Page 2,740«..1020..2,7392,7402,7412,742..2,7502,760..»

Police computer systems ill-prepared to cope with ransomware attack – New Zealand Herald

By Phil Pennington of RNZ

Police computer systems have been ill-prepared to cope with a disaster like a major hack.

This has been at the same time they have been pushing for more powers to gather people's data to keep in the systems.

An audit shows police did not know how much data they could afford to lose if their IT systems were hit. Read the first two pages of the audit here.

They needed a "disaster recovery" strategy to gauge "the acceptable amount of data loss NZ Police can handle after a disruption has occurred", the audit said.

The 2019 audit identified a raft of deficiencies.

It found they had not done an assessment of the major threats to their cyber resilience.

There had been "insufficient investment" in cyber resilience for years, and confusion between two teams over who was in charge of IT disaster recovery.

Police say they have been addressing these gaps - this was "in flight", they said.

'Very high risk'

1 Aug, 2021 06:35 PMQuick Read

1 Aug, 2021 09:01 AMQuick Read

1 Aug, 2021 08:28 PMQuick Read

1 Aug, 2021 07:44 PMQuick Read

The ransomware attack that crippled Waikato District Health Board has prompted questions about the public sector's ability to defend public data from online criminals.

Police held back from RNZ all but the first two pages of the 2019 audit by consultant KPMG of its information communication technology (ICT) resilience.

Police had mentioned to MPs about this audit in its latest annual review, prompting RNZ to ask for it.

Police said releasing more pages might dissuade staff from providing free and frank opinions in future; and that the first two pages fairly reflect what was in the rest of it.

The two pages show police regarded IT business continuity and disaster recovery as a "very high risk" area.

But KPMG concluded police were largely relying on staff to cope with disruptions.

Staff had proved capable and experienced so far, but this could not make up for the lack of:

Plans for backup and "failover" in a disaster Recovery strategies A business continuity plan An assurance plan to test IT vendors and partners are up to scratch Regular disaster recovery testing An overall framework for addressing cyber resilience requirements was also missing.

"Without a framework there is a high likelihood that key business processes may have ICT requirements that are not clearly understood or planned for in a disruption," the report warned.

RNZ asked for details of which of these gaps have been fixed since 2019.

Police have not provided any, instead saying some had been fixed, while others had now been included in its Cyber Security Resilience Programme or CRSP that was aiming to come up with an operating model.

'Significant uplift'

Other documents paint a very mixed picture.

Police's own annual assessment of how they keep people's personal information secure says in 2016 police controls were at the second-lowest rung, and now are close to the second highest rung on a five-rung quality ladder.

At the same time it says that all personal information is "robustly secured both physically and technically".

It shows they are updating how they handle data breaches to match privacy law changes last year.

A 2020 internal review says police are within reach of a big step up in data quality, helped by "reviews of problematic business and ICT processes".

But a 2020 internal review of intelligence capability says information handling "requires significant uplift", yet is hampered by the need for annual bids for enough funding just to keep the fragmented storage and other systems maintained.

At the same time there is this push for greater powers to gather data, worldwide and in this country.

A separate OIA response shows police expect to develop policies to give them more access to evidence held anywhere in the world online.

In the late 2020 briefing to the police minister, police said: "There are important cyber policy gaps that need to be addressed".

It shows police were working on a deal with Europol - the European Union's law enforcement agency - to share data more easily.

They also aim to boost data sharing within this country with the likes of Immigration, Internal Affairs that runs passports, and the Waka Kotahi, the Transport Agency that runs driver licensing.

Immigration has its own information-gathering powers, but some are secret. For instance, it is understood to use a social media scanning tool from Cobwebs Technologies, a firm set up by ex-Israeli Defence Force tech experts.

Immigration has refused to release to RNZ any business case or privacy impact assessment it has had done on the Cobwebs tool, arguing this was "likely to prejudice the maintenance of the law".

RNZ asked for details of what cyber policies are being developed to fill the "gaps", but police have not provided this.

Instead, in a statement it said: "The cyber security environment is constantly changing, and changes significantly over time.

"Our Cyber Security and Resilience Programme addresses the rate of change to the global internet environment, in terms of keeping police systems safe."

Management and governance included frequent auditing and reviewing of plans and capability, "and enhancing our response and recovery to cyber events", they said.

Under the OIA, police totally withheld an assurance review into its use of contractors and consultants.

Read this article:
Police computer systems ill-prepared to cope with ransomware attack - New Zealand Herald

Read More..

Opinion | The Cyber Apocalypse Never Came. Heres What We Got Instead. – POLITICO

What we got was neither the unbridled promise of digital cooperation nor a fiery cyber apocalypse. Instead, todays cyber reality seems simultaneously less scary and more of a hot messa series of more frequent, less consequential attacks that add up not to a massive Hollywood disaster but rather to a vaguer sense of vulnerability. This can make it hard to understand whats going on and how bad it really is. Are all these high-visibility cyber events more of the same, or are we living through a new era of cyber warfare?

In some ways, the events of the past few months arent that surprising given the trajectory of cyber activity over the last decade. Theyre the evolution of a steady, somewhat inevitable shift toward using digital tools as a means of international statecraft and political contestation. However, what we are seeing is also subtly different from the way experts had previously thought cyber would affect the international landscape. Over the last decade, authoritarian governments have embraced digital tools and leaned on shadowy gangs of cyber criminals to do some of their dirty work, while the pandemic has made the world reliant on the internet and created a rich world of targets for those seeking money and leverage. As a result, cyberspace may be less apocalyptic than predicted, and more like a termite infestation, eating at the very foundations of our increasingly digital societies. The good news, though, is that the long-sought international consensus on appropriate uses of cyber means within foreign policy may be finally coming togetherwhich means theres hope that todays cyber disorder may eventually abate.

Its true that Russian cyber espionage, cyber criminals, Chinese intellectual property theft and private actors in cyberspace have been with us for years. Hackers affiliated with the Russian government have long used Ukraine as a testbed for hacks on critical infrastructure and governance and military capabilities, all while the Kremlin looked aside at burgeoning cyber criminal activity. Over the past few years, Xi Jinpings China has also built up its cyber capabilities, embarking on large-scale espionage hacks (like the 2015 Office of Personnel Management data exfiltration) and courting widespread economic sanctions for its illicit efforts to steal intellectual property via cyberspace.

At the same time that Russia and China became more capable and more audacious in their cyber campaigns, non-state actorswho have always played an outsize role in cyberspacewere changing the balance of power in the cyber spyware competition. Companies like the Emirati-based DarkMatter recruited talent from across the globe (including former NSA employees) to develop cutting-edge software that can track targeted users phones, monitor their communications and even geolocate them. These commercially created spyware applications were then provided to governmentsmany authoritarianto track dissidents, journalists and international leaders. Most notably, claims have been made that the assassination of Jamal Khashoggi was linked to spyware that the Israel-based NSO group provided to Saudi security officials, who purportedly used it to monitor Khashoggis movements and influence the investigation after the murder (both the Saudi government and NSO deny their involvement).

So, to an extent, Russian-linked ransomware attacks, the collective callout of China for the Microsoft hack and the revelations about the NSO group are more of the same. But theres also something new going on.

First, the geopolitical context in which cyber battles are fought has changed fundamentally. The early Obama administration was relatively restrained in cyberspace, relying on deterrence, limited sanctions and efforts to establish cyber norms through the United Nations. This approach changed under Trump, whose foreign policy adopted a zero-sum view of the world, characterized by great power competition, trade wars and transactional relationships with allies. Accordingly, the Trump administrations cyber efforts put more focus on defending forwarda more aggressive strategy that emphasizes preemptively entering adversaries networks before they launch cyber attackswhile sidelining efforts to create international consensus on cyber warfare. Meanwhile, the simultaneous rise of personalist regimes across the world ushered in a golden age for digital authoritarianism, with dictators embracing artificial intelligence, disinformation, deep fakes and hack and reveal campaigns to cement their power both domestically and in the fracturing international order.

Add to this digital tinderbox a pandemic that not only drove countries apart (physically and ideologically), but also forced them to become more digitally dependent as they turned to automation, remote work and digital bubbles to protect from the physical threat of Covid-19. As court systems, physicians, classrooms and local governance all went virtual, societies struggling with the pandemic became rich targets for cyber criminals. Ransomware attacks increased exponentially, both in scope and in economic cost.

Pandemic-induced vulnerabilities werent just lucrative cyber targets for criminals. They also created new access points for states looking to add more vulnerabilities to their cyber arsenals. Many of the critical infrastructure companies that went fully digital in response to the pandemic are also potential targets for states like North Korea or Iran that want to coerce the more militarily capable United States. The concern is that these states may use cyber vulnerabilities to attack power supplies, data centers or health and human services as the first salvo in a broader geopolitical crisis. This idea of using cyber attacks against critical infrastructure as signals to deter further escalation has been a major concern for onlookers worried that the uptick in cyber intrusions could not only create economic costs, but inadvertently escalate into violent conflictthus creating exactly the situation these cyber attacks were meant to avoid.

A more competitive geopolitical landscape, the rise of digital authoritarians and Covid-induced vulnerability have helped create a final trend: the blurred line between state and non-state actions in cyberspace. Authoritarian governments have looked aside (sometimes purposefully) as groups of cyber criminals with loose or unclear ties to the state became cyber headliners. North Korea has always used cyber criminal campaigns to generate revenue for the regime. Russia has pursued strategic and willful ignorance about criminal cyber activity originating within its borders, and used cyber criminals as a patsy to avoid retribution for state-sanctioned hacking activities. Even China, which a few years ago made a concerted effort to clamp down on its cyber militia of patriotic hackers, seems to have rediscovered the value of state-sanctioned cyber side hustles. The White Houses recent statement on the Microsoft hack accuses China not just of ignoring cyber criminal activity, but actually contracting such criminals to pursue official foreign policy goals.

Governments are now using cyber criminals the way they use other non-state actorslike maritime militias or un-uniformed special operations forcesto achieve foreign policy objectives without engaging in outright conflict. This murky middle is what international relations scholars call the grey zone. Most directly, states can sanction cyber criminal activity to bring in revenue, use non-affiliated organizations to propagate disinformation, or lean on civilian companies and criminals to create technologies and exploits that states can then buy to use against adversaries. More indirectly, non-state actors can generate chaos, confusion and cost all while introducing enough uncertainty about whos really responsible to dissuade states from retaliating. Scholars have frequently viewed these more shadowy cyber actions as less dangerous than traditional war, but they come with the risk of accidentally pushing too far and escalating into conflict.

So the post-pandemic cyber world has more vulnerabilities, more opportunities for economic and political exploitation, and more actors that blur the line between state and non-state involvement. The convergence of these bad-news trends certainly helps explain the battery of recent cyber headlines. However, there is some reason for optimism. The Biden administrations announcement accusing China of the Microsoft hack noted that an unprecedented group of allies and partners including the European Union, the United Kingdom, and NATO are joining the United States in exposing and criticizing the PRCs malicious cyber activities. This is a remarkable achievement given the difficulty of creating international consensus on what states should and should not do in cyberspace. Outside observers might be surprised to learn just how tough it is for states to agree on something even as basic as what a cyber attack is.

The joint callout of China comes a few months after a UN report signed by 25 countries (including China, Russia, and the US) emphasized the need to prevent cyber attacks on critical infrastructure. While this might seem like an obscure report, it was a diplomatic coup, reflecting a hard-fought, multi-year effort to create consensus among countries about how responsible states should behave in cyberspace. This agreement (and the recent US-NATO-EU statement against Chinese hacking) would not have been possible had pandemic-induced cyber vulnerabilities not galvanized international action. The succession of high-visibility cyber events in recent months, paired with a U.S. administration that is prioritizing cyber threats within its foreign policy, may have provided the impetus for the international community to slowly start agreeing on ways to punish problematic cyber activity.

Cyber attacks on hot dog plants or virtual elementary school classrooms may not look like the dystopian end times Panetta and Clapper warned about. But they insidiously eat away at the foundations of digital economies, societies and, ultimately, state power. Today, with these foundations crumbling, we may not need cyber Pearl Harbor analogies to understand the danger of cyber attacks. But can the U.S. and its now-energized allies build on this momentum to reverse the shifts wrought by authoritarian governments, the pandemic and the rise of non-state cyber criminals? Fingers crossed.

CLARIFICATION: This story has been updated to include a more recent estimate for the number of companies hackers were able to access through the Solarwinds breach.

See the original post here:
Opinion | The Cyber Apocalypse Never Came. Heres What We Got Instead. - POLITICO

Read More..

AU Deals: Get Protected Online Without Breaking The Bank – PCMag AU

While the adage of Common Sense + Windows Defender being a viable strategy for internet security is a pervasive one, the reality is that cyber attacks happen every single day and cause real lasting damage, even to the more technological literate of us.

Even if you personally feel that your internet browsing habits are totally above board, you know what a dodgy link looks like, and you havent had to pirate anything in a long time, there are still risks to consider. If your PC (or Mac) is used by someone other than yourself, those risks increase tenfold.

Right now, you can start up a subscription of Norton AntiVirus Plus for only A$39.99 for the first year (save $30).

Offering more than just virus and threat protection, these days Norton AntiVirus Plus also provides a password manager, a smart firewall between devices, and 2GB of encrypted cloud storage (incredibly useful for sensitive documents and scans, in particular for protecting against ransomware).

AntiVirus Plus is just an entrypoint as well, with Norton 360 Standard, Deluxe and Premium offerings adding a tonne of new features, VPN access and massively expanding that cloud storage up to 250GB.

Check out the options available here and save up to $95 on your first year of Norton protection.

Link:
AU Deals: Get Protected Online Without Breaking The Bank - PCMag AU

Read More..

Our Testimony to Congress on Efforts to Secure Oil and Gas Pipelines Against Cyberattacks (video) – Government Accountability Office

In May, Colonial Pipeline Companyannouncedthat it was the victim of a ransomware attack that led to temporary disruption in the delivery of gasoline and other petroleum products across much of the southeast U.S. This cyberattack exemplifies the cybersecurity threats to critical infrastructure that we at GAO have reported on and testified about for many years.

Yesterday, GAOs Leslie Gordonan acting director in our Homeland Security and Justice Teamtestified before the Senate about steps the federal government has taken to address pipeline security, including since the May attack, and what weaknesses remain.

View video clips from her testimony and read on to learn more:

Weaknesses in TSAs efforts

The Transportation Security Administration (TSA) has primary oversight responsibility for the physical security and cybersecurity of pipeline systems. Prior to the cyberattack in May, TSAs efforts included issuing voluntary security guidelines and performing security reviews of privately owned and operated pipelines.

In 2018 and 2019, we identified some weaknesses in TSAs oversight and guidance, and made recommendations, most of which TSA addressed. TSA clarified its pipeline security guidelines, improved performance monitoring, assessed staffing needs, and updated guidance on federal roles and responsibilities. However, as of June, TSA had not fully addressed 2 key weaknesses:

Weaknesses in government-wide efforts

The attack on Colonial Pipeline highlights the urgent need to address long-standing cybersecurity challenges facing the nation. Most systems and networks used today, including those that are part of our nations critical infrastructure, are interconnected with other systems and the internet, and because of this they are vulnerable to cyberattacks.

The federal government must take immediate steps to prevent, more quickly detect, and mitigate the damage of future cyberattacks. In particular, our testimony yesterday highlighted the need for the government to develop and execute a more comprehensive federal strategy for national cybersecurity and global cyberspace. Since 2010, we have made nearly 3700 recommendations to agencies aimed at remedying cybersecurity shortcomings. As of July 2021, more than 950 of those recommendations are not yet implemented. We will continue to assess and report on critical infrastructure cybersecurity protection.

Read more:
Our Testimony to Congress on Efforts to Secure Oil and Gas Pipelines Against Cyberattacks (video) - Government Accountability Office

Read More..

AI use cases are expanding and evolving in healthcare – Tech Wire Asia

AI use cases are expanding and evolving in healthcare (Photo by STR / AFP) / China OUT (Photo credit should read STR/AFP/Getty Images)

Artificial intelligence (AI) is getting increasingly sophisticated at doing what humans do but more efficiently, more quickly, and at a lower cost.

The potential for AI in healthcare is vast, and PwC estimates the global market for AI healthcare applications will erupt from US$663.8 million in 2014 to US$6.7 billion in 2021. This increased demand correlates with a substantial rise in the complexity and abundance of data.

There are myriaduse cases for AI in the healthcare industry and it is often structured around typical processes that are used in the healthcare industry.

Lets take a look at how AI is helping key stakeholders like hospitals, diagnostic labs, and pharmaceutical companies in various ways.

In an era of technological ubiquity, data fuels innovation.

Data mining is being deployed to find insights and patterns from large databases.

The healthcare industry captures large volumes of patient records and with appropriate analysis of this data. Currently, the sector employs data mining to develop early detection systems by using clinical and diagnosis data.

Using machine learning tools, the healthcare sector can address a plethora of diseases prior to their occurrence.

Tech giants, such as Google and IBM are using AI to unearth patient data which are structured and unstructured. The data is extracted by mining medical records or by deciphering physician-patient interactions (voice and non-voice-based interactions).

According to Minds Field Globals report, AI has expanded substantially in the fields of medical imaging and diagnostics over the past couple of years, thereby enabling medical researchers and doctors to deliver flawless clinical practice.

Paving the way for quantification and standardization, deep learning is aiding in the prevention of errors in diagnostics and improving the test outcome, the report said.

Furthermore, AI is improving the assessment in medical imaging to detect cases such as malignancy and Diabetic Retinopathy (DR). It is also assisting with quantifying blood flow and providing visualization, it added.

The Da Vinci Surgery System was the first surgical robot that was approved by the FDA for general laparoscopic surgery 15 years ago.

Since then, many other surgical robots have been introduced. Including the current generation of robots that are integrating AI in surgery, the next generation will be powered by machine learning.

In the near future, we may witness AI platforms such as DeepMind, IBM Watson, and other advanced AI tools enabling physicians and hospitals to deliver promising surgical interventions.

Currently, IBM Watson has advanced medical cognitive and NLP capabilities to respond to queries by surgeons.

Furthermore, similar AI platforms aid in monitoring blood in real-time, detect physiological response to pain, and provide navigation support in arthroscopy and open surgery.

Inevitably, AI is revolutionizing the way pharmaceutical companies develop medicines. In fact, AI and ML have been playing a critical role in the industry and consumer healthcare business.

The McKinsey Global Institute estimates that AI and machine learning in the pharmaceutical industry could generate nearly US$100 billion annually across the US healthcare system.

From augmented intelligence applications such as disease identification and diagnosis, helping identify patients for clinical trials, drug manufacturing, and predictive forecasting, these technologies have proven critical to the sector.

Top pharmaceutical companies, including Roche, Pfizer, Merck, AstraZeneca, GSK, Sanofi, AbbVie, Bristol-Myers Squibb, and Johnson & Johnson have already collaborated with or acquired AI technologies.

Dashveenjit Kaur| @DashveenjitK

Dashveen writes for Tech Wire Asia and TechHQ, providing research-based commentary on the exciting world of technology in business. Previously, she reported on the ground of Malaysia's fast-paced political arena and stock market.

Go here to read the rest:
AI use cases are expanding and evolving in healthcare - Tech Wire Asia

Read More..

Computer science, environmental health experts at UIC team up to protect US Navy divers with AI | UIC Today – UIC Today

The U.S. Office of Naval Research has awarded University of Illinois Chicago researchers $725,000 to develop an artificial intelligence system that can help protect divers from waterborne bacteria, parasites, and other harmful pathogens and microbes.

Sailors are sent into all kinds of water as part of their service in the U.S. Navy, but they have limited resources to understand in real-time the health risks that may exist when they conduct underwater duties everything from fleet maintenance and repairs to search and rescue and research missions. The most reliable water testing technologies typically rely on lab-based analysis of samples and scientists knowing which microbes to screen. But with dynamic weather, currents, water temperatures, and sewage and pollution factors, the exact condition of water, particularly of coastal water, at a specific time is hard to predict.

By the time a water sample arrives at a lab and is tested, the conditions may have changed, said Dr. Samuel Dorevitch, associate professor of environmental and occupational health sciences at the School of Public Health and co-principal investigator. If Navy divers had real-time information, they could select the best protective equipment, dive duration and take other measures to prevent the various health issues, like heat stress or gastrointestinal, skin, and respiratory infections that may result from microbes in water.

Thats where a new approach using artificial intelligence can make a difference.

Artificial intelligence offers a way to synthesize a vast amount of information quickly for a specific calculation and this technology, if we can bring it to fruition, provides an opportunity for us to improve the tools available to the Navy, said Isabel Cruz, distinguished professor of computer science at the College of Engineering and co-principal investigator.

The researchers hope that they can develop a system that can be used in any location by divers to analyze water conditions through a combination of user-provided and web-based information and human data, such as the age of the divers, their health, and the size of the diving team.

This project is both exciting and challenging because of its multidimensionality, Cruz said. We hope to pull information from many sources that offer different types of data, and we will have to integrate data that are quite complex, heterogeneous, and often without metadata. We will build the artificial intelligence and machine learning methods in stages, and if we can teach our system to reliably and accurately filter and prioritize all these data for risk prediction, I think we will have something remarkable.

If we could provide divers or their commanders with a handheld device or app to evaluate the ever-changing ecosystem of a particular body of water and any potential health risks at the time they enter the water, they would be better able to plan their mission for optimal health and safety, Dorevitch said. For those in the Navy, getting in the water is not optional and anything we can do to aid quick, data-driven decision-making for mitigating health risk is beneficial.

Charlie Catlett, senior research scientist at Discovery Partners Institute, is a co-investigator. The grant, which started May 16, will support this research fortwo years.

Read the rest here:

Computer science, environmental health experts at UIC team up to protect US Navy divers with AI | UIC Today - UIC Today

Read More..

David Haussler ranked 6th among top scientists in computer science – UC Santa Cruz

David Haussler, a distinguished professor of biomolecular engineering in the Baskin School of Engineering and director of the UC Santa Cruz Genomics Institute, is among the top scientists in computer science, ranked sixth in the 2021 Seventh Edition of the Top Scientists Ranking for Computer Science & Electronics.

Hausslers early research in machine learning helped found the field of computational learning theory, and his later work helped revolutionize the field of genomics with the introduction of advanced statistical and algorithmic methods. His genomics work accelerates the understanding of cancer, human development, evolution, neuroscience and many other areas of the life sciences.

Prepared by Guide2Research, one of the leading portals for computer science research, the Top Scientists Ranking is a definitive list of leading scientists from the field of computer science and electronics, based on a detailed examination of more than 6,300 profiles on Google Scholar and DBLP (an online computer science bibliography service). Position in the ranking is based on each scientists influential contributions as measured by their h-index. The h-index quantifies an individual's scientific research output, measuring both productivity and citation impact (how often a scientists publications are cited by other researchers).

Hausslers work lies at the interface of mathematics, computer science, and molecular biology. He develops new statistical and algorithmic methods to explore the molecular function and evolution of the human genome, integrating cross-species comparative and high-throughput genomics data to study gene structure, function, and regulation. He is credited with early insights into the power of artificial neural networks and other machine learning methods, and for pioneering the use of hidden Markov models (HMMs) in genomics.

As a collaborator on the international Human Genome Project, his team posted the first publicly available computational assembly of the human genome sequence on the Internet on July 7, 2000. Following this, his team developed the UCSC Genome Browser, a web-based tool that is used extensively in biomedical research and serves as the platform for several large-scale genomics projects.

A Howard Hughes Medical Institute Investigator, Haussler is a member of the National Academy of Sciences, the National Academy of Engineering, and the American Academy of Arts and Sciences. He has received many awards and honors for his accomplishments, including the 2015 Dan David Prize, the 2011 Weldon Memorial Prize from University of Oxford, and the 2003 ACM Allen Newell Award. Haussler received his PhD in computer science from the University of Colorado at Boulder. He joined the UCSC faculty in 1986.

See the original post:

David Haussler ranked 6th among top scientists in computer science - UC Santa Cruz

Read More..

Computer Science, Environmental Health Experts at UIC Team Up to Protect US Navy Divers with AI – Newswise

Newswise The U.S. Office of Naval Research has awarded University of Illinois Chicago researchers $725,000 to develop an artificial intelligence system that can help protect divers from waterborne bacteria, parasites, and other harmful pathogens and microbes.

Sailors are sent into all kinds of water as part of their service in the U.S. Navy, but they have limited resources to understand in real-time the health risks that may exist when they conduct underwater duties everything from fleet maintenance and repairs to search and rescue and research missions. The most reliable water testing technologies typically rely on lab-based analysis of samples and scientists knowing which microbes to screen. But with dynamic weather, currents, water temperatures, and sewage and pollution factors, the exact condition of water, particularly of coastal water, at a specific time is hard to predict.

By the time a water sample arrives at a lab and is tested, the conditions may have changed, said Dr. Samuel Dorevitch, associate professor of environmental and occupational health sciences at the School of Public Health and co-principal investigator. If Navy divers had real-time information, they could select the best protective equipment, dive duration and take other measures to prevent the various health issues, like heat stress or gastrointestinal, skin, and respiratory infections that may result from microbes in water.

Thats where a new approach using artificial intelligence can make a difference.

Artificial intelligence offers a way to synthesize a vast amount of information quickly for a specific calculation and this technology, if we can bring it to fruition, provides an opportunity for us to improve the tools available to the Navy, said Isabel Cruz, distinguished professor of computer science at the College of Engineering and co-principal investigator.

The researchers hope that they can develop a system that can be used in any location by divers to analyze water conditions through a combination of user-provided and web-based information and human data, such as the age of the divers, their health, and the size of the diving team.

This project is both exciting and challenging because of its multidimensionality, Cruz said. We hope to pull information from many sources that offer different types of data, and we will have to integrate data that are quite complex, heterogeneous, and often without metadata. We will build the artificial intelligence and machine learning methods in stages, and if we can teach our system to reliably and accurately filter and prioritize all these data for risk prediction, I think we will have something remarkable.

If we could provide divers or their commanders with a handheld device or app to evaluate the ever-changing ecosystem of a particular body of water and any potential health risks at the time they enter the water, they would be better able to plan their mission for optimal health and safety, Dorevitch said. For those in the Navy, getting in the water is not optional and anything we can do to aid quick, data-driven decision-making for mitigating health risk is beneficial.

Charlie Catlett, senior research scientist at Discovery Partners Institute, is a co-investigator. The grant, which started May 16, will support this research fortwo years.

See the rest here:

Computer Science, Environmental Health Experts at UIC Team Up to Protect US Navy Divers with AI - Newswise

Read More..

Iowa State part of U.S. National Science Foundation newly established artificial intelligence research institute on cyberinfrastructure – College of…

ISU Professor Hongwei Zhang is leading the edge wireless component of the ICICLE project. (Christopher Gannon/Iowa State University)

The U.S. National Science Foundation (NSF) announced the establishment of 11 new NSF National Artificial Intelligence Research Institutes including one led by Iowa State University building on the first round of seven institutes funded in 2020. The combined investment of $220 million expands the reach of those institutes to include a total of 40 states and the District of Columbia.

One of the 11 institutes, called the AI Institute for Intelligent Cyberinfrastructure with Computational Learning in the Environment (ICICLE), is led by The Ohio State University, with Iowa State Professor Hongwei Zhang of the Department of Electrical and Computer Engineering leading the edge wireless component of that project.

ICICLE will build the next generation of cyberinfrastructure that will make AI easy for scientists to use and promote its further democratization. It will transform the AI landscape of today by bringing in scientists from multidisciplinary backgrounds to create a robust, trustworthy and transparent national cyberinfrastructure that is ready to plug-and-play in areas of societal importance, such as smart foodsheds, precision agriculture and animal ecology. The institute will develop a new generation of the workforce, with sustained diversity and inclusion at all levels. This institute is fully funded by NSF.

Dhabaleswar K. Panda, professor of computer science and engineering at Ohio State, is the principal investigator for ICICLE, leading a core team of 46 academic researchers and staff scientists from 13 organizations, including Zhang from ISU. The institute will build the next generation of cyberinfrastructure with a goal of making AI data and infrastructure more accessible to the larger society.

The Ohio State ICICLE team will work in collaboration with the Ohio Supercomputer Center, Case Western Reserve University, Iowa State University, Indiana University, University of Wisconsin-Madison, University of Texas-Austin/Texas Advanced Computing Center, University of Utah, University of Delaware, University of California, San Diego/San Diego Supercomputer Center, University of California, Davis, Rensselaer Polytechnic Institute and IC-FOODS.

More information about ICICLE can be found at https://icicle.ai.

Learn more about theNSF AI Institutes by visitingnsf.gov.

View original post here:

Iowa State part of U.S. National Science Foundation newly established artificial intelligence research institute on cyberinfrastructure - College of...

Read More..

College majors with the greatest gender disparities | Personal-finance | tulsaworld.com – Tulsa World

Gender disparities persist in college majors, then trickle down to careers, whether in computer science and electrical engineering, or nursing and teaching. Some progress has been made in encouraging more women to enter male-dominated fields and to close gaps in wages. Computer programming is one example where the wage gap has shrunk since 2016. But in other cases, inequities persist: 50% of women leave tech jobs by the time they are 35 years old.

As for the reverse, women continue to dominate in careers such as nursing or teaching, but often men in those fields earn more than women. Women in government public health jobs make $3,000 less than men in the same positions, or men in special education jobs out earn women by $2,400.

StudySoupcompiled data from theNational Center for Education Statistics to identify 15 college majors with the greatest gender disparities. The data is submitted by all U.S. colleges participating in the Title IV federal financial aid program, with 201718 being the most recent year available. StudySoup removed majors with less than 5,000 students, leaving just over 1,000 disciplines in the dataset.

StudySoup recognizes the data collected views gender through a binary lens, which does not accurately represent all gender identities. A recent study estimates about 1.2 million adults in the U.S. identify as nonbinary, a population not explored in the collected data set.

Read the original here:

College majors with the greatest gender disparities | Personal-finance | tulsaworld.com - Tulsa World

Read More..