Nova Upinel Altesse Chow

Nova Upinel Altesse Chow

Salford, England, United Kingdom
1K followers 500+ connections

About

Adaptable and seasoned Technical Product Manager with over 12 years of hands-on…

Activity

Join now to see all activity

Experience

  • Right Inc Graphic

    Right Inc

    London, England, United Kingdom

  • -

  • Company ghost image

    • -

      Kwun Tong, Hong Kong

    • -

      Kwun Tong, Hong Kong

  • -

    Hong Kong

  • -

  • -

    Hong Kong

  • -

  • -

    Hong Kong

  • -

    Hong Kong

  • -

    Hong Kong

Education

  •  Graphic

    3.78/4.0

    -

    - Studied advanced computer and information systems security concepts, including network security, data security, and software security.
    - Gained expertise in developing secure software systems and protecting sensitive data.
    - Learned the latest techniques and technologies for ensuring network security and protecting against cyber threats.
    - Improved critical thinking, problem-solving and technical skills to help organisations protect their information systems.

  • Merit

    -

    - Completed a Master of Laws (LL.M.) with Merit in International Commercial Law from The University of Salford.
    - Studied advanced concepts in international commercial law, including contracts, intellectual property, and dispute resolution.
    - Gained a comprehensive understanding of the legal and regulatory framework that governs international business transactions.
    - Improved legal research, analysis, and writing skills to provide practical legal guidance and support to organisations.

  • 3.51/4.0 (Honour)

    - Completed a Bachelor of Business Administration (BBA) with Honors in Marketing from The Hang Seng University of Hong Kong.
    - Studied business administration with a focus on marketing, including market research, advertising, and branding.
    - Developed a comprehensive understanding of the fundamental principles and practices of marketing and their impact on business success.
    - Improve critical thinking, problem-solving, and communication skills to help organisations reach and engage…

    - Completed a Bachelor of Business Administration (BBA) with Honors in Marketing from The Hang Seng University of Hong Kong.
    - Studied business administration with a focus on marketing, including market research, advertising, and branding.
    - Developed a comprehensive understanding of the fundamental principles and practices of marketing and their impact on business success.
    - Improve critical thinking, problem-solving, and communication skills to help organisations reach and engage customers effectively.

  • -

Volunteer Experience

  • Lifetime Member

    Lifetime Member

    Mensa International

    - Present 9 years 11 months

Licenses & Certifications

Publications

  • Integrating Cybersecurity Frameworks within Agile Product Management Cycles: A Guide to Best Practices and Key Considerations Across Legal, Backend, Frontend, and Log System Design

    In an era of increasingly sophisticated cyber threats, the agility of product management cycles is crucial for maintaining robust cybersecurity postures. This thesis explores best practices for the seamless incorporation of cybersecurity frameworks within agile product management cycles. We delve into the intricacies of such integrations, covering key considerations such as legal compliance, backend and frontend design, and log system architecture. A comprehensive review of existing literature…

    In an era of increasingly sophisticated cyber threats, the agility of product management cycles is crucial for maintaining robust cybersecurity postures. This thesis explores best practices for the seamless incorporation of cybersecurity frameworks within agile product management cycles. We delve into the intricacies of such integrations, covering key considerations such as legal compliance, backend and frontend design, and log system architecture. A comprehensive review of existing literature and various industry practices reveals that a proactive approach to cybersecurity—that anticipates future technological developments and regulatory landscapes— enhances product security and integrity. Recommendations emphasize the importance of predictive analysis, leveraging artificial intelligence and machine learning for real-time threat detection, and staying agile amidst regulatory evolutions. This work underscores the potential for predictive analytics to transform cybersecurity measures (Cavusoglu et al., 2008), and highlights the revolutionary impact of AI and ML on agile security practices (Buczak & Guven, 2016). Furthermore, it confronts the inevitability of regulatory changes, advocating for forward- looking strategies to adapt to technological advancements (Romanosky, 2016). In sum, our study provides a foundation for ongoing research and offers a strategic framework for organizations seeking to integrate cybersecurity more deeply within their agile product management processes.

    See publication
  • CPython: Enhancing Python’s Performance and Versatility

    This thesis paper presents an in-depth exploration of CPython, the default and most widely used implementation of the Python programming language, and positions it within the context of other high-performance languages. It examines the core attributes that contribute to CPython’s status as a preferred interpreter among developers, such as its readability, comprehensive standard library, and the extensive selection of third-party packages available for extending its functionality.
    The…

    This thesis paper presents an in-depth exploration of CPython, the default and most widely used implementation of the Python programming language, and positions it within the context of other high-performance languages. It examines the core attributes that contribute to CPython’s status as a preferred interpreter among developers, such as its readability, comprehensive standard library, and the extensive selection of third-party packages available for extending its functionality.
    The comparative study conducted within this work evaluates CPython’s performance in terms of execution speed, memory consumption, concurrency, and overall versatility against other high-performing languages, notably C, Java, and Go. While these languages may excel in raw computational speed and efficiency, CPython is recognized for its ease of use and rapid development capabilities, factors that often outweigh the raw performance considerations in software development.
    Significantly, this work also addresses the areas where CPython encounters limitations. These include the Global Interpreter Lock (GIL) that affects multi-threaded performance and the way dynamic typing influences both execution speed and memory usage. Despite these challenges, the thesis contends that CPython remains a robust option for many programming tasks, bolstered by its vibrant, active community and the continuous improvements made through the Python Enhancement Proposals (PEPs).

    See publication
  • The Effects of GDPR: A Comparison between the Hong Kong Personal Data (Privacy) Ordinance and the EU General Data Protection Regulation

    UoS Master of Laws Dissertation

    General Data Protection Regulation provides a complete framework to the Data Privacy standard to the companies inside EU countries, while at the same time, GDPR also regulates all companies that serve and store information of EU related Data Objects.
    Due to the fact that when the HK PDPO was drafted, reference was made to the relevant requirements under the OECD Privacy Guidelines 1980 and the EU Directive. In consequence, the PDPO and the GDPR share many common features. Given that the GDPR…

    General Data Protection Regulation provides a complete framework to the Data Privacy standard to the companies inside EU countries, while at the same time, GDPR also regulates all companies that serve and store information of EU related Data Objects.
    Due to the fact that when the HK PDPO was drafted, reference was made to the relevant requirements under the OECD Privacy Guidelines 1980 and the EU Directive. In consequence, the PDPO and the GDPR share many common features. Given that the GDPR constitutes significant developments, if not changes, of data protection law from the EU Directive, the new regulatory framework includes several requirements that are not found under the PDPO.
    This dissertation will examine the practical steps and actions Hong-Kong based companies (substantially internet startups companies) should pay attention to, especially how data controllers and data processors should be aware of during the data share, exchange and working with subprocessors...

    See publication
  • In light of the Article 101 and 102 in the Treaty on the Functioning of the European Union (TFEU), examine how competition law has regulated intellectual property rights

    UoS Master of Laws Thesis

    The Articles 101 and 102 of the Treaty on the Functioning of the European Union (TFEU) are the core of the EC Competition Law. Article 101 regulates the inter-companies’ agreement, while Article 102 addresses the abuse of the dominant position of the business market...

  • The Sanctity of contracts (pacta sunt servanda, a.k.a. the “Umbrella clauses”) priority in Bilateral Investment Treaties (BITs) and Investor-States Contracts (ISCs) changes in the surrounding economic conditions

    UoS Master of Laws Thesis

    Over the decade, the investor seeks ways to minimize theirs on investing in the states. The typical risks the foreign investors faced include change in the political scenario, change in the regulatory or legal framework, changes in the contracts made with the state political and social instability.
    The Investor-State Contracts (ISCs) appear as a transnational commercial law and within the Public International Law (PIL), designed for cross-border investment protection considering the…

    Over the decade, the investor seeks ways to minimize theirs on investing in the states. The typical risks the foreign investors faced include change in the political scenario, change in the regulatory or legal framework, changes in the contracts made with the state political and social instability.
    The Investor-State Contracts (ISCs) appear as a transnational commercial law and within the Public International Law (PIL), designed for cross-border investment protection considering the applicable law of the contract, dispute settlement, and jurisdiction. The contractual devices, such as the Choice-of-law clause, Arbitration clause, Production Sharing Agreements, Hardship Clause, Force majeure clause, Renegotiation clause and Stabilization clause, is meant to control the risks when the breach or unforeseeable disadvantage occurs unluckily. ISCs become one of the important ways for the commercial contract between Investor and State.
    Where the ISCs often have some limitation on claiming the compensation for breach of state contracts in International Investment, the principle of sanctity of contracts (pacta sunt servanda) in Bilateral Investment Treaties (BITs) – A-State to State Treaties, become common protection to the investors. It is under lex mercatoria - an unwritten, implied principle from the merchant’s practice, which is neither capitalism nor socialism, and it is a means to some end, which is an important and well-established law principle in the modern-day transnational commercial law. Thus, even the beneficiaries of such transactions by different countries vary, but this does not hinder the development of international trade. With both the SGS v. Pakistan and SGS v. Philippines from ICSID arbitration case, consider different tribunals on purely contractual claims and treaty claims, which helps further develop the BITs and the transnational commercial law...

  • A Critically analyse to “Corporate governance, Boards of directors responsibility, The shareholders, the auditors and to satisfy themselves that an appropriate governance structure is in place.” with the UK and International company laws

    UoS Master of Laws Thesis

    The modern UK corporation law originated in the Joint Stock Companies Act 1844, enacted by William Gladstone in his presidency of the Board of Trade. The Act creates the key principle that citizens should have the right to establish a company through relatively simple administrative procedures, and the Companies House is in charge of these procedures.
    Before this, the Company's establishment could only be achieved through cumbersome procedures via private parliamentary bills or royal…

    The modern UK corporation law originated in the Joint Stock Companies Act 1844, enacted by William Gladstone in his presidency of the Board of Trade. The Act creates the key principle that citizens should have the right to establish a company through relatively simple administrative procedures, and the Companies House is in charge of these procedures.
    Before this, the Company's establishment could only be achieved through cumbersome procedures via private parliamentary bills or royal charter. These two ways of setting up companies still exist but are rarely used today.
    The power distribution of the shareholders and the Board of Directors seems to be an old topic. There are many well-established doctrines, writings, and principles developed for ages. However, it is still important to remind people that our discussions on company legislation are still far from over in the rapidly changing world...

Projects

Honors & Awards

  • Best Startup Awards

    ICT Awards

  • The Second Runnerup Award, Shanghai - Hong Kong Hackathon 2012

    Shanghai - Hong Kong Hackathon 2012

Languages

  • English

    Full professional proficiency

  • Cantonese

    Native or bilingual proficiency

  • Mandarin

    Native or bilingual proficiency

  • Chinese

    Native or bilingual proficiency

Organizations

  • MENSA International

    Member

    - Present
  • Institute of Electrical and Electronics Engineers (IEEE)

    Member

    - Present
  • Management Information System Association (MISA)

    Fellow

    - Present
  • Association for Computing Machinery (ACM)

    Member

    - Present

Recommendations received

3 people have recommended Nova Upinel Join now to view

View Nova Upinel’s full profile

  • See who you know in common
  • Get introduced
  • Contact Nova Upinel directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses