"This report aims to bridge two communities – the broader development community and the cybersecurity capacity building community – to achieve more resilient outcomes by ensuring incorporation of cybersecurity and digital resilience into digital development activities. This report is a product o
...
f the partnership between the World Bank and the Global Forum on Cyber Expertise (GFCE) Foundation, who recognize the importance of including cybersecurity, digital resilience, and cyber capacity building (CCB) as components of development projects. They also understand that advocates are needed to promote the eligibility of these activities for assistance in the broader development agenda." (Aim and objectives, page 11)
more
"Welcome to the AI journalism Starter Pack, a guide designed to help news organisations learn about the opportunities offered by artificial intelligence (AI) to support their journalism. This guide will be of use to any news organisation approaching AI technologies but it is especially targeted at s
...
mall and local publishers." (Introduction)
more
"1. Participants used a mix of social media platforms and TV/radio to acquire news. Word of mouth was also a noteworthy source of information. Many participants expressed a distaste for comment sections. It was generally agreed that information found on social media should not be taken as truth.
2.
...
The majority of attendees verified information they acquired, especially news from social media platforms. News that was not credible was deemed not worthy of sharing. The participants were scrupulous when it came to cross referencing news.
3. Global news sites were perceived as more trustworthy when it came to international news. The New York Times, for example, was mentioned multiple times.
4. Participants were open to a diverse range of topics including politics, culture, and women’s rights. They felt that education and local tourism as standalone subjects were overused. The integration of mental health resources into the education system sparked discussion and tackled a concept many deemed important." (Findings, page 6)
more
"On the one hand, “Free Flow of Data” is advocated by many as a critical enabler of digital transformation, innovation, economic growth and social benefits. At the same time, various concerns related to privacy, taxation, competition, security, and even the democratic process, have prompted poli
...
cy initiatives invoking the notion of “Data Sovereignty”. “Free flow” and “sovereignty” are terms which strongly resonate with policy-makers, businesses and even citizens. Their coupling with the word data too often generates visceral reactions and intense exchanges devoid of nuance, in a context of heated debates about the impacts of digitalization and growing geopolitical tensions. The diversity of sectoral silos where discussions are conducted worsens the situation and makes solutions even harder to find. This framing report seeks to unpack these two polarizing expressions to better understand actors’ perspectives, and shift the debate towards reconciling apparently conflicting approaches. The goal is not to provide a comprehensive overview of all the issues and stakeholder views, but to offer a holistic snapshot of the concerns and prominent perspectives to kick-start further debate. The report is organized in three self-explanatory parts: Data, Free Flows of Data, and Data Sovereignty. It concludes, in Moving Forward, with a call to reframe the discussion, harness emerging innovative approaches, and engage in a much needed global, multistakeholder and cross-sectoral debate." (Introduction)
more
"This book investigates the ways in which the mobile telephone has transformed societies around the world, bringing both opportunities and challenges. At a time when knowledge and truth are increasingly contested, the book asks how mobile technology has changed the ways in which people create, disse
...
minate, and access knowledge. Worldwide, mobile internet access has surpassed desktop access, and it is estimated that by 2022 there will be an excess of 6 billion mobile phone users in the world. This widespread proliferation raises all sorts of questions around who creates knowledge, how is that knowledge shared and proliferated, and what are the structural political, economic, and legal conditions in which knowledge is accessed. The practices and power dynamics around mobile technologies are location specific. They look different depending on whether one chooses to highlight the legal, social, political, or economic context. Bringing together scholars, journalists, activists and practitioners from around the world, this book embraces this complexity, providing a multifaceted picture that acknowledges the tensions and contradictions surrounding accessing knowledge through mobile technologies. With case studies from Hong Kong, South Korea, India, Syria, Egypt, Botswana, Brazil, and the US, this book provides an important account of the changing nature of our access to knowledge, and is key reading for students, researchers, activists and policy makers with an interest in technology and access to knowledge, communication, social transformation, and global development." (Publisher description)
more
"In this report, we highlight how privacy and data protection violations by state and non-state actors are compounded by the lack of legal data protection safeguards which would obligate public entities, private companies, and international organizations to respect and adhere to data protection prin
...
ciples, empower users to take agency and control over their personal information, and create mechanisms for grievance and redress when such violations occur. We explore these issues and propose safeguards and policy recommendations for those involved in the collection and processing of personal data: governments, private companies, and international aid organizations. We include case studies for Jordan, Lebanon, Palestine, and Tunisia. Our goal is not to include an exhaustive list of all cases related to data protection, but to present a few key illustrative cases for each country." (Executive summary, page 3)
more
"The paper looks at 6 areas where the EU can tackle digitalisation while strengthening development and democracy at the same time. These are: automated decision-making in public administration; data protection; internet access; accountability and control of tech; a free information environment, and;
...
the digital divide. Four broad conclusions emerge from the analysis: The global nature of digitalisation, combined with the local impact of its consequences, places all the challenges and possible responses outlined above in a sort of operational middle-ground, a policy arena where the multilateral and the bilateral must converge to deliver results that do not undermine each other. Arguably, this is what will ultimately determine the success or failure of ‘geographisation’: the capacity of EU Delegations to develop fruitful partnerships with partner countries to jointly tackle the most pressing global challenges – not only digitalisation, but also climate change, migration or inequalities – while responding to the most urgent needs of their populations." (Executive summary)
more
"Efforts to establish or improve national identification systems in Africa have coincided with the increasing deployment of mobile technology. This has led to the prioritisation of digital “solutions” for facilitating forms of identification and registration – often via biometric attributes [.
...
..] Research ICT Africa (RIA) and the Centre for Internet and Society (CIS) partnered in 2020 and 2021 to investigate, map, and report on the state of digital identity ecosystems in 10 African countries. The project looked at local, digitised (in full or partially) foundational ID systems in Ghana, Kenya, Lesotho, Mozambique, Nigeria, Rwanda, South Africa, Tanzania, Uganda, and Zimbabwe. The project set out to contribute to the broader question of whether digital identity ecosystems increase choices and opportunities for Africans, or whether they exacerbate the multidimensional aspects of digital inequality on the continent." (Executive summary)
more
"The smartphone is often literally right in front of our nose, so you would think we would know what it is. But do we? To find out, 11 anthropologists each spent 16 months living in communities in Africa, Asia, Europe and South America, focusing on the take up of smartphones by older people. Their r
...
esearch reveals that smartphones are technology for everyone, not just for the young. The Global Smartphone presents a series of original perspectives deriving from this global and comparative research project. Smartphones have become as much a place within which we live as a device we use to provide 'perpetual opportunism', as they are always with us. The authors show how the smartphone is more than an 'app device' and explore differences between what people say about smartphones and how they use them. The smartphone is unprecedented in the degree to which we can transform it. As a result, it quickly assimilates personal values. In order to comprehend it, we must take into consideration a range of national and cultural nuances, such as visual communication in China and Japan, mobile money in Cameroon and Uganda, and access to health information in Chile and Ireland - all alongside diverse trajectories of ageing in Al Quds, Brazil and Italy. Only then can we know what a smartphone is and understand its consequences for people's lives around the world." (Publisher description)
more
"Prioritizing connection over correction, 'Parenting Generation Screen' is a guide for parents that will equip you with key questions and conversations to help you process screen limits with and for your kids. You’ll learn how to dialogue in meaningful ways about social media, entertainment, and s
...
creen time so your children can learn to be wise in the digital world. Jonathan McKee speaks worldwide and writes about technology and social media for families, and has three kids of his own. In Parenting Generation Screen, he addresses such questions as: At what age should my child get a phone or screen? Can my child have a phone in their bedroom? How does social media affect my teenager’s mental health and sleep? What dangers are really lurking on social media? How can moms and dads best use parental controls? In this extremely practical book, you’ll gain confidence and find the answers you need to set boundaries, guide your kids, and help them navigate the digital landscape." (Publisher description)
more
"The opportunity for further growth in the ICT sector by leveraging the sizeable youth workforce, including females, is immense. The Skills to Succeed program in Bangladesh helps vulnerable youth (ages 15-24), living in slum communities, develop employability, ICT technical and entrepreneurship skil
...
ls, and provides job linkage services to prepare them to obtain decent work in the ICT & Business Process Outsourcing (BPO) value chain, from which marginalized youth have traditionally been excluded. Since 2017, 10,800 youth have received employability skills training (41% female). Additionally, 6,810 youth have received vocational training in ICT and 2,730 entrepreneurship training. Of these, 3,117 youth have been placed in jobs and 504 in self-employment.
One of the key learnings from the S2S program in Bangladesh is that, in order for youth to be more likely to advance in the ICT sector, where technology leaps forward at a fast pace, they need to become lifelong learners and, ideally, develop technology skills at an earlier age. This is why the S2S program is expanding to reach marginalized in-school and out-of-school very young adolescents (ages 10 to 14) to build their life skills, growth mindset and digital skills so they are able to continuously learn, adapt and be prepared to take advantage of the jobs of the future.
An innovative approach for providing access to the internet and build the digital skills of to the most marginalized adolescents and youth in Bangladesh, particularly girls, is the use of a Mobile Training Center (MTC). The MTC moves around Chattogram to provide skills training to adolescent girls and boys at their doorsteps. The MTC has one technical instructor and two life skills trainers. These instructors facilitate a 24-hour training on life skills and growth mindset, and a 24-hour training on digital literacy and citizenship. The MTC is set up in a large bus, it is equipped with 15 laptop computers, internet connection, and furniture to facilitate trainings. Internet access is provided through 3G/4G portable Router Access Points. Service is procured from high quality mobile network service providers in Bangladesh, such as Grameen Phone or Robi, with whom the program has corporate agreements.
By meeting adolescents close to their homes and communities, the MTC will overcome common participation barriers for marginalized and vulnerable adolescents, such as personal safety and the time and cost of traveling to training centers. These barriers frequently prevent girls from pursuing or completing trainings." (Pages 1-2)
more
"El smartphone se ha convertido tanto en un lugar dentro del cual vivimos como en un aparato que usamos para tener “oportunismo perpetuo”, pues siempre está con nosotros. Los autores muestran cómo el smartphone es más un “aparato con aplicaciones” y exploran las diferencias entre lo que l
...
as personas dicen de él y la forma cómo lo usan. El smartphone no tiene precedentes por el grado en el cual podemos transformarlo. Como resultado, rápidamente asimila nuestros valores personales. Para comprenderlo debemos considerar una serie de matices nacionales y culturales, tales como la comunicación visual en China y Japón, el dinero móvil en Camerún y Uganda, y el acceso a la información de salud en Chile e Irlanda, junto a las diversas trayectorias del envejecimiento en Al-Quds, Brasil e Italia. Solo entonces sabremos qué es el smartphone y podremos comprender sus consecuencias en las vidas de las personas alrededor del mundo." (Cubierta del libro)
more
"This handbook explains how internet shutdowns undermine democractic elections and provides tips and recommendations for key actors to navigate shutdowns and understand and assess the extent to which an election taking place under a shutdown is free and fair. It is aimed at election observers, peopl
...
e on diplomatic missions, journalists, and human rights activists in particular." (Introduction)
more
"There is no question that we must address the issues of child safety, disinformation, national security, and criminal activity in the digital age. However, even if the stated end goal for mandating encryption backdoors is legitimate, the means must be necessary and proportionate. Deliberately intro
...
ducing security weaknesses in encrypted systems fails this test. Weakening encryption will create more dangers than it will prevent. Further, there is no evidence base for claiming that breaking encryption will achieve the desired outcomes. At best, exceptional access to encrypted content will only serve as a short-term or partial solution for law enforcement. As we have explained in this brief, encryption is a vital tool for the protection of human rights, democracy, cybersecurity, and the economy. The right to privacy and the right to freedom of expression are basic human rights, and in today’s digital world, we cannot meaningfully separate these rights from the need for secure online communication channels that are free from undue surveillance. Encryption is a crucial building block for a secure technological infrastructure, and governments should promote its use, not repeatedly seek to undermine it." (Conclusion, page 16)
more
"This evaluation is an analysis of the Mozilla Foundation’s grantmaking and fellowship work led by the F&A team from the beginning of 2016 through mid-2020. It seeks to understand: 1) the impacts of the programs on individual funding recipients and organizational partners, on the issues the progra
...
ms endeavor to address, and on the people most affected by those issues, 2) the strengths and challenges of the programs, for Mozilla staff, program participants and other stakeholders 3) how F&A’s work supports the impact goals laid out in Mozilla’s AI Theory of Change and 4) the ways in which the F&A program contributes to and is perceived by the broader internet health ecosystem [...] The evaluation found that the program furthers the foundation’s internet health goals and overall theory of change by investing in research, writing, art, and code that explores the role of the internet in society. The program attracts and grows a network of technologists, coders, educators, scientists, journalists and activists who are committed to advancing Mozilla’s mission. It also found that impact has been limited by a lack of clarity and communication around how program design and theory of change inform one another. Those surveyed felt that making the connection explicit would help the ecosystem and participants have clarity around the intentions of Mozilla’s work, crystalize strategy internally and externally, and help the foundation develop more effective impact measurements. Respondents indicated that the strengths and challenges of the F&A program were largely consistent across program tracks, types and models. This finding indicates that individual F&A programs have more in common than the team currently acknowledges, and that the different programs ultimately offer similar experiences to funding recipients." (Executive summary, page 12-13)
more
"Between 2016 and 2021, 68 shutdowns have been documented in 29 African countries. This demonstrates that government-mandated internet disruptions are an established norm in the region, despite very little scientific or social evidence demonstrating their effectiveness. A number of pointers and fact
...
ors signal the likelihood of an internet shutdown occurring. These include jurisdictions with authoritarian regimes, the duration of a president’s term in office, facilitating laws and policies, protests, national exams, and the election season. In practice, shutdowns are typically ordered by the executive arm of government and implemented by private actors, namely telecom operators and internet service providers (ISPs). Six primary methods are used to implement full and partial shutdowns, including throttling, IP blocking, mobile data shutoffs, domain name system (DNS) interference, server name identification blocking, and deep packet inspection (DPI)." (Executive summary)
more