Category: Feature
Hikvision Releases White Paper on Cybersecurity
Hikvision, the world’s leading IoT solutions provider with video as its core technology, has released a cybersecurity white paper designed as an educational resource for the security industry. Hikvision believes it is crucial for industry leaders to work together to understand cybersecurity risks and take measures to meet those challenges for the IoT industry. “The surveillance industry originally relied on analogue technology which operated on private networks. In those days, the industry focused on product cost, performance, and ease of use. As the industry has transformed from analogue and isolated to digital and networked, we have seen the benefits that the digital and networking revolution brings to the surveillance industry. However, we have also witnessed the spread of various types of malicious cybersecurity attacks from the Internet to the surveillance industry,” said Bin Wang, Chief Officer at Hikvision Network and Information Security Laboratory and Network Security Department. The Hikvision cybersecurity white paper outlines current security threats for the Internet of Things, and for network and information security in the surveillance industry. It explores the product security lifecycle and product security research to protect user data in comprehensive ways, and safeguard assets from common cyber threats. Hikvision is committed to supporting and adhering to internationally recognized cybersecurity standards and best practices. Hikvision actively supports industry research efforts to increase network defense capabilities. It is dedicated to using and improving open and transparent methods so that customers and users can assess Hikvision’s cybersecurity capabilities. “Cybersecurity is not only the responsibility of product manufacturers. Everyone who participates throughout a project’s lifecycle including users, system integrators, operators, system designers, and other service providers, are all responsible for using cybersecurity best practices. All stakeholders must contend with the same cybersecurity challenges. The solution to this problem is 30 percent technology and 70 percent management,” said Yangzhong Hu, CEO of Hikvision, “Cybersecurity challenges will always be around, so we must remain vigilant and keep working on improving product security.”
FICO PREDICTS AI and Blockchain to Meet in 2018
The growing use of blockchain technology in financial services will include a healthy dose of artificial intelligence, as new, automated analytic techniques look for patterns in the ‘relationship data’ about people, contracts and transactions. That merger of two hot tech trends is one of the predictions made by Dr. Scott Zoldi, Chief Analytics Officer at Silicon Valley analytic software firm FICO, and a recognized expert in the field of artificial intelligence. “Beyond its association with crypto-currencies, blockchain technology will soon record ‘time chains of events,’ as applied to contracts, interactions and occurrences,” Dr. Zoldi wrote on the FICO Blog, “Think about renting a car. In the future, you will be able walk up to a car to lease it, but you’ll do so with a micro-loan for which you are approved to lease the car for, say, an afternoon. This micro-loan will have insurance contracts attached to the blockchain, and a codified history of the car’s history of drivers, events, and maintenance. As you drive through the city and interact with toll roads and parking spaces, all of this information will be automatically recorded and monitored on the blockchain. When you leave the car and lock it, the lease is complete and auditable on the chain. These kinds of data event chains will create new opportunities for graph analytics and novel new AI algorithms to consume relationship data at scale.” Zoldi, who leads the team that builds FICO’s AI analytics for solutions such as fraud management and cybersecurity, also sees a rise in what he calls “defensive AI.” “Attackers use malicious AI and ML to circumvent the protective systems companies have in place,” he wrote, “This arms race, in which criminals arm themselves with adversarial machine learning, tops McAfee’s 2018 security forecast. In 2018 we will see new systems that will seed their outputs with ‘faint signatures’ to mislead, confuse or identify the attackers learning the AI system’s response.” As chatbots get smarter and use more AI, they will not only understand us better, they will also be better at manipulating us, Dr. Zoldi predicts. “By quickly understanding the tone, content and predicted highest-value conversational paths to meet various objectives, chatbots using AI can also learn the magic words to sway our attitude, actions and possibly elicit en masse reactions,” he wrote. Dr. Zoldi’s other predictions for AI in 2018 are: AI will have to explain itself. “The need for Explainable AI (XAI) is catalyzed by regulations like the European Union’s General Data Protection Regulation (GDPR), which requires explanations for decisions based on scores, including those produced by AI and ML systems.” AI will augment us. “Whether it’s drawing the information together for us to be superhuman at investigation, data recall, or improving how we learn new topics, AI will augment our ability to process new information. The question will be as to whether our human brains will atrophy, improve or simply evolve to the rate and frequency of data.” AI will get operationalized. “In 2018, companies will focus on operationalizing AI, particularly in the cloud, to more easily build, refine, deploy and enhance machine learning environments.”
Genetec Security Center 5.7
Genetec Inc. has recently introduced a new version of Security Center, an open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. Security Center 5.7 allows users to make insight-driven decisions based on security and analytics data. This latest version also adds privacy protection for individuals, efficiently distributes HID mobile access control credentials, and ensures business continuity with native access control fail-over. Protecting data, the network, and the organization Cyber resilience is about securing communications, authenticating users, and protecting businesses from employees unwittingly allowing vulnerable network-connected devices to threaten the business. To improve overall cybersecurity, Security Center now automatically identifies whether connected edge devices are running the most recent and secure device firmware. Once notified of known vulnerabilities and given firmware recommendations, administrators can take immediate action and eliminate known security gaps. ‘GDPR-ready’ privacy and video analytics More than a trend, protecting individual privacy is fast-becoming a necessity of security management. In some regions like Europe, it is already becoming codified in law. By embedding the KiwiVision™ Privacy Protector ™ module, Genetec enables organizations to automatically blur and mask sensitive video, and anonymize people to protect their privacy. Privacy protector was recently re-certified for its fourth consecutive term with the European Privacy Seal (EuroPriSe), and remains the only video solution to hold this certification.Privacy protector is also rated as ‘GDPR-ready,’ meeting the stringent compliance criteria of the General Data Protection Regulation (GDPR), which will go into effect May 25th, 2018 in the European Union. The KiwiVision Intrusion Detector™ module is also unified with SecurityCenter 5.7 to generate real-time alarms that automatically notify security staff when individuals or vehicles enter sensitive areas, secured perimeters, or restricted zones. Through an accompanying analytics-based intrusion report, operators can now engage in deeper investigations. Additionally, to assist users in scanning through hours of footage, a new Quick Search forensics tool identifies changes in recorded scenes in seconds, ignoring irrelevant footage to narrow down searches. Enterprise access control with native failover and HID mobile credential support The Security Center Synergis™ access control system now comes with built-in failover, so customers can take advantage of continuous monitoring of devices and events. This safeguards critical information and ensures business continuity, even when servers fail. The new HID Mobile Access Portal API integration allows organizations to efficiently deploy mobile credentials to their employees, contractors, and visitors. These credential holders receive an email to download the HID Mobile Access Portal application on their devices, which enables access via Bluetooth® or NFC wireless technology. Employees and visitors will now be able to use their smartphone, wearables, and tablets to gain approved access credentials to securely open doors and defined areas of the premises. Insight-driven reporting and decision support The new advanced Security Center reporting feature intuitively displays data in dynamic charts and graphs, helping organizations gain a deeper understanding of their data, identify trends, and spot undetected patterns. Visualization of physical security data can be employed to quickly isolate security gaps and suspicious activity, identify maintenance issues, find valuable opportunities to improve operations, and ultimately make smarter decisions.
The Value of Intelligent Solutions For Hospitality Security
The hospitality industry is constantly evolving. Hotels focus on leveraging technology to enhance the user experience, which includes streamlining processes and adding additional amenities that draw repeat visits. At the same time, efforts to maintain the safety and security of individual hotels and hotel chains face a sea change. Although security began as a property protection function, it has broadened to include plans to mitigate several types of threats, ranging from fraud and malfeasance to terrorism to response to major events including natural and manmade disasters. It is clear from the growing demand for technology solutions within this segment that hospitality is very focused on ensuring a safe environment for those inside the facility. Hotels strive to deliver exceptional customer service while balancing the safety and security of guests, employees and visitors with a welcoming environment. Modern risks, including those related to cybersecurity, liability and compliance, have propelled the need for stringent yet creative security strategies to be integrated into a hotel’s overall business strategy. As hotels don’t report incidents, there is limited public data regarding the safety and security of these properties. However, it’s still clear that threats exist in hotels and resorts. A 2009 study that examined crimes reported by 64 Miami Beach hotels to the Miami Beach Police Department showed that theft is a chief problem, with nearly half of the 756 reported crimes being thefts. Growth ahead Threats like those mentioned above continue to be a significant driver in the deployment of video surveillance, video intelligence technologies and other security systems. The demonstrated value of video drives further interest in surveillance platforms, and this along with other factors propels the use of video surveillance as it continues to advance globally. According to a 2017 report from Research and Markets, the video surveillance market is projected to grow at a CAGR of 9.6 percent from 2017 to 2023, with hospitality, healthcare and education verticals forecasted to grow at an even higher rate. Technology plays a critical role in the effectiveness of a security function in all organizations, and the hospitality industry is no exception. In research conducted by Professor Alexandros Paraskevas, Chair in Hospitality Management at the University of West London, with assistance from the International Centre for Hotel and Resort Management, a large majority of hotels reported that video surveillance is by far the ‘core’ solution in use today. According to one participant, “95 percent of the discussion on security technology investment is about video surveillance.” Most executives consider video to be the leading investment, used as a deterrent or as an investigative tool. It is predominantly used in a reactive, not proactive manner. Even though technology is considered a force multiplier, many hotels struggle with allocating sufficient budget for security measures. Security investment within the hospitality sector is typically a ‘reluctant spend’ since it is not considered a revenue generator. That does not mean that the hospitality industry doesn’t prioritize security, it’s just a matter of setting the right mindset. Owners and managers who realize the importance of employee and guest safety, and the overall benefit of security are keener to discuss investment. This is why security leaders must be willing and able to educate senior leaders on the technology being proposed. As video surveillance becomes more prominent as a business operations tool in addition to a critical piece of a comprehensive security plan, valuable innovations such as panoramic and 360-degree cameras and video analytics, are important tools to reduce cost and increase coverage of large areas such as hotel lobbies and parking lots. But these products are only one piece of the puzzle – a comprehensive security solution can not only prevent and provide investigative/ forensic support, but also reduce insurance premiums and increase business. It is critical that video cameras and other security solutions are integrated to form a more comprehensive view of a hotel’s overall security posture. Simple, intelligent systems that bring information to the operator are optimal because they help hotels gain new levels of intelligence to help mitigate risks more effectively and proactively. The future is now Advancements in technologies propel new ways for security technology – most predominantly video – to be leveraged throughout an organization. Video data can be leveraged for additional uses that span several departments including business operations and marketing. The capital investment in video capture technology then becomes more widely distributed as more departments utilize the information, going from a required ‘grudge purchase’ to a ‘Swiss Army Knife’ of operational benefits. For example, the future of analytics provides heat-mapping functionality that hotels can use to identify busy areas for target marketing. Users can analyze traffic and people flow, and use that information to determine how to best use specific areas. With facial recognition software, hotels can better address the needs of VIPs by allowing hotel staff to be alert when a frequent guest arrives. How’s that for customer service? Hotels and resorts can use advanced technologies to better serve guests in an effort to deliver the kind of personalized service that customers will come to expect from their visit in the future. This will allow brands to build long-term relationships and ensure return visits, leading to increased revenue streams and a successful sustained business model. At the same time, hotels will be able to realize new levels of safety and security to keep their most important assets protected. Author:- Abhishek Kumar ( Regional Director, Southeast Asia, Oncam)
New NIST Forensic Tests
Data found on a suspect’s computer, cell phone or tablet can prove to be crucial evidence in a legal case. A new set of software tools developed at the National Institute of Standards and Technology (NIST) aims to make sure this digital evidence will hold up in the court. The software suite, referred to collectively as federated testing tools, is designed to help law enforcement and forensic practitioners with a critical early step in evidence collection – making a copy of the data from a seized electronic device. Because a suspect’s guilt or innocence can hang in the balance, both the prosecution and the defense must agree that the digital forensic process did not introduce any unseen errors into the data, and that the methods they are using work as expected. Extracting and copying data is a risky process because of the rapidly shifting digital landscape that the devices inhabit. Confronting the practitioners are all the differences in data and format that can exist between one device and the next – because of the sheer number of different manufacturers, and because of the frequent software updates pushed to various makes and models. “It’s hard to keep up,” said Barbara Guttman, one of the suite’s developers at NIST’s Computer Forensics Tool Testing project, “You don’t want to risk your copying software failing when you try to get data from some new computer that is critical to your case. So, we created these tools to help ensure that the copying software works effectively and transparently.” The federated testing tools allow authorities to run tests in advance on their digital forensic software to make sure ahead of time that it will not fail them when a suspect’s personal computer, media or device arrives in the forensic science lab. Guttman describes the suite as the three most critical tools for evidence acquisition and preservation, each addressing one aspect of the copying process. “One tool tests software for copying computer disks, while another tests mobile device data extraction software. These two test protocols were available previously, but the suite is now completed with a new third test for ‘write blockers,’ which are a sort of one-way valve for data-copying software. An effective write blocker allows data to flow only from the seized device to the copying computer, not the other way around. Later updates to the suite will address additional forensic functions,” said Guttman. The full suite is a freely available Linux file that anyone can download and burn to a blank CD. They can use the disk to boot their workstation and test their copying tools via a user-friendly interface. The NIST software also allows different forensics labs to exchange the results of their tests with each other, so that they can share the burden of exploring how well a copying method works on a specific platform and operating system. Running copying software through its paces generates a report that disparate organizations can share among themselves or with the world, allowing them to indicate whether they found anomalies during the testing or not. “Pooling these traceable results will mean less work for any given lab or organization,” Guttman said, “We don’t require they share the tests, but a rising tide should raise all boats.” Guttman cautioned that the tools will not ensure that a copying or digital forensic process is flawless, only that the results of the job are clearly visible to anyone. “Evidence doesn’t have to be complete to be admissible,” she said, “The key here is that copying does not introduce errors into the data that no one can see.” “Interest in federated testing will go beyond law enforcement agencies,” Guttman added, “Any organization that performs forensics such as civil law firms and corporate enforcement offices, will find a use for the test suite.”
Industry CEOs Comments on 2017 at a Glance
2017 witnessed various ups and downs across business communities in India, including Private Security Industry, in pursuance of multiple reforming policy and regulatory initiatives taken by the Government of India. While calls for Make in India, Digital India and Skill India, Safe City and Smart Cities, and other critical infrastructure development projects have opened far-reaching opportunities for the industry to flourish, demonetization and implementation of GST have been ordered to keep a hold on the unaccounted transactions, corruption, and other malpractices during business deals. The private security industry is one of the fastest growing business of the country which has been growing at the rate of more that 20% in recent past, much higher than the global growth rate, and various reports suggest that it would continue to grow at the similar rate. When the year is now heading to close, SecurityLink India spoke to some eminent players of the Indian Security Industry to find the actual experiences they have been through. Here are some excerpts: Sanjeev Sehgal, Founder & Managing Director, SPARSH SecurityLink India: About six months on, what is your take on GST and the implementation thereof for you and the security industry at large? Sanjeev Sehgal: Today, there are less complexities when we sell products from one state to the other; now we don’t have to pay multiple taxes like CST, Entry Tax, Octroi etc. This would certainly be helpful in expanding market nationally. Things have become less complicated now. However, the biggest challenge which GST has offered is the payment of GST at the time of removal of stocks from the factory, even in the case of branch transfers. It is adding pressure on working capital requirements, which is always a major issue for manufacturers. GST is turning India into one common market, leading to greater ease of doing business and big savings in logistics costs. SecurityLink India: How has the ‘Make in India’ call impacted you and the entire security industry so far? Sanjeev Sehgal: The ‘Make in India’ initiative gives distributors in security systems a platform to reach out to people through an organized method. Since its launch, the Make in India initiative has started showing results. Increased production outputs and growing FDI into India are seen as a result of the initiative. IP video surveillance and CCTV are quickly becoming the norm in public spaces. With the security industry slated to grow to a INR 80,000 crore industry by the year 2020, the ‘Make in India’ initiative has already given this industry a major boost towards that direction. SecurityLink India: Kindly name and give a brief about the products and solutions that you floated during 2017. Sanjeev Sehgal: The security market is experiencing an upward trend in upcoming technologies. We at Sparsh have successfully introduced contemporary trends in the surveillance market with Cloud surveillance. We have recently introduced an Indian cloud computing platform, developed indigenously in India. Remote monitoring, Wi-Fi integrated solutions and customized solutions for specific verticals are some of the upcoming technologies in the security solutions market developed by Sparsh. These aid in solutions such as ANPR, critical infrastructure, border security etc. SecurityLink India: Which are the major projects you accomplished this year? Sanjeev Sehgal: This year we have bagged some prestigious projects such as Delhi schools, FCI, CISF etc. SecurityLink India: What are your plans for the new year? Sanjeev Sehgal: In the forthcoming years, we would like to take the idea of ‘Made in India’ and ‘Make in India’ to a global platform as a leading CCTV manufacturer of India. Sparsh as a brand will target Government, Safe City, Smart City and SMB market and which is the large and sizable business opportunity for us. In the Union Budget, there were many provisions for ‘Make in India.’ We are benefited by such initiatives as an indigenous Indian manufacturing company and brand. Smart Home solution will be another area we would be targeting for growth. In the near future we have plans to launch many new products in this space. Robbin Shen, Director, India & SAARC, Dahua Technology SecurityLink India: How would you rate this year for you in terms of business opportunities and procurements in India? Robbin Shen: 2017 has been a successful year for Dahua as our security products and solutions have been well received and accepted in the market for their intrinsic strengths such as high quality, durability, reliability, and the capacity to function in all weather conditions. Thus we can claim it has been an excellent year for us. SecurityLink India: India has jumped 30 places to 100 in the World Bank’s ‘Ease of Doing Business’ Index. What does your wide-ranging experience in security industry suggest? Robbin Shen: The current Government of India has taken a number of industry-friendly measures such as Smart Cities, Safe Cities, Digital India, and recently the implementation of GST. They have certainly made favorable impact on the prospect and ease of doing business environment in the country, albeit, it has yet to go a long way at the regional and local levels. India has enormous potential and it will become a major market for us. SecurityLink India: About six months on, what is your take on GST and the implementation thereof for you and the security industry at large? Robbin Shen: We welcome the GST initiative taken by the Indian Government. It has reduced the prices of many security items from 28 percent to 18 per cent. There are suggestions to reduce the rate further which, if implemented, will be a boon to all the stakeholders from manufacturers to customers. As prices decline affordability increases, and that makes more people to install security devices to safeguard their lives and properties. SecurityLink India: Kindly name and give a brief about the products and solutions that you floated during 2017. Robbin Shen: We have launched a number of security products, solutions and latest technologies – mainly Extended Power over Ethernet Devices or ePoE including network cameras, switches and network recorders….
DIY Security Systems & the Future of the Professional Installer
By Anna Sliwon – Research Analyst, Building And Security Technology, IHS Markit In 2016, the global market for DIY security equipment reached $60 million, with the great majority of gear – 85 percent – sold in the Americas. The American market for DIY intruder alarms is forecast to grow at a CAGR of more than 20 percent over the next five years. In recent years, the residential security market has seen an influx of DIY intruder alarm system providers from internet service providers such as Deutsche Telekom and consumer electronics companies including Ring and Nest – the latest such providers to offer DIY security systems. DIY on the upswing The popularity of DIY systems is on the rise for several reasons. Self-install systems have no installation costs and can be set up fairly quickly. Equipment usually comes pre-configured, and often only requires a basic understanding of wireless technology. And end users are becoming more tech savvy thanks to the increasing availability of how-to video tutorials on intruder alarm system installation. Alarms can be monitored through a dedicated smartphone application, bringing the costs down to zero while also freeing users from lengthy monitoring contracts. Professional monitoring contract options for DIY systems often come at a lower price than contracts for professionally installed systems. Also, with the growing availability of pay-as-you-go monitoring, users can opt to have the alarm monitored only a few months a year, further reducing the overall annual cost of monitoring. In some cases, the cameras used in DIY systems are more affordable when compared to those offered as part of a professional package. In certain DIY systems, cameras can also be offered at a discounted rate if the user opts out of alarm monitoring services for the camera. DIY end users also have more options available to them, as they can choose from a wide range of consumer devices. With professionally installed systems, usually only one type of pre-selected camera is offered. This limits the end user’s choice to accepting the supplier’s camera or not having a camera in the system. Very often, equipment is interoperable with a wide range of commercially available video cameras, voice speakers or video doorbells, and allows for virtually unlimited expansion and customization. Professional security systems also allow for expansion, but the services of a professional installer may be required to integrate some of the devices, and advanced features are often turned off when a service contract ends. This means that a customer may still be able to arm and disarm the security sensors for a local alarm, but any advanced automation features will not be available to non-active subscriber accounts. Professional solution providers are under pressure New players have entered the security marketplace from other industries, resulting in increased competition and pricing pressures. The flexibility of DIY systems has allowed non-traditional security equipment providers to increase the overall penetration rate of homes with alarm systems – something professional equipment providers have long struggled to achieve. DIY systems are most likely to be chosen by young apartment renters, where there is no previous history of security equipment and the likelihood of annual moves is common. In regions with high population densities, this will lead to the replacement of the professional install option, leaving DIY as a first choice for newcomers to alarm systems. For new homeowners who are also young families concerned with monthly fees, DIY systems may provide a viable option for securing property without long-term contracts. The rise of the DIY market poses the biggest challenge to suppliers of professional security equipment. A blessing in disguise New players from other industries bring into play additional marketing resources to help educate consumers and drive increased awareness of the benefits of security systems. DIY systems have helped lower the barriers to acquiring security systems. As the needs of DIY consumers evolve over time (for instance, they become property owners), they are more likely to switch to professionally installed systems, thereby increasing opportunities for the professional market via system upgrades. DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognizable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment and operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly. Not going away anytime soon The need for professional installers will not disappear completely anytime soon. Professionally installed systems provide added peace of mind. When equipment malfunctions, issues can be addressed immediately by a qualified engineer. And what’s more, the quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability and false alarms. Although DIY security equipment is in principle very easy to install, it is still relatively new technology. Therefore, software and connection issues are likely to surface in the process of operating the equipment, which may undermine the performance of the system. Dealing with technical support that’s available only online or over the phone could be a daunting process and may not appeal to every consumer. Professional installers are usually located across numerous local offices, making an in-person interaction much more accessible and simple. The proportion of elderly people in economically developed countries is increasing. Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member. Moreover, in many cases these systems include individual monitors like personal emergency response systems (PERS) that can alert if a vulnerable person is in distress inside as well as outside the home. In addition to PERS, many service providers have been trialing programs that analyze the routines and behaviors of the elderly. This means that instead of an elderly patient needing to wear a pendant, his or her behavior is monitored passively by analytics software that alerts caregivers and…
Indian PSI Prepares for the Next Leap
(FICCI & PWC) The security industry is a large and expanding area of the economy with an estimated global market worth of USD 173 billion. The private security industry in India, valued at INR 570 billion is also promising. The Indian industry is still nascent and is likely to see exponential growth both in terms of manpower employed, and market share due to rapid infrastructural and economic development, leading to an increased need for prevention, detection and protection of assets and citizens against criminal acts such as fraud, terrorism, theft, drug-related offences and violent crimes. Yet another factor adding to the demand is the increase in individuals joining the billionaire league and seeking private protection at all times. The private security industry is one of the largest employers in India and is continuously growing. It is employing almost 8.5 million people and has the potential to employ 3 million more people by 2020. Manned guarding continues to be the service line with maximum employment and is also the highest revenue generator for the private security industry, contributing to 80 per cent of the revenue, followed by cash services. Government policies like making guards and installing CCTV cameras in schools, ATMs, and various other locations mandatory have also accelerated the demand of the industry in the country. With a high level of advancements in technology, services like electronic security services, integrated facility management, and security architecture and engineering will see greater prominence in the time to come. This not only has the potential to improve the quality of services offered by security companies but may also prove to be a boon for the large workforce who will have the opportunity to up-skill themselves and progress to engaging employment conditions. With the passage of time, security companies have evolved from servicing only homes and businesses to servicing the government. The rapid growth of the private security industry is both a refl ection of the inability of government security agencies to provide adequate security to private property and of the growing sophistication of the requirements of the private sector. In the context of current policy and regulatory developments in the country, the private security industry will continue to play an important role. More investments coming into manufacturing and other related industries will not only trigger the demand for private security personnel but also compel the industry to adopt processes and practices in sync with international standards. The contribution of this sector to employment generation in India is unique. Private security industry provides employment to a large number of rural youth, which otherwise would have remained outside the fold of formal employment. – Dr. Sanjaya Baru Secretary General, FICCI However, as per the industry sources, 60 per cent of the security service providers still operate as unorganised, thereby keeping the sector price oriented, and amenable to unfriendly employment practices that make it difficult to monitor quality and compliance. The sector continues to be perceived by the work force as non-aspirational as people are unaware of career prospects and the benefits that can be achieved. Technology integration is yet another challenge as it is widening the gap between the well-established players and smaller players in the industry. Most clients are now looking for technology-enabled security solutions which some of the bigger players in the industry already have; however, because of high capital and highly skilled manpower requirements, it is getting harder for smaller companies to keep up with the pace. Lack of quality manpower, high attrition rates and compliance requirements also continue to pose major challenges to the growth of the manned guarding security services market. Government policies are changing the game quickly with important decisions being taken to overcome challenges such as revision in foreign direct investment (FDI) rates, re-categorization of security workers and modification in the minimum wages. However, the industry stakeholders are still of the view that more changes at the policy level and improved enforcement could help private security grow further and make the sector more viable for investments. Some key suggestions are creating a grading framework for private security players in the market and having a single window licence process. Industry overview Considering the growing demand for security services, security firms in India are seeking capital to expand their business. Some international players are also foraying into India to tap the potential of the industry. Demographic characteristics India’s competitive advantage has been its competitive wage structure and availability of manpower. A large number of youth within the age group of 15–19 fall below the poverty line as they drop out of formal education and have limited avenues for employment – majorly in regions including Bihar, Uttar Pradesh, Jharkhand, Madhya Pradesh, Rajasthan and Assam. They come to cities in search of better employment opportunities. The youth from cities, though, associate with the security industry with low aspirational value owing to lack of social security schemes, long working hours and poor working conditions. Nevertheless, the private security industry continues to be one of the largest employers in India. Over 90 per cent of this workforce consists of security guards who are at the base of the pyramid, with little to no relevant experience or expertise. They resort to working as security guards as the last option. Recent policy initiatives FDI rates: FDI in private security agencies (PSAs) has been revised through the automatic route to 49 per cent and through the Government approval route to 74 per cent. Re-categorisation: In January 2017, vide a Gazette Notification, workers in private security have been re-categorized under the Minimum Wages Act, along with a modification in the minimum rate of daily pay. Security guards without arms have been recategorized as ‘skilled,’ and security guards with arms and security supervisors have been categorised as ‘highly skilled.’ Wage rate revision: The Central Government has also revised the minimum wage payable to employees of the ‘watch and ward’ sector to INR 637 per day effective April 2017. Stakeholders are of the opinion that more changes need to…
The Markets and Markets Report
‘AI’ in Transportation Market to grow to USD 10.30 Billion by 2030 The report ‘Artificial Intelligence in Transportation Market’ notes that the artificial intelligence in transportation market is projected to grow at a CAGR of 17.87% with the market size expected to grow from USD 1.21 Billion in 2017 to USD 10.30 Billion by 2030. The emergence of autonomous trucks and industry-wide standards such as adaptive cruise control (ACC), blind spot alert, and advanced driver assistance systems (ADAS) would trigger the growth of the artificial intelligence in transportation market. The growing demand for safety and security has created an opportunity for OEMs to develop new and innovative artificial intelligence systems that would attract customers. Software segment holds the largest share The software segment is estimated to hold the largest market share of the artificial intelligence in transportation market in 2017. In recent years, major developments have occurred in AI software solutions, platforms and related software development kits. These developments have taken place due to the need for advancement in the areas of object perception, machine translation and object recognition. Companies such as Alphabet (US), Microsoft (US), IBM (US) and Intel (US) are among the frontrunners in the development of AI software. All these companies are acquiring or investing heavily in start-ups to maintain a strong position in the artificial intelligence in transportation market. In March 2017, Intel (US) acquired Mobileye (Israel) for approximately USD 15 billion. Software for deep learning technology has a major share in the AI in transportation market. Therefore, the need for advancement in autonomous trucks has led to a large amount of funding for various start-ups in the North American region. Data mining process is estimated to be the fastest growing segment of the artificial intelligence in transportation market from 2017 to 2030. A huge amount of data, collected from different sensors used in semi-autonomous or autonomous trucks can be used to train the trucks to detect or recognize images, obstacles and various scenarios one might encounter behind the wheel. Autonomous trucks have a potential of collecting more data from the outside environment, and hence, data mining will be of great importance. The North American region is estimated to have the largest market for data mining as the trucking industry has a huge influence on its economy. Similarly, the growing demand for predictive maintenance in transportation industry would boost the growth of the data mining process in the near future. North America be the leading market Transportation plays a significant role in the North American economy. According to American Trucker Association, there are 8.7 million truck-related jobs in the US, and the country still faces a shortage of truck drivers. Hence, major developments related to autonomous driving of trucks are taking place in this country. Additionally, incentives and high level of funding from the government plays a major role in the development of this technology. For instance, in 2016, the US government spent USD 4.00 billion to accelerate the acceptance of autonomous vehicles on US roads. Also, the Central North American Trade Corridor Association is planning to develop a driverless truck corridor from Mexico to Manitoba. Also, the region is home to leading technology companies such as Microsoft (US), Intel (US), and NVIDIA (US), which offer various AI technologies for vehicles in partnership with OEMs. Therefore, the North American region has a great potential for the growth of the artificial intelligence in transportation market. The key software & Tier- I suppliers profiled in the report include Continental AG (Germany), Bosch (Germany), Microsoft (US), and NVIDIA (US). These systems and technologies are supplied to automotive OEMs such as Volvo (Sweden), Daimler (Germany), Scania (Sweden), and others. Visual Analytics Market Worth USD 6.51 Billion by 2022 The report ‘Visual Analytics Market Global Forecast to 2022’ indicates that the visual analytics market is expected to grow from USD 2.57 Billion in 2017 to USD 6.51 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 20.4%. The major factors driving the visual analytics market are the rapid growth in volume and variety of business data, growing need for data-driven decision-making, and increasing demand for advanced analytics. The visual analytics market is growing rapidly because of the transformation from the traditional analytical techniques for analyzing business data to the advanced techniques and due to the massive surge of the flowing business data. IT business function The IT business function is expected to witness the highest CAGR during the forecast period because of the increasing need for IT departments across industries to have access to real-time analytics on Key Performance Indicators (KPIs) and the visualization of the percentage of helpdesk ticket requests resolved in the agreed time-frame to assess the success of on-going support. Transportation and logistics The transportation and logistics industry is expected to witness the highest CAGR during the forecast period because of the increasing need for managing the real-time data coming from various transportation and logistics activities, such as the vehicle’s schedule analysis and route analysis, based on the transportation and logistics activities conducted. North America is to dominate North America is expected to hold the largest share of the visual analytics market in 2017, due to the technological advancements and early adoption of analytical solutions in this region. The market size in Asia Pacific (APAC) is expected to grow at the highest CAGR from 2017 to 2022. The primary driving factors for this growth are the increasing technological adoption and huge opportunities across industries in the APAC countries, especially in India, China and Japan. The report also encompasses different strategies, such as mergers and acquisitions, partnerships and collaborations, and product upgrading adopted by the major players to increase their shares in the market. Some of the major technology vendors include IBM (US), Oracle (US), SAP (Germany), SAS Institute (US), Tableau Software (US), Microsoft (US), MicroStrategy (US), TIBCO Software (US), Qlik (US), and Alteryx (US).
Caution in Courtroom Evidence Presentation
Use of ‘Likelihood Ratio’ not consistently supported by scientific reasoning approach ( -: Contributed by NIST :- ) Two experts at the National Institute of Standards and Technology (NIST) are calling into question a method of presenting evidence in courtrooms, arguing that it risks allowing personal preference to creep into expert testimony and potentially distorts evidence for a jury. The method involves the use of Likelihood Ratio (LR), a statistical tool that gives experts a shorthand way to communicate their assessment of how strongly forensic evidence such as a fingerprint or DNA sample, can be tied to a suspect. In essence, LR allows a forensics expert to boil down a potentially complicated set of circumstances into a number – providing a pathway for experts to concisely express their conclusions based on a logical and coherent framework. LR’s proponents say it is appropriate for courtroom use; some even argue that it is the only appropriate method by which an expert should explain evidence to jurors or attorneys. However, in a new paper published in the Journal of Research of the National Institute of Standards and Technology, statisticians Steve Lund and Hari Iyer caution that the justification for using LR in courtrooms is flawed. The justification is founded on a reasoning approach called Bayesian decision theory, which has long been used by the scientific community to create logic-based statements of probability. But Lund and Iyer argue that while Bayesian reasoning works well in personal decision making, it breaks down in situations where information must be conveyed from one person to another such as in courtroom testimony. These findings could contribute to the discussion among forensic scientists regarding LR, which is increasingly used in criminal courts in the U.S. and Europe. While the NIST authors stop short of stating that LR ought not to be employed whatsoever, they caution that using it as a one-size-fits-all method for describing the weight of evidence risks conclusions being driven more by unsubstantiated assumptions than by actual data. They recommend using LR only in cases where a probability-based model is warranted. Last year’s report from the President’s Council of Advisors on Science and Technology (PCAST) mentions some of these situations, such as the evaluation of high-quality samples of DNA from a single source. “We are not suggesting that LR should never be used in court, but its envisioned role as the default or exclusive way to transfer information is unjustified,” Lund said, “Bayesian theory does not support using an expert’s opinion, even when expressed numerically, as a universal weight of evidence. Among different ways of presenting information, it has not been shown that LR is most appropriate.” Bayesian reasoning is a structured way of evaluating and re-evaluating a situation as new evidence comes up. If a child who rarely eats sweets says he did not eat the last piece of blueberry pie, his older sister might initially think it unlikely that he did, but if she spies a bit of blue stain on his shirt, she might adjust that likelihood upward. Applying a rigorous version of this approach to complex forensic evidence allows an expert to come up with a logic-based numerical LR that makes sense to the expert as an individual. The trouble arises when other people – such as jurors – are instructed to incorporate the expert’s LR into their own decision-making. An expert’s judgment often involves complicated statistical techniques that can give different LRs depending on which expert is making the judgment. As a result, one expert’s specific LR number can differ substantially from another’s. “Two people can employ Bayesian reasoning correctly and come up with two substantially different answers,” Lund said, “Which answer should you believe, if you’re a juror?” In the blueberry pie example, imagine a jury had to rely on expert testimony to determine the probability that the stain came from a specific pie. Two different experts could be completely consistent with Bayesian theory, but one could testify to, say, an LR of 50 and another to an LR of 500 – the difference stemming from their own statistical approaches and knowledge bases. But if jurors were to hear 50 rather than 500, it could lead them to make a different ultimate decision. Viewpoints differ on the appropriateness of using LR in court. Some of these differences stem from the view that jurors primarily need a tool to help them to determine reasonable doubt, not particular degrees of certainty. To Christophe Champod, a professor of forensic science at the University of Lausanne, Switzerland, an argument over LR’s statistical purity overlooks what is most important to a jury. “We’re a bit presumptuous as expert witnesses that our testimony matters that much,” Champod said, “LR could perhaps be more statistically pure in the grand scheme, but it’s not the most significant factor, transparency is. What matters is telling the jury what the basis of our testimony is, where our data comes from, and why we judge it the way we do.” The NIST authors, however, maintain that for a technique to be broadly applicable, it needs to be based on measurements that can be replicated. In this regard, LR often falls short, according to the authors. “Our success in forensic science depends on our ability to measure well. The anticipated use of LR in the courtroom treats it like it’s a universally observable quantity, no matter who measures it,” Lund said, “But it’s not a standardized measurement. By its own definition, there is no true LR that can be shared, and the differences between any two individual LRs may be substantial.” The NIST authors do not state that LR is always problematic; it may be suitable in situations where LR assessments from any two people would differ inconsequentially. Their paper offers a framework for making such assessments, including examples for applying them. Ultimately, the authors contend it is important for experts to be open to other, more suitable science-based approaches rather than using LR indiscriminately. Because these other methods are still under…