0% found this document useful (0 votes)
236 views18 pages

Digital Technologies Presentation

The document discusses emerging digital technologies including the Internet of Things (IoT), artificial intelligence (AI), and cybersecurity. It defines each technology and explores opportunities, threats, and applications in the non-profit sector. Specifically, IoT allows for collection and transmission of data from connected devices to optimize operations and user experience. AI can augment human capabilities and drive innovation. However, both technologies also present privacy, security, and bias concerns. Cybersecurity is increasingly important to address vulnerabilities from new technologies and attacks. The document outlines applying these technologies in non-profits for tasks like monitoring projects, fundraising, and supporting UN Sustainable Development Goals.

Uploaded by

tosin.chukwuma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
236 views18 pages

Digital Technologies Presentation

The document discusses emerging digital technologies including the Internet of Things (IoT), artificial intelligence (AI), and cybersecurity. It defines each technology and explores opportunities, threats, and applications in the non-profit sector. Specifically, IoT allows for collection and transmission of data from connected devices to optimize operations and user experience. AI can augment human capabilities and drive innovation. However, both technologies also present privacy, security, and bias concerns. Cybersecurity is increasingly important to address vulnerabilities from new technologies and attacks. The document outlines applying these technologies in non-profits for tasks like monitoring projects, fundraising, and supporting UN Sustainable Development Goals.

Uploaded by

tosin.chukwuma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

DIGITAL TECHNOLOGIES

REPORT
Internet of Things (IoT) . Artificial Intelligence(AI) . Cybersecurity
Definitions, Opportunities, Threats, and Applications in the non-profit sector
AGENDA

- INTRODUCTION

- IOT

Opportunities, Threats, Applications.

- AI
Opportunities, Threats, Applications.

- CYBERSECURITY

Opportunities, Threats, Applications.

- CONCLUSION 2
INTRODUCTION
- Technology is advancing rapidly

- IoT and AI are two emerging technologies with growing adoption

- Technological developments lead to increased vulnerability


thereby making cybersecurity an area of growing importance

- IoT, AI and Cybersecurity have applications across industries


including the non-profit sector

3
INTERNET OF THINGS (IOT)

What is IoT?
- Collection of devices and objects that can collect data, connect
to the internet, transmit data, receive commands, and execute
them

- Expansion of the capabilities of everyday devices and objects,


applying computing and communication capabilities

- Underlying technology behind the emergence of smart devices


like smart TVs, smartphones, smart cars, smart watches, etc

- Actions can be triggered with or without human intervention

4
IOT - OPPORTUNITIES
MULTIPLE AREAS OF ADOPTION
• IoT is applied in manufacturing, real estate, healthcare, automobile industries and the list is growing

• Computers are becoming faster, cheaper, smaller and more powerful

• More companies will look to benefit from this technology

IMPROVED USER EXPERIENCE


• It helps people save time and energy and makes life easier

• People will seek to use them to achieve a more convenient way of living

BUSINESS OPTIMIZATION & INCREASED PROFITABILITY


• Businesses exist to make a profit. IoT solutions will be sought to streamline operations, increase efficiency, reduce cost and
increase profit
ENVIRONMENT & SUSTAINABILITY BENEFITS
• It helps minimize the impact of industries on with environment. IoT solutions will be sought by companies
looking to improve the triple bottom line 5
IOT THREATS

INTEROPERABILITY POSSIBILITY OF FAILURE SECURITY


There is limited interoperability and They can do a lot of harm if they become Increased vulnerability and new range of
standardization. faulty or fail in their operations issues arise with use of IoT devices

LACK OF INFRASTRUCTURE ENVIRONMENTAL CONCERNS DATA PRIVACY


Developing countries may not enjoy the Increased use may have associated Large volumes of data are being
benefits due to lack of underlying impact on the environment. The devices transmitted and stored. Data privacy
infrastructure use batteries which cause concerns may limit its adoption
environmental concerns

6
IOT - APPLICATIONS

IDENTIFYING VULNERABLE MONITORING PROJECT


COMMUNITIES OUTCOMES DONOR SOURCING
Gathering data about vulnerable Providing real-time monitoring and Digital screens can raise awareness
communities and areas that need evaluation of programme about causes and collect donations
intervention effectiveness.

RESOURCE MANAGEMENT SUPPLY CHAIN


SUPPORTING SDGS AND CSR
OPTIMIZATION
Efficient use of resources within Monitor and track relief materials Monitor key metrics and achieve 7

office buildings greater accountability with regards


to environmental impace
ARTIFICIAL INTELLIGENCE

• Simulating human-like intelligence

• Programming machines to think, make decisions and behave like humans

• ChatGPT, Siri and Alexa are popular applications of Artificial intelligence

8
ARTIFICIAL INTELLIGENCE - OPPORTUNITIES

AUGMENTING HUMAN DRIVING INNOVATION ACROSS


CAPACITY INDUSTRIES RISK REDUCTION
AI helps humans achieve more with a It as the potential to drive innovation. Its Used in high risk situations to deliver
higher level of efficiency used in healthcare, automobile industry, solutions while protecting humans
marketing, education, etc

BETTER DECISIONS INCREASE ACCESSIBILITY USED IN CYBERSECURITY


Used to gather insights the contribute to Used by people with disabilities to Can be used to address the advanced
better decision-making achieve greater independence and sophisticated cyber crime

9
ARTIFICIAL INTELLIGENCE - THREATS
PRIVACY & LACK OF REGULATION
• Regulation is limited. Data privacy is an area of concern

POTENTIAL FOR BIAS


- There is room for bias based on the data provided to train the system

FAILURE AND ERROR GENERATION


• AI is not fail-proof. It has also been responsible for incorrect output or mis-information

LIABILITY ISSUES
• There is no clear legislation on who becomes liable when something goes wrong

POTENTIAL TO BECOME DESTRUCTIVE


10
• There are concerns regarding the potential of AI to go out of control and become destructive
ARTIFICIAL INTELLIGENCE - APPLICATIONS

CHATBOTS MEETING MANAGEMENT RAISING FUNDS


Increase engagement with website Recording meeting audio and Analyzing donor behavior and
visitors, gather insights to improve transcribing meeting minutes making recommendations on how to
initiatives like fundrasing improve fundraising

SOCIAL MEDIA MONITORING DATA ANALYSIS/ DECISION VIRTUAL ASSISTANTS


SUPPORT
Identifying threats, and Summarizing large volumes of data Supporting administrative tasks like
11
opportunities on social media and delivering insights for better scheduling meetings and managing

decision making. appointments


CYBERSECURITY

• The branch of Computer Science that performs activities and takes


measures to secure data, computer networks, and other IT components
• It maintains the security, availability, and integrity of data, networks,
and devices
• It is an area of growing importance with the increased use of technology
and adoption of emerging technologies
CYBERSECURITY - OPPORTUNITIES

Growing Need for Security Job Opportunities Use of AI in Cybersecurity

- Data breaches cost businesses millions. - Cybersecurity specialists are in high - AI is being applied to augment the
demand effectiveness of Cybersecurity solutions
- Businesses understand the need to
invest in security

13
CYBERSECURITY- THREATS
INCREASED LEVEL OF VULNERABILITY
• Emerging technologies and increased interconnectedness creates heightened levels of vulnerability

LABOR SHORTAGE
- There is a lack of cybersecurity specialists

NEW TECHNIQUES AND INCREASE SOPHISTICATION OF ATTACKS


• Machine learning is being applied to improve social engineering and phishing attacks

GOVERNMENT INVOLVEMENT
• Government and large industries make use of attacks for political gain and corporate espionage
14
CYBERSECURITY- APPLICATIONS

NETWORK SECURITY IDENTITY MANAGEMENT

Firewalls, antivirus, other software and Use of username, password, two-factor


techniques can be used to protect the authentication and role assignment
network from intruders

PHYSICAL SECURITY DEVICES DATA PROTECTION

Alarms, locks, biometric-operated access Ensuring the integrity and safety of


control systems, surveillance systems sensitive data e.g. donor data, financial
15
transactions, etc.
CONCLUSION
- Technologies like IoT and AI are becoming more popular.
- IoT is the collection of devices equipped with computing and communication capabilities
- AI simulates human-like intelligence using machines
- These technologies and the increasing levels of interconnectedness leads to greater vulnerability of
data, networks and technology components
- Cybersecurity is the area of computer science that addresses security concerns
- Although AI, IoT and cybersecurity have associated threats, they have huge potential to deliver
benefits to individuals, businesses, and a wide range of stakeholders

16
REFERENCES
Aiyer, B., Caso, J. Russell, P. & Sorel, M. (2022). New Survey revals $2 trillion market opportunity focybersecurity technology and service providers. McKinsey & Company. https://www.mckinsey.com/capabilities/risk-and-resilience/our-
insights/cybersecurity/new-survey-reveals-2-trillion-dollar-market-opportunity-for-cybersecurity-technology-and-service-providers#/

Burges, J. P. (2010). The Routledge Handbook of New Security Studies. Routledge. https://books.google.ca/books?id=VG2MAgAAQBAJ&dq=what+is+cyber+security&lr=

Burroughs, A. (2018). How Nonprofits Can Take Advantage of the Internet of Things. https://biztechmagazine.com/article/2018/11/how-nonprofits-can-take-advantage-internet-things

Cerf, V. G. (2015). Prospects for the Internet of Things.XRDS: Crossroads, The ACM Magazone for Students (XTDS), Volume 22, Issue 2. Vinter 2015 pp 28-31. https://doi-org.ezproxy.myucwest.ca/10.1145/2845145

Dahlqvist, F., Patel, M., Rajko, A. & Shulman, J. (2019). Growng opportunities in the Internet of Things, McKinsey & Company, July 22 2019. https://www.mckinsey.com/industries/private-equity-and-principal-investors/our-insights/growing-
opportunities-in-the-internet-of-things

Dash, B., Ansari, M. F., Pawankumar, S. & Azad, A. (2022). Threats and Opportunities with AI-Based Cyber Security Intrusion Detection: A Review (September 2022). International Journal of Software Engineering & Applications (IJSEA), Vol.13, No.5,
September 2022, Available at SSRN: https://ssrn.com/abstract=4323258

E2b Teknologies. (2023). Unlocking the Power of AI: How Non-Profits Lead in ad Digital Era. https://e2btek.com/unlocking-the-power-of-ai-how-non-profits-lead-in-a-digital-era/

Edureka, 2019. What is Artificial Intelligence? Artificial Intelligence (AI) in 10 Minures. Youtube. https://www.youtube.com/watch?v=oV74Najm6Nc

Harit, A., Ezzati, A. and Elharti, R. (2017). Internet of things security: challenges and perspectives. In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (ICC '17). Association for Computing Machinery,
New York, NY, USA, Article 167, 1–8. https://doi-org.ezproxy.myucwest.ca/10.1145/3018896.3056784

IBM. (n.d.). what is Cybersecurity? https://www.ibm.com/topics/cybersecurity

Littman M. L., Ajunwa, I., Berger, G., Boutilier, C., Currie, M., Doshi-Velez, F., Hadfield, G., Horowitz, M. C., Isbell, C., Kitano, H., Levy, K., Lyons, T. Mitchell, M., Shah, J., Sloman, S., Vallor, S. & Walsh, T. (2021). Gathering Strength, Gathering Storms: The
One Hundred Year Study on Artificial Intelligence (AI100) 2021 Study Panel Report. Stanford University, Stanford, CA, September 2021. Doc: http://ai100.stanford.edu/2021-report

Moore, M. 2023. Top Cybersecurity Threats in 2023. University of Sandiego. https://onlinedegrees.sandiego.edu/top-cyber-security-threats/

Narasimman, P. 2023) Top 10 Important Applications of Cybersecurity in 2023. https://www.knowledgehut.com/blog/security/applications-of-cyber-security

Perez, C. (2023). The Top Growth Opportunities for IoT in 2023.Frost & Sullivan. https://www.frost.com/frost-perspectives/the-top-growth-opportunities-for-iot-in-2023/

Riad A. Ajami & Homa A. Karimi (2023) Artificial Intelligence: Opportunities and Challenges, Journal of Asia-Pacific Business, 24:2, 73-75, DOI: 10.1080/10599231.2023.2210239

Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The internet society (ISOC), 80, 1-50.

Royal Society. (2017). The Internet of Things: Opportunities and threats, Conference Report. Breakthrough Science and technologies Transforming our future. https://royalsociety.org/~/media/events/2017/10/tof-iot/iot-conference%20report-
final.pdf

Tele2. (n.d.). The Connected Donor: How IoT Enables Charities. https://tele2iot.com/article/the-connected-donor-how-iot-enables-charities/

Viniak, V. (2023). How IoT helps environmental, social and governance goals. https://www.techtarget.com/iotagenda/post/How-IoT-helps-environmental-social-and-governance-goals

Xu, J., Gu, B., Tian, G. (2022). Review of agricultural IoT technology, Artificial Intelligence in Agriculture, Volume 6, 2022, Pages 10-22, ISSN 2589-7217,
https://doi.org/10.1016/j.aiia.2022.01.001.(https://www.sciencedirect.com/science/article/pii/S2589721722000010) 17
THANK YOU

18

You might also like