"This toolkit is a guide to skills that will empower digital innovation ecosystem actors to turn a community into a thriving a digital society. Developing strong innovation ecosystems is a key component of national development, as innovation — especially in ICTs — is a driver of economic competi
...
tiveness and growth in modern economies. This document will help readers build ICT-centric innovation ecosystems that contribute to thriving communities.
Section 1 provides the reader with the language to understand an ICT-centric innovation ecosystem, defines “innovation” and “digital transformation”, and provides tools to measure ecosystem performance in their community. It provides additional background information on the current state of these ecosystems and why they are necessary in the digital era. The section additionally explores the challenges and opportunities facing most ecosystems and introduces the three engines of growth. Understanding these concepts is essential to a champion’s success in their innovation journey.
Section 2 provides an overview of how to acquire, practice and apply relevant new skills to the ecosystem. It contextualizes the stages along the journey at which each skill will be useful. It also lays out the essentials for organizing the ecosystem-building journey. There is an in-depth description of the tools and basic concepts mentioned in Section 1. Lastly, this section includes checklists to help prepare for the journey, as well as the investment a facilitator or ecosystem builder should consider making.
Section 3 provides case studies that demonstrate how to (i) use the tools introduced in the previous sections to assess ICT-centric ecosystems, and (ii) develop a project that creates an environment conducive to innovation. The first case study explains how to develop a digital innovation profile for an ecosystem. The second case study develops a flagship project to create a sustainable, nurturing environment for inclusive digital transformation. Both cases offer insights from applying the tools." (Executive summary)
more
"There are several overarching reasons why billions of people remain offline, ranging from a lack of network infrastructure availability and affordable Internet services to gaps in skills and ability, the availability and cost of personal devices, and a perceived lack of relevancy. For example, over
...
750 million people (approximately 10 per cent of the global population) are not covered by mobile broadband (3G or higher).2 This lack of coverage is particularly concentrated in rural and remote areas. In addition to the coverage gap, usage gaps exist in places with broadband coverage. For example, while up to 31 per cent of individuals in Africa do not have mobile broadband coverage, around 45 per cent do not use mobile Internet even though they live in places with mobile coverage. Estimates also suggest that there are at least 88 countries worldwide where average prices for entry-level mobile broadband service are considered unaffordable (above 2 per cent of average monthly GNI per capita).
The Last-Mile Connectivity Internet Solutions Guide was developed to support the design and development of programmes and interventions that address two of these main issues: the lack of Internet infrastructure availability in certain areas; high Internet service prices that make Internet connectivity unaffordable for local populations. The Solutions Guide presents a methodology for introducing sustainable, affordable connectivity solutions in unconnected and underserved geographies. Although the other challenges (e.g. digital literacy, personal devices and locally relevant content) are as important, they are not the focus here, as they are addressed in depth in other resources listed in the Annex 2. This Solutions Guide was developed to help accelerate actions by Member States to address last-mile Internet connectivity issues in situations that include a lack of network infrastructure and with a view to encouraging more affordable service delivery. It has been written from the perspective of localities and users in geographies without Internet access: the last-mile connectivity communities. The tools, service interventions and policy solutions therefore reflect how best to extend Internet access to those localities, taking into account their unique characteristics." (Executive summary)
more
"Higher levels of disposable incomes, growing urbanization and mobility, and further industrialization in some parts of the world are leading to growing amounts of EEE. On average, the total weight (excluding photovoltaic panels) of global EEE consumption increases annually by 2.5 million metric ton
...
s (Mt). After its use, EEE is disposed of, generating a waste stream that contains hazardous and valuable materials. This waste stream is referred to as e-waste, or Waste Electrical and Electronic Equipment (WEEE), a term used mainly in Europe. This monitor provides the most comprehensive update of global e-waste statistics. In 2019, the world generated a striking 53.6 Mt of e-waste, an average of 7.3 kg per capita. The global generation of e-waste grew by 9.2 Mt since 2014 and is projected to grow to 74.7 Mt by 2030 – almost doubling in only 16 years.
The growing amount of e-waste is mainly fueled by higher consumption rates of EEE, short life cycles, and few repair options. Asia generated the highest quantity of e-waste in 2019 at 24.9 Mt, followed by the Americas (13.1 Mt) and Europe (12 Mt), while Africa and Oceania generated 2.9 Mt and 0.7 Mt, respectively. Europe ranked first worldwide in terms of e-waste generation per capita, with 16.2 kg per capita. Oceania was second (16.1 kg per capita), followed by the Americas (13.3 kg per capita), while Asia and Africa generated just 5.6 and 2.5 kg per capita, respectively. In 2019, the formal documented collection and recycling was 9.3 Mt, thus 17.4% compared to e-waste generated. It grew with 1.8 Mt since 2014, an annual growth of almost 0.4 Mt. However, the total e-waste generation increased by 9.2 Mt, with an annual growth of almost 2 Mt. Thus the recycling activities are not keeping pace with the global growth of e-waste. The statistics show that in 2019, the continent with the highest collection and recycling rate was Europe with 42.5%, Asia ranked second at 11.7%, the Americas and Oceania were similar at 9.4% and 8.8%, respectively, and Africa had the lowest rate at 0.9%. The fate of 82.6% (44.3 Mt) of e-waste generated in 2019 is uncertain, and its whereabouts and the environmental impact varies across the different regions." (Executive summary, pages 13-14)
more
"The DFS Consumer Competency Framework identifies the knowledge, skills and attitudes consumers need to participate actively, safely and have trust in the digital financial services ecosystem. The DFS Consumer Competency Framework is intended for use by public authorities, regulators, DFS providers
...
and policymakers when developing consumer education/training programmes for digital financial services. The DFS Consumer Competency Framework will provide guidance to policymakers, national regulators and DFS providers when developing consumer awareness and literacy programmes as part of the DFS/financial inclusion strategy. Regulators and DFS providers can select from the skills that are critical and which are most relevant to their consumer awareness and literacy programmes." (Executive summary, page 6)
more
"Nearly USD 428 billion is required to achieve universal access to broadband connectivity by 2030 at the global level. This amount includes significant investment in infrastructure, investments to design and implement policy and regulatory frameworks that incentivize and promote growth in broadband
...
connectivity and investments to support and equip populations around the world with the necessary basic digital skills (the skills necessary to navigate the Internet and to use commonly available local applications) and the content needed to benefit meaningfully from broadband access and use.
Achieving the target of connecting all of humanity to broadband Internet by 2030 is, above all, an infrastructure investment challenge. Around 2.6million 4G BTS and700 000 km of backbone fibre transmission infrastructure would have to be rolled out on top of the existing broadband network capabilities. Around 90 per cent of the required investments are directly tied to the need to roll out and maintain broadband networks to support the additional connected user base and related traffic. In addition, 40 per cent of total investments would have to be allocated to CAPEX buildout for last mile broadband and transmission networks capable of reaching and serving at least 90 per cent of the target population. This shows that deploying new infrastructure and upgrading the existing one will be necessary to guarantee a 4G equivalent connection to everyone. While in some regions bridging the connectivity gap predominantly means upgrading existing coverage and capacity sites, nearly half of the required radio access network (RAN) infrastructure investment in Sub-Saharan Africa, South Asia and East Asia/Pacific will be greenfield. This increases the overall weight of investments in such regions to a large extent, especially given the fact that greenfield CAPEX often demands equity premium. Moreover, considerably more capacity would be needed as technology evolves and demand grows, and this means existing infrastructure reach and capacity will constantly need to be expanded." (Pages 4-5)
more
"Este manual no pretende en ningún caso ser conclusivo, ni ofrecer recetas para migrar a software libre, quiere ser un espacio que reúne experiencias como coordenadas comunes de la brújula que marca la política tecnológica y de contenido de ALER. Por ello, dejamos abierta la posibilidad de segu
...
ir dialogando sobre acuerdos que nos permitan profundizar la incidencia en favor de los derechos humanos y de la naturaleza, que se nos hace tan urgente en nuestra Abya Yala. Tenemos el gusto de compartir este manual de Migración a tecnologías libres que responde a la iniciativa de pensar, proponer e intercambiar prácticas comunicativas orientadas al Buen Vivir, que como sabemos, son diversos y variopintos caminos que están en debate y construcción permanente. Invitamos a dejarnos interpelar, a cuestionar nuestras rutinas de producción, con el compromiso ético que nos permita hacer los mundos que necesitamos a través de la palabra." (Presentación, página 4)
more
"This is the true story of how, against all odds, a remote Mexican pueblo built its own autonomous cell phone network – without help from telecom companies or the government. Anthropologist Roberto J. González paints a vivid and nuanced picture of life in a Oaxaca mountain village and the collect
...
ive tribulation, triumph, and tragedy the community experienced in pursuit of getting connected. In doing so, this book captures the challenges and contradictions facing Mexico's indigenous peoples today, as they struggle to wire themselves into the 21st century using mobile technologies, ingenuity, and sheer determination. It also holds a broader lesson about the great paradox of the digital age, by exploring how constant connection through virtual worlds can hinder our ability to communicate with those around us." (Back cover)
more
"Contrary to optimistic visions of a free internet for all, the problem of the 'digital divide' - the disparity between those with access to internet technology and those without - has persisted for close to twenty-five years. In this textbook, Jan van Dijk considers the state of digital inequality
...
and what we can do to tackle it. Through an accessible framework based on empirical research, he explores the motivations and challenges of seeking access and the development of requisite digital skills. He addresses key questions such as: Does digital inequality reduce or reinforce existing, traditional inequalities? Does it create new, previously unknown social inequalities? While digital inequality affects all aspects of society and the problem is here to stay, Van Dijk outlines policies we can put in place to mitigate it." (Back cover)
more
"Diese Themenausgabe ermöglicht einen ersten Einstieg in das Thema Digitalisierung. Sie vermittelt Grundkenntnisse über die digitale Infrastruktur und bietet einen breitgefächerten Überblick über die neuen technologischen Entwicklungen und deren Relevanz für Gesellschaft, Wirtschaft, Umwelt, B
...
ildung und Kultur. Diskutiert werden die aktuellen gesellschaftspolitischen Herausforderungen, die mit der Digitalisierung verbunden sind, sowie die Frage, wie sich das Verhältnis Mensch und Maschine in Zukunft demokratisch gestalten lässt." (Verlagsbeschreibung)
more
"Deberemos nacer —mejor dicho, renacer— en Internet si queremos tener futuro. De ahí la importancia de los dominios personales, de los nick names, de los avatares y de nuestros perfiles públicos en redes sociales. Somos el rastro que dejamos y el que otros dejan de nosotros. Es lo primero que
...
buscan los departamentos de recursos humanos o diferentes personas cuando se encuentran con alguien por primera vez. Y conocer, comprender y manejar los nuevos lenguajes (de medios, de formatos, de relacionarse) es clave para el éxito." (Página 11)
more
"Each section of this guide will explore another dimension of digital security—assets, attackers, risks and likelihood—and address these key questions: What do I want to protect? Who are my attackers? Is my attacker able to succeed? How likely is it that my attacker will succeed? Threat modeling
...
consists of two types of assessments: Firstly, an analysis of the project’s environment (questions one and two). Secondly, an estimation of the likelihood that potential attacks will really happen (questions three and four). To prepare for threat modeling, we have added a “question zero” for project managers: Who are we and what do we do? This helps to establish a clear understanding of the entire project, with all of its workflows and challenges that employees face in their day-to-day work environment. A threat model is the basis for a digital security concept that should be developed along with IT experts so that your concept is both technically sound and practically enforceable. Having a clearly defined list of assets and their vulnerability empowers employees to protect them with appropriate countermeasures, and educates them on risks. This will increase the efficacy of a security concept in practice." (Executive summary)
more
"Open-source intelligence gathering and analysis (OSINT) techniques are no longer predominantly the remit of private investigators and journalists. An estimated 80-90% of data analysed by intelligence agencies is also now derived from publicly available material. Additionally, the massive expansion
...
of the internet and, in particular, social media platforms, have made OSINT increasingly accessible to civilians who simply want to trawl the Web for information on a specific individual, organisation or product. In May 2018, the European Union’s General Data Protection Regulation (GDPR) was implemented in the UK through the new Data Protection Act, intended to secure personal data against unjustified collection, storage and exploitation. This document presents a preliminary literature review of work related to the GDPR and OSINT, which was collated as the basis for an as-yet-unpublished study evaluating the effects of the GDPR on OSINT capabilities in the UK. The literature reviewed is separated into the following six sections:‘What is OSINT?’,‘What are the risks and benefits of OSINT?’,‘What is the rationale for data protection legislation?’,‘What are the current legislative frameworks in the UK and Europe?’,‘What is the potential impact of the GDPR on OSINT?’, and ‘Have the views of civilian and commercial stakeholders been sought and why is this important?’. As OSINT tools and techniques are accessible to anyone, they have the unique capacity for being used to hold power to account. It is therefore important that new data protection legislation does not impede civilian OSINT capabilities." (Abstract)
more
"Many of the significant developments of our era have resulted from advances in technology, including the design of large-scale systems; advances in medicine, manufacturing, and artificial intelligence; the role of social media in influencing behaviour and toppling governments; and the surge of onli
...
ne transactions that are replacing human face-to-face interactions. These advances have given rise to new kinds of ethical concerns around the uses (and misuses) of technology. This collection of essays by prominent academics and technology leaders covers important ethical questions arising in modern industry, offering guidance on how to approach these dilemmas. Chapters discuss what we can learn from the ethical lapses of #MeToo, Volkswagen, and Cambridge Analytica, and highlight the common need across all applications for sound decision-making and understanding the implications for stakeholders. Technologists and general readers with no formal ethics training and specialists exploring technological applications to the field of ethics will benefit from this overview." (Publisher description)
more
"An increasing number of governments around the world are forcing internet service providers to slow their services during critical sociopolitical junctures—a practice known as throttling—infringing on citizens’ right to information and freedom of expression. Despite its deleterious impact on
...
media development and foundational rights, throttling remains an often-neglected topic and risks becoming a pervasive, yet hidden, threat to press freedoms, democracy, and human rights. Throttling refers to the intentional slowing of an internet service by an internet service provider. It stifles the free flow of information during critical moments and prevents journalists from providing vital information to citizens abroad and at home. Due to its difficulty to detect, throttling shields authorities from public scrutiny. Businesses have a duty to be transparent about how and when governments force them to disrupt their services, yet often remain silent on the issue." (Key findings)
more
"El imparable progreso tecnológico, los nuevos dispositivos electrónicos que se van incorporando al mercado, a la sociedad y a los centros educativos, demandan la adquisición y desarrollo de competencias digitales sólidas entre los ciudadanos. Dado que es en la etapa de Educación Obligatoria cu
...
ando los estudiantes adquieren, desarrollan y van consolidando estas competencias, esta obra ofrece las claves para evaluarlas, al presentar una prueba muy relevante para los docentes, Ecodies, ya validada y que puede emplearse, total o parcialmente, dependiendo de las áreas de competencia digital que se deseen evaluar. La obra también proporciona una revisión exhaustiva sobre las principales variables personales y familiares que influyen en la adquisición y desarrollo las competencias digitales, por lo que resulta de interés para las familias y los distintos profesionales de la educación. Además, se describe todo el proceso de investigación realizado para la elaboración de Ecodies y su validación, así como las decisiones adoptadas respecto al diseño metodológico." (https://octaedro.com)
more
"Was macht Desinformation im deutschsprachigen Internet aus? Wie wirkt Desinformation? Wie kann sie mithilfe technischer Mittel erkannt werden? Was kann und könnte mit regulatorischen und rechtlichen Maßnahmen gegen Desinformation getan werden? Aus den Erkenntnissen von Journalistik, Medienpsychol
...
ogie, Informatik und Recht werden Handlungsempfehlungen an die relevanten Adressaten hergeleitet: An den Gesetzgeber, Presserat, Medienschaffende, Betreiber von Social Networks, Einrichtungen der Forschungsförderung und nicht zuletzt Mediennutzende. Dieser Band endet nicht bei der Analyse, sondern zeigt auf, wie die Verbreitung von Desinformationen über das Internet wirkungsvoll eingedämmt werden kann." (Verlagsbeschreibung)
more
"Journalists have long been the targets of both physical and cyber-attacks from well-resourced adversaries. Internet of Things (IoT) devices are arguably a new avenue of threat towards journalists through both targeted and generalised cyber-physical exploitation. This study comprises three parts: Fi
...
rst, we interviewed 11 journalists and surveyed 5 further journalists, to determine the extent to which journalists perceive threats through the IoT, particularly via consumer IoT devices. Second, we surveyed 34 cyber security experts to establish if and how lay-people can combat IoT threats. Third, we compared these findings to assess journalists' knowledge of threats, and whether their protective mechanisms would be effective against experts' depictions and predictions of IoT threats. Our results indicate that journalists generally are unaware of IoT-related risks and are not adequately protecting themselves; this considers cases where they possess IoT devices, or where they enter IoT-enabled environments (e.g., at work or home). Expert recommendations spanned both immediate and long-term mitigation methods, including practical actions that are technical and socio-political in nature. However, all proposed individual mitigation methods are likely to be short-term solutions, with 26 of 34 (76.5%) of cyber security experts responding that within the next five years it will not be possible for the public to opt-out of interaction with the IoT." (Abstract)
more