10 Reasons Why Communities Ditch Their Existing Residential System


The adoption of smart community system for a neighbourhood is fast becoming a trend in recent years as the system could easily ease management, achieve automation and enhance security, all simultaneously. The objectives are clear, and the motive is good, but the end results may vary. This is due to the fact that a neighbourhood is a non-profit entity in which the management of it is normally far more complicated than a business entity. Hence, the process of choosing a system also would be far more complex, and the process turnout could be far less efficient when compared to a business entity’s and could result in more regretful outcomes.
We have compiled a list of 10 common reasons that lead to the changing of a system in a neighbourhood. And, because of the complexity of a neighbourhood, instead of upgrading, surprisingly some may actually end up downgrading their system.


1.   Change of Committee Members
JMB or MC is a regulated and most powerful body to run a neighbourhood. Committee members are elected yearly amongst the unit owners, and the change of new committee members often led to a change in a system, management company, and security company for whatever reasons furnished.


2.   Appointment of New Management Company
When a new management company is appointed, more often than not, they would suggest the neighbourhood to adopt a new system that they are familiar with and in turn, they would gather support from the committee members to agree to the idea of switching to the system they proposed.


3.   Holes in Data Security
Holes in data security has often been overlooked by neighbourhoods where they may take a relaxed approach on PDPA compliance without asking for a more stringent and costly ISO 27001 certification, third-party Penetration Test, or EU’s GDPR compliance that not easy to achieve.  When a neighbourhood realizes that these basics have to be taken care of out of all the features, they would start to regret.


4.   Vendor Promised an Apple, but an Orange was Delivered
A smart community is a complex system; quite often vendors overpromised features that they couldn’t deliver. As an example, a vendor could promise a cloud patrolling system with attendance feature to monitor the guards’ performance and enhance the security as part of the smart community system but instead they deliver a so-called cloud system that is actually a conventional one, or worse still, they did not deliver the promises at all.


5.    Features Pending Delivery
Neighbourhoods may find some smart community systems that come along with a list of features available, but unfortunately, some of those features are not functioning as expected and some might not be even finalized and ready to use. For example, a visitor management feature that can’t read text from a driving license, or can’t automate barrier gate, or can’t leave a visitation remark, or can’t send a snapshot of car plate number or visitor photo to inform resident. Or worse, when they engage with a smart community system with a feature checklist that is short and shy.


6.   Software only, without IoT Capabilities
Most of the smart community systems are developed by software experts without any knowledge of hardware integration. Hence, the system developed lacks IoT device capabilities.  Whereas, it is a common knowledge that smart community without a full fledge of IoT hardware capabilities can no longer be categorized as a smart community system because the integration with IoT access control devices at the barrier gates, lobby doors, elevators, and the integration with smart home devices, surveillance system and etc. has becoming a de facto in the smart community system to bring better automation and security to a neighbourhood.


7.    No Integration of Smart Community System with Accounting System
Naturally, a smart community system should have an accounting system component in it to benefit the whole neighbourhood. With this accounting system, unit owners can check their bills and balances, as well as pay up their maintenance fees easily. The system also must have the capacity to auto update the payment information and issue an official receipt automatically in real time. If a smart community system can’t seamlessly integrate an accounting system into it, the system is far from complete, and it feels like you are losing an arm.


8.   Low System Engagement Rate
A neighbourhood unlike a business entity, its residents have the rights to not use the community App for plenty of founded or unfounded reasons like a privacy issue. When a neighbourhood finds low system engagement, the value of the subscription depletes significantly, which makes renewal irrelevant.


9.   System Problem that takes Vendor Forever to Solve
When a system problem occurs in a neighbourhood and it is not tackled in time, and when the vendor is taking its own sweet time to solve, be it system errors or bugs, it could be quite a frustration to handle. Worse still, if the system deployed does not equip with a service level agreement to entitle a neighbourhood to claim from the vendor.


10.   No smart system is an Island
The wholesomeness of a smart community stretches upwardly to integrate with a government-led smart city system, and O2O Apps and surrounding merchants and downwardly to integrate with the individual smart home system. The benefits? Plenty. For example, for an individual household that has a smart alarm system installed, if the system is integrated with a smart system at the guardhouse or a smart patrol system, when an emergency happens, help could be sent instantly.


Most of the above-mentioned reasons that led to the intention to change and actually changing a system are valid and healthy. Only the first and second point, if their reasons for change are disputable without solid supporting reasons like reason no 3 to 10, this might cause a downgrade of a system rather than an upgrade.

Upgrading of old software to a new one could mean forking out fresh thousands of dollars, and it is a vast commitment especially for neighbourhoods, a non-profit organization. Neighbourhood’s management needs to be more frugal when it comes to spending. Besides, smart community system normally involves all residents, management, or even outsiders like merchants and visitors and etc. Therefore, all parties would be affected, unless a smart community system proposed does not possess comprehensive features and it involves only a small group of people with small engagement rate. Hence, a proper budgeting and migration plan has to be well in place before taking on a bold action to change.  Even so, when the reasons are valid, an upgrade is inevitable for a better and safer neighbourhood for all.

Write to us at info@i-neighbour.com to find out how our conversion plan makes everything easy for you. And the best part is, migration is easy like a walk in the park, cost of conversion is almost zero, and maintenance of new system’s subscription is less than what you already paid for in your current system.


Teh Hon Seng, Group CEO of TimeTec Group of Companies. Prior to forming TimeTec, Teh led PUC Founder (MSC) Bhd to be listed on MESDAQ (ACE) market of Bursa Malaysia in 2002. Teh initiated the R&D in fingerprint technology in 2000, which later developed into a renowned global brand for commercial fingerprint product known as FingerTec. In 2008, he foresaw the trend of cloud computing and mobile technology, and over the years, he had strategically diversified and transformed its biometric-focused products into a suite of cloud solutions that aimed at workforce management and security industries including smart communities that centered around the cloud ecosystem. Teh has more than 10 patents to his name, and he is also a columnist in a local newspaper and a writer of several books.

A Smart Way To Monitor Environmental Threats In Urban Areas Through State-Of-The-Art Sensing Technologies



As the world is moving forward and becoming more advanced in lifestyle and technology, the Earth continues to deteriorate due to various factors that are causing threats to the overall environment and impacting on human lives in general. Earth Day 2018 highlighted the most pressing environmental concerns such as Ocean and Plastics, Rising Seas, Extreme Weather, Famine, Water Supply and many more. Out of the numerous environmental issues, there are four which have a direct impact on our residential environment, namely Climate Change, Air /Water Pollution, Floods and Landslides.

Today, more than half of the world’s population lives in urban areas due to jobs availability and wealth, and it is projected that urban population will increase to 70% by 2050. Influx of population into the urban area exacerbates the availability and quality of air and water, creates waste-disposal problems, and causes high energy consumption.

The environment is another important factor in determining the quality of life and health of urban dwellers. A good quality urban environment will surely make it more attractive and healthier for people to live, work and prosper. On the other hand, the degradation of the environment through air pollution, poor road traffic, floods and climate change, may have negative impacts on the human health and their well being.

This article will go into detail on each of the four environmental threats for better understanding and suggest a way on how smart technology can be utilized to better monitor these threats for the benefit of the larger community.


Climate Change Is On The Upward Trend


Based on the report “Global Risks 2018: Fractures, Fears and Failures” by the World Economic Forum, emissions of carbon dioxide (CO2) had risen for the first time in four years, bringing atmospheric concentrations of CO2 to 403 parts per million, compared with a pre-industrial baseline of 280 parts per million. The increase in the world’s CO2 concentrations in the future is almost certain, thus this issue has been gaining attention as one of the major environmental threats. Having absorbed 93% of the increase in global temperatures between 1971 and 2010, the world’s oceans continue to get warmer and studies suggest that their capacity to absorb CO2 may be declining. Research also suggests that tropical forests are now releasing rather than absorbing the carbon dioxide.

This claim is backed up by NASA, which has also confirmed that the amount of carbon dioxide levels in the atmosphere have increased "from 280 parts per million to 400 parts per million in the last 150 years", due to burning fossil fuels, intensive agriculture, and other human activities. This has resulted in an increase of global temperatures by one degree Celsius over pre-industrial levels. Besides the increased in extreme weathers, according to NASA, this rise in temperature also has raised the sea levels by 1-4 feet since 2010 thus causing Arctic ice caps to shrink, and increased growing season.

Global warming is the increase of Earth’s average surface temperature due to the emission of greenhouse gases such as carbon dioxide from burning fossil fuels or from deforestation, which subsequently trap heat that would otherwise escape from the Earth. The following graph illustrates the change in global surface temperature relative to 1951-1980 average temperatures. The year 2016 marks as the warmest on record and the year 2017 is ranked as the second warmest since 1880, according to an analysis by NASA (NOAA Global Climate Report, 2018).

Global average surface temperature data from the NASA Goddard Institute for Space Studies (2017)


Heat waves and warming temperatures pose a serious threat for human settlements worldwide, especially in urban environments.

This is because modern cities are densely packed with buildings, and they lack green space and vegetation, which in turn limits shading and evapotranspiration. Research shows that the increase in temperature or heat burden may cause heat-related illness such as heat stroke, heat syncope, heat exhaustion, and heat cramps. For every 1 °F (0.6 °C) increase in heat wave intensity, there is a 2.49% increase in the risk of death. Furthermore, every one-day increase in heat wave duration results in a 0.38% increase in mortality risk (Anderson & Bell, 2011).


Air And Water Pollution Threat Is Worse In Urban Areas


Both short and long-term exposure to ambient air pollution can lead to reduced lung functions, respiratory infections and aggravated asthma. According to reports from the World Health Organization (WHO), air pollution is the cause of over 34% of deaths from stroke, lung cancer, and chronic respiratory disease, and 27% of deaths from ischaemic heart disease. The combined effects of ambient (outdoor) and household air pollution cause about 6.5 million premature deaths every year.  Air quality is particularly bad in cities, and this situation is going to get worse as more people move into cities.

Today, an estimated 92% of the world’s population lives in areas where air pollution exceeds WHO safety limits.

Pollutants with the strongest evidence for public health concerns are particulate matter (PM), ozone (O3), and nitrogen dioxide (NO2). The health risks associated with particulate matter of less than 10 and 2.5 microns in diameter (PM10 and PM2.5) is especially well documented. PM is capable of penetrating deep into lung passageways and entering the bloodstream causing cardiovascular, cerebrovascular and respiratory impacts. In 2013, PM was classified as a cause of lung cancer by WHO’s International Agency for Research on Cancer (IARC). It is also the most widely used indicator to assess the health effects from exposure to ambient air pollution (WHO, 2016).


World Air Pollution Map by WHO (2016)


Urban populations are also exposed to water quality problems. The non-point source pollution picks up pollutants such as excess nutrients from fertilized lawns, heavy metals and petroleum hydrocarbons from our cars, and fecal coliform bacteria from our pets and septic systems which can cause serious health risks.  The immediate concerns center on bacterias and viruses which can affect health level resulting in diarrhea, fever, severe cramping and vomiting. Long-term effects of polluted water result in an overall decline in ecosystem function, which results in the continued decline in terms of water quality, aquatic habitat as well as increased health risks. 


Floods Risk Is Real For Urbanites


As this article is being written, Western Japan is being hit by 3 times its normal annual torrential rainfall. The floods have caused more than 100 dead and 58 missing in Okayama Japan. Floods are indeed one of the greatest environmental threats that can affect millions of people, around the world. A flash flood, which can develop in less than a few hours, is primarily caused by heavy rainfall and thunderstorms. Extensive rainfall over a long period of time will also lead to flooding of geomorphic low-lying areas.

Floods often cause damage to homes and properties, potential loss of lives, and deterioration of health conditions owing to waterborne diseases.

Today, weather forecast mostly relies on weather satellites that collect observations globally. While weather forecasts are getting better with more advanced prediction algorithms, we need higher spatial resolution rainfall data in order to measure exactly the amount of precipitation in a specific area. This is because the rainfall and soil characteristics could be very different from place to place. By observing a long-term temporal dataset, it is possible to develop a nationwide framework for flood forecasting (Chang, et. al., 2014; Selvanathan et. al., 2018).


Flooded Residential Areas near Lake Houston following Hurricane Harvey (2017) 
[Photo by Win McNamee/Getty Images]


For urban dwellers, the risk of having Pluvial (Surface Water) Flooding where flooding occurs when an extremely heavy downpour of rain saturates drainage systems and the excess water cannot be absorbed, is high. Based on “Pluvial (rain-related) Flooding in Urban Areas: the Invisible Hazard”, pluvial floods have recently been identified as the type most likely to increase in severity as a result of climate change. They are also the most difficult to manage because they are difficult to predict and it is challenging to provide adequate warning times to the affected population.

As Urban Development Continues, The Risk Of Landslides Increase

Every year, over one million people are exposed to landslide hazards around the world.

Due to the recent climate change, it is likely that the decrease of permafrost areas; changes in precipitation patterns and increase of extreme weather events will influence the weather-related mass movement activities. Moreover, the spread of urban settlements and transportation networks into landslide prone hilly areas is increasing the potential occurrence of landslides, land subsidence and slope failures.


Landslide hits the residential areas in Nova Friburgo, 130 km north of Rio de Janeiro, Brazil (2011)


In order to develop an effective early warning system for landslides, it is important
to perform a comprehensive assessment about the mechanisms of the landslide, including continuous monitoring of the slope stability, surface runoff, intra ground movement, underground water, and rainfall. The monitoring system may consist of a variety of sensors such as in-place inclinometer, multiple strain gauge, piezometer, tiltmeter, rain gauge, infrared camera, Global Navigation Satellite System (GNSS), LIDAR system and Ground Based Synthetic Aperture Radar (GBSAR) (Koo et. al., 2015, Zhao et. al., 2018).


Tapping On Smart Technology In Mitigating Environmental Threats In Residential Areas.

For residential communities, it is important to understand the quality of our residential environment in order to protect our families, assets and our entire community. The responsibility shouldn’t be placed on the shoulders of the authorities; as a member of a community, we have a part to play in monitoring the environment that we are living in to enable us to mitigate the risks as they come.

Having sufficient knowledge about our environment gives the community the power it needs to forward any issues to the authorities for remedial actions.

On 11st December 1993, Block One of the Highland Towers in the state of Selangor Malaysia collapsed, killing the life of 48 individuals and causing two other residential blocks to be evacuated for safety reasons. The cause of the catastrophe was a major landslide in Taman Hillview, Ulu Klang Selangor. Nobody expected the tragedy to happen, as everybody was minding their own business as usual on that day, even though the area had been receiving heavy rainfall for 10 continuous days.

That fated condominium was just erected for almost 2 years when the accident happened. Bukit Antarabangsa Development Project commenced the construction of the Highland Towers in 1991, and the construction had exposed the area’s soil to land erosion, the leading factor of the landslides. The water flow had not been managed properly and it had caused pipes burst at several locations on the hill, leading the surrounding soil to absorb the excessive water, and turning the soil into mud. By the end of November 1993, the hill slope had been saturated with water, and the water was even seen flowing down the hill slopes as well as the constructed retaining walls. Highland Tower tragedy was not the first case of landslides that have caused deaths and endangered human lives in residential areas, and it certainly would not be the last if the community who lives near hill slopes do not do anything about it, or leave the matter in the hands of the authority entirely.

From 1993-2011, around 28 major landslides were reported in Malaysia with a total loss of more than 100 lives. Moreover, from 1973-2007, the total economic loss due to landslides in Malaysia was estimated about US $1 billion.



The Block One of the Highland Towers Collapsed due to Massive Landslides


Apart from landslides, floods is another environmental threat that could endanger the lives and properties of residential communities. Floods tie to climate change as  the warmer the Earth gets, the more water it absorbs, which could result in heavier rains. For example, in Bandar Baru Ayer Itam, Pulau Pinang, Malaysia, an area consisting of 10,000 housing units, has been the scene of floods for the last two to three years. The failure of the retention ponds in two areas had led to the floods in these residential areas. Floods in Pulau Pinang also had caused a deadly landslide in  Tanjung Bungah that claimed the lives of 11 workers. Therefore, residential areas particularly at the hilltop or hillside need to find a way to monitor these threats in order to stay safe.

The first step for the community to do is to know the area that needs to be monitored through a set of environmental indicators.

Environmental indicators are simple measures in the form of numerical values that track the state of the environment over a period of time. Environmental indicators can be measured and reported at different scales. For example, a city may track the air quality along with the water quality and count the number of rare species of birds to estimate the health of the environment within their area. In another scenario, people living in hilly residential areas may track the variations in rainfall patterns and its impact on the slope stability and soil erosion.

A community can kickstart the monitoring of an environment with a set of environmental sensors installed at the appropriate site location for continuous data collection.

Environmental Services which a community can consider include:

1.   Air Quality Monitoring
2.   Scanning of Environment Service
3.   Environmental Risk Assessment Service


Overview of Intelligent Environmental Sensing Solution


For Air Quality Monitoring, the environmental data which can be collected include air quality indicators (PM10, PM2.5, O3 and NO2) and weather-related indicators (ambient temperature, humidity, and rainfall). The spatial and temporal environmental data collected at the cloud server will then be fused and processed by an AI-based (artificial intelligent) data analytics engine. For example, in the case of air quality assessment, the air quality indicators (PM10, PM2.5, O3 and NO2) are treated as a spatiotemporal process and a deep learning algorithm is used to construct a space-time prediction framework. Traditional linear-model methods such as autoregressive moving average (ARMA) method is not suitable for air quality prediction, because the air quality process is inherently nonlinear and its temporal trends and spatial distributions are greatly affected by various factors, such as air pollutant emissions and deposition, weather conditions and traffic flow. As compared to the traditional methods, the deep learning-based method uses multiple-layer architecture to extract nonlinear spatiotemporal air quality features, thus it has superior performance for air quality prediction.

Air Quality Prediction based on Deep Learning


These days, this kind of  data can be acquired on an hourly basis and sent to a cloud server in real-time for accurate monitoring. A community can install a weather station that consists of a few sensors enclosed by an industrial-grade chassis for outdoor operation. Sensors available in a Weather Station include Rain Gauge, Temperature & Humidity Sensor, Particle Sensor, and Ozone & Nitrogen Dioxide Sensor, which could produce traces of gases in the environment such as Hydrogen Sulfide, Chlorine, n-Heptane and etc. This Weather Station is not only affordable but the deployment has also been made easy for a community to initiate.

A Sample of Weather Monitoring Station



Air Quality Station


On top of monitoring the air quality, the community or developer can also engage with a service to scan the topography of the surrounding area to produce high-resolution geological map of their neighbourhood for better understanding of the surrounding area.  These collection data could be updated from time to time, or on a demand basis during/after an emergency incidence and it could also be uploaded to the cloud server for further processing.

Multiple photos of the ground can be taken as the drone flies along a flight path. These photos will then be processed to generate point clouds, digital elevation models (DEMs) and 3D terrain models. Detection and classification of the risk of the slope or structural instability is accomplished by using a machine-learning algorithm based on a deep auto-encoder network with multiple hidden layers. The results are integrated with measurements from rain gauges to produce a landslide susceptibility map. Since the majority of landslides are induced by heavy rainfall, it is thus crucial to continuously monitor rainfall and measure how landscape evolves over time, facilitating both civil protection operations and countermeasures.

This is a state-of-the-art solution that can enhance the quality of life for residential communities. Deployment of cameras, radars and drones to conduct surveillance in the most challenging environment provides the market with a simpler, faster and safer choice and presents data processing capabilities that are fast and efficient, using state-of-the-art cloud computing, cutting-edge software, and proprietary algorithms.

Drone also can be launched to perform aerial photogrammetry surveys for land subsidence and landslide detection.

Example of Geological Section showing Landslide


The monitoring system for landslide may consist of multiple sensors such as in-place inclinometer, multiple strain gauge, piezometer, tiltmeter, infrared camera, Global Navigation Satellite System (GNSS), and rain gauge. Modern technique such as Ground Based Synthetic Aperture Radar (GBSAR) can be used as it has proved it effectiveness. And upon collection of data from various sensors described in previous sections, comprehensive analysis can thus be performed. The outcome of this stage can lead to the establishment of a set of criteria for Early Warning (EW) System that consists of hardware and software as well as the criterias that relate the measured data to the risk levels of landslide. The hardware refers to the sensors, transmission system, storage system and others support units that perform the data collection of the slope whereas the software refers to the control and processing of the data, evaluation of the risk level, and sending the required information to the designated administrators to assist in making the decision of action. The working principle of the EW system is illustrated in the figure below.


Working principle of EW


The scanning service can also be obtained by developers who want to minimize risk while maximizing the return of investment on their development projects. The scanning service usually creates a flight plan and launches a drone to perform aerial surveys with a wider view and at different perspective for land developers and the data collected by the drone will then be processed into the desired deliverables with accurate measurements. By engaging with this service, developers will be able to  provide accurate 3D terrain models of the development areas, environmental analysis, accurate contour maps, surface assessment for drainage modeling, earthwork volume calculations, high altitude views of tall buildings, elevation mapping as well as panoramic images for marketing purposes.  All the information gathered from the service will provide developers with valuable insight for the project and is likewise a useful arsenal for marketing.


3D Terrain Model Generated by Photogrammetry Technique


By continuously monitoring these environmental indicators and observing their spatiotemporal changes, a set of criteria is determined for evaluating the risk level. The risk levels are defined not only by the extent and imminence of the potential hazards but also based on the actions to be taken in accordance with the risk levels.



Example of the risk levels and their corresponding actions are depicted in the following figure. The recommended actions are based on the inputs from the experts and the local authorities, and in accordance to standard practices outlined by international bodies such as World Health Organization (WHO), World Meteorological Organization (WMO), and International Consortium on Landslides (ICL).


Cost Effective is the Question?


But, the services sound expensive for a community to take on, doesn’t it? Definitely not! The advancement in technology and the widespread use of cloud server make smart sensing technology affordable to communities and developers these days.

An example of the price for a Topography Survey which could provide the community with accurate and geo-tagged topographic drawings of your premises and surroundings with features represented by contours, texts and symbols, plus Land Subsidence Detection as well as Exterior Building and Structure Inspection is estimated around USD 4500 for less than 250 residential units.

The market price for Air and Weather monitoring including the hardware is estimated to be  around USD 4,000 for a community of less than 250 units, whereas an Environmental Risk Assessment, which consists of preliminary slope assessment, an initial site investigation and topographic survey of the slope, borehole logging and soil samples collection for slope stability analysis, slope monitoring and early warning real-time monitoring of slope stability and ground movement and early warning system setup and risk assessment reporting for every 6 months is offered by the market starting at around USD 12,500 up to USD 125,000 depending on the amount of equipments setup as well as depending on the slope conditions.

Hence, these services are rather affordable, taking into consideration the greater benefits it provides to the entire community. Hence, it is essential for a community to be in the know about the living environment in order to be able to take appropriate measures with that information in ensuring the safety of the community.   


CONCLUSION


In this article, four major environmental threats concerning urban dwellers have been reviewed, namely global warming, air/water pollution, floods and landslide hazards. Understanding the potential threats of our residential environment is of great importance to ensure that our families are well protected. This can be achieved by continuously monitoring the quality of our residential environment through a set of environmental indicators. An intelligent environmental sensing and analytics solution could be deployed in residential areas to collect timely environmental indicators, and analyze their impacts through an AI-based data analytics engine. Scanning of  Environment is another service which could provide a community with a clear environmental overview of a surrounding area and its risks, and Environmental Risk Assessment Service can then be used to assess slopes and the potential of  landslides in an area.  State-of-the-art Smart Sensing technology is capable in assessing the most up-to-date environmental indicators and their associated risk levels. It is imperative for a community to detect trends in the environment and instantly communicate the results to interested parties for decision making and prompt actions that could guarantee the safety and well being of a community.



References:
[1]  World Economic Forum 2018?, Global Risks 2018: Fractures, Fears and Failures, World Economic Forum, viewed 10 July 2018, <http://reports.weforum.org/global-risks-2018/global-risks-2018-fractures-fears-and-failures/>.

[2] NOAA National Centers for Environmental Information 2018, State of the Climate:
Global Climate Report for January 2018, NOAA, viewed February 25, 2018, <https://www.ncdc.noaa.gov/sotc/global/201801>.

[3] Anderson GB, Bell ML 2011.Heat Waves in the United States: Mortality Risk during
Heat Waves and Effect Modification by Heat Wave Characteristics in 43
U.S. Communities,” Environmental Health Perspectives, 119(2), pp. 210-218, doi:10.1289/ehp.1002313.

[4] Ambient Air Pollution: A Global Assessment of Exposure and Burden of Disease,
World Health Organization (WHO), 2016, ISBN: 9789241511353.

[5] Chang, Li-Chiu; Shen, Hung-Yu; Chang, Fi-John, 2014 “Regional Flood Inundation
Nowcast using Hybrid SOM and Dynamic Neural Networks,” Journal of Hydrology,
519 (Part A), pp. 476-489, doi:10.1016/j.jhydrol.2014.07.036.

[6] Selvanathan, Sivasankkar, Mathini Sreetharan, Seth Lawler, Krista Rand,
Janghwoan Choi, and Mathew Mampara 2018,A Framework to Develop Nationwide
Flooding Extents Using Climate Models and Assess Forecast Potential
for Flood Resilience,” Journal of the American Water Resources Association
(JAWRA), 54(1), pp. 90-103, doi.org/10.1111/1752-1688.12613.

[7] Koo V.C., Lim C.S., William Hii H.H., et. al, 2015, “Ku-band Ground-based SAR Experiments for Surface Deformation Monitoring,” IEEE 5th Asia Pacific Conference on Synthetic Aperture Radar, doi: 10.1109/APSAR.2015.7306288.

[8] Chaoying Zhao, Zhong Lu 2018. “Remote Sensing of Landslides – A Review,” Remote
Sens, 10(2), pp. 279, doi:10.3390/rs10020279.

[9] Donald Houston, Alan Werritty, David Bassett, Alistair Geddes, Andrew Hoolachan and Marion McMillan 2011, Pluvial (rain-related) Flooding in Urban Areas: the Invisible Hazard, Joseph Rowntree Foundation, viewed 25 March 2018, <http://eprints.gla.ac.uk/162145/7/162145.pdf>.

[10]  Stacy Hutchinson 2016, Urban water expert comments on water pollution in cities, Rio de Janiero, Kansas State University, viewed 9 July 2018, <https://www.k-state.edu/media/newsreleases/jul15/pollution73115.html>.

[11] Rahman 2017, Landslides Disaster in Malaysia: an Overview, Research Gate, viewed 11 July 2018, <https://www.researchgate.net/publication/321096764_Landslides_Disaster_in_Malaysia_an_Overview>.

[12] A Practical Landslide Monitoring Framework – How It Works
A White Paper by Yee-Kit CHAN

[13] Monitoring Air Quality Using A Deep Learning Model
A White Paper by Dr. Shing Chiang TAN and Dr. Voon-Chet KOO


Authors:

Voon-Chet KOO is currently a full Professor of Multimedia University. His research interest includes remote sensing technologies, signal processing, and embedded system design. Prof Koo has been a principal consultant for various government agencies and engineering firms since 2000. He has published more than 100 papers in refereed journals, international conferences, 2 books, and 9 patents. He is also the recipient of the inaugural Young Engineer Award by the Institution of Engineers, Malaysia in 2004. 

Prof. Koo has more than 20 years of experience in remote sensing and related technologies, particularly on high-resolution imaging system for environmental monitoring and earth resource management. He is a regular invited speaker in international conferences and has delivered guest lectures and technical workshops to various universities, government agencies and private sectors, including Malaysia, Indonesia, Singapore, Vietnam, Taiwan, Hong Kong, Japan, and the United States. 

Prof. Koo is presently the Director of Digital Lifestyle Research Institute, MMU, Past Chair of the Centre for Remote Sensing and Surveillance Technologies, MMU, Past Chair of the IEEE Geoscience and Remote Sensing Society Chapter, Malaysia Section, a registered Professional Engineer with Practicing Certificate, a Fellow of the ASEAN Academy of Engineering and Technology (AAET), and a senior member of IEEE. Prof. Koo is also the founder and the current CEO of a spin-off company of the university research centre. The company, iRadar, was incorporated in 2011 with primary focus to provide smart sensing solutions for environmental and vegetation growth monitoring. 




Norana Johar has a Bachelor of Science (Psychology) from Indiana University of Bloomington, USA and began her career in the sales & marketing department at FingerTec in 2000 to market biometrics solutions for time attendance and door access worldwide. Throughout her service, she has helped to develop and deliver technology-driven business services and solutions, provide excellent client service, and drive profitable revenue growth throughout her leadership and experience. She is now assuming the role of Group Chief Operating Officer at TimeTec Computing Sdn. Bhd., whereby she has vast experience in handling the business's global network. of resellers operations.

Data Security in A Smart Residential Community


When Singapore, the world’s top ranking Smart City unveiled its pilot trial at the residential-business estate, Jurong Lake District in 2014, it served as a crucial test bed for the country's smart nation technologies and services. It included the rollout of more than 1,000 data sensors in the area, located in the western part of Singapore, which captures information--including video images--to be used in applications around urban mobility, sustainability, and improving "sensing and situational awareness". The trials involved multiple government agencies including the Housing Development Board (HDB), Urban Redevelopment Authority, National Environment Agency, and Land Transport Authority, as well as more than 20 companies and startups.

A smart queue monitoring system is one of the applications that tap advanced video sensing to determine in real-time the length and flow of a queue, for instance, at taxi stands. This information including potential waiting time can be fed to commuters who can then decide if they want to join the queue or take the bus. The data can also alert taxi companies in locations that require more cabs.

However, the plan was to capture all the data via sensors and the collected data will be analyzed and securely managed through a new Smart Nation Platform that all government agencies can connect to. Ultimately the government will own the platform but it is open to having private sector entities operate and manage it at the same time.



Smarter, More Data & Security Measures

With so much data involved, data privacy and security is becoming one of the main concerns, especially when the government is excluded from the Data Protection Act. Some even questioned should the private companies allowed to manage and operate the Smart Nation Platform, and which set of data privacy laws should they abide by?

We all know that sensor networks and perpetual data flows produce new service models and analytics to make modern cities and smart communities more livable, sustainable, and equitable, but at the same time, connected smart city devices raise concerns about individuals’ privacy, autonomy, and freedom of choice, as well as potential discrimination by institutions or governments.

To be fully participative in the social data revolution, we must shed the old mindset of passive “consumers”, who take in whatever is placed before us, and embrace a new mindset, that of active co-creator of social data. The balance of power is shifting between government and people, buyers and sellers, employers and employees, then only the data of the people can and will become data for the people. 

When a residential community upgraded itself to a so-called smart status loaded with all the smart systems, devices and sensors, the flow and generation of data would increase tremendously. In the past, the data might be kept on the local computer or server, and can only be accessed by a few administrators. Hence, even if you are the transactions owner, for example, if you need the hard copy of your up-to-date service charges, you have to go to the office and demand for the account executive to access your own account as well as ask her/him to print it for you. What is the impact for the individual and community as a whole with all the residential community data floating on the cloud?

As an individual, your personal data such as name, ID and contact information, family members, vehicle numbers, home address, service account status and etc., most probably will be captured and stored locally in the past but shifted to cloud in the smart era.

Your physical interactions with smart devices leave traces too. This set of access transaction data produces the time in/out data when you drive through the boom gate, book facilities, and access the condo’s lobby when returning home in addition to taking the lift, or any other thresholds or doors that are possible using smart devices. And with the availability of Internet and cloud computing, it can even generate real-time data as well.

How do we perceive to have all of these generated data to adhere to our daily activities? As an urban dweller, can we still live as a recluse in addition to segregating ourselves from the outside world? If the answer is no, we have to deal with the data maturely instead of rejecting the trend that will inevitably come by.



Data Security: The Fear Factors

Dr. Andreas Weigend, a global expert on the future Big Data, in his book, “Data For the People, How to Make Our Post-Privacy Economy Work for You”, laid three major fears in dealing with data that they can’t control.

First, there is the fear of information imbalance, of data being retrieved about others or the situation in a way that will alter the outcome of the interaction.  When one side of a conversation has access to information and the other side does not have, the power of imbalance can be unbearable and heightened the feelings of insecurity. 

Second, there is the fear of dissemination, of others sharing data with people, companies, or the web without permission.

Third, there is the fear of permanence, of others recording data and saving the data somewhere. In this case, the fear comes down to an uncertainty about how the data might be analyzed or used in the future. With no guarantee that the consequences of the recording will be positive, it might be best to assume the worst. In addition, laws differ from place to place about who is allowed to record what without permission.

With all the fear factors, if a community still has no idea on how to make use of the data for the larger benefits of the community, how can they minimize the risk and keep the data safely hosted on the cloud?



Five Types Of Data

Data is kept on the cloud storage according to its requirement.  We can classify community data into five types of data, which are:

a. Informative Data
Basic information such as resident and organization info, e-document and e-contact created by the community, unless the resident no longer stays in the neighbourhood, his/her basic data would be there for general access by him/herself or the authorized personnel.

b. Transaction Activity Data
Data derived from the transaction activities such as accounting billing, visitors activities, trigger of panic button, notifications, report incidents, e-polling and etc.

c. IoT Sensing Data
Data derived or generated from the transaction activities from the IoT devices for community use such as barrier gate, turnstile, elevator, smart lock and IoT reader for facility rooms, common areas and all other community purposes.

d. Video Surveillance Data
I separated video surveillance data from IoT device data due to the nature of the data and it can be based on transaction if set to motion detection mode or on-going recording mode. Hence, video surveillance data takes more storage than other types of data. And, if a longer duration is required, it can be divided to local storage and cloud storage, whereby cloud storage is for shorter period, cost concern and security measure and it likewise only store relevant activity images rather than video footages on the cloud.

e. Social Activity Data
Community tends to use the third party well-known social media tools like Facebook, WhatsApp, WeChat, Telegram and etc. to fulfill the residential community social needs, instead of using their own smart platform, which may or may have the social functionality. If third party social activity data is involved, means it falls to the social media provider’s terms and conditions, and of course, the appointed administrators or moderators can set their own rules to protect the community social activity data, for example, if Facebook is used, the privacy is encouraged to set as closed community, only invited members can view the page and post to the page.   

What are the best practices a community should have to ensure that data security risk is lowered to the very minimum before kick starting a smart residential community project?


A. Form A Data Security Committee

I suggest the community sets up an internal data security committee (can be limited to one person if there is manpower shortage), the leader should have some basic know-how about data security, at least lay down a simple framework for data security policy. 

Data security committee has to decide on the type of information to be collected from residents and visitors, the duration to keep different type of data on the cloud, to decide role-based of system administration and users, to ensure the adopted smart community system to have met some security measures, to play a role in selecting smart system providers, to audit from time to time whether the data security complies and meets the criteria, to educate the neighbourhood on the good practices of data security at a community level and personal level.


B. Vendor Selection

Since self-initiated smart residential community project normally will engage a third party vendor or an integrator during implementation, the selection of the vendor becomes the most crucial task because companies awarded with the project is at the forefront of installing the system that deals with the abundance of data generated while in daily operation, the backend to house your data, and the knowledge on how to secure the data during transmission. Among all these, how seriously a company treats data security into its account is the foremost important criteria in evaluation. 

Some evaluation criteria can be considered as follows:


1. Whether or not the company is ISO 27001 certified?
ISO 27001 is a security management standard that specifies security management best practices and comprehensive security controls following the ISO 27001 best practice guidance. The basis of this certification is the development and implementation of a rigorous security program, which includes the development and implementation of an Information Security Management System (ISMS), which defines how the company perpetually manages security in a holistic, comprehensive manner. This widely-recognized international security standard specifies the entities as follow:

Systematically evaluate the information security risks, taking into account the impact of the company's threats and vulnerabilities.

Design and implement a comprehensive suite of information security controls and other forms of risk management to address the company's architecture security risks.

Adopt an overarching management process to ensure that the information security controls meet the company's information security needs on an ongoing basis.


2. Whether or not the company does third party penetration test yearly?
A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, service and application flaws, improper configurations, or risky end-user behaviors. Such assessments are also useful in validating the efficacy of defensive mechanisms as well as end-user adherence to security policies. A penetration test can help determine whether a system is vulnerable to attack, if the defences were sufficient, and which defences (if any) the test defeated.


3.  Whether the company that provides the smart community platform is ready with two-factor authentication?
For increased security, we recommend that you configure 2-factor authentication to help protect your system accounts. 2-factor authentication adds extra security because it requires the administrators with the highest authority to access the system via a unique authentication code from an approved authentication device.


4.  Whether the company host the smart community service in a trusted cloud server?      
Since there is only a handful of global renowned cloud computing platform providers such as Amazon AWS, Microsoft Azure, Google GCP, HP Cloud, Alibaba Cloud, this shouldn’t be a problem if the big names are seen in your selection, because your cloud data would eventually reside on the cloud server of the vendor that you choose to work with. But beware of the vendor who often use security measures provided by these cloud platform providers and claim that those are theirs. It is certainly not totally wrong, but always remember, when Amazon AWS guarantees a 99.95% uptime, it does not mean that the smart community system that is provided by the vendor will tag along with the uptime too. The smart community system that is hosted on AWS might still be down due to other reasons, in which the responsibility will be solely borne by the smart system provider.


5.   Whether the company is in compliance with GDPR?
On 25 May 2018, the General Data Protection Regulation (GDPR), a new data protection law for European countries started to take effect. GDPR is meant to strengthen the protection of personal data, it is a wide-reaching legislation, as it applies to all companies handling personal data of EU residents and its scope also covers almost all data relating to an individual, such as IP addresses, website cookies and more. With this, the EU has really taken a major step forward to strengthen data protection by shifting the rights over personal data away from companies back into your hands. A lot of privacy protection statements are self-claimed by vendors without having taken the compliance very seriously. GDPR, even though it is dependent on a company to be self-regulated, a compliant company will have to offer clearer explanations about what data is being collected and how it is going to be used. For example, consent shall be presented in a manner in which is clearly distinguishable from the other matters, in an intelligible and easily accessible form, using clear and plain language. Any part of such a declaration which constitutes an infringement of this Regulation shall not be binding. In other words, if a company is ready to comply with GDPR, the community has less to worry about the measure it has taken for data protection.


C. Adhere to Role-based Access for the Smart Community System

In computer systems security, role-based access control is an approach to restrict system access to authorized users. Role-based access control is sometimes referred to as role-based security. System roles control what sections in the Administrator Panel are available to different types of users. That said, most users have a system role of none, which means that they do not have access to the Administrator Panel.

You can use system roles to assign subsets of administrative privileges to other users. This helps you delegate routine administrative tasks to other users. For example, you can grant an instructor access to the user management pages, where the instructor can create users, edit user profiles, or change a user's enrollment in courses.

Only a user with full administrator privileges can assign privileges to a system role.

If your institution licenses community engagement, you can assign multiple secondary system roles to a user account. Multiple system roles grant the user the sum of their privileges. This makes it possible to create system roles based on tasks instead of creating a separate system role for every possible set of privileges.

In a smart community system, account executives are only assigned with an account and billing module, while security guard when calling residents through their guardhouse panel, may not have the access to view the contact numbers of the residents.


D. Decide on the Data to be Collected

Smart community system will flood with all types of data and information. Some data are raw and self-generated whenever there is a transaction occurring on IoT devices. Unless the smart devices are absent in a smart community system, which is unlikely, so these self-generated data is auto-collected and the committee can only decide on the duration it resides on the cloud server.

Some collected information can be decided by the community, for example designing an online visitor form to be filled up either by visitors, residents or security guards. A community can even add on a registration form complete with the  capability to auto-capture a visitors’ image from their identity card, driver’s license or live image from an installed camera.

Collecting of information should not be excessive; as long that it meets the requirements to keep the smart community moving should be adequate.


E. Decide on the Duration to Keep the Data

Different types of data might have varying durations to be kept in the cloud. For example the basic informative data such as names, contact numbers and etc., would be kept until the resident is no longer staying at the premises; for accounting records, the management committee are governed under the Strata Act, whereby the accounting record shall be kept according to the Company Act, for example, 7 years after the completion of the transactions and operations.

Some types of data might need to be kept in a separate copy in the local storage like surveillance video footage to save cost and to provide convenience for daily operation. And cloud storage should only be limited to activity images, like the snapshot of visitor photos from the guardhouse for recording purposes.

IoT data will account for roughly 10 percent of all the data registered globally in 2020, according to IDC market intelligence firm. Most IoT adopters fail to use their data or they derive just a small part of its value. For example, only one percent of data coming from the 30k sensors on a single oil grid gets turned into actionable insights. Unless a community has already figured out how to exploit its IoT data to a greater efficiency, a community has to decide whether, after a certain duration, an expired IoT transaction data can be purged automatically from the cloud. 


F. Select IoT Smart Devices with Data encryption during Transmission

In order to secure all data traffic between the smart devices and mobile phones, if Bluetooth communication is deployed, make sure that the IoT devices are embedded with Advanced Encryption Standard (AES) encryption.

AES was published by the National Institute of Standards and Technology (NIST) in 2001 after the evaluation process of the AES contest. Rijndael was the winner of the contest and NIST selected it as the algorithm for AES. Starting from 2001, AES has been adopted by the U.S. government and is now being used worldwide. It supersedes the Data Encryption Standard (DES) which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. AES is considered secure, very fast and compact which is about 1 kB of code; its block size is a multiple of 32 (typically 128 bits), its key length is also a multiple of 32 (typically 128, 192, or 256 bits), and it has a neat algebraic description.

AES encryption is used for encoding the information being exchanged between Bluetooth devices in such a way that eavesdroppers cannot read its contents. So, the contents that are sent between IoT device and mobile phone are safe and secure. Besides data encryption, we also have adjusted the Bluetooth range or Bluetooth antenna of the IoT devices to fit for particular usage and prevented someone from Bluesnarfing on our IoT devices. For example, for a smartphone to connect to a BLE door lock, the person must be within 1-2 meters from the IoT device to prevent intruders from eavesdropping at a corner.

In a nutshell, Bluetooth technology particularly BLE, is a great addition to businesses and consumers. However, it is also important for all users to understand the technology and the risks involved in its use so the risks can be mitigated for better user experience.


G.  Conduct Audit from Time to Time on Data Security

It is hard for a smart community to comply with ISO 27001 or to engage with a third-party organization in auditing its data security practice. The data security committee should establish a data security checklist with further revision and enhancement from time to time, and conduct an audit once in a year based on the checklist to ensure correction and remedy actions are taken if the practice deviates from the checklist.


H.  Conduct Data Security Awareness and Precaution Training Class

Another role of the committee is to conduct data security workshops or seminars by inviting experts to present talks and provide trainings to the community members from time to time. 



Personal Level Data Security

For personal level, since the community members or the residents will opt for smartphones and its smart community App rather than its web portal for the purposes of making payment, viewing notifications, inviting visitors, booking facilities and etc; and furthermore if the community is installed with smart devices which use smartphones as personal credentials for access, then the increase of utilization of smartphone at the personal level would be apparent. Hence, we list down a set of security guides to keep your phone and data safe even though it is general practices that are not targeted solely on a smart community platform. 


1. Activate A Screen Lock
After a short period of inactivity (30 seconds, for example), your phone should auto-lock itself. It is a must not only for your mobile device, but also for your laptop or tablet. This is the easiest way to keep intruders away from your data. It is also essential that you enforce automatic wiping of the device after several failed login attempts.

2. Mind Your Apps
Always use official app stores to download and install an app. Disable the option to allow installation of third party apps as they usually carry malware that will harm your smartphone. Of course, the app that is using to manage your smart community is chosen at the community level, not a personal decision and with sufficient consideration and guidance, so the risk to download the community app does not arise here. 

3. Install Ad Blocker
It is recommended to install an ad blocker. Not because the ads are intrusive and have been failing potential customers, but because they can be exploited by cyber criminals. For example, malvertising can be served right on your smartphone through ad servers – and you don’t even need to click on anything in order to get infected!

4. Beware Of Phishing
It is much harder to spot a phishing page on your mobile phone than on your PC or your laptop. Keep your guard up against phishing on all your devices, no matter if it is a desktop, laptop, tablet or smartphone. Don’t click on short, suspicious links that you didn’t request. And be careful with those attachments that you've downloaded via email or instant messaging services.

5. Activate Remote Device Locator
In case your smartphone is lost or stolen, the easiest way to remotely locate it, is by installing a dedicated app and making sure that the option to track its location is always turned on.

6. Activate Automatic Backup
Have automatic backups in the cloud. This option is available on all operating systems, you just have to enable it (or don’t disable it, in case it’s already set as default). In case that your phone is lost, destroyed or stolen, you won’t have to worry about the fact that you didn’t get the chance to backup all your data on it. All apps and data will be automatically synchronized in the cloud.

7. Activate Two-Factor Authentication
No matter if you have an Apple, a Google or a Microsoft account, activating the two-factor authentication is a must. This will act as a second layer of security. In doing so, every time you sign in on a new device or from a new location, it will require you to verify your identity through a unique, time-sensitive code, that you’ll receive via text message.

8. Turn On Encryption
If your smartphone offers the option to encrypt the data on it, enable it.

9. Install An Antivirus
Install a trustworthy antivirus. Although they aren’t as potent as their desktop versions, it is still a better alternative rather than having no antivirus installed.


Summary

1.  In this chapter, the author discusses that a vast pool of data will be generated when shifting an existing community system to a smart community system, and data security will become a more crucial issue in which a community has to deal with.

2.  The interaction with IoT smart devices created more transaction data in a smart community system.

3.  The fear factors drive users to take data privacy and security more seriously. Hence, when adopting a smart community system, security precaution should be part of the entire implementation plan.

4.  The author lists down 5 major types of data namely informative data, transaction activity data, IoT sensing data, video surveillance data and social activity data generated when implementing a smart community system.

5.  At the community level, the author also lists 8 best practices to lower the risk of data security to a minimum. The practices are a) Form a data security committee; b) Vendor selection guideline; c) Adhere to role-based access; d) Decide the data set to be collected; f) Decide on the duration of time keeping the data; g) Ensure smart devices come with strong data encryption; h) To audit on data security measure from time to time, and i) Conduct data security awareness and training workshop for community members.

6.  At the personal level, the author also lists down 9 best practices to reduce data security risk. 


 References

1.  Cristina Chipurici 2017, Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Safe: How to enhance your smartphone’s security and privacy (handy tips included)Heimdal Security Blog, viewed 17 July 2018, <https://heimdalsecurity.com/blog/smartphone-security-guide-keep-your-phone-data-safe/>.

2.  Andreas Weigend 2017, Data For the People, How to Make Our Post-Privacy Economy Work for You, Basic Books, New York.

3.  Eileen Yu 2014, Data privacy ambiguity may hamper Singapore's smart nation ambition, ZDNet, viewed 14 July 2018, <https://www.zdnet.com/article/data-privacy-ambiguity-may-hamper-singapores-smart-nation-ambition/>.

4.  Katherine Lazarevich 2018, What You Should Be Doing With Your IoT DataMedium.com, viewed 19 July 2018, <https://medium.com/iotforall/what-to-do-with-your-iot-data-in-2018-4fc408ed18a9>.




Teh Hon Seng, Group CEO of TimeTec Group of Companies. Prior to forming TimeTec, Teh led PUC Founder (MSC) Bhd to be listed on MESDAQ (ACE) market of Bursa Malaysia in 2002. Teh initiated the R&D in fingerprint technology in 2000, which later developed into a renowned global brand for commercial fingerprint product known as FingerTec. In 2008, he foresaw the trend of cloud computing and mobile technology, and over the years, he had strategically diversified and transformed its biometric-focused products into a suite of cloud solutions that aimed at workforce management and security industries including smart communities that centered around the cloud ecosystem. Teh has more than 10 patents to his name, and he is also a columnist in a local newspaper and a writer of several books.