AIMICT.ORG AIMICT Newsletter

Similar documents
The global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017

VIEW POINT CHANGING THE BUSINESS LANDSCAPE WITH COGNITIVE SERVICES

Your access to security

Ethics and technology

SUCCESSFULLY IMPLEMENTING TRANSFORMATIONAL TECHNOLOGY IN HOSPITALS AND HEALTH SYSTEMS

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

Link dan Match Concept for Accounting Education in Indonesia

IBM Security: Future of Identity Study

Biometrics - A Tool in Fraud Prevention

Innovation in the identity domain: is ICAO s TRIP prepared for innovations?

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

User Awareness of Biometrics

UN-GGIM Future Trends in Geospatial Information Management 1

V I S O c o r e I n s p e c t

CHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP

Microsoft Trustworthy Computing 2013 Privacy Survey Results

WHY PURSUE A CAREER IN ELECTRONIC SYSTEMS?

TRANSFORMING DISRUPTIVE TECHNOLOGY INTO OPPORTUNITY INNOVATION AT THE EXECUTIVE AND BOARD LEVEL

Situational security, controlled privacy

Pan-Canadian Trust Framework Overview

Password-less Behaviometrics Authentication on Touchscreen Devices

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Museum of the Future

Frontier Technology Futures: Support to the DFID Bangladesh Country Office

Tech is Here to Stay and Changing Everyday: Here s How Those Changes Can Help You With excerpts from an interview with Jean Robichaud, CTO, of

Telecoms and Tech Week

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

TRANSFORMING DISRUPTIVE TECHNOLOGY INTO OPPORTUNITY MARKET PLACE CHANGE & THE COOPERATIVE

Training Programme 2015

FUTURE NOW Securing Digital Success

THE AI REVOLUTION. How Artificial Intelligence is Redefining Marketing Automation

Get started with BarclayPlus. Everything you need to know

TEXTILE TESTING AND CERTIFICATION WORLDWIDE WITH SWISS RELIABILITY

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

Data Analysis Fundamentals

Konica Minolta has made a commitment as a manufacturer to deliver first-rate products and services that are trusted and needed all over the world.

Custom Mobile App Support

BIOMETRICS BY- VARTIKA PAUL 4IT55

SAMPLE INTERVIEW QUESTIONS

Liaison 2015 at Swinburne: definitely a work in progress. Derek Whitehead May 2010

Title Goes Here Algorithms for Biometric Authentication

Innovation Report: The Manufacturing World Will Change Dramatically in the Next 5 Years: Here s How. mic-tec.com

THE TECH MEGATRENDS Christina CK Kerley

The How-to Guide for Adopting Model Based Definition (MBD) Michelle Boucher Vice President Tech-Clarity

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012

GP online services Patient Guide

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Data Analysis Fundamentals

Technologies that will make a difference for Canadian Law Enforcement

PRINTING ON YOUR IPAD

2. CHAPTER 2: THE SOCIAL NATURE OF INFORMATION TECHNOLOGY

The modular Mechatronics Training System mms 4.0: hands-on, flexible, scalable

Economic and Social Council

Introduction to

Make Your Local Government A Lean, Green, Constituent-Centric Machine

Corporate Mind 2015 Corporate Responsibility Report

FITNESS WEBSITE BLUEPRINT

Computer Consultant Questionnaire

Welcome to a World of Professional Radio Communications. The power of true scalability

The Role of Technology in Shifting the Institutional Structure of Markets

Young people s access to GP online services Patient Guide

Pushing Boundaries, Changing Horizons

2015 ISACA IT Risk/Reward Barometer US Consumer Results. October 2015

Advances and Perspectives in Health Information Standards

2015 ISACA IT Risk/Reward Barometer UK Consumer Results. October

2015 ISACA IT Risk/Reward Barometer Australia Consumer Results. October

ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal

Privacy and Security in an On Demand World

On Emerging Technologies

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Challenging convention with technological ingenuity

User Guide. PTT Radio Application. ios. Release 8.3

Designing for an Internet of Humans

TABLE OF CONTENTS. Logging into the Website Homepage and Tab Navigation Setting up Users on the Website Help and Support...

STRATEGIC PLAN

Guidelines to Promote National Integrated Circuit Industry Development : Unofficial Translation

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper

OUR INNER CIRCLE IS FOR YOU IF

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Rapid Test Result: Negative HIV

SMEs are a strategic segment for the Group

Eight Key Features of an MDM for Education

manah Institute of Islamic Finance and Economics Learn at Your Pace, Anytime, Anywhere

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases

The future of IoT: Expert Survey results

Draft executive summaries to target groups on industrial energy efficiency and material substitution in carbonintensive

Digital Government Imperatives of the United Arab Emirates: 92% of Emirati Respondents Believe Online Government Services Have Improved Since 2014

New Age Technologies in Construction Safety and Associated Concerns

Enhanced Push-to-Talk Application for iphone

Facebook: A Beginner s Guide

But Now I See - a Vulnerability Disclosure Maturity Model

LEADING DIGITAL TRANSFORMATION AND INNOVATION. Program by Hasso Plattner Institute and the Stanford Center for Professional Development

A Practical Guide to Supply Teaching

new possibilities move closer to the market and the customer With digitalization, Strong roots open up

Getting started with GP online services Easy Read

We would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page.

Growing a UX Career. An HFI White Paper. A Conversation with Eric Schaffer CEO and Founder Human Factors International

Interview Questions Kathlyn Patton, Director of Personnel Services August 2008

Transcription:

SEPTEMBER 2018 AIMICT.ORG 1

IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program Course and Exam AIMICT Conducts ISO 9001 Lead Auditor Examination Session AIMICT Organizes Advanced Skills in Leadership Course in Jordan IS IT REALLY THE END OF PRIVACY? 2

AIMICT CONDUCTS ISO 9001 LEAD AUDITOR COURSE AMMAN - The Arab International Society for Management Technology (AIMICT) held new sessions of ISO 9001 Lead Auditor course in September 2018 in Amman. The program aimed at enabling the participants to develop the necessary expertise to perform a Quality Management System (QMS) audit by applying widely recognized audit principles, procedures and techniques. During this training course, the participants acquired the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and the certification process according to ISO/IEC 17021-1. This five-day course targeted auditors seeking to perform and lead Quality QMS certification audits, managers and consultants seeking to master a Quality Management System audit process, individuals responsible for maintaining compliance with QMS requirements, and experts who work as advisors in Quality Management. AIMICT CONDUCTS ILM S TRAINING OF TRAINERS PROGRAM IN IRBID IRBID, Jordan - The Arab International Society for Management Technology (AIMICT) conducted a Training of Trainer (TOT) course for a group of participants from different sectors in Irbid. Training of Trainers program aimed to provide the participants with the necessary knowledge to understand the importance of training and development to professionals, build a simple training program plan and a training session plan, and design and use an assessment tool to analyze the evaluation results and use them in developing the program. The 30-hour program is accredited by the Institute of Leadership and Management (ILM) UK and targets trainers, teachers and instructors, co-trainers, and HR staff, and can be given in both Arabic and/ or English. AIMICT ORGANIZES PROFESSIONAL QUALITY MANAGER PROGRAM COURSE AND EXAM AMMAN - The Arab International Society for Management Technology (AIMICT) will hold new sessions of the Professional Quality Manager (PQM) course on October 23, 2018 in Amman. The PQM program aims at providing the participants with the necessary knowledge to implement effective quality practices in quality and strategies implementation frameworks, and develop, promote researches and applications in the field of quality principles and practices. 3

It addresses a number of important knowledge frameworks such as Essentials of Quality Management, Total Quality Management Tools, Core Concepts of Leadership and People Management, Strategic Planning in Quality Management, Customer Focus for Business Excellence and Supply Chain Management. The program, accredited by the Institute of Leadership and Management (ILM) - UK, targets companies managers, heads of units and departments, quality control officers and professionals seeking to improve their productivity. Those who wish to register should contact the Society s management and fill the registration application through the following link: http://aimict.org/certificate_registration.aspx?title=key_pqm AIMICT CONDUCTS ISO 9001 LEAD AUDITOR EXAMINATION SESSION AMMAN - The Arab International Society for Management Technology (AIMICT) will conduct ISO 9001 Lead Auditor Examination session in November 2018, in Amman. The ISO 9001 Lead Auditor program enables participants to develop the necessary expertise to support an organization in implementing and managing a Quality Management System (QMS) based on ISO 9001. Those who wish to register or willing to know further information on the program should contact the Society s management through AIMICT email: Info@aimict.com 4

AIMICT ORGANIZES ADVANCED SKILLS IN LEADERSHIP COURSE IN JORDAN AMMAN - The Arab International Society for Management Technology (AIMICT) will hold the Advanced Skills in Leadership course in November 2018 in Amman. The course aims at providing the participants with the knowledge and skills necessary for leadership in the modern business world, teaching techniques which can be applied to drive organizational change, as well as identifying and addressing obstacles, producing the best practices to improve staff motivation, as well as methods of understanding and methods for responding to conflicts. The program, endorsed by the Institute of Leadership and Management (ILM) UK, targets companies managers, heads of units and departments, team leaders and those who seek to improve their leadership skills. IS IT REALLY THE END OF PRIVACY? The Controversy of Fingerprint, Facial Recognition and Big Data By Endrita Muhaxheri, PECB Remember when unlocking our phone or tablet with fingerprint sensors or face recognition seemed futuristic? As technology is now a vital part of our daily lives, we are more willing to provide personal information in exchange for a more easy and interactive experience. The most recent technology that enables organizations to take advantage of this opportunity is known as biometrics. Biometric recognition system has made a major impact in the society by helping people get rid of passwords, ID cards, PINs, and many more, as means of proving one s identity. It is also making life easier by eliminating the need for carrying belongings all the time. Certainly, many of you may have had that frustrating moment where you have been denied access just because you didn t have the identity card or the necessary documents for verification with you. Based on the latest trends of developments in the tech world, we will probably encounter a rapid adoption of new technology features that scan our face, fingerprints, eyes, and voice. One can safely predict that this is just the beginning of the face biometrics era, as its application is constantly evolving worldwide. However, not so long ago, using a fingerprint or a face scan to unlock a phone seemed futuristic. The biometrics field offers both a promising future, which is related to convenience but also involves challenges including privacy concerns and finding the appropriate technology to manage the massive 5

data volume. Biometric technologies are becoming an important element for information security systems in many big organizations such as Standard Chartered Bank which already introduced biometric login services as a faster way to log on to its mobile banking app. But, biometric technology producers do not always take into account the security requirements of the technology, which are essential, given the fact that the identification systems like passports and ID cards hold sensitive user information. Many publications highlight the weaknesses and drawbacks that might compromise the technology. Some skeptics even suggest that since biometric data can be hacked, it is better to not ditch password verification, but instead use biometrics only for two-factor authentication. Main issues raised against biometrics are that they re hackable, public, and that sensitive information can be stolen and used for illegal purposes. Biometrics technology is constantly advancing, especially security-wise, according to Meaghan Johnson, director of research at Fintech consultancy. She believes that the second-generation of biometrics will be safer and more secure, especially for organizations that possess very sensitive information, such as banks and other financial institutions. From Fingerprint to Facial Recognition Facebook s facial recognition technology is the perfect example of facial recognition deployment. This feature is widely used in smartphones, with Apple being one of the first companies to implement the feature, which was made available by using integrated biometric data. Firstly, Apple started integrating a fingerprint scan and now the company uses the face recognition feature to unlock the phone. IPhone s 5s model, launched in 2013, was the first to use fingerprint recognition (Touch ID), and the company later continued introducing faster, second-generation, Touch ID for iphone SE, iphones 7, 7s, 8 and 8s. With the launch of iphone X, Apple introduced facial recognition technology (Face ID), as a safer option. According to Apple executives, the possibility of hacking an iphone X using Face ID is about 1 in 1,000,000, compared to the Touch ID where the possibility was 1 in 50,000. This fact is one of the reasons that led Apple to remove Touch ID from their newest model, iphone X. The Ambiguous Relationship between Big Data and Biometric Technologies Big Data is everywhere. Big Data analytics, along with the latest data storage technology advancement and high-resolution imaging has made biometrics a practical option for organizations that are looking for new ways to engage with customers, manage risks, and improve customer experiences. According to a Spiceworks survey, conducted with around 500 IT companies in Europe and North America, 86% of organizations will use some sort of biometric technology for authentication purposes by 2020. Biometric technology and the general trend of the cutting-edge technologies are driving the so-called big data movement. According to IBM, 2.5 quintillion bytes of data are created every day. Thanks to big data and digital fingerprinting, news, movies and ads are tailored specifically to readers digital profiles and preferences. As this technology continues to expand, the new development of techniques and methods of gaining insights into customer s behavior will evolve, so that the content that users encounter can be tailored. The Future of Biometrics Technology: Convenience or Privacy? The constant advancement of technology is pushing hackers to advance their ways of cracking the system, and the best defense is continual vigilance, such as monitoring of all the activities in devices that use biometric technologies. With the increase of customers using facial recognition, can we indicate that 6

everything points to the fact that consumers prefer convenience over security? The fact that biometric data is essentially linked to an individual s identity makes it more controversial than other forms of big data. Facial recognition has many advantages, it s almost like not have a security code at all, at least until someone tries to unlock it. With facial recognition and fingerprint sensors, a phone and other digital devices can be unlocked fast without writing a password, which is a grand convenience for users in today s fast-paced world. The willingness of individuals to give up their data in order to simplify or improve the services they receive is more related to the age of users, meaning that young individuals are much more comfortable with having their biometric data shared around. Even internationally acknowledged companies such as Microsoft and Google are looking forward to facial and fingerprint recognition, which will enable them to have a password-free future by replacing passwords with biometric authentication. This form of authentication in mobile devices is constantly increasing, with mobile manufacturers installing biometric authentication in devices as an added layer of security. But, is the technology installed in these devices, in fact, secure and safe for consumers? If we compare biometric security over other forms of identification, we can say that the latter has important advantages due to its user-friendly and fast solution, unlike passwords and PINs which require memorization and are easily replicable, compared to facial or fingerprint recognition. When we re thinking about the biometrics era, we should take a moment and ask ourselves how our information is being used and if it s really making our devices more secure. Biometrics data are stored in devices which can be hacked and compromised by hackers, who by now have most probably found ways to manipulate the technology. But for now, biometrics are the safest form of authentication, thus its use in most devices is increasing. Technology innovations have led to an increase in the advancement of security measures, however, it is of utmost importance that organizations and individuals examine the options thoroughly, before implementing technologies such as biometric authentication in their personal and business life. Even though the biometric authentication has its flaws, it does not mean that one should stop using it or be intimidated by it. 7

For more information The Arab International Society for Management Technology Majd Farahat - Executive Director Tel: (0962-6) 5100900-1315 Fax: (0962-6) 5100901 info@aimict.org AIMICT.org This newsletter is published by: The Arab International Society for Management Technology AIMICT 2018 Reproduction is permitted provided That the source is acknowledged 8