The Pacific Covid-19 Infodemic
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Data, AI Governance, and COVID -19: Medium and Long-Term Perspectives for Asia
September, 2020 Data, AI Governance, and COVID -19: Medium and Long-Term Perspectives for Asia CHINA Yi Zeng Kang Sun Enmeng Lu Chinese Academy of Sciences Chinese Academy of Sciences Chinese Academy of Sciences SOUTH KOREA Sangchul Park Yong Lim Seoul National University Seoul National University SINGAPORE Mark Findlay Singapore Management University JAPAN Arisa Ema The University of Tokyo Table of Contents Foreword 03 CHINA 06 Ethics and Governance Perspectives to Fight Against Catastrophic Risks: From COVID-19 to Long-term Safety Issues of Artificial General Intelligence 1. AI Ethics, Governance and Practices in Fighting Against COVID-19 06 2. The use of AI to Fight Against COVID-19: Technical advancements, Ethical Risks, and Governance 06 2-1 Overview of AI usage to COVID-19 06 2-2 Health code system 08 2-3 Social, Ethical, and Legal concerns, and responses to Data Governance 09 2-4 Privacy Protection for Public Health Management 10 3. Yet Another Potential Catastrophic Risk: Long-term Safety Issues of Artificial General Intelligence 11 SOUTH KOREA 14 Harnessing technology to tackle COVID-19: Lessons from Korea 1. Korea Responds to COVID-19 14 2. The Role of Technology in Korea’s Response to COVID-19 14 2-1 GPS Tracking for Quarantine Measures 14 2-2 Automated Contact Tracing 15 2-3 Public Disclosure of the Routes of Confirmed Cases 17 3. Tech Governance Issues in the COVID-19 Era 17 3-1 Technology Enabled Centralized Contact Tracing 17 3-2 Public Disclosure of the Route of Confirmed Cases 19 4. Looking Ahead 21 01 Table of Contents SINGPORE 23 Singapore and COVID-19 control – a tale of 2 cities? 1. -
Thursday, April 22, 2021
TE NUPEPA O TE TAIRAWHITI THURSDAY, APRIL 22, 2021 HOME-DELIVERED $1.90, RETAIL $2.20 ARTS & ENTERTAINMENT // PAGES 23-26 PUNCHED WOMAN IN FACE: MAN ON A SPACE Suppression MISSION PAGE 3 PAGE 9 appeal fails INSIDE TODAY IN THE RED ZONE: Queens/ Titirangi Drive, the road over Titirangi/Kaiti Hill, is open to vehicles again after contractors finished line- marking the new one-way system. The line markings define the one-way route (red) for cars and the cycle and walking lane (green). The entire project is expected to be finished next month. Busy with the rollers on the red side of the road are, front, Coastline Markers Waikato foreman Simon Costain and, from left, Fred Chapman, site traffic management supervisor Joerena Wharehinga, Omar Bashe and Morehu Enoka. Picture by Liam Clayton Frustrated OIympic ‘WE’RE OUT’ Pool Redevelopment Group calls it quits A WATER sports advocate The Gisborne Herald (April 3) that “With the amount of government Mrs Keepa said widening the pool and group is disbanding with “intense councillors, during a public excluded support this project received, the group being able to change the depth at one end disappointment” at being “kept in the meeting (on March 18), approved the don’t want to see money taken away with a moveable floor would “maximise dark” over plans for the new Olympic moveable floor but only if the group from other critical projects in Tairawhiti, the usability for the community — aqua Pool Complex. secured the $1.5 million required for it including many other facilities due to be fitness, injury rehabilitation, family use, The Game-Changing Opportunity by April 30. -
Covid-19 Tracing Contacts Apps: Technical and Privacy Issues
Int. J. Advance Soft Compu. Appl, Vol. 12, No. 3, November 2020 ISSN 2074-8523; Copyright © ICSRS Publication, 2020 www.i-csrs.org Covid-19 Tracing Contacts Apps: Technical and Privacy Issues Salaheddin J. Juneidi Computer Engineering Department, Palestine Technical University Khadoorei1, Hebron, West Bank Palestine. e-mail: [email protected] Received 20 July 2020; Accepted 5 October 2020 Abstract Since the start of the year 2020 the world is facing an outbreak of Covid-19 pandemic, technical specialists all over the universe have been scrambling to develop services, apps, and system’s protocols for contactors tracing, with the objective to identify and to notify everyone that gets close with an individual carrier. Some of these apps are lightweight and temporary, while others are diffuse and aggressive. Some of tracing services are developed locally by small interested programmers, while others are large-scale international operations. To date, we have recognized more than 25 large automated contact tracing efforts around the globe, included with details about what they were, how they worked, and the procedures and conditions that were put in place around them. This paper will deal with general data of the most prominent applications in terms of technical approaches used in the world and compare them with regard to the efficiency of tracking covid-19 and compare them with concerning of the people’s privacy who use these apps. Keywords: Covid-19, GPS location, Blue trace, Google/Apple, DP-3T, Apps, Privacy. 1. Introduction Many applications, services and systems have been proposed and launched [1] with an aim to track and identify infected people with objective to reduce or even to prevent physical contact with other people, some of these tracking 1 Special thanks to Palestine Technical University -Khadoorei for continuous support of research efforts Salaheddin J. -
A Flexible, Efficient, and Privacy-Preserving Iot
1 IoTrace: A Flexible, Efficient, and Privacy-Preserving IoT-enabled Architecture for Contact Tracing Pietro Tedeschi, Spiridon Bakiras, and Roberto Di Pietro Division of Information and Computing Technology College of Science and Engineering Hamad Bin Khalifa University, Doha - Qatar Email: {ptedeschi, sbakiras, rdipietro}@hbku.edu.qa Abstract—Contact tracing promises to help fight the spread of BLE transmission range. Alternatively, solutions like Israel’s COVID-19 via an early detection of possible contagion events. To Hamagen [5] adopt the Global Navigation Satellite System this end, most existing solutions share the following architecture: (GNSS) for localization and proximity tracing. smartphones continuously broadcast random beacons that are intercepted by nearby devices and stored into their local contact A watershed difference in contact tracing applications lies in logs. In this paper, we propose an IoT-enabled architecture for the reconciliation process, i.e., the identification of “infected” contact tracing that relaxes the smartphone-centric assumption, beacons inside a user’s contact list that signal possible con- and provide a solution that enjoys the following features: (i) it tagion events. To one extreme, centralized solutions require reduces the overhead on the end-user to the bare minimum—the all users to share their beacons and/or contact lists with the mobile device only broadcasts its beacons; (ii) it provides the user with a degree of privacy not achieved by competing solutions— health authorities, who perform the reconciliation process and even in the most privacy adverse scenario, the solution provides notify the exposed users. To the other extreme, decentralized :-anonymity; and, (iii) it is flexible: the same architecture can solutions do not collect any information from the mobile be configured to support several models—ranging from the devices. -
Crossing the Line Between News and the Business of News: Exploring Journalists' Use of Twitter Jukes, Stephen
www.ssoar.info Crossing the line between news and the business of news: exploring journalists' use of Twitter Jukes, Stephen Veröffentlichungsversion / Published Version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Jukes, S. (2019). Crossing the line between news and the business of news: exploring journalists' use of Twitter. Media and Communication, 7(1), 248-258. https://doi.org/10.17645/mac.v7i1.1772 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer CC BY Lizenz (Namensnennung) zur This document is made available under a CC BY Licence Verfügung gestellt. Nähere Auskünfte zu den CC-Lizenzen finden (Attribution). For more Information see: Sie hier: https://creativecommons.org/licenses/by/4.0 https://creativecommons.org/licenses/by/4.0/deed.de Media and Communication (ISSN: 2183–2439) 2019, Volume 7, Issue 1, Pages 248–258 DOI: 10.17645/mac.v7i1.1772 Article Crossing the Line between News and the Business of News: Exploring Journalists’ Use of Twitter Stephen Jukes Faculty of Media and Communication, Bournemouth University, Poole, BH12 5BB, UK; E-Mail: [email protected] Submitted: 7 September 2018 | Accepted: 4 January 2018 | Published: 21 March 2019 Abstract Anglo-American journalism has typically drawn a firm dividing line between those who report the news and those who run the business of news. This boundary, often referred to in the West as a ‘Chinese Wall’, is designed to uphold the inde- pendence of journalists from commercial interests or the whims of news proprietors. But does this separation still exist in today’s age of social media and at a time when news revenues are under unprecedented pressure? This article focuses on Twitter, now a widely used tool in the newsroom, analysing the Twitter output of 10 UK political correspondents during the busy party conference season. -
1 a Survey of Automatic Contact Tracing Approaches Using
1 A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy LEONIE REICHERT and SAMUEL BRACK, Humboldt University of Berlin, Germany BJÖRN SCHEUERMANN, Humboldt University of Berlin, Germany and Alexander von Humboldt Institute for Internet and Society, Germany To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to automate the process of finding infected people, also called contact tracing. A special focus was put on preserving the privacy of users. Bluetooth Low Energy (BLE) as base technology has the most promising properties, so this survey focuses on automated contact tracing techniques using BLE. We define multiple classes of methods and identify two major groups: systems that rely on a server forfinding new infections and systems that distribute this process. Existing approaches are systematically classified regarding security and privacy criteria. CCS Concepts: • Security and privacy Privacy-preserving protocols; Mobile and wireless security; • Applied com- ! puting Health informatics; ! Additional Key Words and Phrases: Covid-19, contact tracing, privacy, survey ACM Reference Format: Leonie Reichert, Samuel Brack, and Björn Scheuermann. 2020. A Survey of Automatic Contact Tracing Approaches Using Bluetooth Low Energy. ACM Trans. Comput. Healthcare 1, 1, Article 1 (January 2020), 33 pages. https://doi.org/10.1145/3444847 1 INTRODUCTION Since the beginning of the year 2020, Covid-19 has turned into a global pandemic challenging both healthcare systems as well as democratic institutions [18, 31, 60, 119]. To mitigate its spreading, social and economic life was shut down in affected areas [118]. Tools often used in the past for containing diseases have proven to be not effective enough to deal with this quickly spreading, highly infectious and deadly46 virus[ , 112]. -
Security Brief for Fiji Prepared On: Jul 12, 2021 7:55:29 PM UTC
Security Brief for Fiji prepared on: Jul 12, 2021 7:55:29 PM UTC Security Assessment Rating Security Rating for 2 - Low Fiji: Sub-Ratings 1 2 3 4 5 Crime 2 Overall Rating: Security Services 3 2 Civil Unrest 2 Low Terrorism 1 Kidnapping 1 Geopolitical 3 Security Overview : Overview of Fiji Conflict, terrorism and unrest do no pose a significant threat to foreign nationals in Fiji. Levels of criminal activity in the country are generally low but incidents of assault and burglary do occur and petty theft is relatively common. Popular tourist areas, including downtown Suva, are at increased risk from criminal activity. Related Advice: Increasing your personal security while traveling. Related Advice: Personal security while walking. No Current Security Alerts Other Alerts & Advisories Critical Alerts Entry/Exit: Fiji continues most restrictions amid high COVID-19 activity as of July 3. Tighter controls in and around Suva. Incident: COVID-19 restrictions Location(s): Nationwide (map) Time Frame: Indefinite Impact: Business and transport disruptions, increased security Summary Authorities have marginally reduced nationwide and localized controls despite elevated COVID-19 activity. As of July 3, the tightest restrictions are in place for the designated containment zone in Suva, Nausori, and Lami, where a curfew is in place 18:00-04:00; remaining Viti-Levu continues to enforce a 20:00-04:00 curfew. Transport remains limited in the area. Some nonessential businesses are allowed to reopen in the area if they apply for government approval and enforce social distancing measures. Gyms throughout the island of Viti Levu remain closed, and restaurants are only allowed to provide carryout services. -
Privacy Framework for Aarogya Setu
Privacy Framework FOR the Aarogya Setu App Working Paper | Version 1.0 Privacy Framework for the Aarogya Setu App “Life is like the harp string, if it is strung too tight it won’t play, if it is too loose it hangs, the tension that produces the beautiful sound lies in the middle.” - Gautam Buddha Authors Pranav Bhaskar Tiwari1, Ayush Tripathi2, Harsh Bajpai3, Karthik Venkatesh4, Arya Tripathy5 & Kazim Rizvi6. 1 Policy Research Associate, The Dialogue 2 Policy Research Associate, The Dialogue 3 Research Scholar, Durham University 4 Strategic Engagement and Research Fellow, The Dialogue 5 Principal Associate, Priti Suri & Associates 6 Founding Director, The Dialogue © The Dialogue | 6.5.2020 1 Working Paper | Version 1.0 Index Executive Summary 3 Legal Challenges and Way Forward 3 Privacy Challenges and Way Forward 4 Recommendations 5 1. Background 6 1.1 COVID-19 Pandemic - A Socio-Economic Challenge 8 1.2 Technology as a resource to combat the outbreak 9 1.3 Citizen’s Participation Must - A Fundamental Duty to protect our Communities 10 1.4 Aarogya Setu 11 1.5 Right to Health and Right to Privacy to be harmonised 11 1.6 Proportionality at the heart of Reasonable Restrictions 12 2. Privacy Central to Mass Deployment of the App 14 2.1 Citizen Trust is Critical 14 2.2 Immediate Solution Vs. Preventing Future Harm? 16 2.3 Community Rights Vs. Individual Rights 17 3. The Privacy Framework 19 3.1 Legality 26 3.2 Transparency and Verifiability 20 3.3 Voluntariness 26 3.4 Data Minimisation 26 3.5 Anonymisation 26 3.6 Storage of Data 26 3.7 Grievance Redressal Mechanism & Accountability 26 3.8 Sunset Clause 27 3.9 Access to Data 28 3.10 Data Sharing 29 3.11 Integration of Data Sets 30 3.12 Scope/Function Creep 31 3.13 Auditing 31 3.14 Public Confidence 32 © The Dialogue | 6.5.2020 2 Working Paper | Version 1.0 Executive Summary Technology is one of the tools in the fight against the pandemic and Governments around the world have been deploying technological solutions to tackle the threat posed by COVID-19. -
Analyzing the Essential Attributes of Nationally Issued COVID-19 Contact Tracing Apps: Open-Source Intelligence Approach and Content Analysis
JMIR MHEALTH AND UHEALTH Weiû et al Original Paper Analyzing the Essential Attributes of Nationally Issued COVID-19 Contact Tracing Apps: Open-Source Intelligence Approach and Content Analysis Jan-Patrick Weiû, MSc; Moritz Esdar, MA; Ursula Hübner, PhD Health Informatics Research Group, Faculty of Business Management and Social Sciences, University of Applied Sciences Osnabrueck, Osnabrück, Germany Corresponding Author: Ursula Hübner, PhD Health Informatics Research Group Faculty of Business Management and Social Sciences University of Applied Sciences Osnabrueck Caprivistraûe 30a Osnabrück, Germany Phone: 49 5419692012 Email: [email protected] Abstract Background: Contact tracing apps are potentially useful tools for supporting national COVID-19 containment strategies. Various national apps with different technical design features have been commissioned and issued by governments worldwide. Objective: Our goal was to develop and propose an item set that was suitable for describing and monitoring nationally issued COVID-19 contact tracing apps. This item set could provide a framework for describing the key technical features of such apps and monitoring their use based on widely available information. Methods: We used an open-source intelligence approach (OSINT) to access a multitude of publicly available sources and collect data and information regarding the development and use of contact tracing apps in different countries over several months (from June 2020 to January 2021). The collected documents were then iteratively analyzed via content analysis methods. During this process, an initial set of subject areas were refined into categories for evaluation (ie, coherent topics), which were then examined for individual features. These features were paraphrased as items in the form of questions and applied to information materials from a sample of countries (ie, Brazil, China, Finland, France, Germany, Italy, Singapore, South Korea, Spain, and the United Kingdom [England and Wales]). -
The COVID-19-Crisis and the Information Polity: an Overview of Responses and Discussions in Twenty-One Countries from Six Continents
Information Polity 25 (2020) 243–274 243 DOI 10.3233/IP-200006 IOS Press Global Expert Report The COVID-19-crisis and the information polity: An overview of responses and discussions in twenty-one countries from six continents Albert Meijera and C. William R. Websterb aUtrecht University, Utrecht, The Netherlands bUniversity of Stirling, Scotland, UK Contributing Authors Frank Bannister, Colin J. Bennett, Kaiping Chen, Heungsuk Choi, J. Ignacio Criado, Maria Alexandra Cunha, Mehmet Akif Demircioglu, Mila Gasco-Hernandez, Paul Henman, Douglas Kimemia, Veiko Lember, Karl Löfgren, Luis F. Luna-Reyes, Albert Meijer, Ines Mergel, David Murakami Wood, Giorgia Nesti, Erico Przeybilovicz, Aarthi Raghavan, Ola Svenonius, Rosamunde van Brakel, William Webster, Mete Yildiz. Abstract. Governments around the world are utilizing data and information systems to manage the COVID-19-crisis. To obtain an overview of all these efforts, this global report presents the expert reports of 21 countries regarding the relation between the COVID-19-crisis and the information polity. A comparative analysis of these reports highlights that governments focus on strengthening six functions: management of information for crisis management, publishing public information for citizens, providing digital services to citizens, monitoring citizens in public space, facilitating information exchange between citizens and developing innovative responses to COVID-19. The comparative overview of information responses to the COVID-19-crisis shows that these responses cannot only be studied from a rational perspective on government information strategies but need to be studied as political and symbolic interventions. Keywords: COVID-19, information polity, corona app, corona dashboard 1. Introduction The COVID-19 Pandemic has diffused globally at an alarming rate and has forced countries to undertake a broad range of unprecedented interventions in order to protect their citizens from this disease. -
29 July 2021
- 7 OCTOBER 2021 COVID -19 Immigration Guide TABLE OF CONTENTS Change Log Chile Hong Kong (SAR) Mozambique Slovakia European Union China Hungary Myanmar South Africa Albania Colombia Iceland Nepal South Korea Argentina Costa Rica India The Netherlands Spain Aruba Cyprus Indonesia New Zealand Sri Lanka Australia Czech Republic Iraq Norway Sweden Austria Denmark Ireland Panama Switzerland Azerbaijan Dominican Republic Israel Papua New Guinea Taiwan Bahrain Ecuador Italy Paraguay Tanzania Barbados Egypt Japan Peru Thailand Belgium Finland Kazakhstan The Philippines Trinidad and Tobago Bolivia France Kenya Poland Turkey Botswana Germany Kuwait Portugal Ukraine Brazil Ghana Laos Qatar United Arab Emirates Brunei Greece Macau (SAR) Romania United Kingdom Bulgaria Guatemala Malaysia Russia United States Cambodia Guyana Malta Saudi Arabia Vietnam Canada Honduras Mexico Singapore COVID-19 Immigration Guide 2 © 2021 Newland Chase | A CIBT company INTRODUCTION The COVID-19 pandemic continues to affect global immigration and international travel significantly. At times, it feels as though the world is being pulled in two directions. On the one hand, availability of vaccinations has increased in many countries, borders have begun a hesitant reopening, and corporate travel and immigration is on the rise; however, on the other hand, new outbreaks are reported daily, the vaccination effort varies drastically by region, and virus variants worry the general public and governments alike. All of these factors contribute to an ever-changing global immigration landscape that provides the industry with new challenges daily. Newland Chase and CIBTvisas are here to help you navigate every twist and turn of these regulation changes. This comprehensive guide will keep you up-to-date on any immigration-related change in connection with the continuing COVID-19 pandemic. -
National Risk Assessment ------Money Laundering Through the Offshore Sector and Terrorist Financing
Vanuatu National Risk Assessment ------------ Money Laundering through the Offshore Sector and Terrorist Financing Table of Contents Foreword by the NCC Chairman ............................................................................................................. 3 Introduction .................................................................................................................................................... 4 Key Findings .................................................................................................................................................. 6 Part One: Money Laundering Risks within the Offshore Financial Centre ................................. 8 Background to the OFC ......................................................................................................................... 8 Legislation, Supervision and Law Enforcement ............................................................................. 8 Compliance with International Standards ......................................................................................... 9 Money Laundering Threats ..................................................................................................................... 10 Sources of Data ...................................................................................................................................... 10 Foreign Tax Crimes .............................................................................................................................. 11 Fraud