Diplo Internet Governance Community
Stay networked. Get informed. Broadcast your projects.
Added by Diplo IGCBP on August 28, 2013 at 3:40pm — No Comments
I have been aware of Rwanda being a success story in Africa when it comes to ICT policy implementation, but reading about it in the Introduction part of the first chapter of the ICT Policy and Strategy Planning course has re-ignited my interest in the country’s success story. What I now know is that Rwanda, with the assistance of the UN, put in place a plan to use ICT as a development tool.
I am a board member of the Namibia Information Communication Technology Association (NICTA) (…
Added by Ndapewa Vistorina Hangula on August 27, 2013 at 2:02pm — No Comments
EPIC announced a petition to the NSA to conduct a public rulemaking on the agency's monitoring and collection of communications traffic within the United States. 5 U.S.C. § 553(e).
The petition letter is as follows:
June 17, 2013
Dear General Alexander and Secretary Hagel:…
Added by ZHOU Hui on August 26, 2013 at 5:00pm — No Comments
In many respects, the ICT ecosystem can be likened to the human body. In biology, we learn that the organs of the human body are organised into systems, and that each system is responsible for a major physiological process such as energy production, movement or reproduction. ICT similarly involves various stakeholders; each stakeholder has identifiable and not-so identifiable roles to ensure that technology is properly harnessed to drive development. The main stakeholders in the ICT policy…
ContinueAdded by Gameli Adzaho on August 21, 2013 at 9:24am — 6 Comments
The concept of privacy was proposed for the first time by American scholars announced " The Right to Privacy" http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html at "Harvard Law Review"in 1890, who are Brandeis and Warren. This paper they distinguished the right to privacy from copyright.
It's very interesting that we have to deal…
ContinueAdded by Akinremi Peter Taiwo on August 19, 2013 at 8:17pm — 1 Comment
Promoting the consumption of information - a field that involves e-commerce, the Internet and cloud computing technology - can effectively drive demand, create new sources of economic growth and help consumption upgrading, said the document posted on the central government's website. In this context, there will be a more available, accessible and affordable Internet to all average people in China.
Here is the news …
ContinueAdded by ZHOU Hui on August 19, 2013 at 4:00pm — 2 Comments
Narine Khachatryan
When it comes to ICTs and development, an Armenian fairy tale The Brother Axe comes to mind. Instead of serving its purpose, i.e. chopping wood, the Brother Axe injured villagers who had never before used (or seen) axes. The Brother Axe was beaten by ignorant villagers, shot down and ultimately caused a big fire destroying the village granaries.
The story describes the possible effects new technology may have…
ContinueAdded by Narine Khachatryan on August 18, 2013 at 10:00pm — 4 Comments
Added by Akinremi Peter Taiwo on August 15, 2013 at 10:36am — 2 Comments
Last week the Federal Court recognized the Bitcoin to be real money. Case involving fraudulent offers and sales of securities by the accused Trendon…
ContinueAdded by Valerie on August 12, 2013 at 6:30pm — No Comments
Added by Yahaya Gobir on August 9, 2013 at 2:00pm — No Comments
Added by ZHOU Hui on August 8, 2013 at 11:30pm — No Comments
Widespread use of information technology (IT) has necessitated an increase in consciousness about IT security. As persons and organizations settle for application of computer and mobile phone to most of…
ContinueAdded by Chris Prince Udochukwu Njoku on August 7, 2013 at 12:05am — No Comments
(unofficial English translation)
The Decision of the Standing Committee of the National People’s Congress on Strengthening
Internet Information Protection
(Adopted at the 30th Session of Standing Committee of the 11th National People’s Congress on December 28, 2012)
In order to protect Internet information security, safeguard the legitimate rights and interests of citizens, legal…
Added by ZHOU Hui on August 4, 2013 at 1:19pm — No Comments
Application for the course of Cyber-Security and other is out..Kindly follow this link to apply http://learn.diplomacy.edu/registration
Added by Akinremi Peter Taiwo on August 2, 2013 at 2:11pm — No Comments
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
1999
37 members
79 members
44 members
1 member
39 members
Visit Diplo's IG website, www.diplomacy.edu/ig for info on programmes, events, and resources.
The full text of the book An Introduction to Internet Governance (6th edition) is available here. The translated versions in Serbian/BCS, French, Spanish, Arabic, Russian, Chinese, and Portuguese are also available for download.
Karlene Francis (Jamaica)
Ivar Hartmann (Brazil)
Elona Taka (Albania)
Fahd Batayneh (Jordan)
Edward Muthiga (Kenya)
Nnenna Nwakanma (Côte d'Ivoire)
Xu Jing (China)
Gao Mosweu (Botswana)
Jamil Goheer (Pakistan)
Virginia (Ginger) Paque (Venezuela)
Tim Davies (UK)
Charity Gamboa-Embley (Philippines)
Rafik Dammak (Tunisia)
Jean-Yves Gatete (Burundi)
Guilherme Almeida (Brazil)
Magaly Pazello (Brazil)
Sergio Alves Júnior (Brazil)
Adela Danciu (Romania)
Simona Popa (Romania)
Marina Sokolova (Belarus)
Andreana Stankova (Bulgaria)
Vedran Djordjevic (Canada)
Maria Morozova (Ukraine)
David Kavanagh (Ireland)
Nino Gobronidze (Georgia)
Sorina Teleanu (Romania)
Cosmin Neagu (Romania)
Maja Rakovic (Serbia)
Elma Demir (Bosnia and Herzegovina)
Tatiana Chirev (Moldova)
Maja Lubarda (Slovenia)
Babatope Soremi (Nigeria)
Marilia Maciel (Brazil)
Raquel Gatto (Brazil)
Andrés Piazza (Argentina)
Nevena Ruzic (Serbia)
Deirdre Williams (St. Lucia)
Maureen Hilyard (Cook Islands)
Monica Abalo (Argentina)
Emmanuel Edet (Nigeria)
Mwende Njiraini (Kenya)
Marsha Guthrie (Jamaica)
Kassim M. AL-Hassani (Iraq)
Marília Maciel (Brazil)
Alfonso Avila (Mexico)
Pascal Bekono (Cameroon)
© 2023 Created by Community Owner.
Powered by