'Africa's Internet Shutdowns: a Report on the Johannesburg Workshop'

Total Page:16

File Type:pdf, Size:1020Kb

'Africa's Internet Shutdowns: a Report on the Johannesburg Workshop' AFRICA'S INTERNET SHUTDOWNS A R E P O R T O N T H E J O H A N N E S B U R G W O R K S H O P Eleanor Marchant & Nicole Stremlau Programme in Comparative Media Law & Policy, University of Oxford 2019 This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement no. 716686, ConflictNET). Open Access. Some rights reserved. (2019) We encourage the circulation of this work as widely as possible. Anybody can access the content without charge, and anybody can dowload this work. This is subject to the terms of our Creative Commons license. Its conditions are: • The author(s) are credited • The text is not altered and is used in full • The work is not resold • A copy of the work or link to its use online is sent to the authors To find out more go to www.creativecommons.org HOW TO CITE THIS WORK? Marchant, E., & Stremlau, N. (2019). Africa's Internet Shutdowns: A report on the Johannesburg Workshop. Programme in Comparative Media Law and Policy (PCMLP), University of Oxford. This document is published under Creative Commons Attribution-NonCommercial- NoDerivs. For more information or questions about the report, please contact the authors individually. TABLE OF CONTENTS 1 EXECUTIVE SUMMARY INTRODUCTION 3 14 THE ROOTS OF INTERNET SHUTDOWNS 6 VARYING MODES OF Justifications INTERNET Motivations & Power Relations SHUTDOWNS The Power of the Courts The Power of the Private Sector The Power of Traditional Media & the Public Non-Governmental Causes 9 THE IMPACT OF INTERNET 22 NORMATIVE SHUTDOWNS CONSIDERATIONS Economic Impact Socio-Political Impact 24 CONCLUSION 26 REFERENCES 30 APPENDIX EXECUTIVE SUMMARY Internet shutdowns – where access to the Overall, during the workshop, despite the internet is cut off within a country’s borders – rising instances of internet shutdowns in are not a new phenomenon; it is the increasing Africa, the urgent need for more research scope and scale that make this an urgent issue. became apparent, particularly research that In India, there were more than 130 separate looks in-depth at the social, political, instances of government-ordered internet economic, and legal contexts in which internet shutdowns in 2018; while the African blockages are embedded and the very continent holds the record for the longest different types of shutdowns that occur. The shutdowns, with countries like Cameroon and work of advocacy organizations serves a Chad as particularly notable cases. Choosing function in increasing public awareness, but to shut off access to the internet is choosing a the debate on this complex issue requires particularly blunt instrument, one that more nuance and time-consuming research appeals to certain governments, but also one than many advocacy organizations have the that is unlikely to persist or remain unchanged resources to do. As a result, this report is as governments increase their surveillance intended to help provide a basis for guiding capacity and improve their more targeted future work; it offers both insights on the tools for co-opting and manipulating public discussions that took place during the two-day opinion. workshop and a review of the important research that does exist. In addition, below we Given the urgency of this issue in the African offer a few key suggestions that emerged from context, a workshop on internet shutdowns the workshop about the direction we believe was jointly convened by the University of research needs to go. Such research could not Oxford’s Programme in Comparative Media only help advocacy organizations, but also Law & Policy at the Centre for Socio-Legal policymakers grappling with building Studies and the University of Johannesburg’s regulatory frameworks to keep up with the School of Communication in 2018 in rapid technological advancements happening Johannesburg. It hosted two dozen around the world. participants across the continent representing a wide array of academic disciplines and Internet shutdowns should be treated as a practitioner fields, including from law, spectrum rather an on/off switch communications, and computer science disciplines, and from the legal, advocacy, and Internet shutdowns should not be treated as technology sectors. Countries discussed homogeneous. Rather, they exist on a included: Burundi, Cameroon, Ethiopia, Kenya, spectrum – varying along dimensions such as Morocco, South Sudan, Uganda, and duration, breadth, depth, speed, and Zimbabwe. frequency. Treating them as such allows that discussion to stay engaged with changing debates about the evolving, and competing, norms governing the internet. Impact of shutdowns: More attention to the less military. Focusing on the kinds of power relations visible impacts of shutdowns is needed that exist and how power is exerted between them could provide productive insights into opaque There are a number of studies that focus on the government decision-making processes. economic impact of shutdowns. Yet, while the economic argument may work for governments with Normative issues: A broader debate about the a higher internet penetration rate, it may be less balance between protecting human rights online effective for others, particularly when concerns and protecting security is needed about national security, violent conflict, or terrorism are at the forefront (and have their own economic Despite vocal condemnations of internet shutdowns, impact). More research is needed that looks at the particularly from human rights organizations, the other dimensions of impact, including, for example, acceptability of some forms of internet restriction the impact on those in the poorest communities who appears to be on the rise. Following the violent lack access to the internet to begin with. attack in Sri Lanka, a handful of those who had long advocated for a free and open internet wrote Root of shutdowns: More attention to the role of approvingly in outlets like the New York Times and non-governmental actors is needed the Guardian about the government’s decision to restrict access during the attack in the hopes of In popular debates about the causes of internet minimizing the spread of misinformation. With shutdowns, governments are almost always seen as scandals like Cambridge Analytica and Facebook’s the perpetrators. Yet existing research and the role in perpetuating the Rohingya genocide, the era debate at the workshop show how varied the causes of seeing social media’s impact on the world as can be – from the unintentional, including severe necessarily positive has long passed. Given such weather and accidentally severed cables, to the changes, we believe a broadened debate about intentional but non-governmental, such as foreign internet shutdowns is greatly needed. One that government attacks, rogue hackers, or ISP led slow- takes us away from the previous polarization pitting downs. Even where governments are the causes, civil society and human rights advocates and social more attention needs to be payed to the role of media companies on the one side against other actors to help understand why governments governments on the other, and instead towards a make the choices they do. The role and power of a debate that takes into account the very real range of different stakeholders should be challenges many states face about how to protect considered, from the courts to mainstream the safety of their citizens at the same time as journalists, sitting government officials to political protecting human rights. candidates, domestic publics to foreign publics, and local ISPs to international social media companies, to the likes of even terrorist organizations and the INOTRUODRUCTION Internet shutdowns are not a new phenomenon; it is the increasing scope and scale that make this an urgent issue. Debates over whether there should be a ‘kill switch’ for the internet, particularly in the context of cyberwarfare, have emerged in a range of jurisdictions (including thPe US, UEK, andR TurkeyF). WhiOle much hRas beenM written aAbout theN censorsChip stratEegies of authoritarian governments, less focus has been given to the choices some make to shut off access to the internet. It is the totality, the bluntness, and the intentionality of shutdowns that stand them apart from more targeted efforts at censorship, whether blocking certain websites, arresting particular bloggers, or making it a crime to post messages about an unfolding event on social media. The current one is likely a unique moment in the life of internet shutdowns. They are a tool that appeals to certain governments but also one that is unlikely to persist or remain as popular as governments increase their surveillance capacity and improve their more targeted tools for co- opting and manipulating public opinion. More subtle tactics are gaining traction such as the unleashing of troll armies on critics that can involve many people adopting fake identities and flooding social media or particular forums with a specific message and the intention to drown out opposing voices. Bots, or automated programmes, have also been effective at distorting conversations by overwhelming certain platforms with misinformation and fake news. The growing concern is, as some have argued, not censorship or the restriction of voices but actually too much information, much of it low quality and even harmful, and the competition inherent in the modern attention economy. Governments are increasingly finding innovative ways of discouraging the use of certain social media platforms through creating networks of incentives and disincentives, whether by the implementation of social media taxes, as seen in Uganda, or through the use of social credit – looking at a variety of aspects of citizen’s behaviour both on and offline – growing in influence in China. The legacy of internet shutdowns is chequered. The trend towards using them as a tactic for managing protests really gained traction after their use in Egypt in 2011. As protests against Hosni Mubarak gained steam, the government shut off domestic access to the internet by closing four of the country’s major internet service providers (ISPs) (Richtel, 2011).
Recommended publications
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • The Right to Development and Internet Shutdowns
    D Mburu Nyokabi, N Diallo, NW Ntesang, TK White & T Ilori ‘The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa’ (2019) 3 Global Campus Human Rights Journal 147-172 https://doi.org/20.500.11825/1582 The right to development and internet shutdowns: Assessing the role of information and communications technology in democratic development in Africa Deborah Mburu Nyokabi,* Naa Diallo,* Nozizwe W Ntesang,*** Thomas Kagiso White**** and Tomiwa Ilori***** Abstract: The right to development is generally assessed as an all-inclusive right. It is regarded as a rallying right in which all other rights are mostly realised. The progressive nature of the right to development in realising other rights as a benchmark to a society’s development has become popular even beyond legal jurisprudence to include other qualitative fields of knowledge. The role played by information and communications technology in the realisation of this right has also been acknowledged, particularly in the digital age. However, this progress has not been even across regions in the world. While some regions have experienced a fast-paced development due to ICT, several countries in Africa have been held back due to unfavourable state and non-state policies that have had negative impacts on human rights and democratic development on the continent. This article assesses the impact of ICT on the right to development, particularly as a rallying right, and the way in which the internet, a major component of ICT, has affected the right. The article especially considers the effects of network disruptions on human rights and democratic development that have become rife in the region.
    [Show full text]
  • Never Agains IV February 2010
    the Availability Digest www.availabilitydigest.com More Never Agains IV February 2010 It is once again time to reflect on the damage that IT systems can inflict on us mere humans. We have come a long way in ensuring the high availability of our data-processing systems. But as the following stories show, we still have a ways to go. During the last six months, hardware/software and network faults shared responsibility, each causing about one-third of the outages. The rest of the outages were caused by a variety of problems such as power failures, construction mishaps, and hacking. Rackspace Hit with Another Outage Techcrunch, June 20, 2009 – On June 20, Rackspace suffered yet another outage1 due to a power failure. The breaker on the primary utility feed powering one of its nine data centers tripped, causing data center’s generators to start up. However, a field excitation failure escalated to the point that the generators became overloaded. An attempt by Rackspace to fail over to its secondary utility feed failed because the transfer switch malfunctioned. When the data center’s batteries ran out, the data center went down. Failovers do fail. Have a contingency plan no matter the extent of your redundancy. NYSE Suffers Several Outages in Less Than a Month Reuters, July 2, 2009 – On Thursday morning, July 2, brokers on the floor of the New York Stock Exchange found that they could not route orders, causing the NYSE to halt trading in some stocks and to extend the trading day. During the previous month, a software glitch halted trading; and an order-matching problem affected timely order reconciliation.
    [Show full text]
  • Availability Digest
    the Availability Digest www.availabilitydigest.com Help! My Data Center is Down! Part 3: Internet Outages December 2011 Long gone are the days of the isolated data center. Back then, batch jobs were submitted to update databases and to generate reports. Back then, turn-around times were measured in hours or even days. In today’s competitive environment, IT services are online; and instant response times are expected. What good is a data center if no one can talk to it? Orders can’t be placed or tracked. Medical records can’t be accessed. Online banking comes to a halt. Today’s data centers must be connected. They depend upon the networks that allow users to access them online reliably and with fast response times. In the old days, a company had control over its communication network. It leased lines that it used exclusively for its purposes. If it lost communications, it had direct access to its communication carrier for rapid repair. For critical applications, companies installed redundant communication facilities so that they could continue in operation even in the presence of a communications failure on one of their lines. Not so true today. More and more, companies are relying on the public Internet to connect their users with company data centers. But how reliable is the Internet? In our previous articles in this series, we related horror stories of unimaginable power failures and storage failures that took down the best-designed data centers. In this article, we explore some notable Internet failures that rendered data centers useless even though they were otherwise fully operational.
    [Show full text]
  • Potential Human Cost of Cyber Operations
    ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS REPORT ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Report prepared and edited by Laurent Gisel, senior legal adviser, and Lukasz Olejnik, scientific adviser on cyber, ICRC THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Table of Contents Foreword............................................................................................................................................. 3 Acknowledgements ............................................................................................................................. 4 Executive summary ............................................................................................................................. 5 Introduction....................................................................................................................................... 10 Session 1: Cyber operations in practice .………………………………………………………………………….….11 A. Understanding cyber operations with the cyber kill chain model ...................................................... 11 B. Operational purpose ................................................................................................................. 11 C. Trusted systems and software supply chain attacks ...................................................................... 13 D. Cyber capabilities and exploits ..................................................................................................
    [Show full text]
  • Media Intimidation in Fiji's 2014 Elections
    5 ‘Unfree and unfair’?: Media intimidation in Fiji’s 2014 elections David Robie Introduction Fiji was a media pariah among Pacific nations, as well as a political outcast, for much of the eight years after Voreqe Bainimarama’s military coup in December 2006. But while some media credibility was restored in the months leading up to the 2014 general elections and during the ballot itself, the elephant is still in the room: the 2010 Media Industry Development Decree (Fijian Government 2010). While this Decree remains in force, Fiji can hardly claim to have a truly free and fair media. Just seven months out from the September 17 elections, Fiji was ranked 107th out of 179 countries listed in the 2014 World Press Freedom Index prepared by the Paris-based global media freedom organisation Reporters Without Borders (RSF). That ranking was an improvement on the previous year (RSF 2014a), rising 10 places from the 2013 ranking. The major reason for this improvement was the adoption of the new Constitution on 6 September 2013, criticised as 83 THE PEOPLE Have SPOKEN it was in many quarters during that year, and the promise of ‘free and fair’ elections by 30 September 2014. The elections gave Fiji’s ranking a further boost, rising 14 places to 93rd (RSF 2015). There was considerable hope among news media and civil society groups that the general elections would open the door to a free media climate, which had been lacking since the coup. Over the past few months there has been a marked improvement in public debate and news media have been relatively more robust in terms of published political comment and debate, particularly in news columns and in letters to the editor.
    [Show full text]
  • The Collision of Social Media and Social Unrest: Why Shutting Down Social Media Is the Wrong Response, 11 Nw
    Northwestern Journal of Technology and Intellectual Property Volume 11 | Issue 7 Article 7 Fall 2013 The olC lision of Social Media and Social Unrest: Why Shutting Down Social Media is the Wrong Response Mirae Yang Recommended Citation Mirae Yang, The Collision of Social Media and Social Unrest: Why Shutting Down Social Media is the Wrong Response, 11 Nw. J. Tech. & Intell. Prop. 707 (2013). https://scholarlycommons.law.northwestern.edu/njtip/vol11/iss7/7 This Comment is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY The Collision of Social Media and Social Unrest: Why Shutting Down Social Media is the Wrong Response Mirae Yang September 2013 VOL. 11, NO. 7 © 2013 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2013 by Northwestern University School of Law Volume 11, Number 7 (September 2013) Northwestern Journal of Technology and Intellectual Property The Collision of Social Media and Social Unrest: Why Shutting Down Social Media is the Wrong Response By Mirae Yang∗ I. INTRODUCTION .............................................................................................. 708 II. THE RECENT HISTORY OF SOCIAL MEDIA'S EFFECT ON SOCIAL UPRISINGS ACROSS THE WORLD AND THE GOVERNMENT’S SUBSEQUENT
    [Show full text]
  • No Internet? February 2008
    the Availability Digest What? No Internet? February 2008 On Wednesday, January 30, 2008, North Africa, the Middle East, and India experienced a massive Internet outage that was destined to last for several days or even weeks.1 How did this happen? How did companies cope? Could it happen in other areas such as Europe or the United States? The Failure The bulk of data traffic from North Africa, from the Middle Eastern countries, and from India and Pakistan is routed through North Africa. There, it is carried by a set of three submarine cables that lie under the Mediterranean Sea. The cables link Alexandria, Egypt, with Palermo, Italy, where the traffic then moves on to Europe, the UK, and the Eastern United States. On January 30, 2008, two of these three cables were severed. It is not yet known why, but the predominant theory is that the cables were severed by the anchor of a huge freighter. Heavy storms had hit the area the previous day and forced Egyptian authorities to close the northern entrance to the Suez Canal at Alexandria. As a result, ships had to anchor offshore in the Mediterranean Sea, dropping their anchors to ride out the storm. It is suspected that one of the freighters dropped its anchor on top of the cables. Reportedly, the two severed cables were a kilometer apart. The storm may have dragged the freighter’s anchor across the sea bed, thus taking out both cables. The result of this catastrophe was that 75% of channel capacity was lost from the Mideast to Europe and beyond.
    [Show full text]
  • Does the Communications Act of 1934 Contain a Hidden Internet Kill Switch?
    FEDERAL COMMUNICATIONS LAW JOURNAL VOLUME 65 I SSUE 1 J ANUARY 2013 D OES THE COMMUNICATIONS ACT OF 1934 CONTAIN A H IDDEN INTERNET KILL SWITCH? David W. Opderbeck FEDERAL COMMUNICATIONS LAW JOURNAL VOLUME 65 ISSUE 1 JANUARY 2013 Editor-in-Chief DENNIS HOLMES Senior Managing Editor Senior Production Editor JONATHAN MCCORMACK JESSICA KRUPKE Senior Articles Editor Senior Notes Editor AVONNE BELL JOHN COX Articles Editors Managing Editors Notes Editors RHONDA ADATO N. JAY MALIK ALLARD CHU ROBERT HOPKINS KATHERINE MANTHEI BETSY GOODALL ROBERT VORHEES EMILY SILVEIRO-ALLEN JOSHUA KRESH CHARLES POLLACK Journal Staff KEENAN ADAMCHAK BEN ANDRES JAMES CHAPMAN ANDREW ERBER ADETOKUNBO FALADE DAVID HATEF MATHEW HATFIELD ADAM HOTTELL DARREL JOHN JIMENEZ EVIN LUONGO JAMI MEVORAH MILENA MIKAILOVA MELISSA MILCHMAN CLAYTON PREECE SEETA REBBAPRAGADA MEREDITH SHELL MICHAEL SHERLING MARY SHIELDS TOM STRUBLE HOLLY TROGDON MARGOT VANRIEL CARLA VOIGT BRANDON WHEATLEY MICHAEL WILLIAMS JARUCHAT SIRICHOKCHATCHAWAN Faculty Advisors PROFESSOR JEROME BARRON PROFESSOR KAREN THORNTON PROFESSOR DAWN NUNZIATO Adjunct Faculty Advisors MATTHEW GERST ETHAN LUCARELLI NATALIE ROISMAN RYAN WALLACH Published by the GEORGE WASHINGTON UNIVERSITY LAW SCHOOL and the FEDERAL COMMUNICATIONS BAR ASSOCIATION Does the Communications Act of 1934 Contain a Hidden Internet Kill Switch? David W. Opderbeck* TABLE OF CONTENTS I.! INTRODUCTION .................................................................................... 3! II.! THE WAR AND EMERGENCY POWERS IN SECTION 606 OF THE COMMUNICATIONS
    [Show full text]
  • The Myths and Realities of the Internet Kill Switch
    Science and Technology Law Review Volume 15 Number 2 Article 8 2012 Killing the Internet to Keep America Alive: The Myths and Realities of the Internet Kill Switch Scott M. Ruggiero Follow this and additional works at: https://scholar.smu.edu/scitech Recommended Citation Scott M. Ruggiero, Killing the Internet to Keep America Alive: The Myths and Realities of the Internet Kill Switch, 15 SMU SCI. & TECH. L. REV. 241 (2012) https://scholar.smu.edu/scitech/vol15/iss2/8 This Comment is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Science and Technology Law Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. Killing the Internet to Keep America Alive: The Myths and Realities of the Internet Kill Switch Scott M. Ruggiero* "Congress is debating a kill switch that would allow President Obama to freeze all activity on the Internet if there was a national emergency. The kill switch goes by the top-secret name 'Microsoft Windows."' -Conan 0' Brienl I. INTRODUCTION Does the President have the power to shut down the Internet in America? While much debate has centered on a proposed Senate bill that would have given the President an Internet "kill switch," 2 most Americans would be surprised to discover that the President has had this power for nearly seventy years-decades predating the creation of the Internet. This hot-button issue has resulted in the search of the phrase "Internet kill switch" over 539,000 times on Google.3 This paper will discuss the legality and constitutional implications of the "kill switch." Part I will discuss the history and background of the "kill switch." The first section of Part I discusses the law currently in effect.
    [Show full text]
  • Sarah Clemens* Journalists Face a Credibility Crisis, Plagued by Chants
    FROM FAIRNESS TO FAKE NEWS: HOW REGULATIONS CAN RESTORE PUBLIC TRUST IN THE MEDIA Sarah Clemens* Journalists face a credibility crisis, plagued by chants of fake news and a crowded rat race in the primetime ratings. Critics of the media look at journalists as the problem. Within this domain, legal scholarship has generated a plethora of pieces critiquing media credibility with less attention devoted to how and why public trust of the media has eroded. This Note offers a novel explanation and defense. To do so, it asserts the proposition that deregulating the media contributed to the proliferation of fake news and led to a decline in public trust of the media. To support this claim, this Note first briefly examines the historical underpinnings of the regulations that once made television broadcasters “public trustees” of the news. This Note also touches on the historical role of the Public Broadcasting Act that will serve as the legislative mechanism under which media regulations can be amended. Delving into what transpired as a result of deregulation and prodding the effects of limiting oversight over broadcast, this Note analyzes the current public perception of broadcast news, putting forth the hypothesis that deregulation is correlated to a negative public perception of broadcast news. This Note analyzes the effect of deregulation by exploring recent examples of what has emerged as a result of deregulation, including some of the most significant examples of misinformation in recent years. In so doing, it discusses reporting errors that occurred ahead of the Iraq War, analyzes how conspiracy theories spread in mainstream broadcast, and discusses the effect of partisan reporting on public perception of the media.
    [Show full text]
  • Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance
    Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance Extended Project Report from the Frederick S. Pardee Center for International Futures Josef Korbel School of International Studies University of Denver www.pardee.du.edu September 2015 Barry B. Hughes, David Bohl, Mohammod Irfan, Eli Margolese-Malin, and José Solórzano In project collaboration with and the Table of Contents Executive Summary 4 Conceptualizing Benefits and Costs 4 Using the IFs System for Analysis 4 Background Research Foundations 5 Forecasts and Findings 9 Conclusion 11 A Final Note on Study Contributions 12 1. Introduction: Understanding and Anticipating Change in the Benefits and Costs of Cyber Technology 13 2. ICT and Cyber Development Indices 18 Indices Replicated in the IFs Forecasting System 18 ICT Development Index 18 Global Cybersecurity Index 19 Additional Indices of Importance in Cyber Security Analyses 21 Digitization Index 21 Digital Economy Ranking Index 21 Networked Readiness Index 22 3. Benefits 23 Competing Schools of Thought on Economic Benefits 23 Pessimism Versus optimism concerning ICT’s economic production impacts 23 ICT as a general-purpose technology 25 ICT’s Economic Impact: The Production Side 26 ICT as a growth sector in the economy 26 ICT investment and capital services 29 ICT and multifactor productivity 32 Comparing the Productivity Impacts of GPTs: Steam, Electricity, ICT 33 Variation in ICT Impact across Time/Pervasiveness and Countries 36 Drivers of variation in ICT impact: ICT (especially broadband) pervasiveness 36 Drivers of variable ICT impact: Beyond PCs and broadband 39 Drivers of variable ICT impact: Country development level 41 Consumer Surplus 42 Consumer surplus forecasts 46 Summary of Knowledge Concerning Cyber Risk Benefits: Modeling Implications 47 4.
    [Show full text]