- Jun 2022
-
study.diplomacy.edu study.diplomacy.edu
-
ctivities affect vulnerable populations and communities.
This is very valid and what may have been useful data can be used as a weapon for unintended purposes.
Another example is how highly detailed biometric databases built with U.S. funding and assistance in Afghanistan threatened to become a weapon when the data was accessed by the Taliban
Afghans who’d worked with foreign governments rushed to hide evidence of their online actions, afraid of the Taliban using their digital/online posts against them.
The article below delves further into this as well as details the dangers of location data when it comes to humanitarian aid.
Details here: https://www.brookings.edu/techstream/the-crucial-need-to-secure-the-location-data-of-vulnerable-populations/
-
Big data is anonymous, so it doesn’t invade our privacy.
Not necessarily - I disagree with this.
Big data may be defined as: extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.
The analysis and correlation and drawing of patterns can actually make sense out of seemingly unrelated data and allow identification of who to the level of personal information (which ultimately may invade privacy).
Second, common identifiers (not necessarily PII) in different data sets from different sources may ultimately result in identifying the source of the data. The big challenge today is how effectively data is pseudonymised an de-identified.
Two articles I found useful: https://www.cpomagazine.com/data-privacy/privacy-anonymity-age-big-data/
An alternative view here where this article implies that big data can remain private YET it at the same time talks about possibility to re-identify what was previously considered anonymous: https://www2.itif.org/2014-big-data-deidentification.pdf
-
With enough data, the numbers speak for themselves.
I do not fully agree with this statement. It is never just about quantity of data - more about quality and integrity of the data sources.
When it comes to data, it is important to be mindful of confirmation bias where one observes tendency to search for, interpret, focus on and remember information in a way that confirms one’s preconceptions. This bias usually occurs when the person performing has a predetermined assumption in which data analysis is used to prove it. They then keep looking in the data until this assumption can be proven.
Selection bias is another thing that may disprove the statement above . The bias introduced by the selection of individuals, groups for data for analysis in such a way that proper randomization is not achieved . This then makes prevents the sample obtained from being truly representative of the population intended to be analysed.
-
data quality
Indeed data quality has been the big question with big data driven decision-making.
The question is always about whether the source of data is reliable and whether the data used is free from bias. This is why the choice of source of data needs to be carefully considered to ensure appropriate balance and minimize subjectivity.
An article I found useful that explained data bias (which ultimately speaks to the quality of the data): https://towardsdatascience.com/understanding-subjectivity-in-data-science-70a25b2ea39f
-
-
study.diplomacy.edu study.diplomacy.edu
-
social media
I find this useful. May times, we mistake digital diplomacy to mean twitter or social media and overlook other digital diplomacy tools that have proved useful such as gamification, crowd-sourcing, online platforms that trace or monitor conflict or serve as early warning systems when there is potential tension and conflict.
-
-
study.diplomacy.edu study.diplomacy.edu
-
compromise and maintaining discretion in negotiations are very often closely linked
This is new to me - it now makes sense but I had never previously looked at it in this way.
The need to save face and not appear to have ceded too much ground at the cost of national interest and why discretion is important.
-
Video 2. Negotiation Skills: 3 Simple Tips
Partially agree. Not sure about the third tip - I wouldn't never take the blame - with time it is possible to create a reputation around oneself as not honest/authentic
When it comes to negotiation, trust is key. One can only trust a person they perceive to be authentic and not dishonest.
-
Do you think online tools are more vulnerable than physical activities?
Yes, I believe online tools are more vulnerable than physical activities because of the many different attack paths possible and potential damage/scale of damage as well as speed with which any sensitive information may be exfiltrated out of the organisation or forum impacted.
-
amples of multilateral bodies and others moving their meetings and deliberations online in response to COVID-19?
Yes. the 75th United Nations General Assembly held September 2020 had video conferencing and pre recorded video presentations and was held virtually - a first in the history of all assemblies previously covered in NYC.
-
inclusive participation
Digital tools have proved very helpful to the civil society as well as other stakeholders who would typically not contribute to physical forums due to either monetary or capacity challenges.
MFAs with limited resources (financially) and smaller representation of diplomats can now actively participate and take advantage of digital tools to video conference into forums saving time and cost associated with travel.
-
- May 2022
-
study.diplomacy.edu study.diplomacy.edu
-
actions could institutions undertake
One of the actions that would be most helpful would be implementing layered security. This basically means that when/if one control measure does not work 100% there would be partial mitigant in another layer of control put in place.
For instance, implementing network segmentation at the network layer and then host-based firewalls on the endpoint/devices, anti virus and threat detection capabilities on the systems would mean that if one of these fails, the other partially mitigates the risk.
This here explains it well: https://blog.totalprosource.com/what-is-layered-security-how-does-it-defend-your-network
Beyond layered security, people risk tends to be a critical factor when it comes to cyber security because all tools and capabilities implemented require vigilance on the part of the users. Therefore a robust training and awareness program would play a big role in minimising the risk.
When it comes to high value assets, segmenting the network to ensure these are in a special zone with restricted ability for external connectivity to them would be beneficial and go a long way.
Finally, many hackers exploit vulnerabilities therefore ensuring your solutions are up to date with the latest patches applied timely and sufficient measures are put in place to immediately identify potential breaches would also help.
-
-
study.diplomacy.edu study.diplomacy.edu
-
the new information sources
Information gathering has still remained a core function of diplomacy even with the internet.
What has changed is the speed of dissemination of information and breath of possible recipients. In the past, any information once disseminated would not be accessible immediately to the public but with internet there are many sources that may sometimes post unverified information which may escalate a situation. The diplomats therefore need to be ahead of the pack and have mechanisms to monitor relevant information sources proactively and in some cases share the information that is not restricted from the public openly and faster than was done in the past.
-
-
study.diplomacy.edu study.diplomacy.edu
-
mistrust that contributed to escalation, and ultimately, war.
This in my view is a critical issue that has arisen from the digital technologies. The pace at which comms is transmitted is quite quick/fast and requires a measured approach in diplomatic scenarios.
We have seen senior diplomats commenting online on matters that are quite sensitive and divisive making it difficult for negotiations to take place as a result of the atmosphere of mistrust created.
That said, there have been positive gains from digital technologies used in diplomacy.
This article here on Twiplomacy breaks it down very well: https://www.orfonline.org/research/twitter-diplomacy-a-brief-analysis-60462//
-
writing disruptive for diplomacy?
Yes. I believe it was disruptive. Disruption happens at a point in time so one has to consider the context back then. Personal physical interactions and long drawn engagements were the primary method of diplomatic engagement before writing.
Internet was also disruptive - perhaps more than writing largely because of the speed of information flow. There is currently less secrecy on diplomatic engagements and plenty of positioning diplomatic stance online (twitter, etc). There is also quicker escalation of matters with non-diplomats commenting on pertinent diplomatic matters.
Good read here: https://www.orfonline.org/expert-speak/technologies-changing-diplomatic-practices-pre-and-post-covid19-reality/
-
- Apr 2022
-
study.diplomacy.edu study.diplomacy.edu
-
*One solution is through shifting the power in digital identification from the authorities to the person. This can be achieved in part through people-centric data protection frameworks that guarantee protection of the right to privacy, promote responsible data sharing, and ensure information security.
This has been well articulated in the article but the problem I see in many countries in Africa is a failure to operationalise any regulation that makes it easy to implement the data protection laws available.
Second, depending on maturity of the local government, we have many fears associated with potential abuse or misuse of personal information obtained to support the said digital identity programs with limited options for recourse and limited consequence management when the abuse is done by the government.
-
Are misinformation and disinformation part of this dilemma? Who is responsible for deciding what is true and what is false?
In my view, misinformation and disinformation still remain a challenge to be tacked.
In my local experience and East Africa region experience, it is very difficult sometimes for a non-local to determine whether or not there is disinformation. This was particularly true during the election period in Uganda and in Kenya in 2017 when one could not ascertain whether information being posted online is actually accurate or falsified.
Information specifice to a local region can only be validated as true or false by the individuals on the ground and not a robot or an individual abroad and far removed from the locality or individuals most impacted by the disinformation or misinformation
-
-
study.diplomacy.edu study.diplomacy.edu
-
directly to mobile technology
I can confirm this is the Kenya story. Landline infrastructure and use is quite low at the moment but mobile tech adoption is quite high countrywide with a mobile penetration rate of 114% as at 2021: https://www.statista.com/statistics/509516/mobile-cellular-subscriptions-per-100-inhabitants-in-kenya/
-
Reflection point
Yes, there is an IXP in Kenya. In fact, as a result of the IXP, there has been significant growth in local exchanged internet traffic from 30% to 70%.
The IXP helped improve Internet access by keeping local Internet traffic localized and, because of that, faster and more affordable.
This was detailed in the report which can be found on this link here: https://www.internetsociety.org/issues/ixps/ixpreport2020/ . The report summarises a success story of two countries - Kenya and Nigeria and impact of the IXP on internet.
-
it unimportant, even annoying
I find this information useful as it allows for a balanced perspective when looking at Internet Governance and will hopefully allow us all look at the global challenges as our problem collectively rather than a problem that affects only a few regions globally.
-
oes it seem contradictory to highlight divides in the USA when there are more significant divides in less privileged regions?
No it does not seem contradictory. It actually paints a true picture and a fair view that the divide is NOT ONLY in developing countries, rather it is a global issue. We often see alot of focus or misguided belief that the developed countries are not in any way impacted by internet governance issues or digital divide issues.
The cost of internet I note is lower in a number of developing countries compared to developed countries - any idea why this is the case?
-
- Mar 2022
-
study.diplomacy.edu study.diplomacy.edu
-
ware code. The idea itself is not protected by copyright. In practice, however, it is sometimes difficult to make a clear distinction between an idea and its expression.
Agreed, this is often a challenge for small scale entrepreneurs especially in the tech world e.g developers and innovation specialists who ideate quite a lot. The failure to appreciate the methods available to protect IP have made it difficult for thought leaders to benefit from their innovative ideas and in some cases bigger organisations that have better ability to commercialise ideas and proceed to copyright the said expressions of an idea
-
-
study.diplomacy.edu study.diplomacy.edu
-
partnerships among stakeholder
Cyber crime does not respect borders, so the only way to tackle this threat is through cooperation and collaborative partnerships be it public-private; private-private or public-public partnerships.
This paper here by ENISA has good content on cyber partnerships and information sharing and analysis centres:<br> https://www.enisa.europa.eu/publications/public-private-partnerships-ppp-cooperative-models/@@download/fullReport
-
-
study.diplomacy.edu study.diplomacy.edu
-
GFCE
The AU GFCE Collaboration project in my view is one notable one that will benefit many Africa nations and drive continental collaboration and information sharing as well as cooperation. I recall last year they were nominated as one of the key projects to be show-cased during the Paris Peace Forum in Nov 2021. More details on this project here:
It is also interesting to note the many partners GFCE is working with that also have a focus on cyber cooperation and information sharing as well as capacity building such as Bill&Melinda Gates Foundation; CREST; GCA
-
-
study.diplomacy.edu study.diplomacy.edu
-
Figure 2. Terminology in the field of cybersecurity
Looking at this diagram, it is the first time I am realising how US and Euro-Atlantic approach differ from Russian- China approach.
As a cybersec professional, ISACA and other cybersecurity bodies and association interestingly describe cyber security risk as a subset of information risk rather than taking the US and Euro-Atlantic Approach.
-
-
study.diplomacy.edu study.diplomacy.edu
-
Local loop
-
What are the most important points surrounding 5G?
Reflecting on this, one of the critical points in my view would be: improved speed; better latency performance; increased potential for IoT; economic transformation where there is increased adoption of 5G. On the flip side, 5G technology may prove expensive for developing countries and may pose a potential dependency risk on private entities that provide the capability. In addition, security risk is likely to increase as a result of interconnectedness and possible impact of a single point of failure within the chain. There is likely to be a push by different regions to identify and propose even through regulation list of trusted partners based on fears or concerns at a national or regional level informed by geo political tensions among others.
-
-
study.diplomacy.edu study.diplomacy.edu
-
shift of government sites to RusNet.
The RusNet is not a new concept and from the reading on the internet, seems the conversation began in 2015. The actions taken against Russia if perceived to be cutting them off the Internet may very well accelerate growth and prioritisation of Rusnet.
Russia actually wouldn't be the first country to have their own internet - China does. In such times, it is very possible for countries to make a call to have their own internet in anticipation of actions that would cut them off the internet and to avoid dependence on a few providers who may not necessarily demonstrate neutrality when there are political tensions.
-
-
study.diplomacy.edu study.diplomacy.edu
-
without specific indications on how a rule should apply, the implementation of such rules can create additional challenges.
Neutrality in developing policy is often hailed as the preferred approach, however this may end up being problematic in less mature markets where there is limited know-how. In such cases, a rules based approach or specifying the how proves useful. Once there is general maturity and understanding of the intent of the policy, then one can transition into the neutral approach
-
compatible with the global nature of the internet
The current geo-political atmosphere and increasing mistrust is indeed resulting in prioritising homegrown tech products as is noted with the Biden's directives following the 2021 Solar Winds incidents as well as the Colonial Pipeline attack. Ultimately, we may end up reversing gains accomplished this far with countries such as People's Republic of China introducing new and stringent requirements in their data security laws for instance
-