4,862 research outputs found

    Why Information Matters: A Foundation for Resilience

    Get PDF
    Embracing Change: The Critical Role of Information, a research project by the Internews' Center for Innovation & Learning, supported by the Rockefeller Foundation, combines Internews' longstanding effort to highlight the important role ofinformation with Rockefeller's groundbreaking work on resilience. The project focuses on three major aspects:- Building knowledge around the role of information in empowering communities to understand and adapt to different types of change: slow onset, long-term, and rapid onset / disruptive;- Identifying strategies and techniques for strengthening information ecosystems to support behavioral adaptation to disruptive change; and- Disseminating knowledge and principles to individuals, communities, the private sector, policymakers, and other partners so that they can incorporate healthy information ecosystems as a core element of their social resilience strategies

    An Overview and Examination of the Indian Services Sector

    Get PDF
    India’s service sector has grown rapidly since the 1990s. Domestic demand for services has increased as incomes have risen, triggering the expansion of industries such as banking, education, and telecommunications. Exports have also increased rapidly, led by information technology and business process outsourcing (IT-BPO). India’s ability to offer low-cost, high-quality IT-BPO services has made it a world leader in this industry. However, employment in services has not grown as quickly as output. The majority of India’s jobseekers are low-skilled, but demand for workers is growing fastest in higher-skill industries. The supply of highly-skilled workers has not kept pace with demand, causing wages to increase faster for these workers than for lower-skilled ones. India’s government has supported the growth of service industries through a mix of deregulation, liberalization, and incentive programs, such as the Software Technology Parks of India. Nevertheless, burdensome regulations, poor infrastructure, and foreign investment restrictions continue to affect service firms’ ability to do business. USITC analysis suggests that additional liberalization would lead to an increase in India’s imports of services

    The ECHELON Trail: An Illegal Vision

    Get PDF
    This article tells the story behind the uncovering of the US operated global telecommunications interceptions system now known as ECHELON. It begins with the use of fieldwork techniques in the early 1970's exploring the configuration of Britain's Post Office Towers – these were ostensibly the microwave links through which Britain's long distance telephone calls were made. This modelling process revealed a system within the system of microwave towers linked to the American Base of Menwith Hill in the North York Moors. All the key researchers were then promptly arrested, a raid by Special Branch on the author's university at Lancaster ensued and later a show trail for the other main researchers, most notably Duncan Campbell. Eventually in 1988, Duncan wrote up the ECHELON story, which for its time was an incredible piece of detective work using materials lifted from waste bins by the women activists campaigning around the Menwith Hill Base. Little notice was taken until 1997 when an obscure book by Nicky Hager, Secret Power explained the role and function of ECHELON in more depth. The author represented these findings in a policy report to the European Parliament on the technology of political control that led to a process of political debate and disagreement of the ethics of such a system which continues even today

    Understanding the threat of cybercrime: A comparative study of cybercrime and the ICT legislative frameworks of South Africa, Kenya, India, the United States and the United Kingdom’

    Get PDF
    As broadband infrastructure investments in developing nations intensify and barriers to accessing the internet diminish, the more they increasingly become the quintessential destination for cybercrime. For their lax cyber laws and general cybercrime illiteracy, developing nations such as South Africa, Kenya, and India have become the destination of choice for cybercriminal enterprises. The focus of this dissertation is to comparatively analyse South Africa’s ICT regulatory framework against those of developing and developed nations and to determine its effectiveness in addressing the threat posed by cybercrime. This dissertation hopes to contribute towards establishing a greater understanding and appreciation of the scourge of cybercrime by studying the frameworks, structures, and arrangements, installed to safeguard against the threat of cybercrime in both developing nations, namely Kenya and India, and developed nations, namely the United States of America and the United Kingdom. Some of the key challenges identified in the dissertation, arising from the analysis of South Africa’s cyber laws and policy framework, point to legislation that is out of date and in desperate need of revision, a lack of definitional clarity for cybercrime related terminology, jurisdiction limitations to investigate international cybercrimes, no harmonisation with international laws, standards, and a poor record of implementing strategy and policies. The dissertation concludes that the battle against cybercrime cannot be won without first understanding what cybercrime is. Developing a common understanding of cybercrime and related terminology, and recommends the revision of the necessary ICT strategies, policies, and regulatory frameworks. Concluding international cooperation and mutual assistance agreements to assist with transnational cybercrime investigations and prosecutions is paramount. Establishing cross-sector, intra-ministerial, public-private, and multinational partnerships is also vital to managing the threat of cybecrime. Lastly, this dissertation recommends the development of dedicated cybersecurity and cybercrime mechanisms for the prosecution and safeguarding of the nation’s critical information infrastructure, the mission critical information of corporates and the personal information of citizens against cybercrime

    Information and communication technologies and the dynamics of civil conflict

    Get PDF
    This thesis explores the impacts of information and communication technologies (ICTs) on the dynamics of civil conflict, through three journal-style articles that are interrelated but examine different research questions. The first article examines the rationale behind violent attacks on telecommunication infrastructure by non-state actors during civil wars. Building on existing literature concerning rebel targeting, it posits that rebel groups engage in such targeting when they perceive a significant risk to their survival. This risk becomes more pronounced as rebels confront military forces with enhanced capabilities for detecting and targeting militants. Additionally, the article sheds light on the specific tendencies driven by the ideology of the group concerning target selection. The second article investigates the potential use of modern communication technologies by rebel groups and their impact on organisational effectiveness in ongoing conflicts, focusing on the third-generation mobile network in Afghanistan as a case. It contends that the adoption of modern communication technologies can yield improvements in areas where rebels already utilise telecommunications to some degree, including in-group monitoring, indoctrination and propaganda, diffusion of knowledge, real-time coordination, and intelligence gathering. The third article explores how state control over ICT infrastructure can facilitate digital surveillance and hinder militant mobilisation, prolonging the escalation of armed conflict. By linking the control of companies to the ownership structure, it offers a comprehensive overview of how states can exploit their control over ICT infrastructure to detect potential uprisings and preemptively respond to armed challengers. The findings of this thesis underscore the paramount significance of information in civil conflicts, particularly in scenarios where significant disparities in capabilities exist between opposing forces. Moreover, the thesis enhances our understanding of the interplay between information and communication technologies and conflict dynamics, illuminating how conflict actors strategically adapt their approaches in response to the opportunities and challenges presented by communication technologies

    World Trends in Freedom of Expression and Media Development: 2017/2018 Global Report

    Get PDF
    Abstract: Please refer to full text to view abstrac

    Chinese Satellite Diplomacy: China\u27s Strategic Weapon for Soft and Hard Power Gains

    Get PDF
    China signed its first turn-key communication satellite contract with Nigeria in 2004. The contract stipulated that China would design, build, integrate, launch, and complete in-orbit checkout for the Nigcomsat-1 communication satellite and then transfer control over to Nigeria. By 2018, China had contracted and launched another six communication satellites for various foreign customers. The customers, who are foreign governments, are geographically dispersed throughout South America, Europe, Africa, and Asia. The satellite sales have occurred during China\u27s unprecedented economic growth, a time in which China has been granted additional foreign policy options as its power increases relative to others. This thesis utilizes lateral pressure theory to suggest that China has strategically signed contracts with foreign governments for the sale of communication satellites to further its foreign policy objectives. Examination of China\u27s space history, its foreign policy goals, and key variables shed light on China\u27s intentions and possible future actions
    • …
    corecore