How this system can help India’s online gaming sector
This initiative has the potential to resolve the crucial issue of skill versus chance. The system has the potential to enhance overall transparency and fairness within the gaming industry. The collaboration with experts from renowned institutions aligns with WinZO’s commitment to fostering a gaming environment that is not only entertaining but also characterised by safety, accountability, and transparency in the classification of games based on skill and chance.
Recently there have been concerns on the independence of the proposed Self-Regulatory Bodies (SRBs) in India’s online gaming sector in ensuring fair and unbiased assessments. SRBs access to confidential proprietary information of the new-age technology firms is also a potential threat to early stage innovations.
This prompted WinZO to work with leading academicians across the world to develop a highly scientific model that can be democratised and applied to any game without requiring access to proprietary data or violating the intellectual property rights of gaming companies to assess any game’s skill level.
The collaborative effort has resulted in the creation of statistical tests utilising real game data, user behaviour of over 100 million users, across billions of game plays and other relevant factors to determine the prevalence of skill over chance in various games. This methodology is set to bring clarity to the distinction between skill and chance.
The initiative also has the potential to reduce compliance burden for the online gaming sector and resolve regulatory challenges in the era of innovative and evolving business models.
WinZo’s CHASE cyber security programme: Details
WinZO also partnered with the Indian Institute of Technology-Delhi (IIT-D), the Delhi Technological University (DTU), the Netaji Subhash University of Technology (NSUT), and the IIITD to launch its new cyber security programme, Code Health and Security Evaluation (CHASE).
The programme is aimed at developing open-source technology and best practices that can be used by businesses, government agencies, and other organisations to protect against cyber attacks that exploit product vulnerabilities to steal information, money, or are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.