Stay networked. Get informed. Broadcast your projects.
Added by Diplo IGCBP on August 28, 2013 at 3:40pm — No Comments
I have been aware of Rwanda being a success story in Africa when it comes to ICT policy implementation, but reading about it in the Introduction part of the first chapter of the ICT Policy and Strategy Planning course has re-ignited my interest in the country’s success story. What I now know is that Rwanda, with the assistance of the UN, put in place a plan to use ICT as a development tool.
I am a board member of the Namibia Information Communication Technology Association (NICTA) (…
Added by Ndapewa Vistorina Hangula on August 27, 2013 at 2:02pm — No Comments
EPIC announced a petition to the NSA to conduct a public rulemaking on the agency's monitoring and collection of communications traffic within the United States. 5 U.S.C. § 553(e).
The petition letter is as follows:
June 17, 2013
Dear General Alexander and Secretary Hagel:…
Added by ZHOU Hui on August 26, 2013 at 5:00pm — No Comments
In many respects, the ICT ecosystem can be likened to the human body. In biology, we learn that the organs of the human body are organised into systems, and that each system is responsible for a major physiological process such as energy production, movement or reproduction. ICT similarly involves various stakeholders; each stakeholder has identifiable and not-so identifiable roles to ensure that technology is properly harnessed to drive development. The main stakeholders in the ICT policy…Continue
The concept of privacy was proposed for the first time by American scholars announced " The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html at "Harvard Law Review"in 1890, who are Brandeis and Warren. This paper they distinguished the right to privacy from copyright.
It's very interesting that we have to deal…Continue
Promoting the consumption of information - a field that involves e-commerce, the Internet and cloud computing technology - can effectively drive demand, create new sources of economic growth and help consumption upgrading, said the document posted on the central government's website. In this context, there will be a more available, accessible and affordable Internet to all average people in China.
Here is the news …Continue
When it comes to ICTs and development, an Armenian fairy tale The Brother Axe comes to mind. Instead of serving its purpose, i.e. chopping wood, the Brother Axe injured villagers who had never before used (or seen) axes. The Brother Axe was beaten by ignorant villagers, shot down and ultimately caused a big fire destroying the village granaries.
The story describes the possible effects new technology may have…Continue
Last week the Federal Court recognized the Bitcoin to be real money. Case involving fraudulent offers and sales of securities by the accused Trendon…Continue
Added by Valerie on August 12, 2013 at 6:30pm — No Comments
Added by Yahaya Gobir on August 9, 2013 at 2:00pm — No Comments
Added by ZHOU Hui on August 8, 2013 at 11:30pm — No Comments
Widespread use of information technology (IT) has necessitated an increase in consciousness about IT security. As persons and organizations settle for application of computer and mobile phone to most of…Continue
Added by Chris Prince Udochukwu Njoku on August 7, 2013 at 12:05am — No Comments
(unofficial English translation)
The Decision of the Standing Committee of the National People’s Congress on Strengthening
Internet Information Protection
(Adopted at the 30th Session of Standing Committee of the 11th National People’s Congress on December 28, 2012)
In order to protect Internet information security, safeguard the legitimate rights and interests of citizens, legal…
Added by ZHOU Hui on August 4, 2013 at 1:19pm — No Comments
Application for the course of Cyber-Security and other is out..Kindly follow this link to apply http://learn.diplomacy.edu/registration
Added by Akinremi Peter Taiwo on August 2, 2013 at 2:11pm — No Comments