Digital Technologies, Politics, and Society Across Africa
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ICC-ASP/18/25 Assembly of States Parties
International Criminal Court ICC-ASP/18/25 Distr.: General Assembly of States Parties 29 November 2019 Original: English Eighteenth session The Hague, 2-7 December 2019 Report of the Bureau on complementarity I. Background ................................................................................................................. 2 II. General findings .......................................................................................................... 2 III. The President of the Assembly of States Parties, and the Secretariat ......................... 4 IV. The Court .................................................................................................................... 6 V. Broader efforts of the international community .......................................................... 6 VI. Conclusion .................................................................................................................. 9 Annex I: Draft resolution language for the omnibus resolution ................................... 10 Annex II: Draft language for inclusion in the annex on mandates of the omnibus resolution ....................................................................................................... 12 Annex III: Summaries of 2019 meetings ......................................................................... 13 25E291119 ICC-ASP/18/25 I. Background 1. At its 7 February 2019 meeting, the Bureau re-appointed Australia and Romania as ad country focal points for the topic of complementarity. As such, Australia and -
Paths to Our Digital Future Table of Contents
INTERNET SOCIETY GLOBAL INTERNET REPORT Paths to Our Digital Future Table of Contents Foreword by Kathy Brown, Executive summary Introduction President and CEO, 5–13 14–16 Internet Society 3–4 How we see the Internet Drivers of Change Drivers of Change 16–19 & Areas of Impact 24–61 21–23 Areas of Impact What if? Recommendations 62–84 85–103 104–110 Conclusion Methodology Acknowledgements 111–113 114–117 118–119 internetsociety.org 2 Foreword Foreword by Kathy Brown, President and CEO, Internet Society The Internet Society’s history is inseparably tied to The Internet Society’s fourth annual Global Internet the history of the Internet itself. We were founded Report — Paths to Our Digital Future — explores in 1992 by Internet pioneers Bob Kahn and Vint Cerf, this important question. This comprehensive report along with numerous other visionary individuals brings together insights from across our diverse and organisations. These early Internet luminaries global community to inspire all who engage with the believed that ‘a society would emerge from the Internet to think differently and to prepare for the idea that is the Internet’. And they were right. The opportunities and challenges on the horizon. Internet has come a long way since its inception, and is now part of our social fabric — essential to how No one knows exactly how the Internet will evolve, we connect, communicate, create and collaborate. but we do know it will require new thinking, new approaches and new tools for this rapidly changing 2017 marks a significant milestone for the Internet world around us. Society. -
The Open Internet
The Open Internet What it is, and how to avoid mistaking it for something else. SEPTEMBER 2014 Introduction1 It is not by chance that we have enjoyed the extraordinary success of the Internet as a global engine of economic, political, cultural, and social progress. Fundamental principles embedded in the architecture of the Internet as a collaboration among designers, builders, providers, and users led directly to this success. Sustaining it will require a commitment by today’s policy makers to understand and respect those principles—not because they are honored by time or tradition, but because they confer tangible present and future benefits. The term "Open Internet" has been used so often and so freely that everyone knows what it means—or thinks they know what it means, and assumes that everyone else means the same thing when they use it. After all, the core enabling principle of the Internet as a system that includes users, applications, and infrastructure is openness, which infuses every aspect of the modern Internet—technical, economic, political, and social. But depending on the context in which it is used, the word open conveys different meanings, particularly when subtle (or not–so–subtle) variations are introduced by translation from one language to another; and because “openness” has become an important issue in many Internet political debates, defining what it means has become part of those debates. As is usually the case when people understand the terms and concepts of a debate differently, it will be difficult for us to resolve important issues of Internet policy until we reconcile our different understandings of open and openness in principle and in practice. -
North Korean Cyber Capabilities: in Brief
North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting. -
Assessment of ECOWAS Interventions in Guinea Bissau, Burkina Faso and the Gambia
International Journal of Research and Innovation in Social Science (IJRISS) |Volume II, Issue IV, April 2018|ISSN 2454-6186 Assessment of ECOWAS Interventions in Guinea Bissau, Burkina Faso and the Gambia Charles Akale1, Kingsley Chigozie Udegbunam2*, Julie Sanda3 1Research Fellow at the Centre for Strategic Research and Studies, National Defense College, Abuja, Nigeria 2Social Sciences Unit, School of General Studies, University of Nigeria, Nsukka, Nigeria 3Research Fellow at the Centre for Strategic Research and Studies, National Defence College, Abuja, Nigeria *Corresponding author: Kingsley Chigozie Udegbunam he increase in violent hostilities on the African continent ECOWAS MECHANISM FOR CONFLICT PREVENTION, T since the 1990s can be attributed to the withdrawal of MANAGEMENT, RESOLUTION, PEACEKEEPING AND super power strategic interest in Africa following the end of SECURITY the Cold War. The end of the Cold War dramatically The ECOWAS conflict management framework provides for changed the global strategic landscape. Although threat of regional intervention in political crisis in members states. big power and regional conflicts diminished, the security ECOMOG has been adopted as the regional intervention landscape became characterized by political fragmentation. force. Intervention became popular in the 1990s when In the Third World particularly West Africa has experienced ECOWAS deployed ECOMOG forces into Liberia to prevent many conflicts arising from a multiplicity of causes such as the overthrow of the unpopular government of President bad governance among others. The intensity and carnage that Samuel Doe by the National Patriotic Front of Liberia (NPFL) attended these conflicts, coupled with the inactions of the led by Charles Taylor. ECOMOG intervention can take the “big powers”, reinforced the need for an “African solution” form of peacekeeping or peace enforcement. -
PDF Communicating Fact Checks Online
FEBRUARY 2020 Communicating fact checks online Striking the balance between commanding attention and conveying information A JOINT BRIEFING FROM: About this briefing Misinformation causes real harm to people’s lives, health, finances and to democracy. We need good evidence on how to tackle it. This briefing is part of a research programme set up by Africa Check, Chequeado and Full Fact to find that evidence and make it useful. In this briefing Full Fact’s ResearcherDr. Dora-Olivia Vicol explores the evidence on how to communicate fact checks to strike the right balance between commanding attention and conveying information online. We thank Paula Szewach and the research team at the Africa Centre for Evidence for their help in gathering regional evidence. We also extend our warmest thanks to Prof. Lisa Fazio, Libby Miller and Tristan Fern for their kind comments on earlier drafts. We welcome feedback and comments at [email protected] Full Fact 2 Carlton Gardens London SW1Y 5AA k [email protected] D @FullFact K fullfact.org Africa Check Johannesburg K africacheck.org Chequeado Buenos Aires K chequeado.com This research was supported by a grant from Luminate. Published by Africa Check, Chequeado and Full Fact, February 2020. Published under the Creative Commons Attribution-ShareAlike 4.0 International License. Communicating fact checks online Contents Summary ������������������������������������������������������������������������������������������������������������������������������������������������������������������������4 Reach -
Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement
Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement Paper presented at Politics: Web 2.0: An International Conference New Political Communication Unit Royal Holloway, University of London April 17-18, 2008 Maja Turnšek University of Ljubljana, Faculty of Social Sciences, Slovenia [email protected] Nicholas W. Jankowski Virtual Knowledge Studio for the Humanities and Social Sciences, Amsterdam, The Netherlands [email protected] 1 Introduction Web 2.0 has become the buzz word describing a plethora of social media available on the internet, includingblogs, photo and file sharing systems (e.g., Flickr, SlideShare, YouTube), and social networking sites (e.g., Friendster, MySpace, SecondLife). Although these media are largely designed for personal presentation, political speech and action sometime emerge, such as in postings protesting government actions on YouTube, creation of candidate headquarters in SecondLife, and utilization of still image and video functionalities on mobile phones during demonstrations and police confrontations. Last year, as candidates began preparing for the U.S. Presidential Primaries, CNN coined the term YouTube-ification of Politics to describe this development. From a perspective ascribing importance to everyday settings as venues for political expression, these Internet-based social media have become both the tools for and sites of politics. The question, however, is how such manifestations of political life can be empirically investigated within a social science theoretical framework. In this paper we examine the theoretical and methodological approaches involved in studying social media utilized for political expression and action. In question form, we ask: How do empirically oriented social scientists consider the theoretical and methodological challenges involved in investigating social media? We address this question through examining a sample of research-oriented peer reviewed journal articles addressing facets of social media. -
Never Agains IV February 2010
the Availability Digest www.availabilitydigest.com More Never Agains IV February 2010 It is once again time to reflect on the damage that IT systems can inflict on us mere humans. We have come a long way in ensuring the high availability of our data-processing systems. But as the following stories show, we still have a ways to go. During the last six months, hardware/software and network faults shared responsibility, each causing about one-third of the outages. The rest of the outages were caused by a variety of problems such as power failures, construction mishaps, and hacking. Rackspace Hit with Another Outage Techcrunch, June 20, 2009 – On June 20, Rackspace suffered yet another outage1 due to a power failure. The breaker on the primary utility feed powering one of its nine data centers tripped, causing data center’s generators to start up. However, a field excitation failure escalated to the point that the generators became overloaded. An attempt by Rackspace to fail over to its secondary utility feed failed because the transfer switch malfunctioned. When the data center’s batteries ran out, the data center went down. Failovers do fail. Have a contingency plan no matter the extent of your redundancy. NYSE Suffers Several Outages in Less Than a Month Reuters, July 2, 2009 – On Thursday morning, July 2, brokers on the floor of the New York Stock Exchange found that they could not route orders, causing the NYSE to halt trading in some stocks and to extend the trading day. During the previous month, a software glitch halted trading; and an order-matching problem affected timely order reconciliation. -
Mathematics in African History and Cultures
Paulus Gerdes & Ahmed Djebbar MATHEMATICS IN AFRICAN HISTORY AND CULTURES: AN ANNOTATED BIBLIOGRAPHY African Mathematical Union Commission on the History of Mathematics in Africa (AMUCHMA) Mathematics in African History and Cultures Second edition, 2007 First edition: African Mathematical Union, Cape Town, South Africa, 2004 ISBN: 978-1-4303-1537-7 Published by Lulu. Copyright © 2007 by Paulus Gerdes & Ahmed Djebbar Authors Paulus Gerdes Research Centre for Mathematics, Culture and Education, C.P. 915, Maputo, Mozambique E-mail: [email protected] Ahmed Djebbar Département de mathématiques, Bt. M 2, Université de Lille 1, 59655 Villeneuve D’Asq Cedex, France E-mail: [email protected], [email protected] Cover design inspired by a pattern on a mat woven in the 19th century by a Yombe woman from the Lower Congo area (Cf. GER-04b, p. 96). 2 Table of contents page Preface by the President of the African 7 Mathematical Union (Prof. Jan Persens) Introduction 9 Introduction to the new edition 14 Bibliography A 15 B 43 C 65 D 77 E 105 F 115 G 121 H 162 I 173 J 179 K 182 L 194 M 207 N 223 O 228 P 234 R 241 S 252 T 274 U 281 V 283 3 Mathematics in African History and Cultures page W 290 Y 296 Z 298 Appendices 1 On mathematicians of African descent / 307 Diaspora 2 Publications by Africans on the History of 313 Mathematics outside Africa (including reviews of these publications) 3 On Time-reckoning and Astronomy in 317 African History and Cultures 4 String figures in Africa 338 5 Examples of other Mathematical Books and 343 -
2018-2019 Year in Review
Year in Review 2018–2019 Table of Contents Reflections on the Year ..................................................................................................4 From the Headlines ..........................................................................................................6 Letter from the Faculty Chair ........................................................................................8 Our Work ............................................................................................................................9 Programs ............................................................................................................10 AGTech Forum .................................................................................................................................10 Assembly ..........................................................................................................................................11 CopyrightX .......................................................................................................................................13 Cyberlaw Clinic ..............................................................................................................................14 Techtopia ..........................................................................................................................................16 Spotlight: Ethics and Governance of Artificial Intelligence Initiative 17 Projects & Tools ................................................................................................20 -
OUT of AFRICA: Byting Down on Wildlife Cybercrime CONTENTS
OUT OF AFRICA: Byting Down on Wildlife Cybercrime CONTENTS 1 | EXECUTIVE SUMMARY 2 2 | BACKGROUND 4 3 | RESEARCHING ONLINE WILDLIFE TRADE IN AFRICA 5 4 | KEY RESULTS AT A GLANCE 7 5 | METHODOLOGY 9 6 | CITES AND WILDLIFE CYBERCRIME 10 7 | OUR PARTNERS 11 8 | INTERNET USE IN AFRICA 13 9 | SUMMARY RESULTS 14 10 | RESULTS BY COUNTRY 19 SOUTH AFRICA • NIGERIA • IVORY COAST • KENYA • TANZANIA • UGANDA • ETHIOPIA 11 | CONCLUSIONS AND RECOMMENDATIONS 29 1 | EXECUTIVE SUMMARY The International Fund for Animal Welfare (IFAW) This research is part of a broader project to has been researching the threat that online wildlife address wildlife cybercrime in Africa, funded by the trade poses to endangered species since 2004. During US government’s Department of State’s Bureau of that time, our research in over 25 countries around International Narcotics and Law Enforcement Affairs the globe has revealed the vast scale of trade in wildlife (INL). The wider project included researching trade in and their parts and products on the world’s largest elephant, rhino and tiger products over the 'Darknet'; marketplace, the Internet - a market that is open for providing training on investigating wildlife cybercrime business 24 hours a day, 365 days a year. to enforcers in South Africa and Kenya; ensuring policy Whilst legal trade exists in respect of many species makers addressed the threat of wildlife cybercrime of wildlife, online platforms can provide easy opportunities through adopting Decision 17.92 entitled Combatting for criminal activities. Trade over the Internet is often Wildlife Cybercrime at the CoP17 of the Convention largely unregulated and anonymous, often with little to on International Trade in Endangered Species of Wild no monitoring or enforcement action being taken against Fauna and Flora (CITES) in Johannesburg 2016; carrying wildlife cybercriminals. -
Democratic Strain and Popular Discontent in Europe: Responding to the Challenges Facing Liberal Democracies
DEMOCRATIC STRAIN AND POPULAR DISCONTENT IN EUROPE: RESPONDING TO THE CHALLENGES FACING LIBERAL DEMOCRACIES Report of the Standing Committee on Foreign Affairs and International Development Michael Levitt, Chair JUNE 2019 42nd PARLIAMENT, 1st SESSION Published under the authority of the Speaker of the House of Commons SPEAKER’S PERMISSION The proceedings of the House of Commons and its Committees are hereby made available to provide greater public access. The parliamentary privilege of the House of Commons to control the publication and broadcast of the proceedings of the House of Commons and its Committees is nonetheless reserved. All copyrights therein are also reserved. Reproduction of the proceedings of the House of Commons and its Committees, in whole or in part and in any medium, is hereby permitted provided that the reproduction is accurate and is not presented as official. This permission does not extend to reproduction, distribution or use for commercial purpose of financial gain. Reproduction or use outside this permission or without authorization may be treated as copyright infringement in accordance with the Copyright Act. Authorization may be obtained on written application to the Office of the Speaker of the House of Commons. Reproduction in accordance with this permission does not constitute publication under the authority of the House of Commons. The absolute privilege that applies to the proceedings of the House of Commons does not extend to these permitted reproductions. Where a reproduction includes briefs to a Standing Committee of the House of Commons, authorization for reproduction may be required from the authors in accordance with the Copyright Act.