1. Jun 2022
    1. ‘geopolitical’ European Commission planned to increase the focus on digital development – both in its domestic and external action, reflecting the idea that the internal and external dimensions of the EU’s work should be aligned
    2. he EU’s Digital for Development (D4D) Hub, which marks a step forward for a more joined-up and strategic approach to cooperation.
    3. The 2019 AU Digital Transformation Strategy (DTS) lays out the AU’s vision for Africa’s digital development, whilst the e-commerce protocol of the African Continental Free Trade Area (AfCFTA) is now being prioritised in this year’s negotiations, highlighting the added importance of the digital economy revealed by COVID-19. Many African countries are also developing their national information and communications technology (ICT) strategies and policy frameworks
    4. he EU terms a ‘human-centric approach’ to global digital governance: an approach marked by a strong focus on making technology work for citizens and protecting individual liberties.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Noble or inert gasses – such as neon, argon, xenon, and others – are crucial in the semiconductor manufacturing process. Semiconductors are used to make the microchips needed for gadgets, cars, and household appliances.

      Rare materials for production of semiconductors.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China-Africa Partnership Plan on Digital Innovation.
    2. community of shared future in cyberspace
    3. The Electronic World Trade Platform (eWTP) has helped African products reach Chinese consumers. Huawei's "Seeds for the Future" program and Alibaba's "Africa's Business Heroes Competition" have also contributed to the training of young African professionals in the Internet industry.
    4. The Electronic World Trade Platform (eWTP) has helped African products reach Chinese consumers. Huawei's "Seeds for the Future" program and Alibaba's "Africa's Business Heroes Competition" have also contributed to the training of young African professionals in the Internet industry.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Teniola however, stressed the need for the country to domicile its data in the country rather than host them outside of the country.
    2. “In the case of locally generated data and more importantly data sets, then it is considered that this data is treated as data residing in Nigeria under Nigeria’s jurisdictions and covered by data protection laws or regulations in the case of the Nigeria Data Protection Regulation (NDPR), which is referenced by global tech companies, insurance companies, financial institutes and health organisations and other data mining companies on how they should use data originating from Nigeria.

      Nigerian data

    3. January 28

      Celebrate privacy day - 28 January

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A study by the Atlantic Council, a U.S.-based think tank, found that Huawei has developed 30% of the 3G network and 70% of the 4G network in Africa.

      Chinese coverage of networks

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The fact that a standard-setting organization, like the O-RAN Alliance that was set up to reduce dependency on Huawei, includes multiple Chinese state-owned enterprises suggests the need to reimagine how democracies cooperate to set standards that reinforce liberal values. According to the O-RAN Alliance website, the following Chinese state-owned or CCP-controlled entities are members or contributors: China Mobile, China Telecom, China Unicom, Beijing University of Posts and Telecommunications, CAICT (the Chinese Academy of Information and Communications Technology), CICT (China Information and Communication Technologies Group Corporation), Nanjing Diange Communication Technology Co. Ltd (Digitgate), Inspur, Wuhan Gewei Electronic Technologies Co. Ltd, State Grid Information and Communication Industry Group Co. Ltd, Suzhou Zhizhu Communication Technology Co. Ltd, Tsinghua University, Tongyu, Communication, and ZTE.

      O-RAN initiative

      ||Jovan||

    2. BeiDou’s combined second and third phases include 8 satellites in geostationary orbit, 27 in medium Earth orbit, and 10 in inclined geosynchronous orbit. Another 5 BeiDou-3 experimental satellites—3 in medium Earth orbit and 2 in inclined geosynchronous orbit—also exist within the constellation, albeit on a different signal system.

      ||Jovan|| What is the difference between satellites

      • geostationary orbit
      • medium Earth orbit
      • geosynchronous orbit
    3. Beijing’s predictable opposition is why Washington does not prioritize the G-20 as a forum for meaningful debates around data flows and digital trade.

      ||Jovan|| Interesting to follow on forum shopping

    4. China used government and private-sector information and communications technology (ICT) projects to build support among African countries for New IP.

      ||sorina||||Jovan|| Is this true? Do we have any data on Africa's support for New IP?

    5. Smart Grids: Global Energy Interconnection

      ||Jovan|| this initiative is rather unknown.

    6. “China Proposes Global Rules for Managing Sovereign Digital Currencies,” Dezan Shira and Associates, April 4, 2021; and “China Suggests Principles for Cross Border CBDC to ‘Avoid Dollarization,’” Ledger Insights, March 25, 2021.

      ||Jovan|| to be checked as part of BIS activities

    7. Open Platforms with Chinese Characteristics

      ||Jovan|| To consider as part of open project

    8. China, in contrast, is developing blockchain capabilities to strengthen the state’s control of digital platforms and the information that passes through these networks.

      @jovan How it can be done to use blockchain for centralisation?

    9. An Overview of Digital Platforms

      @jovan a very good overview of types of digital platforms

    10. No matter how large an internet company is, no matter how high its market value is, if it is heavily dependent on foreign countries for its core components, and if the “major artery” of the supply chain is in the hands of others, it is like building a house on someone else’s foundation. No matter how big and beautiful it is, it may not stand up to wind and rain, and it may be so vulnerable that it collapses at the first blow

      An interesting summary of digital interdependence.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. has full authority on all aspects of e-commerce such as data and products being traded under e-commerce,
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Insurtech refers to digital and technology-driven products that cover individuals and businesses against financial loss, from life insurance to car insurance and crop insurance for farmers. African insurtech startups are actively overcoming the historically low penetration rates of insurance products across the continent. According to McKinsey & Co., only 3% of Africa is insured -  by far the lowest coverage in the world. Excluding South Africa, Africa’s most insured market, this number drops to a staggering 1.12%. 

      Insurtech in Africa

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Africa had the fastest growth in internet access of the world’s regions between 2005 and 2018, from just 2.1 per cent of the population to 24.4 per cent. It is home to the fastest growing mobile phone industry, with 20 per cent annual growth between 2005 and 2017. I
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Africa’s large working-age population, its growing middle class, and the significant share of services are all ingredients for value adding trade and investment relationships.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. cooperation with these emerging powers could keep the door open to US influence in Africa, and could help ensure that Beijing’s strategic foothold in the continent does not deepen.
    2. Huawei and Chinese phone maker ZTE have built nearly 80 percent of Africa’s third-generation (3G) network infrastructure, while Huawei has built 70 percent of all fourth-generation (4G) networks and is competing to build all the future 5G networks in Africa.

      China's presence in digital infratructure in Afirca

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The network is operational in 48 African countries with its hub located in Dakar, Senegal. In September 2018, India’s Ministry of External Affairs launched a new network project – e-VidyaBharati and e-Arogya Bharati (e-VBAB). The e-VBAB project is different from the earlier PAeN project. While the PAeN project operated on satellite-based technology, the e-VBAB will establish two separate web-based portals – one each for tele-education and tele-medicin
    2. As a beginning, India has already signed MoUs/joint statements with six African countries on the subject — i.e., Morocco, Egypt, Seychelles, South Africa, Kenya, and Mauritius.

      6 MoU/s joint statement with Afircan countries by India

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. compromise and maintaining discretion in negotiations are very often closely linked

      This is new to me - it now makes sense but I had never previously looked at it in this way.

      The need to save face and not appear to have ceded too much ground at the cost of national interest and why discretion is important.

    2. Video 2. Negotiation Skills: 3 Simple Tips

      Partially agree. Not sure about the third tip - I wouldn't never take the blame - with time it is possible to create a reputation around oneself as not honest/authentic

      When it comes to negotiation, trust is key. One can only trust a person they perceive to be authentic and not dishonest.

    3. Do you think online tools are more vulnerable than physical activities?

      Yes, I believe online tools are more vulnerable than physical activities because of the many different attack paths possible and potential damage/scale of damage as well as speed with which any sensitive information may be exfiltrated out of the organisation or forum impacted.

    4. amples of multilateral bodies and others moving their meetings and deliberations online in response to COVID-19?

      Yes. the 75th United Nations General Assembly held September 2020 had video conferencing and pre recorded video presentations and was held virtually - a first in the history of all assemblies previously covered in NYC.

      https://www.business-standard.com/article/international/landmark-75th-session-of-unga-commences-in-virtual-format-amid-covid-19-120091600364_1.html

    5. inclusive participation

      Digital tools have proved very helpful to the civil society as well as other stakeholders who would typically not contribute to physical forums due to either monetary or capacity challenges.

      MFAs with limited resources (financially) and smaller representation of diplomats can now actively participate and take advantage of digital tools to video conference into forums saving time and cost associated with travel.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. As of 2019, there were 631 online marketplaces in Africa managing 1,900 websites in 58 countries and territories. These marketplaces recorded about 2.2 billion visits that year. Although these numbers may seem large, they are small by international standards. For example, Amazon.com had estimated traffic of 26.73 billion in 2019, while eBay.com had 10.47 billion and AliExpress.com had 6.66 billion.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. While Chinese companies have benefitted from highly de-regulated media markets, where the entry costs for foreign companies is relatively low, African media would face a much more restricted environment were they to try to explore the Chinese media ecosystem; this applies to content creators, tech firms, and telecommunications companies
    2. which works alongside the China Public Diplomacy Association, a non-profit organisation that brings together media outlets, learning institutions, and global firms.
    3. Writing for The China Africa Project, Alexandria Williams, a journalist based in Nairobi, notes that “Chinese tech companies have aggressively pursued projects that provide free or reduced services in exchange for African data”.201 That is the case of Opera’s business in Nigeria, where the company has been able to acquire a very large and diverse volume of personal data from its users. In September 2020, amidst debates around TikTok’s business practices elsewhere, Falhad Dikow, a Kenyan Senator, asked to “investigate the use of TikTok and whether Kenyan users’ data are secure”.202 In her address, Senator Dikow did not raise specific concerns about TikTok’s being owned by a Chinese company. Similar debates around data privacy, specifically as it refers to tech companies from China, have yet to take place in other parts of the continent
    4. While TikTok does not publicise how many users it has in each country, it regularly appears among the most downloaded apps in countries like South Africa, Nigeria and Kenya, where its user base appears to be the strongest in Africa.191 Further proof of TikTok’s popularity among African users can be seen in the 2018 launch of Vskit, another video-sharing app. Vskit is run by Transsnet, a joint venture of two Chinese companies, Transsion, a mobile phone manufacturer, and NetEase, one of China’s first web portals.192
    5. TikTok is owned by ByteDance, a privately owned Chinese company. It effectively entered the African market in mid-2018, after purchasing Musical.ly, w
    6. news content is increasingly adversarial and belligerent; coordinated disinformation campaigns are becoming more frequent; and new actors, including privately owned media, are being mobilised.
    7. The way Beijing has communicated with the world during the Covid-19 outbreak signals a change of approach.
    8. Prof Chu Yin of the University of International Relations in Beijing justified this new approach to “diplomacy” by saying that “China’s rising status in the world requires it to safeguard its national interests in an unequivocal way”.
    9. say scholars Zhao Huang and Rui Wang, are now exercising “less restraint, discretion, and caution than might typically be expected from Chinese officials who speak in public or post on social media”
    10. Not only has the number of accounts risen in a short period, but the way diplomats — and some embassies — interact is different from what most Chinese media had been doing on social media for years. Aside from promoting their own activities, and reposting messages from Chinese media, these accounts are now more engaged in some form of “dialogue” with audiences through the use of hashtags and mentions.
    11. Between January 2018 and May 2020, more than 30 embassies and diplomats based in Africa have created accounts on Twitter. These include the embassies in Mauritania, Liberia, Angola, DRC, Algeria, Mali, Uganda and Kenya, as well as several diplomats, such as China’s Ambassador to Uganda, the Deputy Ambassador to Zimbabwe, and the Economic and Commercial Counsellor at the embassy in Rwanda. Some, like Lin Jing, China’s Consul General in Cape Town (South Africa), are posting and retweeting at a significant pace.
    12. In October 2015, CCTV Africa’s (now CGTN Africa) Facebook page was liked by less than half a million users. By early October 2020, that number had gone up to 4.7 million. Those following CGTN Africa’s YouTube channel have gone from 28 000 in 2015 to over half a million in 2020. Xinhua’s global Facebook page — which has several localised platforms in Africa, depending on each user’s language settings — had more than 86 million followers in 2020, compared to 2.2 million in October 2015, and 4.8 million in March 2016.160
    13. n 2018, in Kenya and Nigeria, between 7% and 8% of people said they had watched CGTN Africa sometime in the previous week. In South Africa, the number was 2%. That is far below the BBC, for example, which was a source of information for at least 20% of people. CRI’s radio listenership was minimal (less than 1% in all three countries), and so was readership of China Daily, either on paper or online (around 1%)
    14. According to former Chinese Ambassador to South Africa, Li Songtian, Huawei technology has been used in 70% of “the backbone networking infrastructure” in Africa,85 which is a crucial component in mobile and other forms of wireless communication. With ZTE technology accounting for another 10%, it is rather evident that Chinese companies do have the upper hand on the continent, where Huawei first started operating in 1997, after receiving a US$4 million contract in Kenya.
    15. Between 2000 and 2014, Chinese companies and State agencies committed to spending around US$4.8 billion in over 100 projects in the information and communications technology (ICT) sector in Africa, according to AidData, a project led by researchers at the College of William & Mary, Development Gateway, and Brigham Young University.

      Chinese investement in ICT in Africa

    16. Their businesses span from building telecommunications networks, to pay television services and digital content creation.
    17. Treating all Chinese enterprises involved in media cooperation activities as a coordinated single unit with similar organisational values, operational logic, and long-term goals might lead to wrongly concluding there is homogeneity of action.
    18. This lack of a cohesive strategy is not unique to China’s activities in Africa. Writing about Beijing’s foreign policy in general, including its public diplomacy work in Africa and elsewhere, David Shambaugh, professor of political science and international affairs at the George Washington University in the US, has noted that China lacks a “grand strategy”
    19. he Chinese government feels at ease in Africa because it has found a politically welcoming environment.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Promoters of GPGs mistakenly assume that a degree of force, coercion and manipulation are a necessity, while in fact people are perfectly capable of working together and hence achieve better results that fit local circumstances (Ostrom 1992).
    2. Although both the commons and the GPG frameworks can still serve a useful descriptive and analytical function, they are also actively used to promote certain solutions for perceived problems in a normative sense.
    3. In this respect, the definition of a global issue as either a commons or a GPGs problem, determines to a great extent the institutional arrangements, and governance mechanisms applied to tackle it
    4. We, therefore, argue that framing issues either in terms of commons or in terms of GPGs, should no longer be seen as based solely on traditional, objective criteria of excludability and rivalry, but that it has important normative components as well.
    5. ‘the capacity of a system to absorb disturbance and reorganise while undergoing change, so as to retain essentially the same function, structure, identity and feedbacks’
    6. This implies that there is something in the nature of public goods and common-pool resources (CPRs) which determines their place on the rivalry-excludability spectrum and sees a commons as the governance arrangement for these objectively identified CPRs.
    7. Over the last years, the concepts seem to have lost practical meaning in framing discussions on exactly the same notions, for example of ‘knowledge’ (as a commons: Hess and Ostrom 2007; Frischmann et al. 2014; or as a GPG: Stiglitz 1999; Maskus and Reichman 2004) or ‘cultural heritage’ (as a commons: Gonzalez 2014; as a GPG: Francioni 2012). They are now sometimes even mentioned as synonyms, for example in the field of development (Severino 2001). The added value of this article is to confront both discourses in an attempt to bring some clarity in the distinction between commons and GPGs, and–more importantly–shed light on the diverging normative implications.
    8. These two ‘buzzwords’ are now too often confused or even conflated, without acknowledging their divergent normative bias
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Only to African states on open data barometer

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||Jovan|| Brainstorming could walk better

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The good news is that small gestures of appreciation can have an outsized effect on employee satisfaction and loyalty. The bad news is that they are not meant to be scaled up.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. From 2000 to 2014 Chinese aid and, especially, loans meant only America gave more development finance. More than half China’s development projects were in Africa.
    2. Africa and China both have 1.4bn people but China is a single, brutally disciplined one-party state, and its economy accounts for nearly 20% of world output. Africa is a continent of 54 mostly weak countries, and its economy is worth only 3% of the world’s.
    3. Africans appreciate China’s economic role but prefer democracy and freedom to authoritarianism.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Taiwan is worried about the security of its chip industryDate: Thu, 26 May 2022

      ||VladaR|| Ovo je za Ana-Mariju o microchips i security.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. During a campaign visit to lol Park, an e-sports venue in Seoul, Yoon Suk-yeol, South Korea’s new president, asked gamers for ideas on how to improve the perception of gaming among parents, who think it is addictive and a waste of time.

      ||Jovan||||VladaR|| President of South Korea and online gaming

    2. There are some 685m gamers in China, including those who play on their phones, compared with 33m in South Korea

      ||VladaR||ovo je clanak za sutra i UNICEF

    3. China is now on the rise. Chinese companies are at the heart of gaming globally. The country’s biggest tech firm, Tencent, owns Riot Games, which developed lol, as well as 40% of Epic Games, which makes Fortnite. They are among the most popular games in the world. Interest in the pastime has grown, too
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “Rather as with the kgb, the difficulty has been in telling truth to power,”
    2. “If you're searching through massive data, your results are only as good as your queries.”
    3. Perhaps Mr Putin did forewarn Mr Xi and convince him it would be done in days. But given China’s reputed capabilities, its lack of contingency planning and situational awareness suggests a serious intelligence failure. The heartening conclusion for many Western governments is that China's spies are not always as good as advertised.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russia should not be humiliated
    2. “Can violence be fought with violence?”
    3. Eastern hawks, notably in Poland and the Baltics, fear that anything other than an unambiguous defeat of the Russian invasion will encourage Vladimir Putin to attack them next.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. One of the attractions of the workplace is that it is a place where there is a shared endeavour. That endeavour is called “work”. You need to be friendly to be a good colleague, but you don’t need to be friends. You need to be capable of empathy, but you don’t need to constantly emote. You have to turn up, try hard and play your part. You have to bring your role self.
    2. Any job that involves a uniform is by definition asking employees to subsume their personalities, not express them.

      Diplomacy used to be profession with uniforms.

    3. A company is a hierarchy, in which even the most understanding bosses expect people to follow orders rather than their hearts.
    4. Behind this thought lies a good intention—or rather lots of good intentions. The notion of the whole self variously captures the idea that people are more engaged in work if they believe in a firm’s purpose; that teams are more effective if colleagues understand each other; that people with different identities should feel comfortable in their own skins; that firms should care about and respond to issues that affect their staff’s well-being, from mental health to child care; and that leaders need to show some of their personal side to be connected with their staff.

      Why 'whole self' approach matters?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. when we see some systemic flaws in sectors, which are best tackled in a systemic manner, that I'm relying on base
    2. nd so the question came to the fore like, are these antitrust instruments, the best suited to deal with these issues? And we quite quickly saw that that was not a case for two reasons.
    3. he digital transformation
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. From your perspective, what are important capacity-building needs in the area of cybersecurity?

      The States must make an effort to create capacities that allow them to be resilient, as well as the elaboration of regulations and policies that are the bases for the development of the lines of action that establish the controls, promotion of education in cybersecurity, national and international cooperation and proper governance.

    2. What capacity building in the area of cybersecurity, undertaken by the five states we discussed here, can you identify?

      Responsible use of ICTs and resilience

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This is linked to the evolution of international relations and the multiplication of diplomatic actors over the past twenty years,"
    2. society is still very much stuck on the cliché of the 'Ferrero Rocher' diplomat,"
    3. We work 14 hours a day, and the consequences of the workload on our personal lives, when we have a family and must go abroad, are sometimes difficult to handle.
    4. Being a diplomat is not a job that you take on without thinking about its implications, in terms of your personal life or training,"
    5. but the problem is that it relies on a generalist administration, whereas for certain professions, specialists are needed.
    6. "My skills consist in having a thorough knowledge of a geographical area, as well as the foreign languages I speak. I am not going to become a prefect. We are not interchangeable.”
    7. "Our profession is one that we learn over time and through our experiences on the ground,"
    8. budget cuts that have seen staffing fall some 20% since 2007.
    9. of state administrators in which senior civil servants will no longer be attached to a specific administration.
    10. would mean "the end of French professional diplomacy”.
    11. diplomats deal with existential questions about their shifting role.

      existential question of French diplomacy

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. May 2022
    1. Each action

      main actions in Africa

    2. he AU’s Digital Transformation Strategy for Africa 2020 – 2030,114 and offer governments a roadmap for how to update their digital economy strategies and plans.
    3. for peer-learning initiatives,
    4. that theyplayed an important role in catalysing political will within the government, and some said that they had provided them a meaningful opportunity to learn from their peers
    5. Using the Digital Economy Blueprint as a reference, countries scored differently on measures of digital governance, infrastructure development, ICT skills, and innovation
    6. aying the foundation for more regional integration and trade, and many were working on regional e-commerce and mobile interoperability.
    7. as well as pursue global alignment
    8. regional networks are one of the best forums for countries to find alignment on such objectives
    9. required significant legal and regulatory work (and sometimes a high level of political risk), including e-government, digital identity, data privacy and protection, and cybersecurity.
    10. By cooperating through such regional bodies, countries have begun to promote common understanding around the legal and policy frameworks for responsible and sustainable digital transformation.
    11. to align national digital strategies, regulations, and infrastructure with regional frameworks and initiatives, with the goal of improving national and shared regional outcomes.

      regional cooperaiton

    12. to address the need for cross-functional capabilities rather than technical expertise on its own, governments expressed some movement toward whole-of-government processes in managing human and technical capacity, though this was in its early stages.
    13. Several countries highlighted examples of expert panel discussions, short-term training, and peer learning sessions within or across countries that could provide opportunities for government employees to refresh ICT skills and learn about emerging technologies, including 5G, data analytics, cyber security, and distributed ledgers
    14. Countries recognise that human capacity development and a human-centered transformation are key enablers of successful digital transformation.
    15. sectoral silos continue to impede harmonisation of planning across government, and the downstream effects of this lack of coordination are particularly evident during emergencies like the recent pandemic
    16. Closely related to the need for improving digital skills and values in rural areas was inclusion and access, which were often core themes of the infrastructure extension and connectivity issues mentioned by officials in their responses.
    17. digital inclusion that countries were working on included e-payment, ICT for gender, financial inclusion, and ICT for disability.
    18. Governments continue to be challenged by the need to invest in physical infrastructure, whether through internal or external sources
    19. recognisesiloedinvestmentsandduplicativeefforts by ICT development partners as a problem, and they also recognise issues in coordination between ICT ministries and promoting a whole-of-government approach
    20. ncluding sectoral planning, silos, and procurement,
    21. lacked either leadership or a coordination mechanism (a key driver of intragovernmental coordination) and many said they experienced challenges related to stakeholder commitment and integration of common approaches.

      Problem in whole of government approach

    22. an aspiration or ongoing project rather than a fully executed reality.
    23. hey were told that whole of government refers to coordination and resource-sharing across government ministries and agencies with the intent of achieving ICT policy/strategy objectives
    24. Coordination and horizontal integration are important elements of digital government, so addressing these issues is critical in delivering a whole-of-government approach to ICT adoption and use, as well as promoting and investing in the digital economy
    25. lack a timetable for actions and key performance indicators (KPIs),
    26. itwasfoundthatfivecountries have strategies that are more than fiveyearsoldandareinimmediateneedofupdating.

      Need to update strategies

    27. Digital skills for public sector officialsallowforimproveddecision-makingaround digital strategy, and subsequently increase the potential for successfully navigating digital strategy implementation
    28. Another positive sign is the proliferation of digital ID systems in almost all the countries, albeit at different stages of universal rollout. A good example is Kenya, with the deployment of its National Integrated Identity Management System, known as Huduma Namba
    29. Unlocking the Digital Economy in Africa: Benchmarking the Digital Transformation Journey | 17FIGURE 5Indices Used for Benchmarking Assessment Using Secondary Data
    30. harmonising national ICT strategies and regulatory frameworks becomes critical,
    31. This divide is particularly acute in Africa, where increasing connectivity is transforming the continent and integrating people into the digital economy.
    32. at the nexus of policy frameworks, digital platforms, and peer learning, with particular success in regional policy harmonisation and global alignment.
    33. Developing human capacity entails promoting a culture of innovation and entrepreneurship across society, as well as upskilling and improving the capacity of the existing government workforce.
    34. mproving fragmented digital governance by deploying coordinated ICT strategies and harmonized policy and regulatory frameworks
    35. efforts to renew these strategies (with a focus on digital economy and whole-of-government coordination) are just beginning.
    36. Most countries have ICT strategies or plans in place, though very few arespecifictocreatingadigitaleconomy.
    37. countries need to collectively build ecosystems that facilitate digital integration—regionally and continentally
    38. Digital Government, Digital Business, Infrastructure, Innovation-Driven Entrepreneurship, and Digital Values and Skills
    39. the launch of the Digital Economy Blueprint by the Republic of Kenya,
    40. Pioneered by the government of Kenya, the blueprint highlights fivepillarsasafoundationforcreatingadigital economy and underscores the need for countries to adopt user-centric and whole-of-government processes in promoting outcomes for the whole-of-society
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Nigeria Startup bill

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Tunisian Startup Act

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Statistical analysis of the Ukraine war: potentials and pitfalls

      Two Spanish scientists question the thesis of "two Ukraine": pro-West or pro-Russian. Their analysis is based upon a set of data on violent events in Ukraine since January 2021.

      Their analysis shows that conflicts can arise from many factors beyond simple East-West binary optics. Accordingly, the solution is not to split Ukraine in two.

      According to the authors, data lack is the greatest problem in this scientific method.As opposed to other fields, like engineering, obtaining reliable and high-quality data about social and political events is a major challenge.

      The greatest challenge to using statistical models and scientific methods in diplomacy will be finding timely, reliable and usable data.

      Source: Phys.Org

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Share of Economies With Relevant E-Commerce Legislation in Africa, by region, 2017 (%

      To check various laws related to digital economy

    2. to Agenda 2063
    3. Leverage synergies with existing regional and international initiatives with shared goals
    4. Establish national cyber-security governance structures under multi-stakeholder structures (involving policy makers,economic,educational, technical and business communities, legal, law enforcement, Academia, diplomatic, military ...etc.)
    5. SPECIFIC OBJECTIVESTO DRIVE THE DIGITAL TRANSFORMATION TO PROPEL INDUSTRIALIZATION IN AFRICA AND CONTRIBUTE TO THE DIGITAL ECONOMY AND SUPPORT AFCFTA

      Good list of concrete objectives for Africa.

    6. Africa has fewer legacy challengesto deal with and is therefore adopting digitized solutions faster out of necessity. For Africa, the current moment offers a leapfrogging opportunity. Today’s technologies indicate the scale and speed at which technology is transforming traditional socio-economic sectors.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Just 9% of Tanzanians surveyed in April for The Economist by Premise had watched China’s flagship news channel in the latest month. By comparison 73% had watched the bbc. Across the seven countries Premise surveyed, cgtn did best in Congo, where 28% of respondents had watched it in the latest month. But 73% had seen France24. (The survey skews slightly to wealthier and more urban than average, but the ages of respondents are representative).
    2. Yet some African regimes have made use of Chinese know-how to go after dissidents and journalists. The Wall Street Journal reported that in Zambia in 2019 the Cybercrime Crack Squad, a unit of the telecoms regulator, enlisted the help of Huawei to track down and arrest bloggers for an opposition news site. It also found that in Uganda in 2018 frustrated security officials had asked Huawei employees to help crack WhatsApp communications by the leader of an opposition movement. Huawei engineers penetrated a group chat, enabling Ugandan authorities to arrest the opposition figure and dozens of supporters and thwart plans for street demonstrations. (Huawei has denied that its employees conduct any such hacking).

      Examples of misuse of tech companies.

    3. a Chinese initiative to deliver satellite tv to “10,000 villages” in Africa.

      to check

    4. StarTimes, a Chinese satellite firm, is strong in digital television. Its public profile in Africa is as a tv provider, serving 13m subscribers in half of Africa’s 54 countries (plus 27m more customers across the continent who get content over the internet). Less visibly, it is helping 15 African countries migrate from analogue to digital transmission, according to a tally by Dani Madrid-Morales of the University of Sheffield.

      On China and AFrican infrastructure

      ||sorina||

    5. China brings officials from African countries to seminars on “cyberspace management”. At one such event in 2017 Freedom House, a non-profit group based in Washington, dc, found that attendees were given a tour of systems for “public-opinion management”, including “real-time monitoring of negative public opinion” and tools to guide public opinion to be more positive.

      ||sorina|| China's training for Africa in cyberspace management.

    6. Last year People’s Daily Online, the website of China’s official mouthpiece, started a Swahili-language service.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Davos needs the world more than the world needs Davos. That isn’t to say there are no mutual benefits.
    2. Attendance seemed down on previous years—by half or so, chief executives reckoned.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But investigators trying to detect sanctions-cheaters—for government agencies, pressure groups, or insurers and other businesses—are encountering a surge of help from an unexpected quarter.

      sanction surveillance

    2. But investigators trying to detect sanctions-cheaters—for government agencies, pressure groups, or insurers and other businesses—are encountering a surge of help from an unexpected quarter.
    3. But investigators trying to detect sanctions-cheaters—for government agencies, pressure groups, or insurers and other businesses—are encountering a surge of help from an unexpected quarter.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Undersea cables carry Internet traffic across continents. They are part of the critical information infrastructure of the modern world.

      Scientists started using these cables as a global network of sensors that monitor seismic and other changes at the seabed previously beyond the reach of the scientific community.

      As Wired indicated in the recent coverage Where there's cable, there's potential data.

      Geoscientist Philippe Jousset said 'You can interrogate any fibre under the sea, covering all of the Earth'.

      Undersea cables could be also used as early-earning tools for tsunami as they can detect any tectonic shifts on the seabed.

      Source: Undersea Cables are carrying scientific secrets.

    2. “This is really interesting, because then you can interrogate any fiber under the sea, covering all of the Earth,”
    3. Where there’s cable, there’s potential data.
    4. Every 60 to 80 kilometers, usually, you need an optical amplifier, which essentially takes the incoming light and amplifies it,”
    5. These very words may have flown through an undersea cable before reaching your eyeballs. Hundreds of thousands of miles of fiber optics crisscross the world’s oceans, shuttling emails, Netflix shows, and news articles as packets of light. And, scientifically speaking, boy does that light have a story to tell—not so much about what happens on land, but what happens in the deep.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. actions could institutions undertake

      One of the actions that would be most helpful would be implementing layered security. This basically means that when/if one control measure does not work 100% there would be partial mitigant in another layer of control put in place.

      For instance, implementing network segmentation at the network layer and then host-based firewalls on the endpoint/devices, anti virus and threat detection capabilities on the systems would mean that if one of these fails, the other partially mitigates the risk.

      This here explains it well: https://blog.totalprosource.com/what-is-layered-security-how-does-it-defend-your-network

      Beyond layered security, people risk tends to be a critical factor when it comes to cyber security because all tools and capabilities implemented require vigilance on the part of the users. Therefore a robust training and awareness program would play a big role in minimising the risk.

      When it comes to high value assets, segmenting the network to ensure these are in a special zone with restricted ability for external connectivity to them would be beneficial and go a long way.

      Finally, many hackers exploit vulnerabilities therefore ensuring your solutions are up to date with the latest patches applied timely and sufficient measures are put in place to immediately identify potential breaches would also help.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Peace, security and human rights 2. Prosperity3. Sustainability4. Digitalisation

      Four priorities of the Swiss Foreign Policy

    2. Combining bilateral and multilateral levels also strengthens the position of International Geneva.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Flourish chord diagrams

      Use of flourish for chord diagrams

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Equatorial Guinea
    2. China is involved in financing, building or operating 61 ports in 30 African countries,
    3. The original pretext for its base was to support anti-piracy missions in the Gulf of Aden.

      I was wondering why China established military base in Djibouti? What was the pretext?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. a practical approach to making the country richer, mixing market reforms with state control.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. African employees make up 70-95% of Chinese firms’ workforces, according to a recent summary of the evidence.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But turning to China was often the only option. The West should offer an alternative.
    2. A less patronising Western approach would be well-timed.
    3. Build Back Better World (b3w), is seen as a response to China’s Belt and Road Initiative. It was followed more recently by the eu’s Global Gateway infrastructure-for-Africa plan.

      two important projects in Africa ||sorina||

    4. the Trump administration’s rigid approach of telling countries they must make a binary choice between America and China.
    5. but also the sense of not being patronised
    6. To seize it means resisting the temptation to see everything China does as part of a zero-sum game.
    7. asked Africans in seven countries, a mix of democracies and authoritarian states, which would be more powerful in a decade’s time: China or America. In all seven the answer was China. Overwhelmingly they also felt that China’s influence was favourable, as well.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China prides itself on a “demand-driven” approach: doing what African leaders want, to hell with technocrats in finance ministries. In Congo the “deal of the century” signed with Joseph Kabila in 2007 swapped mining rights for infrastructure projects. In Ethiopia China helped Meles Zenawi’s push for industrialisation. In Kenya China supported Uhuru Kenyatta’s “Vision 2030”, notably via the standard-gauge railway (sgr), its largest infrastructure project since independence.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Attempts to exempt smaller firms from the most onerous rules are welcome.
    2. to allow users to choose sanitised versions of websites
    3. Over-blocking, arbitrary enforcement and the chilling of legitimate discussion is thus built into the legislation.
    4. Anyone who spends time on social media knows that such content-moderation algorithms are already arbitrary and inconsistent, banning some people for trivialities while leaving others untouched for flagrant breaches of the rules
    5. firms will have strong incentives to block anything even remotely controversial first and ask questions later—or, more likely, not at all.
    6. to delegate enforcement to the same tech companies that the government says have failed to police themselves properly in the past.
    7. to be known as “legal but harmful”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL