknesses that could be exploited by attackers. There are several different types of application security assessments, including penetration testing, vulnerability scanning, code review, and threat modeling. Each type of assessment provides a different perspective on the security of the application or system, and all of them can be useful in identifying and mitigating security risks. Overall, application security assessment is an important process for any organization that wants to ensure the security of its applications and systems.
While cryptocurrency and NFT are popular use cases of blockchain, there are many other use cases that can potentially address the present and future social issues. Blockchain is a promising technology that allows several stakeholders to collaborate on the basis of Trust. This trust comes from blockchains’ inherent characteristics of auditability, verifiability, transparency, and immutability. This webinar covers some core concepts of blockchain focusing on the characteristics of Tamper Resistant Distributed Ledger, and shares the way of thinking for which purpose, how and where the blockchain would work nicely. The webinar would introduce at an abstract level and superficially introduce how an Internet running on the blockchain technology would provide more trust and transparency.
Information security risk management, also called IT risk management, consists of the policies, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities, whether it is software vulnerabilities, vulnerable configurations, obsolete packages, or a range of other issues related to the threats and risks associated with the use of new technologies. Effective risk management means attempting to control, as much as possible, future outcomes by acting proactively rather than reactively.
This webinar describes how to build the foundation for a comprehensive security program, calculating risks, and processes necessary to develop that foundation into a mature vulnerability assessment and risk management program.
Progress is being made to bridge the gap in industrial development and enhance industrial production towards Industry 4.0 through the digital transformation of manufacturing. As Industry 4.0 innovates totally towards the digital transformation of all industrial sectors, we need to consider not only manufacturing but also the healthcare services sector. The Industrial IoT platforms improve the automation in real-time monitoring of manufacturing processes and smart healthcare services.
The consequence could heal the corona pandemic effect on disruption to the manufacturing product supply chain and the remote healthcare services. However, on the flip side, moving data to be computed in the public cloud raises security breaches and privacy leakage concerns. Therefore, the key solution is a secure and privacy-preserved IoT platform that can utilize the public cloud capability.
Multi-access edge computing (MEC), is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and at the edge of any network. As a promising edge technology, it can be applied to mobile, wireless and wired scenarios, using software and hardware platforms, at the network edge near end users. MEC provides seamless integration of multiple application service providers and vendors towards mobile subscribers, enterprises, and other vertical segments. It is an important component in 5G architecture that supports variety of innovative applications and services where ultra-low latency is required. This webinar will introduce Mobile Edge Computing, its Architectures, Applications in real-time and some current challenges.
Learning techniques have been applied increasingly for food quality evaluation using computer vision in recent years. This webinar reviews recent advances in learning techniques for food quality evaluation using computer vision, which include artificial neural network, statistical learning, and decision tree. Artificial neural network (ANN) and statistical learning (SL) remain the primary learning methods in the field of computer vision for food quality evaluation. Among the applications of learning algorithms in computer vision for food quality evaluation, most of them are for classification and prediction. In this webinar, the promise of learning techniques for food quality evaluation using computer vision is demonstrated, and some issues which need to be resolved or investigated further to expedite the application of learning algorithms are also discussed.
The challenges and opportunities facing individuals in the Age of Covid 19 has altered everyone's lifestyle and perspective on education and personal journeys to higher education. In this session we will explore how we have faced the challenges of opportunities with each of our initiatives. The session will provide an overview of these annual events called Schools of Internet Governance which are a global phenomenon for the past ten years evolving into critical short and intensive learning opportunity. Introduction on the State of Schools of Internet Governance in the Age of Covid and Journey in the creation of an online Multi-lingual MOOC (Massive Open Online Courseware) on Internet Governance ( Virtual School of Internet Governance).
The challenges and opportunities facing individuals in the Age of Covid 19 has altered everyone's lifestyle and perspective on education and personal journeys to higher education. In this session, we will explore how we have faced the challenges of opportunities with each of our initiatives. The session will provide an overview of these annual events called Schools of Internet Governance which are a global phenomenon for the past ten years evolving into critical short and intensive learning opportunity. Introduction on the State of Schools of Internet Governance in the Age of Covid and Journey in the creation of an online Multi-lingual MOOC (Massive Open Online Courseware) on Internet Governance ( Virtual School of Internet Governance).
Small businesses play a huge role in the development of any country. The contribution of small entrepreneurs to the economy and the growth of the economy cannot be ignored. For example, the SME sector in Sri Lanka is contributing to 45% of total employment and 52% of the gross domestic product of the country. There is a need to explore more opportunities in this sector and in that context, social media play a really important role in terms of marketing and communication.
An essential element of any communications system is that the trust users place in the network is well founded. Am I communicating with the right party? Is my communication confidential? Is anyone tampering with my communication? In this presentation, the speaker will talk about the state of trust and security in a hostile world, and the strengths and weaknesses of the existing security frameworks that negotiate trust in the Internet. The speaker will also look at the efforts to improve this trust infrastructure and the necessary trade-offs that exist in such proposals to modify these trust models.
• How to get online securely?
• How to work online securely?
• How to quickly check if you're hacked?
• More hours to use a computer a day
• Need cyber security awareness
• More remote ways to access to company data
• Need better identity validation
• Less separation between company data and personal data
• Need better privacy protection
Redmine is a free and open-source, web-based project management and issue tracking tool. It allows users to manage multiple projects and associated subprojects. It features per project wikis and forums, time tracking, and flexible, role-based access control. It includes a calendar and Gantt charts to aid visual representation of projects and their deadlines. Redmine integrates with various version control systems and includes a repository browser and diff viewer.
Please subscribe to the APNG mailing list to stay in touch with news and updates.
subscribe here