Connect with us

Science & Technology

Chinese Initiative on Jointly Building a Community With a Shared Future in Cyberspace

Published

on

The world is experiencing rapid changes unseen in a century. The COVID-19 pandemic has taken heavy losses on countries around the world. The only collective struggle may win the battle between humanity and the virus. In the face of evolving risks and challenges, humankind must augment solidarity and cooperation in cyberspace and uphold fairness and justice for the digital economy’s collective benefits.

During the second World Internet Conference held in 2015, Chinese President Xi Jinping put forward four principles and a five-point plan on the Internet’s global development and governance. He advocated respect for sovereignty in cyberspace and revealed the vision of building a community with a shared future in cyberspace, offering China’s wisdom and methodology to the Internet’s global development and supremacy. In 2019, the World Internet Conference’s Organizing Committee released the perception document entitled Jointly Shaping a Community with a Shared Future in Cyberspace, further explaining this vision. The current pandemic highlights a more significant distinction and urgency to building a community with a shared future in cyberspace. We call on all nations, global organizations, Internet companies, technical societies, social organizations, and individuals to take the attitude to global governance, which is based on extensive consultation, joint contribution and shared benefits, uphold the philosophy of “achieving shared development, ensuring common security, realizing joint governance, and enjoying benefits together,” and work together to build cyberspace into a community where we can jointly advance development, safeguard security, participate in governance, and share the benefits. To this end, we would like to propose the following:

Achieving shared development

We should implement more proactive, inclusive, and synchronized policies that benefit all, speed up global information infrastructure building, promote advanced development of the digital economy, and improve public service capacity.

1. Improving Internet access and stimulating connectivity. We should further advance cooperation in communications structures such as optical cable backbone networks and international underwater cables. Based on respecting sovereignty in cyberspace and Internet policies of individual countries, we should explore adequate means of expanding Internet access and linking, and deliver development opportunities brought by the Internet to more developing countries and peoples.

2. Evolving information infrastructure construction. We need to work together to increase cooperation in information infrastructure construction, operation, and service capability. Funding should be given to the structure, application, and development of 5G, Internet of Things, and industrial Internet, to substitute new economic growth drivers and improve economic recovery and development.

3. Enhancing ICT-enabled public serviceability. We should boost experience sharing and cooperation in using digital technologies to respond to such public disasters as epidemics and natural disasters. Digital technologies should be leveraged to improve public service capability in culture and education, environmental protection, urban planning, community management, healthcare, etc.

4. Incorporating digital technologies with industrial development for economic revolution and upgrading. It is essential to integrate digital technologies with outdated industries by further applying digital, network, and intelligent technologies in industries, encouraging economic transformation and upgrading, and enabling the development, utilization, and sharing of data resources.

5. Nurturing an enabling business environment to sustain, stable, and secure global ICT industry and supply chains. We call on countries to arrange for an open, fair, and non-discriminatory business atmosphere and strengthen solidarity and cooperation in times of hardship to enhance the global market’s confidence. Good multilateral digital rules should be developed to promote mutual expectation and win-win cooperation, ensure openness, stability, and security of global ICT industry and supply chains, to encourage the healthy growth of the worldwide economy.

Ensuring common security

We campaign a cybersecurity vision that landscapes openness and cooperation and encourages Internet development while setting equal emphasis on cybersecurity to jointly support peace and security in cyberspace.

6. Strengthening strategic conjoint trust in cyberspace. Cooperation and negotiations at global, regional, multilateral, bilateral, and multi-party levels need to be encouraged to jointly maintain peace and stability in cyberspace and reinforce strategic trust among nations. We should oppose acts of attacks, deterrence, and blackmailing in cyberspace, stand against leading activities that destabilize other countries’ national security and public interests through the use of ICTs, and safeguard against arms race in cyberspace as well as attempts to politicize technical subjects, to create a peaceful atmosphere for development.

7. Stepping up the shield of information infrastructure. We should stride up cooperation in early-warning and prevention, information sharing and emergency response, and aggressively engage in experience exchanges to protect critical information infrastructure. We stand against harming the critical information infrastructure or stealing essential data from other countries through its use.

8. Improving personal information safe and data security management. It is imperative to legalize the practices of collecting, storing, using, processing, transmitting, providing, and disclosing personal information to safeguard personal information security. International exchanges and cooperation should be advanced in data security, personal information protection, and relevant rules and standards, and energies should be made to promote mutual recognition among countries on regulations and standards on personal information protection in line with the commitments of the UN Charter. Companies should not pre-install backdoors or malicious codes in their information technology equipment nor steal users’ data when providing products and services.

9. Strengthening the safeguard of minors in cyberspace. We should promote knowledge sharing on the legislation of minors protection in cyberspace, fight cybercrimes and cyberbullying targeted at children, protect their privacy on the Internet, and cultivate their digital literacy to help them develop vigorous Internet habits.

10. Increasing international cooperation on struggling cybercrimes and cyberterrorism. We should take engagements to crack down upon cybercrimes, especially their eco-system and chains, and other progress mechanism building on combating cybercrimes and cyberterrorism. We should support and take an active part in the negotiations on the global convention against cybercrimes under the United Nations’ outline. Effective coordination on legislations and practices of different countries should be made in a joint effort to tackle the threats of cybercrimes and cyberterrorism.

Realizing joint governance

We should stay dedicated to a multilateral and multi-party approach to cyberspace governance. Dialogues and consultation should be stridden up to foster a more just and impartial governance system in cyberspace.

11. Giving full play to the UN’s main-channel role in global authority in cyberspace. We should exert the UN Open-ended Working Group (OEWG) functions and the Group of Governmental Experts (GGE) and support articulating codes, norms, and principles of responsible state conduct in cyberspace that are suitable to all parties under the UN framework.

12. Improving the international authority system that is shared and governed by all. We were backing the roles of the Internet Governance Forum (IGF), the World Internet Conference (WIC), the Mobile World Congress (MWC), the International Telecommunication Union (ITU), and other platforms and encourage the participation of governments, international organizations, Internet companies, technical communities, public organizations, and individual citizens in the global governance in cyberspace.

13. Participating in Internet infrastructure resource management on the same footing. The convenience and reliability of Internet infrastructure resources for each country should be guaranteed, and efforts should be made to promote joint management and rational distribution of Internet infrastructure resources for the international community.

14. Cultivating governance on new technologies and applications. We should use expression into laws, regulations, rules, and standards to guide the use of new technologies and applications such as artificial intelligence, the Internet of Things, and the next-generation communications network, and endorse international cooperation in technical standards and moral standards.

15. Promoting capacity building on cyberspace governance. We call on countries to establish multi-channel exchange platforms and launch assistance and training programs on global management in cyberspace under the UN and other multilateral frameworks to help developing countries improve their capacity of participating in global governance.

Enjoying benefits together

We should advocate Tech for Good with a people-centered approach, contracted the digital divide, and achieve collective prosperity.

16. Sharing the paybacks of e-commerce. Countries need to diminish barriers in market access and other fields for charming trade channels. Cross-border e-commerce needs to be further encouraged. Countries need to establish mechanisms for information sharing and mutual trust and recognition. Secure and reliable digital technologies should be encouraged to enable cross-border trade.

17. Generating more opportunities for MSMEs in the digital economy. Policy backing needs to be stepped up to assist MSMEs in exploiting new-generation information technologies for innovation in products, services, processes, and organizational and business modes to generate more jobs and help MSMEs join the global value chains.

18. Strengthening backing and support to the vulnerable groups and leaving no one behindhand. We inspire experience sharing on Internet-enabled targeted poverty eradication to promote international cooperation in poverty reduction. More products and services appropriate for the elderly, the disabled, women, and children should be developed, and more policies, procedures, and technical tools should be employed to improve the digital skills of the vulnerable groups for the advancement and improvement of digital literacy among the public.  

19. Endorsing cyber cultural exchanges and mutual learning. The multiplicity of cyberculture should be respected. We advocate for tapping into adequate cultural resources to promote Internet-related exchanges and cooperation, and mutual knowledge. There is a need to establish inclusive, open, and diverse platforms and instruments for cyber cultural exchanges.

20. Contributing to the enactment of the 2030 Agenda for Sustainable Development. We request all countries to set great store by developing countries’ apprehensions, bridge the digital divide, and promote sustained, comprehensive, and sustainable economic growth and social development with ICTs as an enabler.

The Internet is a shared home for all humankind. The future of the human race in cyberspace has never been so closely interwoven. To conserve a peaceful, secure, open, cooperative, and orderly cyberspace is to build a better place than we all call home. Going accelerative, we stand ready to work with the global community to seize the opportunities and address the challenges to conjointly build a closer community with a shared future in cyberspace towards a brighter future for humankind.

Prof. Engr. Zamir Ahmed Awan, Sinologist (ex-Diplomat), Non-Resident Fellow of CCG (Center for China and Globalization), National University of Sciences and Technology (NUST), Islamabad, Pakistan.

Continue Reading
Comments

Science & Technology

From nanotechnology to solar power: Solutions to drought

Published

on

While the drought has intensified in Iran and the country is facing water stress, various solutions from the use of solar power plants to the expansion of watershed management and nanotechnology are offered by experts and officials.

Iran is located in an arid and semi-arid region, and Iranians have long sought to make the most of water.

In recent years, the drought has intensified making water resources fragile and it can be said that we have reached water bankruptcy in Iran.

However, water stress will continue this fall (September 23-December 21), and the season is expected to be relatively hot and short of rain, according to Ahad Vazifeh, head of the national center for drought and crisis management.

In such a situation, officials and experts propose various solutions for optimal water management.

Alireza Qazizadeh, a water and environment expert, referring to 80 percent of the arid regions in the country, said that “Iran has one percent of the earth’s area and receives only 36 percent of renewable resources.

The country receives 250 mm of rainfall annually, which is about 400 billion cubic meters, considering 70 percent evaporation, there is only 130 billion cubic meters of renewable water and 13 billion cubic meters of input from border waters.”

Referring to 800 ml of average rainfall and 700 mm of global evaporation, he noted that 70 percent of rainfall in Iran occurs in only 25 percent of the country and only 25 percent rains in irrigation seasons.

Pointing to the need for 113 billion cubic meters of water in the current year (began on March 21), he stated that “of this amount, 102 billion is projected for agricultural use, 7 percent for drinking and 2 percent for industry, and at this point water stress occurs.

In 2001, 5.5 billion cubic meters of underground resources were withdrawn annually, and if we consider this amount as 20 years from that year until now, it means that we have withdrawn an equivalent of one year of water consumption from non-renewable resources, which is alarming.”

The use of unconventional water sources can be effective in controlling drought, such as rainwater or river runoff, desalinated water, municipal wastewater that can be reused by treatment, he concluded.

Rasoul Sarraf, the Faculty of Materials at Shahid Modarres University, suggests a different solution and states that “To solve ease water stress, we have no choice but to use nanotechnology and solar power plants.

Pointing to the sun as the main condition for solar power plant, and while pointing to 300 sunny days in the country, he said that at the Paris Convention, Iran was required to reduce emissions by 4 percent definitively and 8 percent conditionally, which will only be achieved by using solar power plants.

Hamidreza Zakizadeh, deputy director of watershed management at Tehran’s Department of Natural Resources and Watershed Management, believes that watershed management can at least reduce the effects of drought by managing floods and extracting water for farmers.

Amir Abbas Ahmadi, head of habitats and regional affairs of Tehran Department of Environment, also referring to the severe drought in Tehran, pointed to the need to develop a comprehensive plan for water management and said that it is necessary to cooperate with several responsible bodies and develop a comprehensive plan to control the situation.

He also emphasizes the need to control migration to the capital, construction, and the implementation of the Comprehensive Plan of Tehran city.

While various solutions are proposed by officials and experts to manage water and deal with drought, it is necessary for the related organizations to work together to manage the current situation.

Mohammad Reza Espahbod, an expert in groundwater resources, also suggested that while the country is dealing with severe drought due to improper withdrawal of groundwater and low rainfall, karst water resources can supply the whole water needed by the country, only if managed.

Iran is the fifth country in the world in terms of karst water resources, he stated.

Qanats can also come efficient to contain water scarcity due to relatively low cost, low evaporation rates, and not requiring technical knowledge, moreover, they proved sustainable being used in perpetuity without posing any damages to the environment.

According to the Ministry of Energy, about 36,300 qanats have been identified in Iran, which has been saturated with water for over 2,000 years.

In recent years, 3,800 qanats have been rehabilitated through watershed and aquifer management, and people who had migrated due to water scarcity have returned to their homes.

Water resources shrinking

Renewable water resources have decreased by 30 percent over the last four decades, while Iran’s population has increased by about 2.5 times, Qasem Taqizadeh, deputy minister of energy, said in June.

The current water year (started on September 23, 2020) has received the lowest rain in the past 52 years, so climate change and Iran’s arid region should become a common belief at all levels, he lamented.

A recent report by Nature Scientific Journal on Iran’s water crisis indicates that from 2002 to 2015, over 74 billion cubic meters have been extracted from aquifers, which is unprecedented and its revival takes thousands of years along with urgent action.

Three Iranian scientists studied 30 basins in the country and realized that the rate of aquifer depletion over a 14-year period has been about 74 billion cubic meters, which is recently published in Nature Scientific Journal.

Also, over-harvesting in 77 percent of Iran has led to more land subsidence and soil salinity. Research and statistics show that the average overdraft from the country’s aquifers was about 5.2 billion cubic meters per year.

Mohammad Darvish, head of the environment group in the UNESCO Chair on Social Health, has said that the situation of groundwater resources is worrisome.

From our partner Tehran Times

Continue Reading

Science & Technology

Technology and crime: A never-ending cat-and-mouse game

Published

on

Is technology a good or bad thing? It depends on who you ask, as it is more about the way technology is used. Afterall, technology can be used by criminals but can also be used to catch criminals, creating a fascinating cat-and-mouse game.

Countless ways technology can be used for evil

The first spear was used to improve hunting and to defend from attacking beasts. However, it was also soon used against other humans; nuclear power is used to produce energy, but it was also used to annihilate whole cities. Looking at today’s news, we’ve learned that cryptocurrencies could be (and are) used as the preferred form of payments of ransomware since they provide an anonymous, reliable, and fast payment method for cybercriminals.

Similarly, secure phones are providing criminal rings with a fast and easy way to coordinate their rogue activities. The list could go on. Ultimately, all technological advancements can be used for good or evil. Indeed, technology is not inherently bad or good, it is its usage that makes the difference. After all, spears served well in preventing the extinction of humankind, nuclear power is used to generate energy, cryptocurrency is a promise to democratize finance, and mobile phones are the device of choice of billions of people daily (you too are probably reading this piece on a mobile).

However, what is new with respect to the past (recent and distant) is that technology is nowadays much more widespread, pervasive, and easier to manipulate than it was some time ago. Indeed, not all of us are experts in nuclear material, or willing and capable of effectively throwing a spear at someone else. But each of us is surrounded by, and uses, technology, with a sizeable part of users also capable of modifying that technology to better serve their purposes (think of computer scientists, programmers, coding kids – technology democratization).

This huge reservoir of people that are capable of using technology in a way that is different from what it was devised for, is not made of just ethical hackers: there can be black hats as well (that is, technology experts supporting evil usages of such technology). In technical terms, the attack vector and the security perimeter have dramatically expanded, leading to a scenario where technology can be easily exploited for rogue purposes by large cohorts of people that can attack some of the many assets that are nowadays vulnerable – the cybersecurity domain provides the best example for the depicted scenario. 

Fast-paced innovation and unprecedented threats

What is more, is that technology developments will not stop. On the contrary, we are experiencing an exponentially fast pace in technology innovation, that resolves in less time between technology innovations cycles that, while improving our way of living, also pave the way for novel, unprecedented threats to materialize. For instance, the advent of quantum computers will make the majority of current encryption and digital signature methods useless and what was encrypted and signed in the past, exposed.

The tension between legitimate and illegitimate usages of technology is also heating up. For instance, there are discussions in the US and the EU about the need for the provider of ICT services to grant the decryption keys of future novel secure applications to law enforcement agencies should the need arise –a debatable measure.

However, technology is the very weapon we need to fight crime. Think of the use of Terahertz technology to discover the smuggling of drugs and explosives – the very same technology Qatar      has successfully employed. Or the infiltration of mobile phone crime rings by law enforcement operators via high tech, ethical hacking (as it was the case for the EncroChat operation). And even if crime has shown the capability to infiltrate any sector of society, such as sports, where money can be laundered over digital networks and matches can be rigged and coordinated via chats, technology can help spot the anomalies of money transfer, and data science can spot anomalies in matches, and can therefore thwart such a crime – a recent United Nations-sponsored event, participated by the International Centre for Sport Security (ICSS) Qatar and the College of Science and Engineering (CSE) at Hamad Bin Khalifa University (HBKU) discussed      the cited topic. In the end, the very same technology that is used by criminals is also used to fight crime itself.

Don’t get left behind

In the above-depicted cybersecurity cat-and-mouse game, the loser is the party that does not update its tools, does not plan, and does not evolve.

In particular, cybersecurity can help a country such as Qatar over two strategic dimensions: to better prevent/detect/react to the criminal usage of technology, as well as to advance robustly toward a knowledge-based economy and reinforce the country’s presence in the segment of high value-added services and products to fight crime.

In this context, a safe bet is to invest in education, for both governments and private citizens. On the one hand, only an educated workforce would be able to conceptualize/design/implement advanced cybersecurity tools and frameworks, as well as strategically frame the fight against crime. On the other hand, the same well-educated workforce will be able to spur innovation, create start-ups, produce novel high-skill products, and diversify the economy. 

In this context, Qatar enjoys a head start, thanks to its huge investment in education over the last 20 years. In particular, at HBKU – part of Qatar Foundation – where we have been educating future generations. 

CSE engages and leads in research disciplines of national and global importance. The college’s speciality divisions are firmly committed to excellence in graduate teaching and training of highly qualified students with entrepreneurial  capacity.

For instance, the MS in Cybersecurity offered by CSE touches on the foundations of cryptocurrencies, while the PhD in Computer Science and Engineering, offering several majors (including cybersecurity), prepares future high-level decision-makers, researchers, and entrepreneurs in the ICT domain  – the leaders who will be driving the digitalization of the economy and leading the techno-fight against crime. 

Continue Reading

Science & Technology

Enhancing poverty measurement through big data

Published

on

Authors: Jasmina Ernst and Ruhimat Soerakoesoemah*

Ending poverty in all its forms is the first of the 17 Sustainable Development Goals (SDGs). While significant progress to reduce poverty had been made at the global and regional levels by 2019, the Covid-19 pandemic has partly reversed this trend. A significant share of the population in South-East Asia still lacks access to basic needs such as health services, proper nutrition and housing, causing many children to suffer from malnutrition and treatable illnesses. 

Delivering on the commitments of the 2030 Agenda for Sustainable Development and leaving no one behind requires monitoring of the SDG implementation trends. At the country level, national statistics offices (NSOs) are generally responsible for SDG data collection and reporting, using traditional data sources such as surveys, census and administrative data. However, as the availability of data for almost half of the SDG indicators (105 of 231) in South-East Asia is insufficient, NSOs are exploring alternative sources and methods, such as big data and machine learning, to address the data gaps. Currently, earth observation and mobile phone data receive most attention in the domain of poverty reporting. Both data sources can significantly reduce the cost of reporting, as the data collection is less time and resource intensive than for conventional data.

The NSOs of Thailand and the Philippines, with support from the Asian Development Bank, conducted a feasibility study on the use of earth observation data to predict poverty levels. In the study, an algorithm, convolutional neural nets, was pretrained on an ImageNet database to detect simple low-level features in images such as lines or curves. Following a transfer learning technique, the algorithm was then trained to predict the intensity of night lights from features in corresponding daytime satellite images. Afterwards income-based poverty levels were estimated using the same features that were found to predict night light intensity combined with nationwide survey data, register-based data, and geospatial information. The resulting machine learning models yielded an accuracy of up to 94 per cent in predicting the poverty categories of satellite images. Despite promising study results, scaling up the models and integrating big data and machine learning for poverty statistics and SDG reporting still face many challenges. Thus, NSOs need support to train their staff, gain continuous access to new datasets and expand their digital infrastructure.

Some support is available to NSOs for big data integration. The UN Committee of Experts on Big Data and Data Science for Official Statistics (UN-CEBD) oversees several task teams, including the UN Global Platform which has launched a cloud-service ecosystem to facilitate international collaboration with respect to big data. Two additional task teams focus on Big Data for the SDGs and Earth Observation data, providing technical guidance and trainings to NSOs. At the regional level, the weekly ESCAP Stats Café series provides a knowledge sharing platform for experiences related to the impact of COVID-19 on national statistical systems. The Stats Café includes multiple sessions dedicated to the use of alternative data sources for official statistics and the SDGs. Additionally, ESCAP has published policy briefs on the region’s practices in using non-traditional data sources for official statistics.

Mobile phone data can also be used to understand socioeconomic conditions in the absence of traditional statistics and to provide greater granularity and frequency for existing estimates. Call detail records coupled with airtime credit purchases, for instance, could be used to infer economic density, wealth or poverty levels, and to measure food consumption. An example can be found in poverty estimates for Vanuatu based on education, household characteristics and expenditure. These were generated by Pulse Lab Jakarta – a joint innovation facility associated with UN Global Pulse and the government of Indonesia.

Access to mobile phone data, however, remains a challenge. It requires long negotiations with mobile network operators, finding the most suitable data access model, ensuring data privacy and security, training the NSO staff and securing dedicated resources. The UN-CEBD – through the Task Team on Mobile Phone Data and ESCAP – supports NSOs in accessing and using mobile phone data through workshops, guides and the sharing of country experiences. BPS Statistics Indonesia, the Indonesian NSO, is exploring this data source for reporting on four SDG indicators and has been leading the regional efforts in South-East Asia. While several other NSOs in Asia and the Pacific can access mobile phone data or are negotiating access with mobile network operators, none of them have integrated it into poverty reporting.

As the interest and experience in the use of mobile phone data, satellite imagery and other alternative data sources for SDGs is growing among many South-East Asian NSOs, so is the need for training and capacity-building. Continuous knowledge exchange and collaboration is the best long-term strategy for NSOs and government agencies to track and alleviate poverty, and to measure the other 16 SDGs.

*Ruhimat Soerakoesoemah, Head, Sub-Regional Office for South-East Asia

UNESCAP

Continue Reading

Publications

Latest

Trending