You are on page 1of 351

Frameworks for ICT

Policy:
Government, Social and Legal
Issues

Esharenana E. Adomi
Delta State University, Nigeria

InformatIon scIence reference


Hershey New York
Director of Editorial Content: Kristin Klinger
Director of Book Publications: Julia Mosemann
Acquisitions Editor: Lindsay Johnston
Development Editor: Joel Gamon
Publishing Assistant: Natalie Pronio
Typesetter: Michael Brehm / Travis Gundrum
Production Editor: Jamie Snavely
Cover Design: Lisa Tosheff

Published in the United States of America by


Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com

Copyright 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or com-
panies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Frameworks for ICT policy : government, social and legal issues / Esharenana E. Adomi, editor.
p. cm.
Includes bibliographical references and index. Summary: "This book provides policy-relevant insights and information to aid
those engaged in systematic research and teaching about ICT policy formation and implementation"--Provided by publisher.
ISBN 978-1-61692-012-8 (hardcover) -- ISBN 978-1-61692-013-5 (ebook) 1. Information technology--Government policy--
Cross-cultural studies. 2. Information technology--Security measures--Cross-cultural studies. 3. Computer crimes--Prevention-
-International cooperation. I. Adomi, Esharenana E. HC59.72.I55F73 2010
303.48'33--dc22
2010007131
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
Editorial Advisory Board
B. Dawn Medlin, Appalachian State University, USA
Basil E. Iwhiwhu, Delta State University, Nigeria
Haluk Geray, Ankara University, Faculty of Communication, Turkey
Hopestone Kayiska Chavula, United Nations Economic Commission for Africa, Ethiopia
Lawan A. Mohammed, King Fahd University of Petroleum and Minerals, Saudi Arabia
Sita Venkatraman, University of Ballarat, Australia
Table of Contents

Foreword ............................................................................................................................................xiii

Preface ................................................................................................................................................. xv

Acknowledgment ............................................................................................................................... xvii

Chapter 1
A Framework for ICT Security Policy Management .............................................................................. 1
Sitalakshmi Venkatraman, University of Ballarat, Australia

Chapter 2
A Model for Building Trust in E-Government...................................................................................... 15
Stephen M. Mutula, University of Botswana, Botswana

Chapter 3
Adopting Mobile Devices in Classroom: An Empirical Case Study from Indonesian Teachers .......... 34
Chockalingam Annamalai, SEAMEO RECSAM, Penang, Malaysia
Wahyudi Yososutikno, SEAMEO RECSAM, Penang, Malaysia
Ng Khar Thoe, SEAMEO RECSAM, Penang, Malaysia

Chapter 4
Analysing an ICT4D Project in India Using the Capability Approach
and a Virtuous Spiral Framework ........................................................................................................ 50
Helena Grunfeld, Victoria University, Australia
Sriram Guddireddigari, Monash University, Australia
Benita Marian, The East West Foundation of India, India
John Peter, The East West Foundation of India, India
Vijay Kumar, The East West Foundation of India, India
Chapter 5
Analysis of Speedy Uptake of Electronic and Digital Signatures in Digital Economy
with Special Reference to India ............................................................................................................ 76
Swapneshwar Goutam, Hidayatullah National Law University, India

Chapter 6
Context for ICTs Role in South African Development........................................................................ 89
Udo Richard Averweg, Information Services, eThekwini Municipality
and University of KwaZulu, South Africa
Geoff Joseph Erwin, The Information Society Institute (TISI), South Africa

Chapter 7
Cybercrime Regulation: The Nigerian Situation .................................................................................. 98
Alex Ozoemelem Obuh, Delta State University, Nigeria
Ihuoma Sandra Babatope, Delta State University, Nigeria

Chapter 8
Emerging Information and Communication Technology Policy Framework for Africa .................... 113
Saul F.C. Zulu, University of Botswana, Botswana

Chapter 9
Ethics and Social Issues Related to Information Communication Technology (ICT) ........................ 135
Nelson Edewor, Delta State Polytechnic, Nigeria

Chapter 10
Framework for Effective Development of Information and Communication Technology (ICT)
Policy in University Libraries in Nigeria ............................................................................................ 148
Okon E. Ani, University of Calabar, Nigeria
Margaret Edem, University of Calabar, Nigeria

Chapter 11
Gender and ICT Policy ....................................................................................................................... 164
Tracy Efe Rhima, Delta State University, Nigeria

Chapter 12
Name Authority Control Paradigm Shift in the Network Environment ............................................. 182
Mirna Willer, University of Zadar, Croatia

Chapter 13
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism:
The Legal and Policy Model from India ............................................................................................. 206
S.R. Subramanian, Hidayatullah National Law University, India
Chapter 14
National Information and Communication Technology Policy Process
in Developing Countries ..................................................................................................................... 218
Edwin I. Achugbue, Delta State University, Nigeria
C.E. Akporido, Delta State University, Nigeria

Chapter 15
Regulation of Internet Content............................................................................................................ 233
Esharenana E. Adomi, Delta State University, Nigeria

Chapter 16
The New Zealand Response to Internet Child Pornography .............................................................. 247
David Wilson, Researcher, New Zealand

Chapter 17
Towards Electronic Records Management Strategies......................................................................... 263
Basil Enemute Iwhiwhu, Delta State University, Nigeria

Chapter 18
Ugandas Rural ICT Policy Framework: Strengths and Disparities in Reaching the Last Mile......... 277
Carol Azungi Dralega, Western Norway Research Institute, Norway

Compilation of References .............................................................................................................. 290

About the Contributors ................................................................................................................... 321

Index ................................................................................................................................................... 327


Detailed Table of Contents

Foreword ............................................................................................................................................xiii

Preface ................................................................................................................................................. xv

Acknowledgment ............................................................................................................................... xvii

Chapter 1
A Framework for ICT Security Policy Management .............................................................................. 1
Sitalakshmi Venkatraman, University of Ballarat, Australia

Much research has focused on formulating frameworks for ICT management in general and there is a
paucity of guidelines in literature for ICT security policy management, in particular. This chapter explores
ICT security management issues faced in different environments and proposes an integrated framework
for managing ICT security policies in an iterative manner. The framework provides the flexibility and
adaptability for different organisations to follow the guidelines effectively as it emphasises on policy
alignment with business objectives. Since the framework underpins the continuous improvement phi-
losophy, it caters to ICT security policy reform and implementations for the future as well.

Chapter 2
A Model for Building Trust in E-Government...................................................................................... 15
Stephen M. Mutula, University of Botswana, Botswana

This chapter proposes a model for building trust of citizens in e-government. The proposed model is
premised on five trust pillars: ethical/human; information/content; technical; policy/legal; and political/
governance. Each of these pillars has several dimensions adapted from various existing user satisfaction
tools or frameworks such as Service Quality (SERVQUAL), trust formation framework, technology ac-
ceptance model, information systems success model, and many more. The chapter also covers history
of e-government; models of e-government interactions; e-government trust related models; theoretical
basis of trust; causes of distrust in e-government; challenges of applications of ICT in e-government;
framework for building trust in e-government; and future trends of trust in e-government
Chapter 3
Adopting Mobile Devices in Classroom: An Empirical Case Study from Indonesian Teachers .......... 34
Chockalingam Annamalai, SEAMEO RECSAM, Penang, Malaysia
Wahyudi Yososutikno, SEAMEO RECSAM, Penang, Malaysia
Ng Khar Thoe, SEAMEO RECSAM, Penang, Malaysia

This chapter addresses issues related to the mobile phone evolution in Indonesia, pedagogical effective-
ness of using it in educational context with empirical study on Indonesian teachers perception of the
aforementioned in the classroom for science and mathematics learning. The useful research evidence
of the value of ICT in education thereby serves as empirical basis for the formulation of ICT policy in
educational institutions, particularly ICT integration in instruction.

Chapter 4
Analysing an ICT4D Project in India Using the Capability Approach
and a Virtuous Spiral Framework ........................................................................................................ 50
Helena Grunfeld, Victoria University, Australia
Sriram Guddireddigari, Monash University, Australia
Benita Marian, The East West Foundation of India, India
John Peter, The East West Foundation of India, India
Vijay Kumar, The East West Foundation of India, India

This chapter reports a research, conducted at a computer centre in the Indian state of Tamil Nadu,
which centred on the perception of participants with respect to whether the centre had played a role in
any improvements in the community and whether they could see a role for it in changes they would
like to see, or aspirations they may have for their communities. A key finding of the field research was
that participants valued the centre mainly for its contribution to education of their children. Education
was appreciated beyond its instrumental utility and included intrinsic value, i.e. value that exceeds its
potential as a path to higher incomes. Participants frequently referred to how a higher level of literacy
would empower them to deal with government officials without intermediaries. This finding is consistent
with the CAs emphasis on development as a process facilitating capabilities that enable people to lead
lives they have reason to value.

Chapter 5
Analysis of Speedy Uptake of Electronic and Digital Signatures in Digital Economy
with Special Reference to India ............................................................................................................ 76
Swapneshwar Goutam, Hidayatullah National Law University, India

This chapter focuses on the issues evolved out of the Indian Information Technology Act of 2000; the
key subject related to authentication of digital signatures with special reference to India based on case
studies; the benefits of strong information technology infrastructure in India for advancement of future
technologies and expansion of domestic market worldwide as well as the vital suggestions on advantages
of electronic and digital signatures in enriching and ensuring swiftness in business desires and security.
Chapter 6
Context for ICTs Role in South African Development........................................................................ 89
Udo Richard Averweg, Information Services, eThekwini Municipality
and University of KwaZulu, South Africa
Geoff Joseph Erwin, The Information Society Institute (TISI), South Africa

This chapter discusses that information and communication technologies (ICTs) can (and should) be
used to disseminate information and participation to disadvantaged communities in order to foster
socio-economic development in South Africa. The objective of this chapter is twofold: (1) how should
ICT policies and frameworks in South Africa be implemented (e.g. by a top-down, bottom-up or
mixed approach paradigm) in order for the South African government to achieve its socio-economic
goals?; and (2) can socio-economic development in South Africa be effectively assisted by the use of
ICT? A discussion of these points may assist in the formulation of national ICT policies in South Africa
and thereby spawn the setting up of social appropriation of ICT advancement programs. Such programs
are particularly relevant to the digital divide, for fostering socio-economic development and in promot-
ing an inclusive information society in South Africa.

Chapter 7
Cybercrime Regulation: The Nigerian Situation .................................................................................. 98
Alex Ozoemelem Obuh, Delta State University, Nigeria
Ihuoma Sandra Babatope, Delta State University, Nigeria

This chapter discusses cybercrime and cybercrime regulation in the Nigeria. It gives the meaning
to cybercrime, types of cybercrimes (of which advance fee fraud is the most prevalent in Nigeria),
means of perpetrating cybercrimes, the current situation and efforts towards combating cybercrime in
Nigeria.

Chapter 8
Emerging Information and Communication Technology Policy Framework for Africa .................... 113
Saul F.C. Zulu, University of Botswana, Botswana

This chapter reviews emerging ICTs and their potential for application in leveraging Africas efforts
towards meeting development efforts. The digital divide barriers that may inhibit emergent ICTs in
Africa are highlighted. The current ICT policies of selected African countries are reviewed and the
review indicates that the policies are geared towards application of ICTs other than their production.
The review also reveals a lack of appreciation of emerging ICTs in Africa both at the national as well
as sub-regional economic bloc levels. The chapter proposes policy framework for emerging ICTs for
Africa that are necessary for creating an enabling environment for harnessing the emerging ICTs that will
propel the continent into the 21st Century and beyond. And that such an emerging ICT environment must
be anchored on a number of strategic policy frameworks including the legal, regulatory/administrative
institutional framework, infrastructure, technology advocacy, human resources, education and research
frameworks. It concludes that Africa can prepare for its future by creating an appropriate environment
for fostering the adoption and application of emerging technologies
Chapter 9
Ethics and Social Issues Related to Information Communication Technology (ICT) ........................ 135
Nelson Edewor, Delta State Polytechnic, Nigeria

This chapter describes these ethical issues and how to deal with them as an individual or an organization.
It provides information on the concept of ethics and the technological advancements responsible for
the ethical concern. It discusses privacy, information rights, and intellectual property rights and ethics
policy. The Nigerian national intellectual property right laws were examined in line with World Trade
Organization/Trade Related Aspects of Intellectual Property Rights (WTO/TRIP) compliance.

Chapter 10
Framework for Effective Development of Information and Communication Technology (ICT)
Policy in University Libraries in Nigeria ............................................................................................ 148
Okon E. Ani, University of Calabar, Nigeria
Margaret Edem, University of Calabar, Nigeria

The chapter explores variety of ICT infrastructure/services that are available in university libraries,
sources of ICT funding, ICT policy priority areas, key ICT policy issues and strategies for formulating
ICT policy. Questionnaire survey was used for the study. The findings of the study indicate that, there
is a widespread use of Internet in the 14 surveyed university libraries; and only 5 of these libraries have
computerized library services. NUC/ETF, library development fund (LDF) and university management
are major ICT funding sources. ICT funding/budgeting, ICT infrastructure procurement/maintenance, ICT
literacy/capacity building and ICT use are the highest ranked ICT policy priority areas in the surveyed
libraries. And annual budgetary allocation to ICT in university libraries, training/capacity building for
librarians, as well as, organization of ICT literacy programme for patrons are the highest ranked key
ICT policy issues in university libraries. The chapter recommends that, each university should formulate
relevant ICT policy for its library, besides the national ICT policy.

Chapter 11
Gender and ICT Policy ....................................................................................................................... 164
Tracy Efe Rhima, Delta State University, Nigeria

This chapter is devoted to discussion of ICT and gender policy. Itt explores the need for gender con-
sideration in ICT policy, gender issues in ICT policy, adoption of gender perspective in ICT policies,
challenges, for adopting gender perspective information, implementation of ICT policies, case studies
of gender and ICT policies in Asia, Africa, Europe, Latin America and Caribbean and Australia, gender
approaches to ICT policies and programmes, guidelines for policy-making and regulatory agencies ,and
future

Chapter 12
Name Authority Control Paradigm Shift in the Network Environment ............................................. 182
Mirna Willer, University of Zadar, Croatia
The purpose of this chapter is to give an international perspective and overview of the theory, standard-
ization processes and following practices in the field of authority control, with particular view on the
name authority control since the 1960s to the present. In the focus of interest of this chapter is paradigm
shift in the field, and the possibilities of semantic web technologies in meeting library users needs, as
well as librarians tasks to produce tools convenient to the user in the network environment.

Chapter 13
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism:
The Legal and Policy Model from India ............................................................................................. 206
S.R. Subramanian, Hidayatullah National Law University, India

This chapter examines and analyses the Indian ICT laws and policies in the backdrop of cyber-crime
prevention and regulation, with the aim of offering a comprehensive model of ICT policy. It will discuss
the extent of legal framework in the light of classification and criminalization of various cyber-crimes.
Also, while examining the policy instruments, it will bring out the public and private initiatives on pro-
tection of information infrastructures, incident and emergency response and the innovative institutions
and schemes involved.

Chapter 14
National Information and Communication Technology Policy Process
in Developing Countries ..................................................................................................................... 218
Edwin I. Achugbue, Delta State University, Nigeria
C.E. Akporido, Delta State University, Nigeria

This chapter discusses national information and communication technology policy process in develop-
ing countries. It describes the need for information and communication technology policy, ICT policy
development process, national ICT policy in developing countries, the role of an ICT policy in the
developing country, factors affecting the formulation of national ICT policies and the future of national
ICT policy was also discussed.

Chapter 15
Regulation of Internet Content............................................................................................................ 233
Esharenana E. Adomi, Delta State University, Nigeria

This chapter focuses on regulation of Internet content. It presents the arguments for and against Internet
content regulation, approaches to content regulation on the Net, how Internet content is regulated in dif-
ferent parts of the world, issues inherent in content regulation, choice of content regulation mechanism
as well as future trends.

Chapter 16
The New Zealand Response to Internet Child Pornography .............................................................. 247
David Wilson, Researcher, New Zealand
This chapter describes the history, development and operation of the New Zealand censorship system,
as it applies to Internet content. It is likely to be of interest to policy-makers, law enforcement officers
and media regulators in other countries.

Chapter 17
Towards Electronic Records Management Strategies......................................................................... 263
Basil Enemute Iwhiwhu, Delta State University, Nigeria

Organizations should recognize that its records are a vital business resource and are key to the effective
functioning and accountability of the organization. Efficient management of records is essential in order
to support organizations core business activities, to comply with legal and regulatory obligations, and
to provide a high quality service to citizens. Electronic records management programme ensures that the
organizational business activities are well documented, organized and managed, given access, protected
from unauthorized access and disposed off (either destroyed or archived). Credible and dependable
information systems are desired to achieve this. Also, adequate skills sets are required by personnel
working with and managing electronic records.

Chapter 18
Ugandas Rural ICT Policy Framework: Strengths and Disparities in Reaching the Last Mile......... 277
Carol Azungi Dralega, Western Norway Research Institute, Norway

This chapter investigates the Ugandan ICT policy approach to promoting access to and the empower-
ment of the poor majority, remote and under-accessed communities in Uganda. The chapter high-
lights the strengths of the policy framework while at the same time draws attention to its weaknesses.
For instance, while the chapter acknowledges the fact that the ICT policy framework recognises and
has pursued strategic approaches to expanding access to remote areas, a closer scrutiny of the policy
framework indicates disparities that may delimit its pragmatism. These disparities, it is argued, mainly
emanate from the fact that the policy framework is not entirely holistic in its outlook, not only because
the processes (of policy making) left out the rural users, it also fails to address the gender dynamics.
In addition to divorcing itself from political and democratic aspects necessary for development, the
policy framework seems shorthanded on sustainability fundamentals that are conjectured to delimit its
pragmatism at the grassroots.

Compilation of References .............................................................................................................. 290

About the Contributors ................................................................................................................... 321

Index ................................................................................................................................................... 327


xiii

Foreword

There is little doubt we are in the midst of a communication and information revolution. But what
type of revolution will this be? Fifty years from now will we speak of the current era as an edifying
moment in human history when the ICTs of the day were harnessed to effectively address societys
social, political and economic ills? Or will we speak forlornly of lost opportunities and of an era that
exacerbated inequalities and wrought new forms of insecurity across the globe? Or will our cogitations
lie somewhere in between?
This book accepts the following premise as foundational: Where we end up, and how the revolution
unfolds will be determined to a very significant extent by the policy frameworks devised to guide the
development, deployment and use of ICTs. As with all new technology systems, recent and emerging
ICTs portend both significant potential benefits and serious potential problems for organizations and
societies. Wherever there are winners, there are likely to be losers unless steps are taken to prevent
such developments. Appropriately designed ICT policies can increase the possibilities for benefit, reduce
the risk of loss and harm, and ensure that the implications for various sectors of society are considered.
The book also takes as axiomatic the premise that the formation of these policies should be informed by
scholarly work, whether this takes the form of relevant empirical findings or of theoretical and analytic
frameworks that inform the questions and issues policy makers prioritize.
Taken together, the various contributions in the Handbook provide an engaging and timely analysis
of a number of pressing questions that come in to plain sight when these eminently reasonable premises
are accepted. What values, normative commitments and priorities should inform the design of ICT policy
frameworks? Whose interests should be incorporated into the frameworks and whose needs should receive
priority? What processes shape how these frameworks are developed, implemented and reformed? Whose
voices should be present in the policy formation process and how can their voices be institutionalized
in the process? Given that ICT developments cut across many if not all sectors of society, how should
we ensure ICT policies take into consideration and harmonize with priorities in other policy domains?
Twenty-eight experts from eight countries and four continents and an array of disciplines address these
and other important questions in a variety national contexts and in relation to numerous topical issues
including: ICT security and cybercrime policy; citizen trust and e-government; ICTs and socioeconomic
development; privacy and intellectual property issues associated with ICTs; gender considerations and
ICT policy; internet content regulation. While some contributions are concerned with policy issues
at the international or national level others train their sights on the regional or organizational context.
The book provides a highly engaging and instructive cross-national comparative perspective on ICT
policy issues. In doing so, it fills an important lacunae in the extant literature on ICT policy. It contains
a wealth of policy-relevant insights and information that will be of great use to those who engage in
xiv

or systematically research and teach about ICT policy formation and implementation. More specifi-
cally, the book includes important observations on the philosophical, ethical and moral touchstones
that should guide sound ICT policy, it provides useful research evidence that can provide the basis for
good policy decision making, and it provides the reader with specific, granular-level information on
designing particular kinds of ICT policy initiatives. In short, the book provides a body of knowledge
and information that will prove to be a valuable resource for those seeking to maximize the benefits of
ICT while minimizing potential negative consequences.

Peter Shields
Eastern Washington University, USA

Peter Shields is Professor of Communication and Director of the Masters of Science in Communications program at Eastern
Washington University in Cheney, Washington. His areas of research include electronic surveillance and national security,
communication technology policy, and the political economy of telecommunication networks. He is the author of forty journal
articles and book chapters on topics such as communication privacy, telecommunication and development, money laundering
regulation, and media reform in Eastern Europe. He is also co-editor of International Broadcasting in Asia: Economic, Political
and Cultural Implications (University Press of America, 1998).
xv

Preface

ICT policy framework is a set of principles and goals intended to govern the development, implementa-
tion, adoption, monitoring, evaluation and application of ICTs in organizations, institutions, societies or
nations. It provides the rationale and philosophy to guide the planning and development and utilization
of ICTs in a particular setting.
ICTs are always evolving and have been contributing immensely to economic, political, social, sci-
entific and educational development in every society where they are deployed. It is the existence and
utilization of appropriate policy framework that would enable individuals, institutions, organizations,
nations, or regions to benefit from the developments propelled by the application of ICTs. ICT policy
framework is capable of bridging or reducing the gap between those who do and do not have access to
ICT. An ICT policy framework is an essential step towards creating an enabling environment for the
deployment of ICT for the development of the society. Absence of ICT policy can impede the develop-
ment of information infrastructure in affected organizations and societies. The availability of ICT policy
has the potential of building capability and capacities in the community, thereby enabling individuals
to participate in an economy and society that increasingly relies on ICT. Though ICT policies are very
important, not all institutions, countries, regions, etc., have been able to formulate, adopt and implement
policies. Some that have put ICT policies in place may even have defective ones which would not en-
able them to derive desirable developmental benefits. Review of literature has not been able to reveal
any book that has addressed different ICT policies. This book will therefore bridge this literature gap.
ICT as a field is interdisciplinary in nature. Every field of human endeavour depends on as well as
derives benefits from it. It is therefore not surprising that contributors to this book are from various
subject disciplines computer science, education, library and information science, mass communication,
law, etc. These scholars have addressed ICT policy from their various backgrounds. This has therefore
made the book to be relevant to different fields of study.
The book also has contributors from different world regions both developed and developing coun-
tries. This shows that ICT and its policies have been embraced and adopted in different parts of the
world. The contents of the book would therefore be useful to scholars, researchers and practitioners in
different parts of the world.
This book aims to provide the most complete and reliable source of information on current develop-
ments in the field. Specifically, the book will be a source book on ICT policy framework; be a guidebook
to those who are involved in ICT policy formulation, implementation, adoption, monitoring, evaluation
and application; provide background information to scholars and researcher who are interested in carry-
ing out research on ICT policies; furnish teachers of information technology with necessary knowledge
which they can impart to their students/trainees; provide ICT users with information that can enable
xvi

them to understand the policies which guide technology and how they can make use of ICT components
for their enhancement..
The book will be essential reading for professionals, governmental and non-governmental officials
involved in ICT matters; teachers/academics in the field of information science, technology and manage-
ment; students, scholars and researchers in the field of information science, technology and management;
ICT users; library and information service users, etc. The publication will provide the audience access to
information that will advance research in ICT policies. It will enable individuals to become acquainted
with ICT policy process, which will then assist those concerned to formulate and implement appropriate
policies. This book will provide teachers, students, scholars and researchers in the field of information
science, education, technology and management with useful material on curricular offering. It will en-
able different ICT users to apply ICTs for the advancement of different areas of their lives.

Esharenana E. Adomi
Delta State University, Nigeria
xvii

Acknowledgment

The editor would like to acknowledge the help received from all those involved in the collation and review
process of the book, without whose support the project could have not been completed satisfactorily.
Due appreciation and gratitude is due to the authors of the included chapters, most of whom served
as reviewers for chapters written by others. Thanks go to members of the editorial board and all others
who provided constructive and comprehensive reviews.
Special thanks go to Professor Peter Shields of the Eastern Washington University, USA for writing
the foreword.
Special thanks also go to the management and staff of IGI Global, whose contributions throughout the
whole project from inception of initial ideas to final publication has been very invaluable. In particular,
the editor is grateful to Beth Ardner for the invitation to edit this book, Christine Bufton, Joel Gamon
and Jan Travers for their support and encouragement.
In closing, I wish to thank all the authors for their insights and excellent contribution to this handbook.
I also want to thank all of the people who assisted me in the reviewing process. Finally, I must thank my
wife and children for their support, patience and encouragement throughout this project.

Esharenana E. Adomi
Delta State University, Nigeria
1

Chapter 1
A Framework for ICT Security
Policy Management
Sitalakshmi Venkatraman
University of Ballarat, Australia

AbstrAct
Organisations around the world are increasingly relying on the potential of information and communi-
cation technologies (ICTs) for their business operations as well as competitiveness. Huge amounts of
money and time are invested on ICT infrastructure as there exists a high level of business dependency
on ICT. Hence, protecting the ICT resources using effective security policies is of utmost importance
for the sustenance of organisations. With the recent exponential rise in ICT security threats witnessed
worldwide, governments and businesses are trying to successfully develop ICT security policies for
their internal and external operations. While ICT security best practices are quite similar globally,
ICT security policy management is very much localised and specific to different business scenarios and
applications. Moreover, ICT security policies in an organization keep evolving from time to time and
more recently changes take place at a much faster pace. This situation warrants a pragmatic framework
for the development and management of ICT security policies in an organisation. Much research has
focused on formulating frameworks for ICT management in general and there is a paucity of guidelines
in literature for ICT security policy management, in particular. This chapter explores ICT security
management issues faced in different environments and proposes an integrated framework for manag-
ing ICT security policies in an iterative manner. The framework provides the flexibility and adaptability
for different organisations to follow the guidelines effectively as it emphasises on policy alignment with
business objectives. Since the framework underpins the continuous improvement philosophy, it caters
to ICT security policy reform and implementations for the future as well.

DOI: 10.4018/978-1-61692-012-8.ch001

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Framework for ICT Security Policy Management

IntroductIon tional and modern societies having different


social and ethical beliefs / laws (Small, 2007).
With information and communication technol-
ogy (ICT) becoming part and parcel of business Hence, ICT security policies have to be
environments worldwide, the role of ICT security modified frequently to deal with the above said
and its policies are of paramount importance dynamic changes that impact both technologi-
in this globally inter-connected world (OECD, cal and non-technological areas. It is, therefore,
2002; IT Governance Institute, 2005; Bojanc & important to incorporate security monitoring and
Jerman-Blaic, 2008). Organisations, both private planning steps that include protection measures,
and public, have the critical objective of protecting security standards, risk analysis and contingency
their ICT infrastructure as well as business infor- plans so as to ensure information security in an
mation assets from intrusions and risks (Conklin, organisation for the present as well as the future.
2007). Hence, it is mandatory for them to have All these steps require considerable effort, time
in place suitable ICT security policies that could and money and hence developing and managing
facilitate in achieving this objective. an effective ICT security policy has become one
Traditionally, before the onset of the Internet, of the main concerns for businesses worldwide.
ICT security policies were not given high priority This chapter aims to discuss the prevailing
among the various business strategies. Organisa- issues that face ICT security management and to
tions were able to sustain with or without such propose an integrated framework for managing
policies. However, with the Internet explosion ICT security policies effectively. The main objec-
opening up global market opportunities, more tives of this chapter are:
and more businesses are harnessing the benefits
of the inter-connectivity of ICT. Hence, formulat- To explore the major issues and challenges
ing ICT security policies have become mandatory that are surrounding ICT security policies,
for the sustenance of every organisation (Caruso, To understand the key global trends in
2003; Drevin, Kruger & Steyn, 2006). In addition, developing and managing ICT security
as shown in Figure 1, ICT security has become policies,
highly complex with three main dynamic changes To appreciate the need for a guideline to-
taking place in the following areas that create new wards ICT security policy management,
issues to focus on: To propose an effective framework for
managing ICT security policies and for
1. Rapid ICT innovations: new devices (mo- continuously reforming them,
bile, wireless, etc) are getting inter-connected To understand the implementation details
to traditional computing systems with dif- of the framework through the governance
ferent hardware and software platforms / of ICT security policy at the strategic,
protocols for businesses to operate on tactical and operational levels of manage-
(Sathish Babu & Venkataram, 2009); ment, and
2. Growing security threats: recent security To provide an overview of the future trends
breaches are increasing exponentially cre- in the challenges, concerns and issues that
ating a race between the hackers and the organisations would face while managing
anti-virus solutions architects (Jahankani, their ICT security policies.
Antonijevic & Walcott, 2008);
3. Varying social and legal focus: Globalisation
requires business interaction between tradi-

2
A Framework for ICT Security Policy Management

Figure 1. Influences on ICT security policies

bAckground The security risks and the roles / responsi-


bilities of staff;
Developing an ICT security policy is the first step The standards and procedures to be adopt-
towards enhancing an organisations informa- ed in protecting the information assets of
tion security and hence it should clearly identify the organisation and in reporting incidents.
goals, directions, procedures, and stakeholder
responsibilities (Fulford & Doherty, 2003). A For the past two decades, much research and
good ICT security policy should try to balance practice have been focussing on the technology
rigid information control that creates constraints aspects of information security (Von Solms,
and limitations to the ICT services of the organi- 2006). Research studies were concentrating on
sation against an open information control that tools and techniques in achieving the three main
creates scope for security compromises. It should objectives of ICT security, namely confidential-
provide the necessary procedures and controls to ity, integrity and availability of information that
ensure that the ICT systems in an organisation are are required to be achieved during transaction
protected against information loss or ICT service processing or in transit over the network or within
disruptions that could be caused by inadvertent or storage devices. Hence, ICT security policies were
malicious actions. Essentially, the ICT policy is also developed around the technological aspects
a comprehensive document that should provide outlining the general use of computer resources,
at least the following baseline information for access controls, staff responsibilities in handling
protecting the ICT resources of an organisation: sensitive information and incident management
procedures. However, such ICT security policies
The ICT security policy statement and have served their purpose only in the short-run as
coverage; they cater to ICT resource management alone and
The objectives and the strategies behind lacked risk management, performance measure-
the ICT security policy as a business en- ment, strategic alignment and other non-technical
abler of the organisation; aspects associated with the ever changing business

3
A Framework for ICT Security Policy Management

needs of an organisation (Dhillon & Torkzadeh, aspects of information security with the business
2006). ICT security policies are also required to operations.
comply with a number of government regula- The key to success with a security policy is not
tions that span multiple industries and could be the technology alone, but the ability to effectively
uniquely specific to industry sectors such as, manage and safeguard the information assets as
finance, healthcare and small businesses (Greene, part of an organisational culture (Caruso, 2003).
2006). Hence, information security standards have In order to develop and manage an ICT security
also been raised by adding on to the traditional policy successfully, it is important for the top man-
security objectives of confidentiality, integrity and agement of an organisation to understand the cost
availability of information, some more objectives and measures involved in information security:
such as authenticity, accountability, compliance, where, when and how much money to allocate for
non-repudiation and reliability that have been each security-related task, what are the levels of
introduced recently (ISO/IEC 27000, 2007). risks associated with different business operations
In the past, organisations perceived ICT secu- and how to strategically align policies with stake-
rity as a technical problem and did not relate infor- holders interests (IT Governance Institute, 2005;
mation security problem as a risk to its business Bojanc & Jerman-Blaic, 2008). Security alignment
objectives (Siponen & Oinas-Kukkonen, 2007). with stakeholders interests is also important in
There has been lack of management involvement the success of a security policy, as humans are the
and commitment in developing ICT security ones connecting the technology with the business
policies and procedures. According to studies activities. In other words, information security
conducted by Dong, Neufeld & Higgins (2009) should be considered as a business driver and an
on various enterprises, the level of outcomes in ICT security policy should become a vehicle in
such ICT initiatives varies very much with the establishing the bridge between the human and
level of top management support rendered. Hence, the technological paradigms of an organisation.
management support is essential for a successful In broad terms, an ICT security policy is a plan
implementation of ICT policies. that involves both the technology component and
Today, we are in a networked world that the management component. It should outline
provides openness and connectedness through a not only the techniques that are to be adopted to
variety of gateways that could lead to escalated protect the ICT resources and information assets
security breaches. Recent evidences indicate that of an organisation, but should also explain the
there is enormous potential for intrusions through delegation of the associated duties and respon-
the network, which may result in business service sibilities of participants at all levels, strategic,
disruption and loss of strategic / asset information tactical and operational levels of an organisation
by organisations (Jahankani, Antonijevic & Wal- in a co-operative manner in order to achieve the
cott, 2008; Whitman & Mattord, 2009). Security desired security culture.
breaches have negative impacts on achieving
business objectives and result in huge financial
implications (Hansche, 2001; IT Governance Ict securIty PolIcy Issues
Institute, 2005; Bojanc & Jerman-Blaic, 2008).
Hence, organisations need to change from the Over a period of time, the ICT era has posed many
traditional relaxed approach shown towards the challenges that require much attention. One of the
management of ICT security policies to a more major concerns that has surfaced recently is the
involved and integrated approach that connects insufficiency of the current ICT security policies
the technical and non-technical (socio-economic) to tackle the multi-dimensional issues posed by

4
A Framework for ICT Security Policy Management

the interconnected world of today with much legal issues of privacy (Whitman & Mattord,
more diversity. While formulating ICT security 2009). Hence, in general, ICT security poli-
policies, organisations need to be aware of the cies are framed around tackling technical
recent trends and issues that arise from internal issues and do not address the socio-economic
as well as external business operations. Some of risks and privacy barriers that could impact
the major ICT security policy issues surrounding a the organisations business objectives.
globally connected organisation are given below: 3. There is a lack of shared responsibility with
regard to ICT security issues. Normally,
1. Though information security standards are ICT security policies are merely conveyed
available in literature, there are no stan- to the employees of an organisation in the
dardised procedures for developing ICT form of an information communication
security policies that meet all the security session. Many organisations do not have
requirements of an organisation (Hone & in place any in-depth security awareness
Eloff, 2002; Saint-Germain, 2005; Pinder, program that could help management and
2006). Well-established guidelines such employees get involved and participate in
as Information Technology Infrastructure the ICT security policy implementation and
Library (ITIL), Control Objectives for that could facilitate in taking ownership of
Information and Related Technology their security roles and responsibilities. The
(COBIT), Capability Maturity Model lack of focus on user awareness could result
(CMM), and International Organisation for in deliberate and accidental introduction of
Standardisation (ISO) 1779 provide best malicious activities by the employees (Abu-
practices for managing ICT infrastructures, Musa, 2007).
in general, and they have complementary 4. Even a single incidence of security breach
purposes (IT Governance Institute, 2005). or virus attack on a companys ICT could
While ICT security best practices are quite lead to denial of service or asset information
similar worldwide, the ICT configurations, leakage resulting in a serious damage to the
business needs and the corporate culture are integrity of the organisation and denial of
much different from one organisation to an- service leading to a huge financial loss (Von
other. Hence, none of the studies indicate how Solms, 2006; Conklin, 2007; Jahankani,
these standards and guidelines fit together Antonijevic & Walcott, 2008). However,
in providing a management framework for until the recent security awareness wave,
ICT security policies, in particular. ICT security policies have not been given a
2. Information security needs for an organi- risk-managed outlook and therefore have not
sation are generally seen from merely the been given high priority among the business
technical context while the much-required objectives of an organisation.
non-technical (socio-economic) aspects 5. Effective governance of ICT security is pos-
are ignored (Dhillon & Torkzadeh, 2006). sible with planned interventions such as se-
The social concerns, corporate cultural is- curity acts / government laws or even internal
sues and economic impacts of a security / external audits, which require changes in
problem are not considered by many policy corporate culture. Employees need to believe
makers (Chang & Chin-Shien, 2007). The that such external interventions or internal
recent trends in computer attacks through audits would in fact strengthen corporate
the Internet have resulted in changing the accountability (Pinder, 2006).
security policies to be closely tied to the

5
A Framework for ICT Security Policy Management

6. There is no international law that can be ICT security policy that is geared towards
adopted to prosecute cybercrime and infor- meeting all the organisations information
mation asset thefts of an organisation (Aljifri, security requirements that were identified.
Pons & Collins, 2003; Shalhoub, 2006). 2. Policy Recommendations: This step would
Electronic commerce poses legal risks that involve researching the best practices to deal
cannot be ignored by organisations as they with the organisations security issues identi-
involve the understanding of the different fied in the requirements analysis step. This
cyber laws practised in other countries. would help the policy makers in identifying
alternate security solutions / strategies that
With so many ever-changing technological as are adopted in other similar environments.
well as non-technological issues impending on All the solution options are then considered
information security, organisations are in need with a cost-benefit analysis leading to certain
of a management framework that caters to these viable recommendations for the policy. In
issues and acts as a guideline for creating, imple- other words, the recommendations are drawn
menting and continuously reforming ICT security based on the pros and cons that are weighed
policies. The next section proposes a framework through the cost-benefit analysis of each
to achieve this. solution option.
3. Policy Design: This step involves outlining
how the recommended security solution
ProPosed FrAmework would be put into practice in the organi-
sational context. The making of the policy
Developing a good ICT security policy for an involves identifying the scope of the policy,
organisation requires an iterative approach as the risks to be addressed, the detailed security
it is an ongoing journey towards a risk-reduced measures to be adopted and the support /
environment. It cannot be a one-time endeavour guidance required. It outlines the procedures,
as it requires continuous improvements from checklists, standards, rules and regulations,
time to time in an iterative manner. This is due user roles, training and support that are es-
to increased business dependencies with ICT sential for implementing the ICT security
services, increased security threats and diverse policy within the organisation.
socio-economic issues. Such a dynamic situation 4. Policy Communication: This step focuses
could warrant major policy upgrades from one on promoting discussions about the informa-
iteration of development to the next. The frame- tion provided in the policy as part of the secu-
work proposed below captures this requirement rity awareness program of the organisation.
of continuous improvement with an iterative ap- It enables individuals and stakeholder groups
proach for the development of ICT security policy: to identify policy issues, inconsistencies
across various departments of the organisa-
1. Requirements Analysis: This step involves tion and possible implementation hitches.
identifying various issues related to the or- This step also enables staff participation in
ganisations ICT systems, possible security policy making and develops a sense of policy
threats and risks, their impact on the business ownership and security responsibility among
operations and more importantly the drivers individuals of the organisation. Through
for an ICT security policy. Such an analysis such participation techniques one could
of the organisations environment would then achieve employee empowerment (Whyte
lead to defining the vision and goals of an & Macintosh, 2002; Hart-Teeter, 2003).

6
A Framework for ICT Security Policy Management

5. Policy Endorsement: The policy gets re- contingency steps to be undertaken, proce-
fined based on the feedback obtained through dures for reporting and handling incidents,
the policy communication step. The refined etc. are laid out clearly and communicated
ICT security policy then gets endorsed by a to the staff. The deployment of the policy
security governance committee, which could also involves different ways of establishing
consist of internal and external security the communication lines between the stake-
auditors. The committee would ensure that holders and the Information Security Team
the policy complies with the international of the organisation for continuous updates
standards and practice. The International and support.
Organisation for Standardization (ISO) 7. Policy Feedback and Evaluation: It is
and the International Electrotechnical important to monitor and collect feedback
Commission (IEC) have published standards periodically in order to evaluate the success
for information security termed as ISO/IEC of the policy. Monitoring event logs plays
27000 series, which provides high-level an integral part in the evaluation of ICT
advice on a broad range of controls, risk policy compliance and governance (Greene,
assessment processes and certification stan- 2006). Evaluation is an important step in an
dards for information security management. information security management initia-
The security governance committee of an tive as it helps in collecting information on
organisation could adopt policy compliance its efficiency and effectiveness, to define
and governance by verifying that the policy follow-up actions and to justify the invest-
guidelines conform to the best practices ments made (Schlienger & Teufel, 2005).
recommended by the ISO/IEC 27000 series Such a feedback system is highly essential
of information security standards as well as because, all organisations undergo changes
the government / local security organisa- in this globally competitive world and that
tions such as Information Systems Audit could have an impact in the implementation
and Control Association (ISACA). It is also of the policy. There could be organisational
important for the committee to check that the cultural barriers that form roadblocks in the
policy captures the hardware and software implementation of certain aspects of the
guidelines suggested by the organisations policy. The effectiveness of the policy could
IT industry partners such as Microsoft, Sun, be determined based on certain key metrics
IBM, Cisco, etc., who have provided the ICT such as the number of security incidents
infrastructure. identified and resolved, system audit compli-
6. Policy Implementation: The ICT security ance achievements and the business service
policy that has been formed from the previous continuity performance. Finally, the review
steps would go through the implementation process in this step would result in major
process. The most important aspect in this recommendations for policy improvements
step is to provide education and training that would lead back to step 2 for the next
for staff to always think and act in a secure iteration of the ICT security policy reform.
manner. The security awareness program
would also involve changing their roles ICT security is not a mere technical problem
and duties that are required for protecting but the entire organisations problem. Many stud-
the information assets of the organisation ies indicate that the ICT security issues are not
that are related to their everyday business given due importance at all levels of management,
operations. The protocols to be followed, namely strategic, tactical and operational levels.

7
A Framework for ICT Security Policy Management

Figure 2. Iterative process cycle of ICT security


The lack of budget allocation for ICT security
policy development
(Wiander, Savola, Karppinen & Rapeli, 2006) at
the strategic level indicates that the organisational
management, in general, has failed to understand
the complexity of information security risks and
their implications on business operations. In-
stead, the information security problem has been
delegated to the ICT departments, which try to
develop ICT security policies for addressing the
multi-dimensional issues of protecting the entire
organisations information assets. This has resulted
in misalignment of policy objectives as against
business objectives. However, the proposed frame-
work outlining the seven-step iterative process of
ICT security policy development clearly indicates
the participation of all levels of management.
Figure 2 depicts the iterative continuous improve-
ment process cycle of the proposed framework.
It shows that the feedback loop paves way for
flexibility and adaptability of the policy from
time to time as changes take place in the business
environment. In addition, the next section provides
the implementation details and governance of the
ICT security policy at the strategic, tactical and
operational levels of management.

Ict securIty PolIcy


governAnce

A good ICT security policy has three levels


of policy formulation and governance that are
aligned with the management objectives, namely, procedures for preventive management, control
strategic level, tactical level and operational level and recovery of ICT assets. At the strategic level,
(Figure 3). At the strategic level, the policy states the policy would cover the technical aspects of
the vision, mission and overall objectives of the security such as defining the information assets,
security policy by drawing close relationship with the ICT infrastructure and the user groups that
the organisations business objectives. These high- could have an impact on the business. Similarly,
level statements provide the overall management examples of non-technical aspects would include
expectations, scope and directions of the policy. defining the business risks, legal matters, audits
They indicate a comprehensive set of areas cov- and standards that would be associated with the
ered by the policy such as risk management, legal information security of the organisation.
advisory, security standards and reference objects At the tactical level, the policy determines
that relate to security awareness programs and the non-technical aspects such as risk assessment

8
A Framework for ICT Security Policy Management

Figure 3. ICT policy alignment with management objectives

guidelines, security standards, audit procedures, privileges, etc.) for each user. It clearly prepares
and incident reporting manuals along with govern- the procedures, checklists and templates that are
ing rules. It also covers technical aspects of se- essential in the day-to-day business operations
curity such as identification of user groups, roles for user groups to adopt. The policy documents
and responsibilities, classification of sensitive the training details and support available to staff
data, training programs, system monitoring and when they perform their functions of protecting,
recovery mechanisms. While the policy at the monitoring and reporting. Further, the policy de-
strategic level provides the motivation (why) of termines the metrics for evaluation and continuous
the security initiatives and objectives, at the tac- improvements. In other words, at the operational
tical level it provides the procedures (what) that level, the ICT security policy provides detailed
would be adopted to realise these objectives. steps, both preventive and proactive, for dealing
Finally, at the operational level, the policy with technical and non-technical security prob-
elaborates the details (how, when and where) of lems. Some examples on the technical arena that
the implementation mechanisms to be adopted would be included in the security policy are pro-
by the organisation. It provides the mechanisms cedures for latest anti-virus software updates, user
and guidelines for determining the risk levels account rights created in databases, and incident
(low, medium, high) of each business functional monitoring and reporting. Some examples on the
task and allocating roles (user login, password, non-technical arena that would be included in the

9
A Framework for ICT Security Policy Management

security policy are procedures for communicating 2. Overhead and Training Concerns:
new security initiatives, protecting stakeholders Developing an ICT security policy should not
privacy and documentation. be considered as an additional overhead. As
emphasised in the proposed framework, the
security policy objectives should be aligned
Future trends with the business objectives, and security
mechanisms should be integrated with the
This section gives an overview of some of the everyday business operations. In such a
future trends in the challenges, concerns and is- case, all the system logs and generated data
sues that organisations would face while managing could automatically serve as inputs into the
their ICT security policies. final evaluation process. This would pave
way to an automatic approach to measur-
1. Management Challenges: The previous ing the success metrics and effectiveness
sections have clearly established that security of the policy and hence implementing such
cannot be delegated to a specific depart- a security policy would not become an
ment within an organisation and it requires additional overhead. It would also greatly
an active participation of representatives assist in studying and analysing the security
from all departments to interact towards the behaviour of ICT users so as to fine tune the
iterative development of an ICT security training program and reform the policy for
policy that covers technological, economic, incorporating tighter security measures for
and social issues pertaining to its business the future.
information security. This requires a drastic 3. Cyber Compliance Challenges: In this
change in the mindset of the management globally interconnected business envi-
and staff to buy-in the security culture. The ronment, almost all organisations handle
policy framework should promote a security customer information in electronic form
compliance culture within an organisation and protecting such data during transaction
so as to satisfy government regulations that processing or in transit over the network or
are specific to the industry sector (Greene, within storage devices should be given high
2006). The security attacks seen so far are priority as any unintended disclosure could
only the beginning steps to a more advanced lead to privacy and legal issues that have
maliciousness of the future that end-users immense business implications. While the
are unaware of (Whitman & Mattord, 2009). policy would state the necessary security
Hence, top management should understand controls that deal with compliance stan-
that with security problem worsening as dards and local government regulations,
years go by, such a participatory manage- any violations could lead to not only busi-
ment of ICT security policy would definitely ness liabilities but could also result in local
enhance the end-user security awareness and court litigation claims based on the type of
the success of the policy implementation. In security breach. In addition, cyber security
addition, it provides the necessary inputs to laws vary from one country to the other and
the feedback loop of the policy development with business transactions taking place over
framework (Figure 2) that would result in the internet, the ICT security policy of an or-
a well-structured policy improvement from ganisation should be developed with proper
time to time. understanding of the cyber requirements
and regulations of different countries. This

10
A Framework for ICT Security Policy Management

could pose a major challenge in developing proposed an integrated management framework


security policies for the future. which contains a seven-step practical guideline
4. Accountability and Audit Issues: Another for developing, implementing and reforming ICT
concern for the future ICT security policy security policies.
management would be to conduct ICT se- The salient features of the proposed frame-
curity audits and to create an accountability work are:
framework that could work hand-in-hand
with both internal and external audits. Flexibility: The policy development goes
Periodic system audits are essential for through a continuous improvement feed-
continuous improvements in the ICT se- back loop that allows the policy to get re-
curity policies. However, there is a general formed through iterations.
resentment among staff to cooperate with Consultative: The framework uses par-
regard to any kind of audit and account- ticipative techniques that facilitate the in-
ability, which calls for a co-ordinated effort volvement of stakeholders in the policy-
among all levels of participants for a sound making process.
security review (OECD, 2002; Pinder, 2006). Business Alignment: By mapping the
Hence, staff must be educated that internal security tasks with the business functions
and external audits would rather help to at the strategic, tactical and operational
strengthen corporate accountability and to levels, the framework promotes the align-
minimise liability exposures / court litiga- ment of the security risks with the business
tion claims. In future, external reviews and objectives.
international accreditation of ICT security Conformity: Policy endorsement through
policy could even become the law for many internal and external auditing processes
companies. facilitates in achieving conformity and
compliance with security standards and
regulations.
conclusIon Integrated: Through policy communica-
tion initiatives and policy evaluation, the
Information security objectives have been framework is able to integrate the different
modified from time to time to meet up with the requirements (technical, social, economic)
socio-technological changes taking place in this of various user groups from different de-
globally interconnected environment. This af- partments of the organisation.
fects the ICT security policy of an organisation. Adaptability: The generic nature of the
The key factors that warrant frequent changes in framework supports adaptability of the
the ICT security policy of an organisation are, i) framework to any organisation.
rapid ICT innovations, ii) growing security threats
and iii) varying social and legal focus. Such a This chapter is by no means intended to be a
situation indicates that protecting the information complete reference for ICT security policy man-
assets of an organisation is not merely a technical agement. Instead, the main purpose is to provide
problem, but involves privacy, social, economic an awareness of the multi-dimensional issues
and management issues that are unique to each and global trends that impact upon ICT security
business setting. Today, organisations require a and the need for an effective framework for its
good management framework for developing policy development. It has proposed an effective
their ICT security policy. Hence, this chapter has framework that provides practical steps for the

11
A Framework for ICT Security Policy Management

implementation, enhancement and governance Dong, L., Neufeld, D., & Higgins, C. (2009). Top
of ICT security policies and procedures in an management support of enterprise systems imple-
organisation. mentations. Journal of Information Technology,
24(1), 5580. doi:10.1057/jit.2008.21
Drevin, L., Kruger, H. A., & Steyn, T. (2006).
reFerences
Value-focused assessment of ICT security
Abu-Musa, A. A. (2007). Evaluating the security awareness in an academic environment. In S.
controls of CAIS in developing countries: An Fischer-Hubner, K. Ranneberg, L. Yngstrom, &
examination of current research. Information S. Lindskog (Eds.), IFIP International Federation
Management & Computer Security, 15(1), 4663. for Information Processing. Volume 201, Security
doi:10.1108/09685220710738778 and Privacy in Dynamic Environments, (pp. 448-
453). Boston: Springer.
Aljifri, H. A., Pons, A., & Collins, D. (2003).
Global e-commerce: A framework for understand- Fulford, H., & Doherty, N. F. (2003). The
ing and overcoming the trust barrier. Informa- application of information security policies
tion Management & Computer Security, 11(3), in large UK-based organizations: An explor-
130138. doi:10.1108/09685220310480417 atory investigation. Information Manage-
ment & Computer Security, 11(2/3), 106114.
Bojanc, R., & Jerman-Blaic, B. (2008). Towards a doi:10.1108/09685220310480381
standard approach for quantifying an ICT security
investment. Computer Standards & Interfaces, Greene, S. (2006). Security Policies and Proce-
30(4), 216222. doi:10.1016/j.csi.2007.10.013 dures: Principles and Practices. Upper Saddle
River, NJ: Prentice Hall.
Caruso, J. B. (2003). Information technology
security policy keys to success. Center for Ap- Hansche, S. (2001). Designing a security aware-
plication Research Bulletin, 2003(23). Retrieved ness program: Part 1. Information System Security,
January 2009 from http://www.educause.edu/ir/ 9(6), 1422.
library/pdf/ERB0323.pdf Hart-Teeter. (2003). The new e-Government equa-
Chang, S. E., & Chin-Shien, L. (2007). Ex- tion: Ease, engagement, privacy and protection. A
ploring organizational culture for information Report prepared for the Council for Excellence in
security management. Industrial Manage- Government. Retrieved February 10, 2009 from
ment & Data Systems, 107(3), 438458. http://www.cio.gov/documents/egovpoll2003.pdf
doi:10.1108/02635570710734316 Hone, K., & Eloff, J. H. P. (2002). Information
Conklin, W. A. (2007). Barriers to adoption of security policy - What do international infor-
e-government. In Proceedings of the 40th Annual mation security standards say? Computers &
Hawaii International Conference on System Sci- Security, 21(5), 402409. doi:10.1016/S0167-
ences. Washington, DC: IEEE Computer Society. 4048(02)00504-7

Dhillon, G., & Torkzadeh, G. (2006). Value- ISO/IEC 27000. (2007). The ISO/IEC 27K Toolkit
focused assessment of information system security Implementation guidance and metrics. Retrieved
in organizations. Information Systems Journal, 16, January 20, 2009 from http://www.iso27001secu-
293314. doi:10.1111/j.1365-2575.2006.00219.x rity.com/html/iso27k_toolkit.html

12
A Framework for ICT Security Policy Management

IT Governance Institute. (2005). Aligning CO- Shalhoub, Z. K. (2006). Trust, privacy, and
BIT, ITIL and ISO 17799 for business benefit. security in electronic business: The case of
A management briefing from ITGI and OGC. the GCC countries. Information Manage-
Retrieved February 4, 2009, from http://www. ment & Computer Security, 14(3), 270283.
nysforum.org/documents/pdf/itil-6-6-06/Align- doi:10.1108/09685220610670413
ingCOBITITIL.pdf
Siponen, M. T., & Oinas-Kukkonen, H. (2007). A
Jahankani, H., Antonijevic, B., & Walcott, T. H. review of information security issues and respec-
(2008). Tools protecting stakeholders against tive research contributions. ACM SIGMIS Data-
hackers and crackers: An insight review. In- base, 38(1), 6080. doi:10.1145/1216218.1216224
ternational Journal of Electronic Security and
Small, B. (2007). Sustainable development and
Digital Forensics, 1(4), 423442. doi:10.1504/
technology: Genetic engineering, social sustain-
IJESDF.2008.021459
ability and empirical ethics. International Journal
OECD. (2002). Guidelines for the security of of Sustainable Development, 10(4), 402435.
information systems and networks: Towards a doi:10.1504/IJSD.2007.017912
culture of security. OECD Information Privacy and
Von Solms, B. (2006). Information security -
Security. Retrieved February 10, 2009 from http://
The fourth wave. Computers & Security, 25(3),
www.oecd.org/dataoecd/16/22/15582260.pdf
165168. doi:10.1016/j.cose.2006.03.004
Pinder, P. (2006). Preparing information security
Whitman, M. E., & Mattord, H. J. (2009). Prin-
for legal and regulatory compliance (Sarbanes-
ciples of Information Security (3rd ed.). Boston:
Oxley and Basel II). Information Security
Thomson Course Technology.
Technical Report, 11(1), 3238. doi:10.1016/j.
istr.2005.12.003 Whyte, A. & Macintosh, A. (2002). Analysis and
evaluation of e-Consultations. e-Service Journal,
Saint-Germain, R. (2005). Information security
2(1), 9-34.
management best practice based on ISO/IEC
17799. Information Management Journal, 3(4), Wiander, T. Savola, R. Karppinen, K. & Rapeli,
6066. M. (2006). Holistic information security man-
agement in multi-organization environment. In
Sathish Babu, B., & Venkataram, P. (2009).
Proceedings of the International Symposium of
A dynamic authentication scheme for mobile
Industrial Electronics, (pp. 2942-2947). Montreal,
transactions. International Journal of Network
Canada: IEEE.
Security, 8(1), 5974.
Schlienger, T., & Teufel, S. (2005). Tool supported
management of information security culture: Ap-
key terms And deFInItIons
plication in a private bank. In Sasaki, R., Okamoto,
E. & Yoshiura, H. (Eds.) IFIP International Fed- ICT Security: The techniques to protect in-
eration for Information Processing. Volume 181, formation, computer systems and communication
Security and Privacy in the Age of Ubiquitous technologies from unauthorised access, misuse,
Computing, (pp. 65-77). Boston: Springer service disruption, destruction and malicious
manipulation or disclosure.
Security Policy: A definition of what, how
and why the information and communication

13
A Framework for ICT Security Policy Management

technologies of an organisation are being secured Continuous Improvement: It is one of the


including the constraints and the mechanisms. philosophies of Total Quality Management and
Security Objective: A projected state of the refers to the belief that an organisation requires
ICT security that a security policy of an organisa- to constantly measure the effectiveness of its
tion wishes to achieve with the underlying common processes and products with the objective of
goals of protecting the confidentiality, integrity increasing quality and reducing waste.
and availability of information and communica- Security Awareness: The knowledge and at-
tion technology services. titude possessed by an individual with regard to
Security Issue: The exposure of ICT to con- realising the importance of security of information
cerns, problems and vulnerabilities from technol- assets of an organisation, ones responsibilities,
ogy, management, social and ethical perspectives. the procedures to be followed and the implications
Management Framework: A coordinated of security failure.
component set that would endeavour to meet the Security Audit: A measurable assessment of
policy objectives of an organisation. a security system that checks for operational and
Business Alignment: The alignment of the technological problems and security vulnerabili-
strategic goals, objectives and plans of the business ties of an organisation.
to the enterprise-wide activities and supporting
systems.

14
15

Chapter 2
A Model for Building
Trust in E-Government
Stephen M. Mutula
University of Botswana, Botswana

AbstrAct
E-government is a new and complex field which is yet to be clearly understood because of lack of a well
developed theoretical framework. E-government provides a platform for different forms of interactions
such as business to business (B2B), citizens to government (C2G), government to government (G2G),
business to government (B2G), etc. These interactions raise several ethical issues which have implica-
tions on citizens trust in e-government. This chapter proposes a model for building trust of citizens in
e-government. The proposed model is premised on five trust pillars: ethical/human; information/content;
technical; policy/legal; and political/governance. Each of these pillars has several dimensions adapted
from various existing user satisfaction tools or frameworks such as Service Quality (SERVQUAL), trust
formation framework, technology acceptance model, information systems success model, and many more.
The chapter also covers history of e-government; models of e-government interactions; e-government
trust related models; theoretical basis of trust; causes of distrust in e-government; challenges of ap-
plications of ICT in e-government; framework for building trust in e-government; and future trends of
trust in e-government.

IntroductIon and grasped by most people. The concepts of


e-government and e-governance can better be
E-government is increasingly being perceived understood in the context of government and
as panacea for a transparent and accountable governance respectively. Government refers to
administration. Yet e-government is a complex exercising state power, the governing body of a
phenomenon that is not yet fully understood state, or the way by which a state is governed. The
term government also refers to an administration,
DOI: 10.4018/978-1-61692-012-8.ch002 regime, executive, rule, leadership, command or

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Model for Building Trust in E-Government

control (Hawker, 2002). Governance is a noun Wamukoya, 2009). E-government is expected to


from the term government which Neumayer (2006) help governments meet these goals.
defines as the exercise of economic, political and This chapter is intended to discuss history of e-
administrative authority to manage a countrys government, models of e-government interactions,
affairs at all levels. It comprises the mechanisms, e-government trust related models, theoretical
processes, and institutions through which citizens basis of trust, causes of distrust in e-government,
and groups articulate their interests, exercise their challenges of applications of ICT in e-government,
legal and human rights, meet their obligations, framework for building trust in e-government, and
and mitigate their differences. Governance en- future trends of trust building in e-government.
compasses political legitimacy and accountabil-
ity, administrative accountability, financial and
budgetary accountability, transparency, openness, bAckground
and the rule of law. Governance therefore entails
various things, among them, that those who hold E-government, a derivative term from governance,
public trust should be able to account for the use refers to the application of information and com-
of the trust to citizens or their representatives. munication technology within public administra-
This signifies the superiority of the public interest tion to optimise its internal and external functions,
over the private interest. Secondly, it presupposes [thereby providing] government, the citizen and
the competence of the state to exercise adminis- business with a set of tools that can potentially
trative and political power in a fair, transparent transform the way in which interactions take place,
and equitable manner, including the protection services are delivered, knowledge is utilized, poli-
of personal rights and the rule of law. Thirdly, it cy is developed and implemented, the way citizens
implies that no manner of accountability can be participate in governance, public administration
realized unless there is the rule of law, transpar- reform and the way good governance goals are
ency and the free flow of information among all met (United Nations Department of Economic and
stakeholders in the governance process (Mutula Social Affairs, 2006). E-government may also be
& Wamukoya, 2009). perceived as the application of ICTs to facilitate
Transparency being a major component of social governance processes or objectives, such as
governance means that decisions taken and their information for political participation, consulta-
enforcement are executed based on clearly stipu- tion and consensus-seeking among governments,
lated rules and regulations that are known to all public servants, politicians and citizens (Sheridan
stakeholders. This requires that the institutions and Riley, 2006).
of governance in both public and private sector E-governance is an advanced level of e-govern-
including civil society organizations interact and ment where citizen and government engagement
engage with citizens in a manner that contributes takes place electronically. The United Nations
to good governance. Governance can be both (2008) discusses various forms of e-government.
good and bad depending on whether it brings Connected governance (sometimes referred to as
positive benefits to the governed or the benefits networked governance) is a deepened form of e-
merely serve to benefit the personal interests of governance and refers to governmental collective
a few individuals in government. Therefore, the action to advance the public good by engaging
government as the major actor in the governance the creative efforts of all segments of society.
process must create an enabling environment E-governance aims at improving cooperation
for citizen participation in the decision making between government agencies, allowing for an
process and service delivery systems (Mutula & enhanced, active and effective consultation and

16
A Model for Building Trust in E-Government

engagement with citizens, and a greater involve- of enhancing progress towards an information
ment with multi-stakeholders regionally and society status (Interoperable Delivery of European
internationally. Connected governance provides E-government Services to Public Administra-
better organized, aligned and often integrated tion, Businesses and Citizens -IDABC, 2005)
information flows, new transactional capacities, as customers increasingly expected government
as well as new mechanisms for feedback, consulta- to be accessible and convenient. In Canada, the
tion and more participative forms of democracy. Government On-Line Strategy that paved way
Connected governance has various approaches for e-government was created in 1999 (Public
through which it is achieved. E-government-as- Works and Government Services Canada, 2004).
a-whole is a form of connected governance which While in the United States, Government Paper-
focuses on the provision of services at the front- work Elimination Act of 1998 required federal
end, supported by integration, consolidation and agencies to provide the public with the option of
innovation in back-end processes and systems submitting, maintaining and disclosing required
to achieve maximum cost savings and improved information electronically rather than on paper.
service delivery. Connected governance can be The e-government act of 2002 in the United
achieved through the whole-of-government ap- States established broad measures that required
proach which refers to public service agencies using Internet-based information technology to
working across portfolio boundaries to achieve a enhance citizen access to government informa-
shared goal and an integrated government response tion and services and for other purposes (Relyea
to particular issues. Through whole-of-government & Hogue, 2003).
approach government agencies and organizations In Asia, since the year 2000, governments have
share objectives across organizational boundaries, made significant progress in adopting informa-
as opposed to working solely within an organiza- tion and communication technologies to improve
tion. It encompasses the design and delivery of a financial management, streamline the delivery of
wide variety of policies, programmes and services government services, enhance communication
that cut across organizational boundaries. with the citizenry, and serve as a catalyst for em-
powering citizens to interact with the government
(Wescott, Pizarro, & Schiavo-Campo, 2001). In
HIstory oF e-government contrast, though African governments have been
using information technology for more than 40
The history of using information and commu- years, key innovations such as computer networks,
nication technology in government operations intranets and the Internet started to emerge on the
especially in developed countries spans several continent in the late 1990s. However, e-govern-
decades. In Britain, the Technical Support Unit ment as we know it today is only starting to slowly
of the telecommunication services was engaged diffuse within the continent because high levels
by government to evaluate and advise on the use of e-readiness needed to realise e-government
of computers as far back as 1957 (Interoperable implementation is not yet in place (Heeks, 2002).
Delivery of European E-government Services to
Public Administration, Businesses and Citizens-
IDABC, 2005). However, the use of the word e- models oF e-government
government in literature is a recent phenomenon, InterActIons
having been given impetus in many ways by the
growth of the Internet and World Wide Web in E-government consists of several online interac-
the 1990s. E-government evolved with the aim tions such as business to business (B2B), citizens

17
A Model for Building Trust in E-Government

to government (C2G), government to government all branches and levels of government to function
(G2G), business to government (B2G), and more. as a single coordinated entity, thus expanding
Through these interactions, e-government links government availability and accessibility, moving
people to people, people to business, and people government in the direction of anytime, anywhere
to government. The different digital government and by any means. The e-society applications on
applications are referred to as e-government inter- their part enable government to engage with the
actions. The applications of various e-government collective membership of communities and societ-
interactions include e-administration, e-business, ies that comprise the nation. These applications
e-services, and e-society (Mutula, 2009). These are generally referred to as government-to-society
applications define the levels of interactions that or simply as G2S. E-society applications give
define relationships between the government and communities a collective voice in their dealings
the respective stakeholders. The e-administration with the government. The capacity of e-society
applications arise from the interactions within and applications to enable interactive participation and
between government agencies, as well as between multiple consultations between the government
different spheres of government at local and pro- and all its stakeholders is sometimes referred to
vincial levels. These interactions are sometimes as e-democracy (Oyomno, 2003). The highest
referred to as government-to-government or sim- echelon of e-government is e-participation which
ply G2G. These applications seek to improve the measures the extent to which governments are
operational efficiency and effectiveness of gov- able to establish more transparency by allowing
ernment. E-administration applications provide citizens to use new channels to influence policy.
facilities to enable electronic communications E-participation looks at how governments are able
and sharing of information and knowledge. They to create an environment that allows citizens to
also permit simultaneous access to information, voice their views online and more importantly,
thus shortening the red tape often associated with to create a feedback mechanism (United Nations,
access to, and transmission of, information. The 2008).
e-business applications interaction can take place
with business entities, citizens or any other legal
entity with which the government has a business Issues, controversIes,
interest. E-business applications take most govern- Problems
ment procurement and disposal of assets to the
electronic medium, thus cutting the red tape, the Despite the increasing adoption of electronic
middlemen and the time required, and reducing governments by most countries around the world
operational costs, unnecessary delays, paperwork (United Nations, 2008), little attention has been
and redundant data capture (Oyomno, 2003). paid to the ethical dimension of e-government and
The electronic services (e-services) applica- in particular how trust of citizens can be nurtured
tions enable interactions and relationships between in such e-government environments. Carbo (2007)
the government and citizens, through which the concurs that little if any attention has been paid to
latter gain access to a range of public services. two critical questions in e-government especially
These applications are referred to as government- with regard to whether people trust e-government
to-citizen or G2C. However, these interactions and or how the cultural differences affect individuals
relationships may not be limited to citizens alone. trust in government and their perceptions of how
They include non-citizens and other legal entities government affects their human dignity. The low
that the government interacts with in the process priority accorded to the subject of trust dynamics in
of delivery of public services. E-services enable e-government is perhaps attributed to the fact that

18
A Model for Building Trust in E-Government

e-government evolved with emphasis on techno- Zimbabwe, Swaziland and Burma to mention
logical rather than on institutional, organisational but a few (Mutula & Ocholla, 2009). Lack of
and human considerations. The failure to take trust between the people and government, will
the earliest opportunity to differentiate between often lead to the state providing limited infor-
e-government and e-governance has not helped in mation on government web portals thus denying
focusing attention to citizen-government engage- citizens adequate access to information and also
ment as a priority and consequently on issues of incapacitating them to question the decisions of
trust and ethics. The limited attention paid to ethics government. Moreover, governments that do not
and trust in e-government is not made any better have trust with its people will not strive to create
by the fact that there is paucity of analytical tools awareness or develop skills needed for the people
including a theoretical framework for studying to use information and communication technolo-
and understanding the subject. gies effectively. Lack of trust of governments for
The lack of trust in e-government has various its people often will lead to a top down approach to
undesirable consequences. For example, in coun- governance where citizens are hardly involved in
tries that have been involved in long drawn wars decision making of governance matters. Moreover,
such as Eritrea, Democratic Republic of Congo, lack of trust between government and its people
Uganda, and many others, it is difficult to access will not enhance e-government as there will be
data in the custody of government because of fear limited information sharing between people and
that such information could fall in wrong hands. the state, and even among government depart-
If one happens to access data in the custody of ments. Governments that do not enjoy the trust
government, the process is lengthy and tedious of its people resort to regulating the media as in
and such information if given is vigorously vet- Zimbabwe, Kenya, Swaziland, and Botswana
ted. Moreover, because of lack of transparency among others (Mutula & Ocholla, 2009).
by government with regard to enabling access
to information in its custody, systems that would
facilitate access to information are deliberately e-government trust
not in place. Consequently, it is difficult to find relAted models
information because the collation, filing and stor-
age systems are not of good quality (Mutula & There is little consensus on the notion of what a
Ocholla, 2009). Government that have restrictions model is. In the context of this chapter however, a
to information in their custody, do not often have model is perceived in the context of Microsoft Cor-
freedom of information laws in place. Denial of porations (2009) which defines it as an abstract
access to information is justified on account of representation of an item or concept. The purpose
protecting national security and sovereignty. In of a model is to help visualise something that can-
states where trust in government by the people not be directly observed. It helps to understand the
is low, the public will often be cautious about in- complexity of a phenomenon or a thing. A model
truding in matters they believe may lead the state helps to predict and explain the behaviour of a
to retaliate against them. In such circumstances, system. E-government is a concept that is complex
there is bound to be lack of freedom of expression in nature and is yet to be well understood. The
as well as limited political activities. Such states concept is made even more complex when issues
would also exercise excessive monitoring (e.g. relating to trust are added to it. In this chapter, the
phone tapping or monitoring Internet) of what concept of model will be used interchangeably
people are doing. This kind of state repression with the notion of framework which is a real or
is common in Tunisia, Morocco, Syria, China, conceptual structure intended to serve as a support

19
A Model for Building Trust in E-Government

or guide for the building of something that expands nication technology systems and that of business
the structure into something useful (Whatis.com, processes they support to exchange data and to
2009). Genoud & Pauletto (2004) have developed enable sharing of information and knowledge.
a model for an e-society known as a repository E-inclusion under the eSociety layer refers to
for implementing e-government strategy to help achieving information society for all by enabling
in understanding the complexity of e-government. access (to government website for all including
The repository structure has three layers each the disabled), enhancing usability (e.g. users
with five dimensions. The first layer is known as experience with an application/website for ease
the Project which has the following dimensions: of learning, efficiency of use, satisfaction, etc);
security, economic factors, information policy, training, etc. Ethics dimension under the eSociety
and technology. The second layer is the Organi- layer covers privacy, security and the enhancement
sation and covers interoperability, transversality of confidence (European Commission, 2002).
of processes, transversality of data, e-government Though the e-Society repository provides a
processes, and knowledge management dimen- framework for understanding the complexity of
sions. The final layer is the e-society and covers e-government, it does not consider the subject
legal framework, e-inclusion, society component, of trust in e-government. The other model that
ethics and information concept. The dimensions explains online government development is the
in the Project layer collectively deal with issues eGovernment maturity models which focus more
related to security and new technologies. on the progress of maturity of online applications
The granularity of each layer is encapsulated in than on issues of trust or ethics.
the dimensions making up the layers. For example,
security dimension under the Project layer covers
confidentiality, integrity and availability. Confi- tHeoretIcAl bAsIs oF trust
dentiality refers to limiting information access
and disclosure to a set of authorised users. Data The foundation of trust can be traced in part to key
integrity implies that data has not been changed theories such as the Social-Psychological Model;
inappropriately whether accidentally or deliber- the Social Cultural Model and the Institutional
ately. Availability represents the requirement that Performance Model. The Social-Psychological
an asset can be accessible to authorised person, Model posits that trust and institutional confidence
entity or device. Economic factors are perceived (or distrust and lack of confidence) is a basic aspect
as return on investment or costs benefits such as of personality types. The Social Cultural Model
changes in waiting times or fees. Information posits that the ability to trust others and sustain
policy relates to information channels through cooperative relations is the product of social ex-
which project leaders, end users and IT special- periences and socialization. This Model states that
ists can communicate. Knowledge management society has the ability to inculcate habits of the
dimension under the Organisation layer creates heart such as trust, reciprocity, and co-operation
value, increases productivity and fosters innova- (Bellah, Madsen, Sullivan, Swidler, & Tipton,
tion (Malhotra, 2002). Transversality of processes 1985). The Institutional Performance Model
refers to reengineering existing processes to create opines that actual performance of government
completely new ones going beyond internal bor- is the key to understanding citizens confidence
ders of an administration. Transversality of data in it. Government institutions that perform well
ensures that data is consistently shared and used, are likely to elicit the confidence of citizens;
and that its quality is preserved. Interoperability those that perform badly or ineffectively gener-
refers to the ability of information and commu- ate feelings of distrust and low confidence. The

20
A Model for Building Trust in E-Government

general public, the model assumes, recognizes tens to customers and acknowledges their com-
whether government or political institutions are ments, keeps customers informed in a language
performing well or poorly and reacts accordingly. they understand); understanding the customer
Collectively, these three models generate various (making the effort to know customers and their
meanings of trust namely: reliance on the integrity, needs) (Zeithaml, Parasuraman, & Berry, 1999).
ability, or character of a person or thing; reliance Trust formation framework a model from
on somebody or institution; to have faith or a mobile communications examines trust from
feeling of certainty that a person or thing will not the perspectives of quality of product and service,
fail; depth and assurance of feeling that is often interface design and customisation; brand and
based on inconclusive evidence (Mutula, 2009). online feedback mechanism (Shao, Ma, & Meng,
Trust has origin in such disciplines as busi- 2005). Lee (2005) points out that interactivity is
ness management, psychology, management, a source of trust. Interactivity is characterised by
sociology and economics (Williamson, 1981). ubiquitous connectivity which refers to the con-
From business management perspective, the tinuance of a service activity irrespective of users
common concepts associated with or related to time and location. Trust formation as observed
trust building include (White, 2008) customer from the perspective of 3G mobile services also
satisfaction, interaction, honesty, moral values, include responsiveness and brand image. More-
responsiveness, and confidentiality. In the con- over, responsiveness refers to providing speedy
text of e-learning, trust building is associated feedback to service subscribers (Dholakia, Miao,
with or leads to (Daniel & West, 2006) privacy, Dholakia, & Fortin, 2000) and is used to measure
data protection, confidentiality, data security, ac- service quality and is also a diagnostic tool for
curacy, choice (opting in or opting out to the use uncovering areas of service quality strengths and
and sharing of information), redress (means for weaknesses. Responsiveness influences user sat-
filing a complaint), access (giving people to view isfaction towards the use of the service because
information held about them), consistency (data it can convey the trustworthiness of the service
integrity); appropriateness, authentic (accredited), provider or system to customers.
affordability, efficiency, effectiveness, benefits, Information systems success model (DeLone
transparency, mobility (any time, anywhere), and & McLean, 1992) is widely used for studying
ubiquitous interaction between service provider information systems success. The model intimates
and consumer. that IS quality characteristics (system quality),
Service Quality Framework (SERQUAL) quality of IS output (information quality), con-
which has origin in management is useful in sumption of IS output (usage) and user reaction
understanding user satisfaction. It identifies at- to the IS (user satisfaction) are important to IS
tributes of trust to include tangibles (appearance implementation success. Whyte & Bytheway
of facilities; reliability, responsiveness, assurance, (1996) in a UK study of business people on their
courtesy, credibility, security); empathy (access, perception of the success of information system in
approachability, communication, and understand- business identified success constructs to include:
ing the customer). Others include: competence user friendliness, responsiveness of personnel,
(possession of requisite skill and knowledge to reliability of system and personnel, data accuracy,
perform service); courtesy (politeness, respect, system response time, system accuracy, useful-
consideration and friendliness of contact person); ness, and net benefits. Technology acceptance
credibility (trustworthiness, believability, honesty model posits that acceptance and use of a given
of service provider); feeling of security (freedom system will be influenced by the degree to which
from danger, risk or doubt); communication (lis- the person believes that using such a system would

21
A Model for Building Trust in E-Government

Table 1. Trust theoretical models (Adapted from: Easton; 1965; Bellah, Madsen, Sullivan, Swidler, &
Tipton, 1985; Erikson, 1963; Dirks & Ferrin, 2002; Williamson, 1981)

Model Name Source Coverage


The Social-Psychological Model Sociology/Psychology trust, confidence, distrust
The Social Cultural Model Sociology trust, social experiences, socialization. reciprocity, co-operation.
The Institutional Performance Management confidence, distrust
Model
SERVQUAL Management user satisfaction; tangibles (appearance of facilities; reliability, re-
sponsiveness), assurance (competence, courtesy, credibility, security);
empathy (access, approachability, communication, and understanding
the customer); courtesy (politeness, respect, consideration and friend-
liness of contact person); credibility (trustworthiness, believability,
honesty of service provider); feeling of security (freedom from danger,
risk or doubt); communication) ; understanding the customer
Technology Acceptance Model Information Technology technology acceptance, ease of use, usefulness, attitudes
Information Systems Success Information Systems system quality, information quality, usage, user reaction, user satisfac-
tion, success, user friendliness, responsiveness, reliability of system
and personnel, data accuracy, system response time, system accuracy,
usefulness, net benefits
Trust Formation Framework Mobile Communications web quality, product quality, service quality, interface, customisation;
brand, online feedback, interactivity, ubiquitous connectivity; continu-
ance of a service, responsiveness, user satisfaction, trustworthiness
Online Learning Education privacy, data protection, confidentiality, data security, accuracy,
choice, redress, access, consistency (data integrity); appropriateness,
authentic (accredited), affordability, efficiency, effectiveness, benefits,
transparency, mobility (anytime, anywhere),ubiquitous interaction
Governance Public Administration democracy, intellectual property rights; freedom of information; uni-
versal access; privacy/confidentiality; accountability; transparency;
respect for human rights, openness, free press, freedom of speech
e-society repository for imple- Inter-disciplinary (e.g. sociology, security, economic factors, information policy, interoperability, trans-
menting e-government strategy IT, education, management, etc) versality, legal framework, e-inclusion, ethics, acceptance, confidenti-
ality, system availability, data integrity, costs benefits, interoperability,
access, usability, ease of use, efficiency, user satisfaction, privacy,
security, confidence.

enhance his or her job performance. Moreover, cAuses oF dIstrust In


acceptance will be influenced by the extent to e-government
which the person believes that using a particular
technology would be free from using much ef- There are several anecdotes why citizens dis-
fort. Shih (2004) in a study found that individual trust their governments and by extrapolation
attitudes towards e-shopping (an online transac- e-government. In 2006, Yahoo the widely used
tion similar to e-governments C2B) are strongly online content provider was compelled to provide
and positively correlated with user acceptance. user information to Chinese authorities who sub-
The trust theoretical models described above are sequently used it to imprison online activists for
summarised in Table 1. years. In addition, Google, Microsoft, and Yahoo
operating on Chinese soil, censor their content in
line with the Chinese government expectations. In
Egypt, government officials beat Ahmed Maher

22
A Model for Building Trust in E-Government

Ibrahim, a 27-year-old civil engineer for using awareness is being created among the people.
Facebook to support calls for a general strike on This is exacerbated by lack of involvement of
May 4, 2008-President Mubaraks 80th birthday. citizens in the planning process. Xiong (2006) in
In Russia, Saava Terentev - a musician was put on the context of e-government in China noted that if
trial for speaking out about corruption in a blog people have never heard of e-government, have no
posting. The 2007 Burma crackdown on monks interest, have no equipment, insufficient knowl-
by government when it shut down the countrys edge or skills to access and use the online gov-
internet connections to make sure no information ernment information and services, e-government
got into the country and that little information got is meaningless. Most developing countries also
out of the country is another affront to freedom face problems of poor organization of knowledge
of citizens. The Syrian government also regularly in government portals thus denying citizens the
restricts free flow of information on the internet benefits that could accrue from sound information
and subsequently arrests individuals who post and knowledge management practices. Identify-
comments that the government deems too critical ing the right processes to capture, store and share
(Mutula, 2009). knowledge is an essential aspect of knowledge
E-government in developing countries is management (United Nations, 2008).
unlikely to score highly on citizen trust. This is Distrust by citizens of government or e-gov-
because by and large, e-government is still in the ernment in many countries is caused by failure
confines of government enclaves. While infor- on the part of the state to involve the public in
mation on the who is who in the ministry, its electronically-enabled decision-making processes
organizational structure and mission will often be because politicians fear that e-democracy may
abundantly available, the average website will not result in a loss of power (Mahrer and Krimmer,
have public service information, for instance on 2005).
how to go about applying for a particular service,
who the right officer/ person to approach is, and
where on the website to download and even elec- cHAllenges oF tHe
tronically submit these application forms (Rotberg, APPlIcAtIon Ict In
2007:20). During the WSIS Summit in Tunis in e-government
2005, civil society held demonstrations against the
Tunisian and Moroccan governments complaining Mason (1986) identifies four main ethical and trust
about brutal state repression against free press and issues obtaining in digital environment that affect
freedom of expression (World Information Soci- its use. These include: Privacy: what information
ety Report, 2006). In Kenya, the founding father about ones self or ones associations must a person
of the nation Mzee Jomo Kenyatta was fond of reveal to others, under what conditions and with
stating, Serikali ni Siri Kali (translated literary what safeguards? Accuracy: who is responsible
from Swahili to English to mean government is for the authenticity, fidelity and accuracy of infor-
top secret). Governments that have traditionally mation? Who is to be held accountable for errors
restricted access to public information cannot be in information and how is the injured party to be
expected to embrace e-government whole-heart- made whole? Property: who owns information?
edly and avail information that would empower What are the just and fair prices for its exchange?
citizen to question public policy, accountability Who owns the channels, especially the airways,
and integrity in government. through which information is transmitted? How
Though most governments in developing world should access to this scarce resource be allocated?
are implementing e-government systems, little Accessibility: what information does a person or an

23
A Model for Building Trust in E-Government

organization have a right or a privilege to obtain, infrastructure and low literacy level estimated at
under what conditions and with what safeguards? 60% have been reported (Sawe, 2005). Compara-
By and large, the technologies including ICTs tively, in Lesotho, (Sehbalaka, 2004) cites prob-
used in developing world are imported. Such tech- lems of low internet penetration in the population,
nologies are often implanted rather than transferred restructuring within government departments, lack
because of a number of constraints, including of commitment from senior officials and shortage
the inadequate or complete lack of indigenous of IT skilled personnel. For Botswana, most of
mechanisms to adapt to such technologies. This internet connectivity is in government. The coun-
leads to limited enthusiasm and the consequence try faces the problems of fast changing industry
underutilisation of the digital resources. Gerhan & and low acceptance of ICT in a predominantly
Mutula (2005) in a study of bandwidths problems resources-based economy. In South Africa 45%
in Botswana found that shortage of computers and of the population is estimated to live in rural areas
poor connectivity were major factors hampering with less developed infrastructure compared to the
effective access. Lenhart, Horrigan, Rainie, Allen, urban areas. In addition, PC penetration and human
Boyce, Madden, & OGrady (2003) note that not poverty index according to the 2004 estimates
all have nots necessarily want to be haves are 6.2% and 20% of the population respectively.
and neither do they view engagement in ICTs as The country has also diversity of languages with
a positive force that would transform the quality 11 official ones that need to be converted to the
of their life. Research work in the area of digital language of the Internet (Geness, 2004). Globally,
government in the US revealed how the lack of ap- Africa has the lowest internet penetration in the
propriate access amongst communities hinders the world at 3.6% (Internet World Statistics, 2007).
provision of social services by forcing individuals, The United Nations (2008) points out that
often the poor, to travel long distances between in some instances, governments have spent vast
offices (Bouguettaya, Ouzzani, Medjahead, & amounts of money building online systems and
Cameron, 2001). products only to observe that their citizens do not
The Executive Secretary of the South Afri- fully utilize them. This challenge in part is occa-
can Development Community (SADC) in 2003, sioned by the multiple aspects of ICT implementa-
observed that while efforts had been channelled tions that have to be dealt with or people simply
towards the development of ICTs in the region, not willing to use it for their own reasons. Ngulube
many challenges still prevailed. For example, there (2007) points out that the major ingredients of e-
were a low proportion of electrified households in government are infrastructure, human resources
most member states. Moreover, telecommunica- and information. However, the reality shows that
tions facilities were generally poor and fixed line in all these ingredients sub-Saharan Africa is de-
teledensity was low, with less than five percent of ficient. In particular, the ICT infrastructure is not
the population in the majority of SADC countries widely available to rural populations, and in most
(SADC E-readiness Task Force, 2002). In Mau- cases, both government officials and the people
ritius, Aubeelack (2002) identifies problems that who may want to use government services online
have to be overcome in order to put the country on lack basic skills. The World Bank in a report on
a stronger and sustainable e-government footing. African Region Communications Infrastructure
These problems include: user resistance, IT skill Programme released in April 2007 (Nyasato &
shortages; frequent policy changes; bureaucracy Kathuri, 2007) observes that east and southern
leading to technological obsolescence; limited African region suffers bandwidth deficiency as it
funding; lack of awareness about the potential of accounts for less than one per cent of the worlds
ICTs. In Tanzania problems relating to inadequate international bandwidth capacity. Nyasato and

24
A Model for Building Trust in E-Government

Kathuri further note that telecommunication users while enhancing the growth of assistive technol-
face some of the highest costs in the world. The ogy as one way of promoting universal access.
international wholesale bandwidth prices in the Moreover, national strategies of member states
east and southern Africa region are 20 to 40 times emphasise interoperability of products, universal
higher than in the United States, and international service policies for electronic communications,
calls are on average 10 to 20 times more costly affordable pricing of network, and interactive
than in other developing countries. content. The European Commission through the
eEurope initiative recognizes accessibility for
disabled users such as the blind, deaf people or
solutIons And people with learning impairments.
recommendAtIons Trust in digital environment can be enhanced
For buIldIng trust further if content providers can respond to cyber
In e-government crime through effective investigation and pros-
ecution of misuse; protecting privacy, data and
One way to promote trust in e-government is offering consumer protection. A legal oriented
through enhancing e-readiness environment. framework is necessary to cater for cyber laws,
E-readiness refers to a community that has high- consumer protection, and the security of transac-
speed constant access and application of ICTs in tions online (Department of IT eTechnology Group
government offices, businesses, healthcare facili- -India, 2003). Content providers must in addition,
ties and homes; user privacy and online security; promote cultural and linguistic diversity online
and government policies which are favourable in with regard to identity, traditions and religions.
terms of promoting connectedness and the use of Sensitivity to cultural values can be buttressed by
the network (Bridges.org, 2001). The e-readiness local content development, providing local content
status of the nation is also measured by education that is relevant to the people and in languages
levels of the people, use of appropriate tech- they understand.
nologies (e.g. radio and television), private public Observing ethics too can help build trust
partnerships for resource mobilisation, research among users with regard to managing and using
and development and creating relevant content digital content. Ethics refers to the universal or
accessible and useable by all citizens. commonly held values of persons, despite differ-
A policy framework that ensures universal ent moral or cultural backgrounds (Fallis, 2007).
access is a necessary precondition for enhanced Ethics focuses on the norms and standards of
digital inclusion and trust-building of citizens in behaviour of individuals or groups within a society
e-government. As part of universal access strat- based on normative conduct and moral judgment,
egies, diversity of choices of accessing content principles of wrong or right. Perceived benefits
should be encouraged by allowing users to use a and ease of use of an information system are
variety of technologies with which to gain access, key determinants of trust in the actual usage of a
such as the telephone, fax, e-mail, kiosks, face-to- technology. Information systems must be easy to
face interaction, etc. Universal access should be use for diverse customers. The content must also
accompanied by freedom of access to information be useful and beneficial to the customers if they
through constitutional guarantees that enhance have to be motivated to use it (Baeza-Yates and
sharing of information (Farelo and Morris, 2006). Ribeiro-Neto, 1999). The effective use of govern-
The European Union member states (European ment services online starts with the involvement
Commission, 2005) have undertaken measures to of people in the design of e-government applica-
ban the sale of inaccessible technology products tions. This calls for close consultation among

25
A Model for Building Trust in E-Government

stakeholders, creating customer awareness so that proposed. The framework consists of five pillars
an environment is developed from the beginning and their corresponding dimensions modelled
where users demands and the mechanisms of on a repository for implementing e-government
service delivery and feedback are provided for. strategy (Genoud & Pauletto, 2004). The pillars
User satisfaction analysis with government web include: Ethical/Human Pillar; Information/Con-
portals need to be regularly carried out as is the tent Pillar; Technical Pillar; Policy/Legal Pillar;
periodic monitoring of administration of e-gov- and Political/Governance Pillar.
ernment services. The European Union member Each of the pillars in Table 2 serves a particu-
states have set good practices of e-government. lar role in enhancing trust in e-government as
For example, in 2005 the European Ministers follows:
produced an e-Government Declaration setting
targets for citizen inclusion, user-orientation and Ethical/Human Pillar: This pillar deals
trust (European Commission, 2005). with issues that distinguish right from
Some countries have made good progress wrong actions. Ethics in general is con-
in implementing e-governance systems that are cerned with the universal or commonly
tailor-made to cater for various categories of held values of persons, despite different
citizen needs. For example, Singaporean gov- moral or cultural values. Ethics focuses on
ernment portal provides information services on the norms and standards of behavior of in-
culture, recreation, sports, defence and security, dividuals or groups within a society based
education, employment, family, community de- on normative conduct and moral judgment,
velopment, health and environment. The portal principles of wrong or right.
also includes user-centric hot links such as give Information/Content Pillar: This pillar
us your feedback on national issues and policies focuses on commitment by the state to the
(Government of Singapore, 2004). The Canadian free flow of information and knowledge.
e-government portal on the other hand enables Technical Pillar: The technical Pillar is
public participation that allows individuals to concerned with what users perceive as
share their opinions on specified subjects, or to benefits from the technology. Perceived
participate in various activities (Government of ease of use is a key determinant of ac-
Canada, 2006). Building trust in e-government tual usage of a technology (Davis, 1989).
also requires branding of government web portals E-government systems must be easy for
to make them people-centric and friendly. For diverse customers to use.
example, in South Africa, the e-government web Policy/ Legal Pillar: This pillar is con-
portal is branded Batho Pele (translated to mean cerned with a legal oriented framework
people first) (Department of Public Service and necessary to cater for cyber laws, consumer
Administration, 1996). protection, and the security of transactions.
National strategies that emphasise interop-
erability of products, universal service
model (FrAmework) policies for electronic communications, af-
For buIldIng trust fordable pricing of network and interactive
In e-government content are crucial.
Political/Governance Pillar: The po-
In Table 2, an integrated model/framework for litical and governance pillar is concerned
building trust in e-government deriving from with the exercise of economic, political
the various frameworks described in Table 1 is and administrative authority to manage a

26
A Model for Building Trust in E-Government

Table 2. Trust building model/framework in e-government

Ethical/Human Information /Content Technical Policy/Legal Political/Governance


Pillar Pillar Pillar Pillar Pillar
Ethical/Human Dimen- Information/Content Technical Dimensions Policy/Legal Dimen- Political/Governance
sions Dimensions Online support sions Dimensions
Ethics Friendly information Feedback mechanism Consumer protection Transparency
Trust/distrust architecture Interactivity Data protection Accountability
Trustworthiness Diverse formats Interoperability Intellectual property Integrity
Technology acceptance Diverse retrieval tools Service /system avail- rights Democracy
Education and training Diverse delivery chan- ability Freedom of information Good governance
Cultural values nels Online security Standardization Respects for human
Special needs Information security Friendly interface Universal access rights
Privacy /confidentiality Knowledge management Transversality of pro- Privacy Commitment
Benefits Information policy cesses Confidentiality Responsible
Customer satisfaction Information quality Transversality of data E-inclusion Branding image
Quality of service Data accuracy Appearance Redress Free press
Approachability of Data integrity Reliability E-government Freedom of speech
service provider Choice Responsiveness ICT policy Free market economy
Courtesy Access Consistency of interface Affordability Service quality
Politeness Appropriateness Efficiency /effectiveness E-signatures Product quality
Love Local content Availability/mobility Freedom of information Rule of law
Affection Multilingual content Customisation legislation Free and fair elections
Kindness Free flow of information Friendliness Protection of minorities
Gentleness Usefulness of content Ease of use Consultations
Respect Usability of content Web quality Competence
Honesty Current content System quality
Social experiences Trustworthy sources Response time
Socialisation Availability Ubiquitous connectivity
Reciprocity Ubiquity Authentic
Cooperation Website ease of learning
Communication Help features
Attitudes
User reaction
Moral values
Human dignity
Relationships
Interdependence
Faith
Beliefs

countrys affairs at all levels. It comprises Future trends And trust


the mechanisms, processes, and institu- In e-government
tions through which citizens and groups ar-
ticulate their interests, exercise their legal E-government implementations around the
and human rights, meet their obligations, world have gained impetus. However, the issues
and mitigate their differences (Neumayer, of trust in electronic governments will have to
2006). E-government is expected to help be addressed through interventions involving
achieve this goal. technology, capacity building, legal and regu-
latory frameworks. An e-government founded
on the pillars of trust as enunciated in Table 2
would help increase the overall quality of public
sector service delivery and assists in enhancing
customer satisfaction from services they receive

27
A Model for Building Trust in E-Government

from government. Such satisfaction would en- through new media like the Internet; improving
hance citizen-government engagement and make communication between different parts/levels of
governance easier. government, making it possible for government
As governments make the transition from the to provide a variety of services around the clock,
traditional to e-government environment, the and enhancing democratic processes. The impor-
emphasis has largely been on improving access tance of trust in e-government need not be over
to information and transaction-based services for emphasised. Foreign investors look at different
the public, clients and partners. But through e- locations and issues relating to democracy, ac-
government founded on trust there is potential to: countability, skills, technology and infrastructure
before making investment decisions. They also
Enhance confidence of people while trans- look at how helpful and efficient government
acting online is, and how easy it is to get things done such as
Improve internal management and admin- applying for trade licenses and the efficiency of
istrative processes such as service delivery the legal system.
Create partnerships between government In developing countries where there are several
and the broader public sector challenges of infrastructure nature, government
Increase efficiency should consider the use of any appropriate tech-
Foster digital democracy nology to facilitate access to information such
Increased citizen involvement in as batteries and solar panels to generate energy,
governance using radio and television for public education
Promote e-business by enabling the people and use of CDMA (Code Division Multiple Ac-
deal with governments electronically cess) cordless telephone suitable for rough terrain
Increase integrity in government where cabling would be difficult to lay and also
Encourage citizens to bring pressure on provide high channel capacity than other com-
their governments to demonstrate account- mercial mobile technologies. Moreover, very
ability and transparency. small aperture terminals (VSAT) could be used to
provide access to rural areas and others which do
The peoples perceived trust in e-government not have telephone connectivity. The future of e-
will in part be predicated on how governments government lies in the private public partnerships
observe the law and maintain integrity in sat- to mobilise resources needed to implement such
isfying citizen needs through the delivery of governments. The potential of e-government and
relevant, value-added and high-quality services. its utilisation also lies in the increased penetra-
E-government system that enhances transpar- tion of mobile phone services across the world
ency, especially with regard to the procurement both in developing and developed countries. This
of services; provision of opportunities for people would be completed by increased establishment
to work in partnership with the private sector and of cybercafs in most developing countries, the
citizens to influence policy decisions will likely liberalisation of telecommunication sector as
be valued and adopted by the people. A trusted well as increased democratisation of hitherto
e-government system would inspire people to undemocratic states.
come forward and use services provided by
government thus, reducing the cost and time of
service delivery; making it easier for business and
individuals to deal with government; enabling
government to offer services and information

28
A Model for Building Trust in E-Government

conclusIon reFerences

This chapter has demonstrated that e-government Aubeelack, P. (2004). Mauritius. Proceedings of
is a growing and complex field which is yet to be workshop of the regional consultation on national
well understood. E-government presents a new e-government readiness in Gaborone, Botswana.
method where there is minimal contact between From 14-16 April 2004. Retrieved July 16, 2005,
the citizens and government except through the from http://www.comnet-it.org/news/CESPAM-
intermediation of information and communication Botswana.pdf
technologies. Such an environment is bound to Baeza-Yates, R., & Ribeiro-Neto, B. (1999).
have far reaching trust implications unless the Human-computer interaction. Retrieved Septem-
system is completely transparent, efficient and ber 15, 2006, from http://www.ischool.berkeley.
interactive. E-government is predicated upon edu/~hearst/irbook/10/node3.html
improving overall service delivery and good gov-
ernance to citizens. However, the human aspect Bellah, R. N., Madsen, R., Sullivan, W. M.,
with regard to trust has received little attention Swidler, A., & Tipton, S. M. (1985). Habits of
despite the fact that governments collect a lot of the heart. Berkeley, CA: University of California
information on citizens and private enterprises Press.
(e.g. corporate filing information, tax information,
Bouguettaya, A., Ouzzani, M., Medjahead, B. &
and regulatory information). The information in
Cameron, J. (2001). Helping citizens of Indiana:
the custody of the state when stolen may erode the
Ontological approach to managing state and local
trust that citizens may have in their governments.
government databases. IEEE Computer, February.
Hitherto, e-government as a field of study has
no specific model available to study the issue of Bridges.org. (2001). Comparison of E-readiness
trust building. Studies that have made attempts Assessment Models: Final Draft. Retrieved July
to examine the issue of trust have applied models 16, 2003, from http://www.bridges.org/eredainess/
from such field as sociology, psychology, manage- tools.html
ment, etc. E-government as we know it is a field
Carbo, T. (2007). Information rights: trust and hu-
that strides different disciplines and a theoretical
man dignity in e-government. [from http://www.i-
framework or model that is cross-disciplinary is
r-i-e.net]. International Review of Information
needed to help understand it. This chapter has
Ethics, 7(9), 17. Retrieved December 8, 2008.
attempted to develop an integrated model that
can help to study the subject of building citizens Daniel, J., & West, P. (2006). E-learning and
trust in e-government. The model consists of five free open source software: The key to global
pillars - ethical/human; information/content; tech- mass higher education? International Seminar on
nical; policy and legal; and political/governance Distance, Collaborative and eLearning: Providing
with each pillar having several dimensions. The Learning Opportunities in the New Millennium
integrated model by virtue of its pillared structure via Innovative Approaches, Universiti Teknologi
provides the flexibility to be applied in whole or Malaysia Kuala Lumpur, Malaysia, 4-5 January
part depending on the issues that are to be studied. 2006.
It can also be expanded to accommodate more
Davis, F. D. (1989). Perceived usefulness, per-
pillars or dimensions as they arise. It is hoped that
ceived ease of use, and user acceptance of informa-
this model will fill up the lacuna that has to date
tion technology. Management Information Systems
existed in the field of e-government with respect
Quarterly, 13(3), 319340. doi:10.2307/249008
to trust building among customers.

29
A Model for Building Trust in E-Government

Delone, W. H., & Mclean, E. R. (1992). Informa- Farelo, M., & Morris, C. (2006). The working
tion system success: The quest for the dependent group on e-government in the developing world:
variable. Information Systems Research, 3(1), Roadmap for e-government in the developing
6195. doi:10.1287/isre.3.1.60 world, 10 questions e-government leaders should
ask themselves. Retrieved December 24, 2008,
Department of IT eTechnology Group (India).
from http://researchspace.csir.co.za/dspace/bit-
(2003). Assessment of central ministries and
stream/10204/1060/1/Morris_2006_D.pdf
departments: e-governance readiness assessment
2003: Draft Report 48. Geness, S. (2004). E-government, the South Afri-
can experience. In Proceedings of workshop of the
Department of Public Service and Administration.
regional consultation on national e-govt readiness
(1996). Green paper transforming public service
in Gaborone, Botswana. From 14-16 April 2004.
delivery. Pretoria, South Africa: GCIS.
Retrieved July 16, 2004 from http://www.comnet-
Dholakia, R. R., Miao, Z., Dholakia, N., & Fortin, it.org/news/CESPAM-Botswana.pdf
D. R. (2000). Interactivity and revisits to websites:
Genoud, P., & Pauletto, G. (2004). The e-society
a theoretical framework. RITIM Working paper.
repository: Transforming e-government strategy
Retrieved December 15, 2008, from http://ritim.
into action. Paper Presented at the 4th European
cba.uri.edu/wp/.
Conference on E-government, Dublin Castle,
Dirks, K. T., & Ferrin, D. L. (2002). Trust in lead- Ireland, 17-18 June 2004.
ership: meta-analytic findings and implications
Gerhan, D., & Mutula, S. M. (2005). Bandwidth
for research and practice. The Journal of Applied
Bottlenecks at the University of Botswana: Com-
Psychology, 87(4), 611628. doi:10.1037/0021-
plications for Library, Campus, and National
9010.87.4.611
Development. Library Hi Tech, 23(1), 102117.
Easton, D. (1965). A systems analysis of political doi:10.1108/07378830510586748
life. New York: John Wiley.
Government of Canada. (2006). On-line forms
Erikson, E. H. (1963). Childhood and society (2nd and services. Retrieved May 13, 2007, from http://
ed.). New York: W.W. Norton. canada.gc.ca/form/e-services_e.html
European Commission. (2002). eEurope 2005 Government of Singapore. (2004). E-citizen: Your
action plan: e-Inclusion. Retrieved December gateway to all government services. Retrieved
20, 2008, from http://europa.eu.int/informa- May 14, 2007, from http://www.ecitizen.gov.sg/
tion_society/eeurope/2005/all_about/einclusion/
Hawker, S. (Ed.). (2002). Oxford dictionary
index_en.htm
thesaurus: wordpower guide. New York: Oxford
European Commission. (2005). Transform- University Press.
ing public services. Report of the Ministerial
Heeks, R. (2002). E-government in Africa: Prom-
eGovernment Conference, Manchester, UK. Re-
ise and practice. Manchester, UK: Institute for
trieved December 12, 2008, from http://www.
Development Policy and Management University
egov2005conference.gov.uk/documents/pdfs/
of Manchester.
eGovConference05_ Summary.pdf
Fallis, D. (2007). Information ethics for the twenty
first century library professionals. Library Hi Tech,
25(1), 2336. doi:10.1108/07378830710735830

30
A Model for Building Trust in E-Government

Internet World statistics. (2007). Internet Usage Mutula, S. M & Ocholla, D. (2009). Trust, At-
Statistics: World Internet Users and Population titudes and Behaviours in E-Government. Paper
Stats. Retrieved September 12, 2007, from http:// Presented at the African Information Ethics and e-
www.internetworldstats.com/stats.htm Government Workshop, Held from 23-27 February
2009 at Mount Resort Magaliesburg, South Africa
Interoperable Delivery of European E-government
Services to Public Administration. Businesses and Mutula, S. M. (2009). Digital Economies, SMES
Citizens-IDABC. (2005). Retrieved July 19, 2005, and E-readiness. New York: Business Science
from http://europa.eu.int/idabc/en/chapter/383 Reference.
Lee, T. M. (2005). The impact of perceptions Mutula, S. M., & Wamukoya, J. (2009). Public
of interactivity on customer trust and transac- sector information management in east and south-
tion intentions in mobile commerce. Journal of ern Africa: implications for FOI, democracy and
Electronic Commerce Research, 6(3), 165180. integrity in government. International Journal
of Information Management, 29(5), 333341.
Lenhart, A., Horrigan, J., Rainie, L., Allen, K.,
doi:10.1016/j.ijinfomgt.2009.04.004
Boyce, A., Madden, M., & OGrady, E. (2003).
The evershifting internet population: A new look Neumayer, E. (2006). Self-interest, foreign
at internet access and the digital Divide. Retrieved need and good governance: Are bilateral invest-
May 11, 2003, from http://www.Pewinternet.org/ ment treaty programmes similar to aid alloca-
tion? Foreign Policy Analysis, 2(3), 245268.
Mahrer, H., & Krimmer, R. (2005). Towards the
doi:10.1111/j.1743-8594.2006.00029.x
enhancement of e-democracy: Identifying the
notion of the middleman paradox. Journal of Ngulube, P. (2007). The nature and accessibility
Information Systems, 15(1), 2742. doi:10.1111/ of e-government in sub Saharan Africa. Interna-
j.1365-2575.2005.00184.x tional Review of Information Ethics, 7(09/2007).
Retrieved November 25, 2007, from http://www.i-
Malhotra, Y. (2002). Why knowledge manage-
r-i-e.net/inhalt/007/16-ngulube.pdf
ment systems fail? Enablers and constraints of
knowledge management in human enterprises . In Nyasato, R., & Kathuri, B. (2007). High Phone
Holsapple, C. W. (Ed.), Handbook on knowledge Charges Hamper Regions Growth, Says W
management 1: Knowledge matters (pp. 577599). Bank. The Standard. Retrieved April 10, 2007,
Heidelberg, Germany: Springer-Verlag. from http://www.eastandard.net/hm_news/news.
php?articleid=1143967136
Mason, R. O. (1986). Four ethical issues of the
information age. Management Information Sys- Oyomno, G. Z. (2003). Towards a framework for
tems Quarterly, 10(1), 512. doi:10.2307/248873 assessing the maturity of government capabilities
for e-government. Retrieved July 20, 2005, from
Microsoft Corporation. (2009). What is a model.
http://link.wits.ac.za/journal/j0401-oyomno-e-
Retrieved September 19, 2009, from http://msdn.
govt.pdf
microsoft.com/en-us/library/dd129503 (VS.85,
printer).aspx Public Works and Government Services Canada.
(2004). Government online history. Retrieved July
19, 2005, from http://www.communication.gc.ca/
gol_ged/gol_history.html

31
A Model for Building Trust in E-Government

Relyea, H. C., & Hogue, H. B. (2003). A brief United Nations. (2008). UN e-government survey
history of the emergency of digital government in 2008: From e-government to connected govern-
the United States. In Pavlichev & Garson (Eds.), ment. Retrieved January 28, 2008, from http://un-
Digital Government, (pp. 16-33). Hershey, PA: pan1.un.org/intradoc/groups/public/documents/
IGI Global. UN/UNPAN028607.pdf
Rotberg, R. (2007). The Ibrahim index on Afri- United Nations Department pf Economic and
can governance: how we achieved our rankings. Social Affairs (2006). E-government readiness
African Business, November (336), 20. assessment methodology. Retrieved December
12, 2006, from http://www.unpan.org/dpepa-kmb-
SADC E-readiness Task Force. (2002). SADC
eg-egovranda-ready.asp
e-readiness review and strategy. Johannesburg,
South Africa: SADC, 1060. Wescott, C. G., Pizarro, M., & Schiavo-Campo, S.
(2001). The role of information and communica-
Sawe, D.J.A. (2005). Regional e-governance
tion technology, in improving public administra-
programme: Progress from Tanzania. 2nd EAC
tion. Retrieved July 21, 2005, from http://www.
Regional Consultative Workshop held in Nairobi,
adb.org/documents/manuals/serve_and_preserve/
Grand Regency Hotel from 28-29 June 2005.
default.asp
Sehlabaka, C. (2004). The Lesotho government.
Whatis.com. (2009). Framework. Retrieved Sep-
In Proceedings of workshop of the regional
tember 18, 2009, from http://whatis.techtarget.
consultation on national e-govt readiness in Ga-
com/definition/0,sid9_gci1103696,00.html
borone, Botswana, 14-16 April 2004. Retrieved
July 16, 2005, from http://www.comnet-it.org/ White, B. (2008). Business management skills-
news/CESPAM-Botswana.pdf. trust building tips for managers. Retrieved De-
cember 24, 2008, from http://ezinearticles.com/?
Shao, B., Ma, G., & Meng, X. (2005). The in-
Business-Management-Skills--Trust-Building-
fluence to online consumer trust: an empirical
Tips-for-Managers&id=679140
research on B2C ecommerce in China. In Pro-
ceedings of the fifth International Conference on Whyte, G., & Bytheway, A. (1996). Factors affect-
Computer and Information Technology, (pp. 961- ing information systems success. International
965). Washington, DC: IEEE Computer Society. Journal of Information Management, 7(1), 7493.
Sheridan, W., & Riley, T. B. (2006). Com- Williamson, O. E. (1981). Calculativeness, trust
paring e-government and e-governance. Re- and economic organisation. The Journal of Law
trieved December 12, 2006, from http:// & Economics, 26, 453486.
www.electronicgov.net/pubs/research_papers/
World Information Society Report. (2006). Digital
SheridanRileyComparEgov.d
opportunity index 2005. Retrieved February 13,
Shih, H. P. (2004). An empirical study on predict- 2007, from http://www.itu.int/osg/spu/publica-
ing user acceptance of e-shopping on the web. tions/worldinformationsociety/2006/World.pdf
Information & Management, 41(93), 351368.
Xiong, J. A. (2006). Current status and needs
doi:10.1016/S0378-7206(03)00079-X
of Chinese e-government users. Carbondale, IL:
Southern Illinois University.

32
A Model for Building Trust in E-Government

Zeithaml, V. A., Parasuraman, A., & Berry, L. E-Government Interaction: Refers to dif-
L. (1999). Delivering quality service: Balancing ferent forms of e-government such as business
customer perceptions and expectations. New York: to business, government to citizens, business to
The Free Press. government, etc.
Ethics: Moral principles defining acceptable
behaviour.
Trust: Belief that somebody means good and
key terms And deFInItIons
can be relied upon to deliver what is expected
Confidence: Conviction or belief. without being put under any scrutiny.
E-Governance: A noun for e-government. It Trust Building: Process of inculcating con-
means the use of ICTs to facilitate processes of fidence in a people.
government such as service delivery, political User Satisfaction: Consumer feeling of
participation of citizens, electoral process, etc. contentment that a service provider is meeting
E-Government: The use of ICTs to improve user needs.
the functions of government.

33
34

Chapter 3
Adopting Mobile Devices
in Classroom:
An Empirical Case Study from
Indonesian Teachers
Chockalingam Annamalai
SEAMEO RECSAM, Penang, Malaysia

Wahyudi Yososutikno
SEAMEO RECSAM, Penang, Malaysia

Ng Khar Thoe
SEAMEO RECSAM, Penang, Malaysia

AbstrAct
Worldwide, Mobile phone technology is increasing at a remarkable rate. Mobile technologies (m-
technologies) allow students to gather access and learn beyond the classroom. They are an integral
part of humans lives today, including children in some societies. This chapter addresses issues related
to the mobile phone evolution in Indonesia, pedagogical effectiveness of using it in educational context
with empirical study on Indonesian teachers perception of the aforementioned in the classroom for sci-
ence and mathematics learning. The useful research evidence of the value of ICT in education thereby
serves as empirical basis for the formulation of ICT policy in educational institutions, particularly ICT
integration in instruction.

IntroductIon (m-learning) is increasingly gaining attention


especially in the societies with limited access to
Mobile technologies (m-technologies) are integral Internet facilities such as Indonesia and South
part of humans lives today in many parts of the Africa. According to literature, not only is the
world as they are powerful tools for communica- Internet subscriber base in Indonesia significantly
tion and learning in the technology era. Learn- lower than in its Association of Southeast Asian
ing via mobile technologies or mobile learning Nations (ASEAN) counterparts (see Figure 1), it
is also lower than the ASEAN average. Internet
growth in Indonesia is also lagging behind as can
DOI: 10.4018/978-1-61692-012-8.ch003

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Adopting Mobile Devices in Classroom

Figure 1. Internet subscriber in ASEAN countries (From ICT infrastructure in emerging Asia. Policy and
regulatory roadblocks, Sage Publications (2008). Retrieved from http://www.idrc.ca/openebooks/378-
2/#page_141).

be seen in Figure 2 (Samarajiva & Zainudeen, and Section 6 (Conclusion). Section 2 describes
2008). Thus it is not surprising that m-learning the background of related research on mobile
is defined as Knowledge in hand by Brown & phones and its pedagogical effectiveness. Section
Metcalf (2008) as it facilitates the delivery of edu- 3 discusses literature review. Section 4 discusses
cation or learning, foster communication, conduct research methodology such as sample size, in-
assessments and provide access to performance struments, data collection and analysis. Section
support or knowledge. 5 elaborates findings discussions & conclusion
This chapter deliberates on the broad defini- drawn. Section 6 offers research implications and
tions of m-learning with identification of various limitations. Finally, this chapter comes up with
controversial issues and problems of practice as recommendation on formulation of ICT policy
reviewed from literature. Elaboration will be made towards the usage of mobile devices in classroom.
on the mobile phone evolution in Indonesia and
the pedagogical effectiveness of using it in edu-
cational context. The findings from the empirical bAckground
case study on Indonesian teachers perception
towards mobile learning in the science and math- Mobile learning (m-learning) is defined by Quinn
ematics classroom will also be reported with (2000) as the intersection of mobile computing
discussions on future trends. The useful research and e-learning: Accessible resources wherever
evidence of the value of ICT in education thereby you are, strong search capabilities, rich interac-
serves as empirical basis for the formulation of tion, powerful support for effective learning,
ICT policy in educational institutions, particu- and performance-based assessment. Wei & Lin
larly ICT integration in instruction. (2008, p.5251) defined m-learning as all forms of
The organization of this book chapter is divided education in which the teacher and the learner are
into six sections: Section 2 (Background), Sec- physically separated from one another by space and
tion 3 (Literature review), Section 4 (Research by time. A new m-learning architecture will sup-
methodology), Section 5 (Finding and Discussion) port creation, brokerage, delivery and tracking of

35
Adopting Mobile Devices in Classroom

Figure 2. Internet subscribers: Indonesia vs. India (1998-2005) (From ICT infrastructure in emerging
Asia. Policy and regulatory roadblocks, Sage Publications (2008). Retrieved from http://www.idrc.ca/
openebooks/378-2/#page_141).

learning and information contents, using ambient Technology tools such as mobile devices,
intelligence, location-dependence, personaliza- wireless communications, and network technol-
tion, multimedia, instant messaging (text, video) ogy have recently advanced significantly, and
and distributed databases (Mobilearn, 2003). have been integrated into various wireless learn-
Three ways in which learning can be considered ing environments that attract many individuals
for mobile learning are that it is mobile in terms attention and expectations (Liu, 2007; Norris &
of space; it is mobile in different areas of life; it is Soloway, 2004; Roschelle & Pea, 2002). The tools
mobile with respect of time (Kukulska-Hulme, contain semiautomatic and automatic guidance
Sharples, Milrad, Arnedillo-Sanchez, & Vavoula, for learners learning process, enabling automatic
2009; Vavoula & Sharples, 2002) individualization of a learning process.
There are several controversial issues raised
over the past decade about the use of m-learning.
revIew oF relAted reseArcH For example, Hoppe, Joiner, Milrad and Sharples
(2003) wanted to shift the focus of M-learning
Thanks to mobile phone technologies and personal from content delivery to interpersonal relations,
digital assistants (PDAs), with the boundaries as asserted there is an imperative to move from
expanded beyond the classroom learning. With a view of e- and m- learning as solely delivery
an increasing attention and concerns over the ap- mechanisms for content(p.255).
plicability of M-technologies, several researches According to Vogel (2007, p.2), adapting
have been conducted on M-learning environment technology into learning is not new, and as times
in classroom activities for teaching and learning. goes by, it is part of students day-to-days life.
One could use it for learning purposes beyond the Mobile devices, e.g., PDAs and smartphones,
classroom, create quizzes, surveys, questionnaire are categorically different forms of technologies
forms and evaluate them as well (Divjak, 2008; with different behavioral consequences. The
Kukulska-Hulme, 2008; Lindquist, 2007; Sung, ubiquitous nature of these mobile technologies
Gips, Eagle, Madan, Caneel & DeVaul et al., 2005) in terms of being constantly within reach of the

36
Adopting Mobile Devices in Classroom

Figure 3. Asia Pacific: Top 10 markets by customers (Source: From Cellular News, 2008. Retrieved
from http://www.itu.int/ITU-D/ict/newslog/content/binary/27-04-2009.gif).

users and continuously connected to a broader information and communication technology


communications network give them a unique status (ICT) policy.
in the realm of technology support for education
and learning. mobile Phone evolution and
Empirical studies have reported the advan- Pedagogical effectiveness
tages of using wireless technologies in learning
environments, including supporting group work Analysts and industry experts have previously
on projects, engaging learners in learning-related predicted that the total number of cellular phone
activities in diverse physical locations, and enhanc- customers in Indonesia would climb to 120 million
ing communication and collaborative learning in by the end of this year, from around 90 million
the classroom (Barker, Krull & Mallinson, 2005; at the end of 2007 (Reuters News, 2009). During
Liu, Wang, Liang, Chan, Ko, & Yang, 2003) 2008, Indonesia became the Asia Pacific regions
While a great deal of studies had been done third largest market with a total of 140.2 m con-
around the globe as aforementioned, however, nections (refer Figure 3) (Cellular News, 2008).
none or practically only very few such study was The number of mobile phone users in Indonesia
done within Indonesian context, in relation to its could more than double to 100 million by 2010 as
pedagogical effectiveness in science/mathemat- a low penetration rate in the worlds fourth most
ics education. Therefore, this study was initiated populous country offers huge potential. However,
to explore Indonesian mathematics and science the mobile penetration rate in Indonesia is low
teachers views towards mobile learning with compared with Malaysia, where around two-thirds
review of mobile phone evolution in Indonesia. It of the population has access to mobile phones.
is hoped that the empirical findings will provide Thailand also has a penetration rate of around
an overview of M-learning classroom practices 46% (The Edge Daily, 2006). -
that contributed to the intended formulation of The ultimate goal of this study is to see
whether handheld device such as mobile phones

37
Adopting Mobile Devices in Classroom

Table 1. Mobile phone evolution. Source: Soccio, D (2007). Victorian Adult Literacy and Basic Educa-
tion Council (VALBEC) Conference. Retrieved from http://www.valbec.org.au/05/conf07/docs/Please_
switch_your%20mobile_on.ppt.

Types Description
1G Used analogue technology for the transmission of voice traffic
Encompasses competing standards or personal communications service (PCS). It uses digital technologies that enabled better
2G
audio quality in voice transmissions, increased capacity on networks
Extension of the main 2.5 G standard and designed to enable rapid transmission of very large quantities of data, video clips and
3G
Multimedia Short Messages (MMS)

enhance teaching pedagogically and technically was carefully developed and administered to the
in the classroom activities. The first author tried purposively chosen sample as described below.
with Nokia 6300 mobile device to show some
applications on Science/Math Applications. The sample
following Table 1 describes the evolution of mo-
bile phones in general. A total of forty five science and mathematics
Handheld devices have the potential to ef- teachers from Aceh, Indonesia with various years
fectively push and pull information and de- of science teaching experience and with at least
liver learning whenever/wherever employee needs a basic degree participated in this study. These
arise (Brown & Metcalf, 2008). Mobile devices respondents are the participants who attended a
themselves cannot be used effectively unless they three months in-service course on science and
meet pedagogical effectiveness criteria. Accord- mathematics pedagogy. Prior to coming for this
ing to Robson (2003), there are two basic require- course, the majority had access to computers and
ments for the adoption of new technology by were familiar in using it. During formal classes
formal educational systems: they had the opportunities to observe facilitators
integrating ICT into their teaching mainly through
1. The technology must be pedagogically ef- presentation tools as well as exercises which
fective and viewed as an improvement involved the use of word processors to produce
2. The technology must be available and reports, presentation tool such as PowerPoint and
accessible. exploration using the Internet. During the course
they had been exposed to the use of mobile device
In mathematics and science, at least, there is as teaching tools in mathematics and science
widespread belief that microprocessor based tech- classroom.
nology is pedagogically effective and can lead to
improvements in learning. Indeed, technology in Instruments
the classroom has been mandated by curriculum
standards for over a decade. After the demonstration of using mobile device
in teaching mathematics and science, a validated
questionnaire My Perception on Mobile Learn-
reseArcH metHodology ing (henceforth being referred to as MPML)
adapted from Singh & Zaitun (2006) was ad-
This study employed questionnaire survey as ministered. The questionnaire was intended to
main data collection method. The questionnaire explore mathematics and science teachers view

38
Adopting Mobile Devices in Classroom

Table 2. Description of scales in MPML and representative items

Scale Name Scale Description Example of the item


Flexibility Extent to which mobile learning device facilitates students Learning can be done anytime and anywhere (Item No.2)
learning in any condition
Effectiveness Extent to which mobile learning helps the teachers to fa- Students did not have to waste time copying what the
cilitate teaching instructor wrote on the whiteboard. (Item No.12)
Collaboration Extent to which collaboration among stakeholders are needed Collaboration is a critical element to successful mobile
to conduct mobile learning devices integration in education. (Item No.31)
Restriction Technical matter that limit teacher and students in doing Connectivity costs are kind of expensive for mobile
mobile learning devices (Item No.18)
Teacher Readiness Extent to which teachers are able to engage in mobile learn- Educators need to be trained on how to apply mobile
ing classroom devices in their practices (Item No.29)

towards the use of mobile devices in mobile learn- The Statistical Package for Social Science (SPSS)
ing classroom. The questionnaire consists of 36 software version 13.0 was used to explore the
items which required the respondents to respond internal consistency of scale and the reliability
to a 5-point Likert scales ranging from strongly of questionnaire was followed up (see Table 3).
disagree to strongly agree. The questionnaire is Moreover, the teachers views towards mobile
provided in the Appendix. learning, descriptive statistics via analysis of
teachers responses to the questionnaire about
data collection Procedure their views towards mobile learning was made.
The average item mean, or the scale mean divided
After experiencing the use of mobile device in by the number of items in a scale and its standard
science and mathematics classroom, the partici- deviation, was used as the basis of comparison
pants were asked to respond to the questionnaire among teachers views on the items in different
that was put online [refer URL http://www.ques- scales of the questionnaire.
tionpro.com/akira/TakeSurvey?id=1185083].
The ethical concern of anonymity was abided by
to ensure that the participants provided the most FIndIngs And dIscussIon
genuine response. The participants were told that
the researchers were available if they have any validity and reliability of
question or clarification towards the items in the the Questionnaire
questionnaire. They were also informed that their
responses will not affect their performance or grade The My Perception on Mobile Learning (MPML)
in the course. The administration of questionnaire questionnaire consists of 36 items which were
was followed up with some participants were unevenly distributed into five scales, namely
randomly selected for interview to triangulate Flexibility (a total of 7 items, i.e. No. 2, 3, 4, 5,
the findings. 6, 26 and 35), Effectiveness (a total of 10 items,
i.e. No. 7, 8, 9, 10, 12, 13, 20, 21, 23 and 24),
data Analysis Collaboration (a total of 5 items, i.e. No. 22, 26,
27, 30 and 31), Restriction (a total of 7 items, i.e.
Data analysis included validation of the question- No. 16, 17, 18, 19, 32, 34 and 36), and Teacher
naire with descriptive statistics on the analysis Readiness (a total of 7 items, i.e. No. 1, 11, 14, 15,
of responses for each scale in the questionnaire. 28, 29, and 33) (Refer Appendix). The description

39
Adopting Mobile Devices in Classroom

Table 3. Cronbach alpha () and mean correlation of scales of the MPML Questionnaire (N=45)

Criterion
Scale Number of Items Cronbach Mean Correlation
Flexibility 7 0.78 0.60
Effectiveness 10 0.78 0.45
Collaboration 5 0.72 0.49
Restriction 7 0.74 0.59
Teacher Readiness 7 0.69 0.57

Table 4. Teacher perceptions of mobile learning devices and classrooms (N=45)

No Scale Number of Items Mean SD


1. Flexibility 7 4.07 0.45
2. Effectiveness 10 3.82 0.47
3. Collaboration 5 3.97 0.42
4. Restriction 7 3.82 0.46
5. Teacher Readiness 7 4.05 0.39

of these scales accompanied by examples of an Table 3 shows that the discriminant validity,
item from each scale is provided in Table 2. which measured the mean correlation of a scale
The criteria to ensure the validity and reli- with other four scales, ranged from 0.45 (Effec-
ability of the questionnaire included scale internal tiveness) to 0.60 (Flexibility). These results sug-
consistency reliability, and factor structure. In this gest that the MPML used in this study possesses
study, analysis was done to check whether or not relatively satisfactory scales construct, although
each item in a scale of the questionnaire assessed a degree of overlap still exists.
a common construct. Therefore, Cronbachs alpha
coefficient was calculated. On the whole, the teachers Perceptions
statistics obtained were acceptable. Cronbach of mobile learning
alpha coefficients of these five scales ranged from
0.69 (Teacher Readiness) to 0.78 (Flexibility and To depict the teachers perceptions of mobile
Effectiveness) (Table 3). These results suggest learning, the average item mean (the scale mean
that the internal consistency for the MPML ques- divided by the number of items in that scale) and
tionnaire is acceptable. average item standard deviation of each scale
Furthermore, mean correlation of a scale with were calculated and the results are shown in
other four scales in the MPML questionnaire was Table 4 below.
calculated and used as the criterion of discriminant Generally, the teachers hold relatively positive
validity. The lower mean correlation infers greater view of mobile learning in which their average
discriminant validity for that scale. The results are score for all scales ranged from 3.82 to 4.07 with
presented in Table 3. standard deviation from 0.39 to 0.47.

40
Adopting Mobile Devices in Classroom

With regard to the flexibility of mobile learn- had expressed in the questionnaire. Therefore,
ing classroom, teachers perceptions towards the this study implied that Indonesian science and
items in the questionnaire are in between agree mathematics teachers should be empowered to
and strongly agree (average mean score 4.07). It start implementing mobile learning to teach sci-
indicates that the teachers are in agreement that ence and mathematics.
mobile learning will be able to provide students However, due to the fact that the survey was
with learning activities regardless of time and only conducted with samples from one country,
place. Similarly, teachers also responded either the results of this study may not be generaliz-
agree or strongly agree on their readiness able to other nations. Time constraints faced
(average mean score of 4.05) which is important during the conduct of this study within the one
for the success of mobile learning delivery. month in-service course also did not permit the
On the other hand, teachers are about in agree- researcher to conduct pilot testing in MPML in
ment on their perceptions towards the effective- local schools before the real study although it is
ness of using mobile learning for helping students, a validated instrument. Moreover, no follow up
on collaboration needed among stakeholder for research activities or observational studies were
the success of mobile learning delivery, and of made with the sample teachers participated in this
restriction they faced in implementing mobile study. Hence positive perception as evidenced
devices in mobile learning classrooms. from this case study does not necessarily guarantee
the real practices.

reseArcH ImPlIcAtIons
And lImItAtIons Future trends

The findings suggest a promising future and re- The National Information and Communication
vealed the possibility on the use of mobile devices Technology Council (DeTIKNas) recently an-
in delivering mobile learning for science and nounced its plan to accelerate the implementation
mathematics classroom in Indonesian context. of Indonesias ICT Blueprint. The announcement
At first, it was assumed that teachers positives was part of the governments commitment to elimi-
views on all scales in the questionnaire were due nate digital gap and build an e-Indonesia through
to the fact that the teachers felt refreshed with the the development of telecommunication network
opportunity to learn something new that they never in 43,000 villages, 31,173 junior and senior high
knew and like to know about. It was observed that schools, 2,428 universities and 28,504 health
there were eagerness and enthusiasm during the centers in Indonesia by 2025 (ICT-Indo, 2007). As
presentation on mobile learning classroom by the revealed from the literature, a backbone network
facilitator as part of the course activities. However, will be developed across Indonesia, connecting
this assumption was later rejected as it was found 440 cities, in all 33 provinces of Indonesia. It
that the teachers hold positive perception and re- consists of about 35,000 kilometers of submarine
sponded to the questionnaire as they had given their fiber optic cables. Indonesia also seeks to pro-
best knowledge as much as they could. Through mote Asia regional interests in international and
interview we found that mostly participants were global forums, not to be merely target markets for
IT savvy, were familiar with mobile devices and every model and technology associated with the
did understand what mobile learning should be. It implementation of e-government (Sofyan, 2007
is obvious that they really knew the items in the in Obi, 2007).
questionnaire and had strong belief as what they

41
Adopting Mobile Devices in Classroom

Table 5. Asia mobile penetration rates (2005-2010): Business Monitor International (BMI)s report
on 14 key Asia market. [Source: Cellular-News (2007). Retrieved from http://www.cellular-news.com/
story/17162.php].

Mobile Penetration (2005) BMI Forecast Mobile Forecast Average Annual


Penetration (2010) Growth
Hong Kong 118.5% 111.9% -0.3%
Singapore 97.7% 100.7% 2.1%
Australia 96.1% 100.6% 2.0%
Taiwan 92.4% 92.6% 1.3%
Korea 79.1% 85.9% 2.1%
Malaysia 74.1% 91.2% 5.8%
Japan 70.3% 85.6% 4.2%
Thailand 46.9% 78.5% 14.4%
Philippines 42.7% 75.2% 16.9%
China 30.2% 58.9% 21.9%
Indonesia 22.3% 41.5% 19.5%
Pakistan 14.1% 37.7% 38.5%
Vietnam 10.3% 35.9% 62.3%
India 7.0% 32.8% 80.1%

According to Goswami (2007), for the year technologies to be used in educational settings by
2006, we may see an investment of more than wider population in future.
$2.5 billion dollars made in the mobile infra- In view of the increasing attention and interest
structure as the existing operators gear up to face in mobile technologies, especially the trends to
the challenge from Hutch and Maxis who are implement mobile learning in science and math-
rapidly rolling out their infrastructure. Literature ematics classrooms, it is imperative that some
revealed that more than 20 million Indonesians studies could be made with formulation of ICT
now own mobile phones, roughly 8 percent of the policy to ensure effective implementation of
countrys 220 million population. Research and mobile learning in science and mathematics
Markets expects the country to have 60 million classrooms. The future research that may be worth
mobile subscribers by 2007 (The Gale Group, of doing can be focused on the investigation of
2008). The recent report by Business Monitor how and to what extent these teachers use mobile
International (BMI) on 14 key Asia market (refer devices in teaching science and mathematics
Table 5) (Cellular-News, 2007) also revealed that through mobile learning in classroom.
mobile phone penetration in Indonesia was 22.3%
in 2005. According to the BMI Forecast mobile
penetration in the aforementioned country by ImPlIcAtIons For Ict
2010 is 41.5%. This means there is an increase of PolIcy FormulAtIon
about 19.5% forecast average annual growth of
mobile penetration in Indonesia. The implication As revealed in Table 4 of the research findings,
is that there will be higher opportunity of mobile though the Indonesian teachers hold positive view
of mobile learning, their average scores for Ef-

42
Adopting Mobile Devices in Classroom

fectiveness, Collaboration and Restriction scales Due to various ethical issues, mobile tech-
ranged from 3.82 to 3.97, which were less than the nology such as mobile phone was actu-
average scores for Flexibility and Teacher Readi- ally banned in secondary schools of some
nessscales that are 4.07 and 4.05 respectively. This countries. Hence, there is a need to take
means that some forms of measures and efforts into consideration the ethical issues of us-
need to be made so that teachers are more confi- ing mobile technologies such as mobile
dent and can work collaboratively (in terms of phone in classrooms so that students do not
e.g. communication, networking, accommodating misuse its application to make unethical
diverse learner-centred environment, stakehold- video recordings that create controversial
ers collaboration and sharing) to introduce mobile issues if it is to be implemented at various
learning. These types of learning should also be levels of educational settings.
effectively (in terms of e.g. feedback, assessment, Other management of learning via mo-
experimentation, constructive learning support, bile devices or technologies may be con-
balanced intellectual development) implemented sidered, including sending students prog-
in the classrooms with less restriction (in terms ress reports, parents-teachers meeting
of e.g. cost, functionality, potential to expand, cost announcements.
effectiveness) (refer Appendix for the constructs The integration of the existing indepen-
identified for the questionnaire items). dent system within the government by
The research implications show that some implementing E-government as has been
forms of ICT policy should be formulated. To promoted by Indonesia also need to be
enable the teachers adopt and implement mobile considered with some forms of policy
learning as the perceived, both necessary techni- guidelines formulated. Highly committed
cal and pedagogical support need to be provided. leadership with technical expertise to com-
Other educational stakeholders such as school bine systems into an integrated process is
principals, curriculum developer, education of- essential. Effectiveness and transparency
ficers and mobile technologies company also need of E-government processes is also very
adequate support so that they can create conducive important (Sofyan, 2007 in Obi, 2007).
environment for teacher to implement mobile
learning in classroom. Some forms of control
need to be made to types of mobile technologies conclusIon
that could be implemented in classrooms with
students of diverse education and sociocultural This study was designed to tap Indonesian science
background. For example, the simpler and low and mathematics teachers perception towards
cost mobile phone with no camera option may be mobile learning classroom. Using online question-
allowed for use in schools as mobile learning is naire, the data was collected and analysed using
also feasible without camera. School management descriptive statistics with reliability and validity
with financial viability should be encouraged to tests. The findings from the empirical case study
provide at least 10 low cost mobile phones per revealed that generally Indonesian teachers hold
classroom. The following are some more sugges- positive views towards mobile learning in the
tions that should also be considered when consid- science and mathematics classroom in terms of
ering formulating ICT policy for mobile learning: flexibility, effectiveness, collaboration, restric-
tion and readiness. The research evidence of the
value of ICT in education also serves as empirical

43
Adopting Mobile Devices in Classroom

basis for the formulation of ICT policy in edu- Lindquist, D., Denning, T., Kelly, M., Malani, R.,
cational institutions, particularly ICT integration Griswold, W. G., & Simon, B. (2007). Exploring
in instruction as aforementioned. It is hoped that the potential of mobile phones for active learning
this Chapter has initiated discussions towards em- in the classroom. ACM SIGCSE Bulletin, 39(1),
powering more science and mathematics teachers 384388. doi:10.1145/1227504.1227445
to use mobile devices in classroom environment.
Liu, T. C. (2007). Teaching in a wireless learning
environment: A case study. Journal of Educational
Technology & Society, 10(1), 107123.
reFerences
Liu, T. C., Wang, H., Liang, T., Chan, T., Ko, W.,
Alexander, B. (2004). Going nomadic: Mobile & Yang, J. (2003). Wireless and mobile technolo-
learning in higher education. EDUCAUSE Review, gies to enhance teaching and learning. Journal
39(5), 2935. of Computer Assisted Learning, 19(3), 371382.
Cantoni & C. McLoughlin (Ed.). Proceedings of doi:10.1046/j.0266-4909.2003.00038.x
World Conference on Educational Multimedia, Massey, A. P., Ramesh, V., & Khatri, V. (2006).
Hypermedia and Telecommunications2004, (pp. Design, development and assessment of mobile
4729-4736). applications: The case for Problem-based Learn-
Csete, J., Wong, Y., & Vogel, D. (2004). Mobile ing. IEEE Transactions on Education, 49(2),
devices in and out of the classroom. In L. 183192. doi:10.1109/TE.2006.875700

Divjak, S. (2008). Mobile phones in the classroom. Mcconatha, D., Praul, M., & Lynch, M.J. (2008).
International Journal on Hands-on Science, 1(2), Mobile learning in higher education: An empirical
9294. assessment of a new educational tool. The Turk-
ish Online Journal of Educational Technology
Hoppe, H. U., Joiner, R., Milrad, M., & Sharples, (TOJET), 7(3).
M. (2003). Guest editorial: Wireless and mobile
technology in education. Journal of Computer Metcalf, D. (2005). mLearning: Mobile learn-
Assisted Learning, 19(3), 255259. doi:10.1046/ ing and performance in the palm of your hand.
j.0266-4909.2003.00027.x Amherst, MA: HRD Press.

Kukulska-Hulme, A. (2008). Mobile Usability Montero, F., Crcoles, J. E., & Calero, C. (2006).
in Educational Contexts: What have we learnt? Handhelds and mobile phones to manage students
International Review of Research in Open and and resources in classroom: A new handicap to
Distance Learning, 8(2), 115. the teacher? (pp.876-880).

Kukulska-Hulme, A., Sharples, M., Milrad, M., Naismith, L., et al. (2005). Report 11: Literature
Arnedillo-Snchez, I., & Vavoula, G. (2009). In- review in mobile technologies and learning. Future
novation in mobile learning: A European perspec- lab series. Bristol, U.K.
tive. International Journal of Mobile and Blended Norris, C., & Soloway, E. (2004). Envisioning
Learning, 1(1), 1335. the handheld-centric classroom. Journal of Edu-
cational Computing Research, 30(4), 281294.
doi:10.2190/MBPJ-L35D-C4K6-AQB8

44
Adopting Mobile Devices in Classroom

Pearson, J. (2004). Current policy priorities in Vavoula, G. N., & Sharples, M. (2002). KleOS:
information and communication technologies in A personal, mobile, knowledge and learning
education . In Trinidad, S., & Pearson, J. (Eds.), Us- organisation system. In M Milrad, HU Hoppe &
ing information and communication technologies Kinshuk (Eds), IEEE International Workshop on
in education. Singapore: Pearson Prentice Hall. Wireless and Mobile Technologies in Education
(pp.152156). Los Alamitos, CA: IEEE Computer
Roschelle, J., & Pea, R. (2002). A walk on the
Society.
wild side: How wireless handhelds may change
computer-support collaborative learning. Inter- Vogel, D., Kennedy, D. M., Kuan, K., Kwok, R.,
national Journal of Cognitive Technology, 1(1), & La, J. (2007). Do mobile device applications
145168. doi:10.1075/ijct.1.1.09ros affect learning? In Proceedings of the 40TH Annual
Hawaii Conference on Systems Sciences, 1-4.
Saipunidzam, M., Mohammad, N. I., Mohamad, I.
A. M. F., & Shakirah, M. T. (2008). Open source Wagner, E. D. (2005). Enabling mobile learning.
implementation of M-learning for primary school EDUCAUSE Review, 40(3), 4053.
in Malaysia. In Proceedings Of World Academy
Wei, J., & Lin, B. (2008). Development of a value
Of Science, Engineering And Technology (pp.752-
increasing model for mobile learning. In Proceed-
756). 34.
ings of the 39th Annual Meeting of the Decision
Singh, D., & Zaitun, A. B. (2006). Mobile learn- Sciences Institute (pp. 5251-5256).
ing in wireless classrooms. [MOJIT]. Malaysian
Zhao, X., & Okamoto, T. (2008). A personalized
Online Journal of Instructional Technology, 3(2),
mobile mathematics tutoring system for primary
2642.
education. The Journal of the Research Center for
Sofyan, D. (2007). ICT policy in Indonesia . In Educational Technology, 4(1), 6167.
Obi, T. (Ed.), E-governance: A global perspec-
Zurita, G., & Nussbaum, M. (2004). A constructiv-
tive on a new paradigm (pp. 4850). Amsterdam:
ist mobile learning environment supported by a
IOS Press.
wireless handheld network. Journal of Computer
Sribhadung, P. (2006). Mobile devices in elearn- Assisted Learning, 20(4), 235243. doi:10.1111/
ing. In Proceedings of the Third International j.1365-2729.2004.00089.x
Conference on eLearning for Knowledge-Based
Society (pp.35.1-35.4), Bangkok, Thailand.
Sung, M., Gips, J., Eagle, N., Madan, A., Caneel, websItes
R., & DeVaul, R. (2005). Mobile-IT education
(MIT.EDU): M-learning applications for class- Barker, A., Krull, G., & Mallinson, B. (2005). A
room settings. Blackwell Publishing Limited. proposed theoretical model for M-learning adop-
Journal of Computer Assisted Learning, 21, tion in developing countries. Proceedings of the 4th
229237. doi:10.1111/j.1365-2729.2005.00130.x World Conference on Mobile Learning. Retrieved
March 29, 2009 from http://www.mlearn.org.za/
CD/papers/Barker.pdf
Brown, J., & Metcalf, D. (2008). Mobile learning
update. Masie Centers Learning Consortium.
Retrieved March 20, 2009 from http://www.
masie.com

45
Adopting Mobile Devices in Classroom

Cellular-News. (2007). Asia phone penetration to Quinn, C. (2000). mLearning. Mobile, Wireless,
reach 50% by 2010 Report. Retrieved October In-Your-Pocket Learning. Linezine. Fall 2000.
9, 2009 from http://www.cellular-news.com/ Retrieved April 29, 2009 from http://www.line-
story/17162.php zine.com/2.1/features/cqmmwiyp.htm.
Cellular-News. (2008). Asia Pacific: Top 10 Retrieved June 11, 2009 from http://www.
markets by customers. Retrieved October 12, eduworks.com/ Documents/Publications/Mo-
2009 from http://www.itu.int/ITU-D/ict/newslog/ bile_Learning_Handheld_Classroom.pdf Sa-
content/binary/27-04-2009.gif marajiva, R., & Zainudeen, A. (2008). Does
regulation stifle or enable ICT connectivity? In
Goswami, D. (2007). Evaluating ICT policy in
R. Samarajiva, & A., Zainudeen (Eds), ICT infra-
Indonesia: Interview with LIRNEasia researcher.
structure in emerging Asia: Policy and regulatory
Retrieved October 9, 2009 from http://lirneasia.
roadblocks. International Development Research
net/2007/01/evaluating-ict-policy-in-indonesia-
Centre (IDRC), Sage Publications India Pvt Ltd.
interview-with-lirneasia-researcher/
Retrieved October 12, 2009 from http://www.idrc.
ICT-Indo. (2007). ICT2007 Indonesia earmarked ca/openebooks/378-2/
as a DeTIKNas flagship event to set ICT milestones
Reuters News. (2009). Retrieved 20 March 2009,
for Indonesia. Retrieved October 12, 2009 from
from http://www.reuters.com/article/rbssTech-
http://www.ictindonesia.com/2008/PressRelease-
MediaTelecomNews/idUSJAK10826820080606
Feb07.pdf
Robson, R. (2003). Mobile learning and handheld
Kearns, P. (2002). Towards the connected learning
devices in the classroom.
society. An overview of trends in policy for infor-
mation and communication technology in educa- Silvernail, D. L., & Lane, D. M. M. (2004). The
tion. Canberra: Department of Education, Science impact of Maines one-to-one laptop program
and Training. Retrieved October 6, 2009 from on middle school teachers and students. Maine
http://www.dest.gov.au/sectors/higher_education/ Education Policy Research Institution, University
publications_resources/summaries_brochures/ of Southern Main. Retrieved October 6, 2009
towards_the_connected_learning_society.htm from http://maine.gov/mlti/articles/research/
MLTIPhaseOneEvaluationReport2004.pdf
Merrill Lynch. Bullish on mobile learning. Re-
trieved March 12, 2009, from http://www.clom- Staudt, C. (2001). Handheld computers in educa-
edia.com/index.php?pt=a&aid=2135 tion. Concord, MA: The Concord Consortium.
Retrieved July 11, 2009 from http://playspace.
mLearnopedia. Retrieved March 12, 2009 from
concord.org/Documents/Learning from Hand-
http://mlearnopedia.com
helds.pdf
Mobile learning at IADT Online. Retrieved
The Edge Daily. (2006) (Malaysia Online News-
January 16, 2009, from http://online.academy.
paper) Retrieved March 12, 2009 from http://
edu/iadtmobile/
www.indonesia-ottawa.org/information/details.
Mobilearn (2003). The Mobilearn project vision. php?type=news_copy&id=2310
Retrieved 20 March 2009, from http://www.mo-
bilearn.org/vision/visiton.htm

46
Adopting Mobile Devices in Classroom

The Gale Group. (2008). Indonesias mobile key terms And deFInItIons
penetration to triple by 2007, according to Re-
search and Markets. Retrieved October 9, 2009 1G: First Generation mobile phones
from http://goliath.ecnext.com/coms2/gi_0199- BMI: Business Monitor International
2376036/Indonesia-s-mobile-penetration-to.html E-Government: Electronic Government
ICT: Information and Communication Tech-
Wei, J., & Lin, B. (2008). Development of a value nology
increasing model for mobile learning. Proceedings MMS: Multimedia Short Messages
of 39th Annual Meeting of the Decision Sciences MPML: My Perception on Mobile Learning
Institute. Retrieved June 11, 2009 from www. (survey questionnaire)
decisionsciences.org/Proceedings/DSI2008/ M-learning: Mobile learning
docs/525-2426.pdf M-technologies: Mobile technologies
PCS: Personal Communications Service
PDA: Personal Digital Assistant
Smartphones: Mobile phones offering
advanced capabilities, often with PC-like func-
tionality
SPSS: Statistical Package for Social Science

47
Adopting Mobile Devices in Classroom

APPendIx

Items in My Perceptions on Mobile Learning (MPML) Questionnaire [An instrument adapted from
Devinder Singh & Zaitun A.B (2006)]

No. Questionnaire Items in MPML Questionnaire Construct


1 Instructors can incorporate multimedia demonstrations in their lecturers and receive real-time feedback from Readiness
their students using quizzes or surveys.
2 Learning can be done anytime and anywhere. It supports continuous learning. Flexibility
3 Able to collaborate with instructors notebook during class. Flexibility
4 Communication and teaching support while outside the classroom. Flexibility
5 Mobile learning is able to synchronous team members appointments and schedules. Flexibility
6 Classroom seating does not have to have a fixed seating arrangement. Flexibility
7 An instructor can get immediate feedback on the lesson being taught. Effectiveness
8 Students can be assessed on multiple choices, true/false questions in the classroom. Effectiveness
9 An instructor can get immediate feedback on the lesson being taught. Effectiveness
10 Real-time experiments can take place in classrooms. Effectiveness
11 Instructors can provide examples such as simulations and web based documents that can be accessed at specific Readiness
time to improve retention.
12 Students did not have to waste time copying what the instructor wrote on the whiteboard. Effectiveness
13 Students can be used as soon as they are turned on the device and dont have to be booted up. Effectiveness
14 (Many, but not all) significantly cheaper than desktops or portable machines. Readiness
15 Closed to youth lifestyle part of their social and cultural life. Readiness
16 Their functionality is limited compared to more powerful devices. Restriction
17 They have limited potential for expansion and upgrade. Restriction
18 Connectivity costs are kind of expensive for mobile devices. Restriction
19 Concerns about security issues. Restriction
20 It is considered as a learning supportive tool. Effectiveness
21 Students are allowed the recording and maintenance of the lessons takes place. Effectiveness
22 Mobile devices facilitate communication between faculty members and students through file sharing capabilities. Collaboration
23 Mobile devices can be used as instructional tools to constructive learning. Effectiveness
24 Mobile devices can be treated as tools that help students execute their tasks and promote the balanced develop- Effectiveness
ment of their mental abilities by functioning as intellectual partners to the instructor and the learner.
25 Activities within the curriculum can be designed to take place in classroom (deskwork) or mainly outside the Flexibility
classroom (fieldwork.).
26 There is a need for a shared, progressive pedagogy for mobile learning that will provide the scientific basis for Collaboration
networked and collaborative learning in both a virtual and a virtual-augmented environment.
27 It must accommodate different teacher- and learner perspectives, promote learner-centered environments and Collaboration
collaboration among learners and between learners and educators.
28 Educators need to be trained on how to apply mobile devices in their practices. Readiness
29 In order to minimize that risk and increase the success probabilities, it is important to be proactive and apply Readiness
a systemic, holistic approach to mobile technology integration.
30 Collaboration (i.e. various stakeholders such as educators, students/ learners, computer scientists and engineers) Collaboration
is a critical element to successful mobile devices integration in education.

48
Adopting Mobile Devices in Classroom

No. Questionnaire Items in MPML Questionnaire Construct


31 Stakeholders (i.e. Various Collaborators) need to communicate, coordinate their actions, transfer and share Collaboration
their knowledge and experiences, as well as align their needs and goals.
32 The screen size is one of the issue is mobile learning. Restriction
33 The cost of the mobile is one of the issue is mobile learning. Readiness
34 The battery life of the mobile is one of the issue is mobile learning. Restriction
35 One can bring Science/Math Contents and Concepts beyond the classroom. Flexibility
36 Mobile Bandwidth may degrade with large number of users. Restriction

49
50

Chapter 4
Analysing an ICT4D Project
in India Using the Capability
Approach and a Virtuous
Spiral Framework
Helena Grunfeld
Victoria University, Australia

Sriram Guddireddigari
Monash University, Australia

Benita Marian
The East West Foundation of India, India

John Peter
The East West Foundation of India, India

Vijay Kumar
The East West Foundation of India, India

AbstrAct
The field research covered in this chapter represents the first wave of a longitudinal study, aimed at
testing a framework for evaluating the contribution to capabilities, empowerment and sustainability
of information and communication technology for development (ICT4D) projects. Key features of the
framework are: it is conceptually informed by Amartya Sens capability approach (CA), uses a partici-
patory methodology and longitudinal timeframe, and considers the micro-, meso-, and macro- levels in
understanding the role of ICT in development. Despite the longitudinal nature of the framework, each
stage of the research is designed to be a case study in its own right. The research, conducted at a com-
puter centre in the Indian state of Tamil Nadu, centred on the perception of participants with respect
to whether the centre had played a role in any improvements in the community and whether they could
see a role for it in changes they would like to see, or aspirations they may have for their communities.

DOI: 10.4018/978-1-61692-012-8.ch004

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

A key finding of the field research was that participants valued the centre mainly for its contribution
to education of their children. Education was appreciated beyond its instrumental utility and included
intrinsic value, i.e. value that exceeds its potential as a path to higher incomes. Participants frequently
referred to how a higher level of literacy would empower them to deal with government officials without
intermediaries. This finding is consistent with the CAs emphasis on development as a process facilitating
capabilities that enable people to lead lives they have reason to value.

IntroductIon inequalities, some authors have called for further


research to improve knowledge of this aspect of
When allocating scarce development resources, ICT4D (Forestier, Grace, & Kenny, 2002; Ku-
governments like to see hard evidence of the mar & Best, 2006; Souter, Scott, Garforth, Jain,
benefits. In the absence of such evidence, there is Mascarenhas, & McKemey, 2005; Torero & von
a risk that decision-makers misallocate resources, Braun, 2006; van Dijk & Hacker, 2003).
either through ineffective ICT deployments or no ICT4D project evaluations exhibit diversity
deployments. An appreciation of the environment in frameworks, methodologies, methods and fo-
in which ICT infrastructure is considered or de- cus. They can be analytical, descriptive and/or
ployed will make us wary of blindly following prescriptive. Case studies represent a common
the technological imperative and alert to situations approach (e.g. Batchelor & Sugden, 2003; Evans
where there is a trade-off between efficiency and & Ninole, 2004; Falch & Anyimadub, 2003; Har-
human well-being (Sawhney, 1996, p.311). It ris, 2001; Meera, Jhamtani, & Rao 2004; Over,
will also contribute to awareness of many ben- 2006; Talyarkhan, Grimshaw, & Lowe, 2005) and,
efits of ICT that are not necessarily quantifiable apart from a few macro-level studies, they provide
in economic terms, e.g. in the exchange of ideas much of the evidence of the benefits of telecom-
and for governance processes. munications in rural development (Hudson, 2006).
As recognised by many researchers in this field, Whereas case studies indicate the importance
research aimed at understanding environments in of telecommunications in different sectors, such
which ICTs have been deployed and their impacts as agriculture, education and health, and functions
has not kept pace with the significant investments such as marketing, they do not in general include
in ICT4D initiatives (e. g. Alampay, 2006a; Batch- any systematic analysis and are not undertaken
elor & Norrish, 2004; Gagliardone, 2005; Harris & within a specific theoretical framework. Some of
Rajora, 2006; Hudson, 2006; Nielsen & Heffernan, the case studies include assertions based on varying
2006; ONeil, 2002; Sciadas, (Ed.) 2005; Souter, levels of analysis, concluding with recommenda-
Scott, Garforth, Jain, Mascarenhas, & McKemey, tions for authorities and other implementers of
2005; Torero & von Braun, 2006; Warschauer future projects. In commenting on the inadequate
2003). Torero & von Braun (2006) recommended theoretical depth in ICT4D research, Heeks
investigations of the conditions required for ICT (2006), noted that while there has been reason-
to contribute positively to sustainable develop- able theoretical underpinnings related to the first
ment. Gagliardone (2005) argued that problems three letters of the ICT4D acronym: I (library
arise when localised experiences are scaled and and information sciences), C (communication
identified the absence of an innovative culture, studies), and T (information systems), this is not
capabilities and links between ICT enclaves and the case for D (development studies), which in
the rest of society as factors impeding the benefi- his view have been meagre.
cial use of ICT. Noting that ICT can contribute to

51
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

The case study presented in this chapter rep- ICT4D, where most evaluations are undertaken
resents the initial field research in a longitudinal upon the completion of a project. Although it may
study aimed at providing an input into the debate take some time before new technologies are ac-
on suitable frameworks for understanding how ICT cepted at a community level and even longer for
can contribute to capabilities, empowerment and them to have an impact, longitudinal studies are
sustainability from a development perspective. sparse (Gaved & Anderson, 2006). The study by
Despite the longitudinal nature of the framework, Ramirez (2001) on community-based networks
each stage of the research is designed to be a case in Canada is one of the exceptions.
study in its own right and be useful on a stand- The micro-, meso- and macro-levels refer
alone basis, as it enables others to learn as the primarily, but not exclusively, to the geographic
study progresses, even without an opportunity of dimension. The micro-level is the smallest unit
reading results from subsequent research phases. under consideration. In this case, it comprises
The conceptual framework is outlined in the the Vicki Standish e-Education Centre (VSeEC),
next section, which includes an introduction to the the focus of this study, villages in its catchment
capability approach (CA), as this has informed the area, and possibly the next institutional layers
conceptual framework. The case study includes above, the panchayat. The central government,
sections on the micro-, meso-, and macro envi- with its policies and practices are at the macro-
ronments, methodology and key findings of the level. The boundaries between these two and
field research data, which was analysed through the meso-level are more difficult to define, as
the lens of the conceptual framework. there are several nested hierarchies within this
somewhat simplified three-tier scale. In addition
to the central government, the state government
bAckground And can be considered to operate at the macro-level,
concePtuAl FrAmework although it has some meso-level characteristics,
as do mediating organisations, such as NGOs.
This chapter presents and tests a conceptual frame- The boundary of the meso- level extends to the
work, designed to understand how and under what micro-level, in the geographic domain. It is not the
circumstances an ICT4D project can contribute exact definition of these layers that is of relevance
to capabilities, empowerment and sustainability, in this context, but rather an understanding of the
taking into account factors that facilitate and dependencies and information flows between them
inhibit their achievement. and the impact they have, can, or should have on
The conceptual framework, the capabilities, each other. Analysis of these interdependencies
empowerment, and sustainability virtuous spiral is akin to systems theory, an approach advocated
framework (CESVSF) is informed by the CA and by Ramirez (2003) and Andrew & Petkov (2003)
applies a forward-looking longitudinal perspective to enhance understanding of ICT and its contexts,
to the micro-, meso- and macro-levels, using par- particularly in rural environments.
ticipatory methodologies. It recognises that many In a conceptual dimension, the three tiers can
impacts are not direct, but are similar in nature to be thought of in terms of the extent to which
the concept of spillovers in economics, i.e. their it is possible to generalise. From this and the
influences may extend in unpredictable ways, geographic perspective, the meso-level is useful
even to those not directly involved in an activity. when considering scalability and replicability,
Static, one-shot, cross-sectional studies iden- as it is less sweeping than macro concepts,
tified by Orlikowski & Baroudi (2002, p.54) as the without claiming that everything is different
main form of IS research, are also predominant in (Bebbington, 2004, p. 348), i.e. it is expected that

52
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

some degree of generalisation will be possible. bilities assumed to be essential for development
Focussing on either the macro-level with studies and likely to be required for and facilitated by a
on the relationship between ICT, the policy and sustainable ICT infrastructure are illustrated in
regulatory environments and/or economic growth, Figure 1, which depicts a virtuous spiral that is
or on implementation of specific projects at the expected to emerge for appropriately implemented
micro-level, most ICT4D research overlooks the ICT4D projects.
meso-level, despite the likelihood that it is at this The CESVSF assumes that a minimum set of
level service provision can be most responsive. capabilities are required to establish, manage and
In addition to government authorities, this level use a basic ICT infrastructure - shown as obtain
is inhabited by infomediaries and a range of or- initial funding in Figure 1. Alternatively, this
ganisations that can facilitate effective use of ICT function can be performed by a mediating or-
(Duncombe, 2006; Ramirez, 2001). ganisation such as the VSeEC, in this case study.
In terms of ICT deployments, there are several Using a basic level of IT artfulness, individuals
illustrations from India of three-tier ICT4D initia- can gain confidence and increase the control over
tives. The three-tier n-Logue (Jhunjhunwala, Ra- their own lives (Corea, 2007). This in turn can
machandran, & Bandyopadhyay, 2004) structure strengthen the IT infrastructure in their communi-
and the model used by the Informatics unit of the ties, whether in the form of better skills, equipment
M.S. Swaminathan Research Foundation (MS- and/or services. With each cycle of this spiral,
SRF) illustrate the diversity in the application of there are new insights and improvements in ca-
the three levels, with private sector involvement in pabilities, which strengthen community members
n-Logue and a community based model in MSSRF. and expose them to new realities that can improve
At the time of the study, MSSRF, headquartered their livelihood conditions to enable them to do
in Chennai, had 18 Village Resource Centres and to be what they have reason to value in a
(VCRs) spread across several states, supporting sustainable way.
94 Village Knowledge Centres with functions such
as technical assistance, information gathering and the capability Approach
coordination of training. A three-tier approach is
not a guarantee for success, as indicated by Jain Instead of asking about peoples satisfactions, or
& Raghuram (2005) in their study of Community how much in the way of resources they are able
Information Centres in Nagaland, which, despite to command, we ask, instead, about what they are
the involvement by central, state and local authori- actually able to do or to be (Nussbaum, 2000, p.
ties, did not accomplish their objectives. 12). This question is central to the CA and stands
In contrast to classical economic theory, where in contrast to questions about utility, preference
motivations and perceptions of participants are not satisfaction, and/or access to resources, indica-
relevant, these often play a major role in the CA tors that characterise the utilitarian and welfare
and in participatory frameworks (Anyaegbunam, approaches to development.
Mefalopulos, & Moetsabi, 1999; Ramirez 2001; The seminal book by the 1998 Nobel Laure-
Robeyns, 2001), where local participation in as- ate in Economics, Sen (2001), Development as
sessing how ICT can contribute to capabilities Freedom (DAF), first published in 1999, was
would be important. The CESVSF envisages that the culmination of considerable work carried
participants would identify basic capabilities that out by Sen at least since the 1980s to develop
are common to different places and cultures, such a framework for development that is grounded
as literacy and employment as well as capabilities in human development as an alternative to the
that are specific to each environment. Some capa- prevailing focus on economic development. Oth-

53
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Figure 1 The CES virtuous spiral conceptual framework (Source: Grunfeld, 2007)

ers (e.g. Alkire, 2005; Comin, 2001; Corbridge, At the heart of the CA lies the importance of
2002; Gasper, 1997; Robeyns, 2001; Stewart the expansion of freedom both as the primary
(2005), Stewart & Deneulin, 2002; Nussbaum, end and as the principal means of development
2000, 2006) have contributed to the development (Sen, 2001:xii). Development is considered to be
of this framework both before and following the an extension of freedoms, which are viewed as the
publication of DAF. The versatility of the CA is basic building blocks to development, as well as
illustrated by the wide range of research to which the expansion of capabilities of persons to lead
it has been applied, e.g definition by children of the kinds of lives they value and have reason to
their capabilities in an endeavour to understand value (Sen, 2001, p.18). This focus on freedom,
appropriate dimensions of childrens well-being which distinguishes the CA from frameworks ad-
(Biggeri, et al. 2006), analysis of poverty alle- vocating growth at any price, including doctrines
viation programmes in New Zealand and Samoa justifying that the end justifies the means, does not
(Schischka, Dalziel & Saunders (2008) and ad- mean that economic variables such as income and
dressing a river water dispute between different access to commodities are considered irrelevant.
Indian states (Anand, 2007). They are, however, inadequate for measuring qual-
Rather than focussing on economic growth ity of life and livelihoods. In the CA framework,
and income to evaluate outcomes of develop- certain political and social freedoms, such as the
ment initiatives, adherents of the CA have argued freedom to participate in political activities and
in favour of using capabilities of individuals to to receive basic education are considered to be
lead the lives they have reason to value, as an constitutive of development (i.e. they are relevant
informational base for evaluations. This approach whether or not they contribute to economic devel-
has had considerable influence on welfare and opment and/or growth). Certain capabilities are
development economics and is reflected in the required to achieve and enjoy freedom. There is
UNDP human development index (Sen, 2000). also a link between capabilities and human equal-
ity, as discrimination of any kind is considered a

54
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

failure of associational capability (Nussbaum, Another way of illustrating the importance at-
2000, p. 86). tached to institutions in the CA framework is the
As individuals, according to the CA, are recognition that, although poverty entails a lack
responsible for their own well-being, it is up to of basic capabilities to lead full, creative lives
them to decide which capabilities are important (UNDP 2003, p.27), capabilities represent only
to them and how, subject to external constraints, one of four dimensions identified by Sen (2001)
these should be translated into functionings. These as essential for poverty alleviation. The others
describe what a person is actually doing with his are: opportunity (access to markets and employ-
or her capabilities or the state of being resulting ment), security/vulnerability to economic risk
from this. and to all forms of violence, and empowerment,
As many who have tried to effect change in a external to as well as within households, all of
community would be able to attest to, there are which depend on institutional frameworks at the
many barriers, of an institutional nature, between macro-, meso-, and micro-levels. The importance
somebodys capability of doing something and of these domains played out is several ways in
actual achievements. Considering the CA to be the research, whether in the form of absence of a
too focused on individualism, Stewart & Deneulin broadband infrastructure, potential security issues
(2002) suggested an extension of the concept to when accessing VSeEC after dark, and education
include valuable structures of living together as a tool for empowerment.
(p.68), i.e. structures that can impact positively Developed as a critique against the more preva-
on peoples well-being. They specifically enu- lent utilitarian approach to evaluation and with its
merated functional families, cooperative and emphasis on the importance of capabilities as the
high-trust societies and social contexts (p. 68) basis for evaluations, Comin (2001) described the
and argued that this inclusion would be important CA as a framework for evaluating and assessing
from a policy and research perspective. From the social arrangements, standards of living, inequal-
policy angle, more attention would be placed on ity, poverty, justice, quality of life or well-being
structures that facilitate or inhibit development. (p. 4). However, a main difficulty of applying
This critique of the CA did not take sufficient this framework is the lack of operationalisation
account of the CAs recognition of external of the concept (Alampay, 2006a; Comin, 2001;
constraints, including institutional constraints, Gasper, 2002).
involved in obtaining and using capabilities. One way of overcoming the lack of opera-
Furthermore, the CA recognises reciprocity tionalisation, thereby making the concept more
between individuals and institutions in that a useful to development policy could be to list basic
persons capabilities not only depend on social capabilities. Nussbaum has been a vocal advocate
arrangements and institutions but also influence of doing this and has also developed a tentative
others, as described by Sen (1985a): Given the list, which she admits must be subject to review
intrinsic importance of well-being, and indeed of over time and in different contexts. Despite insist-
agency, it is not credible that a person can morally ing that capabilities should be formulated through
evaluate his or her actions without taking note of democratic processes, in his practical work, Sen
their effects on the well-being and agency aspects has nevertheless assumed that there would always
of others (including their well-being freedom and be democratic support for capabilities of being
agency freedom) (p.216). This means that the CA healthy, well nourished, and educated: expan-
accounts for impacts at a wider community level, sion of health care, education, social security,
without defining geographic or other limitations etc., contributes directly to the quality of life
in the definition of a community. and to its flourishing (Sen, 2001, p. 144). Sen

55
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

has also recognised the role that ICT can play in functionings, using the capabilities approach to
contributing to these basic capabilities. highlight that both the type of infrastructure and
the ability of people to use it should be taken into
Ict4d and the capability Approach account when evaluating impacts of ICT on hu-
man development. This is similar to the concept
In the CA, access to physical ICT infrastructure of effective use, which has been of concern in
would not be a sufficient determinant of how indi- the community informatics approach. Calling
vidual preferences, capabilities and choice would for more resources to be allocated to the devel-
influence the use of and benefits derived from it. opment of applications and support, rather than
Inherent in the CA is a reciprocal relationship just infrastructure, to benefit users in developing
between ICT and capabilities in that individuals countries, Gurstein (2003), defined effective use
require certain capabilities to be able to benefit as the capacity and opportunity to successfully
from ICT, which in turn facilitates the free flow integrate ICTs into the accomplishment of self or
of information: vital to democratic freedom. As collaboratively identified goals.
expressed by Sen (2005), access to the web Other researchers with an interest in the CA
and the freedom of general communication has have gone a few steps further and applied the
become a very important capability that is of inter- framework to specific countries or projects.
est and relevance to all Indians (p.160). Access Alampay (2006b) used the CA for explanatory
to physical infrastructure alone is not sufficient purposes in an investigation of ICT ownership
and the concept of access must be extended to and access in two locations in the Philippines and
include capabilities, (e.g. [computer] literacy), concluded that in order to contribute to human
to actually use the infrastructure. development; those who are marginalised must
Several studies have applied the CA to ICT, or first be made aware of opportunities inherent in
at least referred to a relationship between these new ICTs. In their case study on a community
(Alampay 2006a, 2006b; Barja & Gigler, 2005; health information system, Byrne & Sahay (2007)
Byrne & Sahay, 2007; Garnham, 1999; Gigler, referred to DAF when advocating in favour of a
2004; Madon, 2004; James, 2006; Mansell, 2006; participatory methodology for establishing the
Musa, 2006; Thomas & Parayil, 2008; Walsham informational base for the project and determin-
& Sahay, 2006; Warschauer, 2003, Zheng & ing how the information collected should be used,
Walsham, 2008). taking into account capabilities of community
A common thread in the literature linking the members to actually use the information. Informed
CA and ICT is the attention given to the capabili- by the CA, Barja & Gigler (2005) suggested a
ties of the user to benefit from technology in ways conceptual framework for measuring information
that will achieve the desired functionings. In this poverty in Latin America that recognised the role
context the CA can be useful in actually shaping of ICTs in the advancement of human freedoms.
the design of ICT interventions, taking into ac- They drew attention to the requirement for new
count interests and perspectives of individuals. For capabilities for the exchange of information about
example, rather than treating ICT4D interventions the economy, politics, and society in addition to the
as just infrastructure, Musas (2006) modified ver- need to strengthen the capabilities of the poor with
sion of the technology acceptance model (TAM), respect to ownership and use of economic assets.
refers to the relevance of CA in its focus on the Applying the CA, or functionings approach,
intrinsic value to individuals of such initiatives. as he referred to the CA, James (2006) explored
Garnham (1999) analysed the contribution made the relationship between the Internet and pov-
by communication media to enhancing a range of erty, focussing on what occurs after the point

56
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

of purchase, i.e. the usage, contrasting this to through a participatory approach. In doing so, the
traditional welfare economics, where the focus is significance of having contrasted the CA with the
on the point of purchase. In doing so, he critiqued more traditional development economics lies in
the telecentre model in favour of initiatives that the method of choosing the informational base for
blend the Internet with radio, using the example exploring the impact on individuals and commu-
of Kothmale in Sri Lanka. Several single initia- nities of an ICT4D initiative in India. Consistent
tives have in fact deployed a mix of technologies with the CA, the impact will be assessed in areas
and a range of different methods to reach a wider that are relevant for the population, rather than
audience. Others are planning to do so. using pre-defined indicators. Outcome Mapping
Comparing research results from one village (Earl, Carden, & Smutylo, 2001) and Most Sig-
in Kerala and one in Andra Pradesh, Thomas & nificant Change (Dart & Davies, 2003) are two
Parayil (2008) found better capabilities to use ICTs approaches that, although not making specific
and convert information to useful knowledge in reference to the CA, have adopted participatory
Kerala and attributed this to the more equitable methods in identifying factors that are relevant
socio-economic development in that state. They for evaluative purposes in different contexts.
concluded that access to ICTs does not in itself These methods have influenced the design of
lead to development, but requires social and this research and some aspects of them may be
political intervention to achieve progress in this useful for operationalising the CA in general.
area. These findings are similar to those made by However work on trying to synthesise the CA
Niles & Hanson (2003), in their analysis of the key and these approaches is beyond the scope of this
role played by the social context in the process of chapter, but could be an important research topic
conversion from physical Internet infrastructures in its own right in an endeavour to contribute to
to useful knowledge. Conditions existing prior to operationalising the CA.
the deployment of ICT infrastructure shape both
constraints and capabilities to use this medium.
Despite this reasonable body of work related to cAse study: vIcky stAndIsH
ICT and CA, the literature is nevertheless sparse e-educAtIon centre (vseec)
when it comes to applying the CA to participatory
evaluation of ICT4D initiatives. Unlike writers In this section we present the first phase of re-
who refer to the CA as a way forward for future search conducted at the VSeEC in the form of
research in general terms, but without including a case study. Although this research forms part
reference to in-depth field studies based on this of a three-year longitudinal study of VSeECs
approach, Mansell (2006), suggested that one influence on communities in its coverage area, we
way of ensuring greater participation of the poor have designed the research to enable each phase
in ICT4D initiatives could be an evaluation of to also be analysed and presented on a standalone
priorities in the light of entitlements as outlined basis. The section starts with describing the centre
in DAF (p.903). and the environments within which it operates.
This research accepts the challenge presented We then report on the field research, including
by Mansell. Attempting to fill a knowledge gap methodology and key findings.
in the relationship between ICT and the CA at
the empirical level, the research aims at develop- micro-level
ing a framework that can explore the reciprocal
influences between ICT and capabilities in a The East West Overseas Aid Foundation (TE-
systematic, forward looking longitudinal manner WOAF), an Australian based NGO and its Indian

57
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

partner organisation, The East West Foundation Edaikalinadu, the lowest administrative level for
of India (TEWFI) fund and operate the VSeEC, which census data could be found.
the Uluru Childrens Home (UCH), with which Consistent with the inscription on the inaugura-
it is associated, a health clinic, and other com- tion plaque at the entrance of the VSeEC building:
munity development initiatives in the Alamparai- ..with intent to serve the local community,
Kadapakkam area in the Indian state of Tamil the aim of the centre is to serve as a resource for
Nadu. The funding comes from private dona- the local communities as well as for the children
tions to these organisations. Engineers Without living at UCH. Inaugurated in 2008, the VSeEC
Borders Australia (EWB), was responsible for had been operational for only eight months when
designing and has been instrumental in operating the research reported in this chapter was conducted
the centre. No charges had been applied for use in September/October 2008.
of the VSeEC when the research was conducted. Although no loss of life was suffered when the
Financial sustainability of VSeEC, an issue that fishing villages were affected by the December
has plagued many ICT4D initiatives, is not ad- 2004 tsunami, many homes, fishing boats and other
dressed in this study. VSeEC was established as fishing equipment were damaged or lost. The vil-
a non-profit centre, funded through donations to lages were subsequently relocated further from the
TEWOAF. However, as the centre expands from coastline. As part of tsunami rehabilitation projects
its current nine computers to full capacity of 36 there has been an influx of foreign NGOs. The
(through donation of additional funds to cover economic characteristics of the area are atypical
this cost), the operational expenses, including because of the influence of TEWFIs presence,
staff, maintenance and power, could increase to which has contributed considerably to employ-
such an extent that it may be necessary to pay ment levels. In addition to TEWFIs permanent
greater attention to financial aspects. There was and casual staff, the purchasing power of TEWFI
one full time systems administrator, and one part and its overseas volunteers has boosted employ-
time employee at VSeEC, when the study was ment in the private sector. To the extent possible,
conducted, but this may not be sufficient when TEWFI sources food, for approximately 50 people,
the centre is fully equipped. and other requirements locally. The transport,
The TEWFI complex is located at the Bay primarily in the form of auto-rickshaws (three-
of Bengal backwaters, in a relatively isolated wheelers), and construction sectors have also been
rural coastal community, five km east of the East stimulated by the requirements of TEWFI. Other
Coast Road (ECR), between Chennai (125km) employment opportunities in the area are limited
and Pondicherry (46km). The catchment area of and remittances from family members working
TEWFIs activities is defined as having a radius of elsewhere represent another income source. There
approximately five km. Seven villages are located is limited scope for higher paid employment in
within this distance, three of which are defined the area, which however has some potential for
as fishing villages and the others as farming vil- tourism (Lummen & Ruiter, 2008).
lages. The main village of Kadapakkam, on the There are several castes in the area, but in
ECR and the market one km inland are included to order avoid bringing up an issue that could
within this radius. Administratively, the area is potentially be divisive, the issue of caste was not
in the Edaikalinadu Panchayat, Cheyyur Taluk, addressed during the focus groups. Caste is not
Kancheepuram district. There are also informal relevant to the activities of TEWFI. The govern-
leadership structures within the villages. The ments affirmative action policies for scheduled
2001 census showed a population of 25,793 in castes and tribes have contributed to overcoming
some of the disadvantages that previously plagued

58
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

their lives. TEWFI has also been open to employ- study, India with its central government consti-
ing persons of all caste backgrounds and especially tutes the macro-environment. This is where the
those from disadvantaged communities. telecommunications policy is formulated and
A key obstacle confronting VSeEC has been administered. With almost 70 million citizens, the
the lack of broadband connectivity throughout state of Tamil Nadu can sometimes be too remote
the area and Internet was not available when from a village to be considered as a meso-level.
the research was conducted. Access via dial-up The boundary between the macro and meso-levels
was not an option, as the location of the centre is therefore somewhat blurred in this analysis.
was serviced with narrowband wireless local On paper, India has a regulatory framework,
loop lacking data capability. Some of the mobile including a Universal Service Obligation (USO)
operators had limited data coverage (GPRS and Fund which, through a levy of 5% on gross
CDMA) of questionable quality and high prices. revenue on licensed carriers, is intended to sup-
This wireless connectivity was primarily used for port broadband connectivity and a progressive
administrative purposes and had, on occasions transformation of village public telephones into
provided villagers with information, e.g. for ex- ICT community centres (Thomas, 2007). Sev-
amination results. The local telephone exchange eral reasons have been suggested for the lack
in Kadapakkam, despite being located along a of progress in implementation of these policies.
main road and serving a reasonable population According to Rao (2008) various operational,
size, had not been equipped with DSL at the time procedural, legal and regulatory issues have im-
of the study. While regional telecommunications peded progress, whereas Thomas (2007) argued
infrastructure initiatives and the introduction of that consideration of access as a basic right is
competition into the market may have improved no longer a public policy priority. These reasons
network access in some rural regions of India, this describe what has happened, without advancing
area was still under-served and lacking reasonable any explanations as to why the ICT infrastructure
broadband infrastructure. And this despite the momentum has abated. For example, it would be
fact that the normal reasons for lack of adequate useful to know whether the central government
infrastructure in rural areas, viz mountainous re-evaluated the policies in light of any research
topography and/or thinly distributed population, findings and whether it consulted with meso- and
do not apply for the Alamparai-Kadapakkam area. micro-level authorities and mediating organisa-
There were no public Internet facilities in the area. tions on the usefulness of ICT projects for rural
A Drishtee outlet in Kadapakkam (at ECR), where development. If so, what was the reaction? A key
services, including computer courses and access objective of undertaking research of the nature
to computers for typing and other functions were covered in this chapter is to provide authorities
available on a commercial basis, did not have with a relevant informational base for deciding
Internet access either. between competing interests and to provide the
From a CA perspective, the absence of broad- public with evidence that is useful for influencing
band infrastructure is an illustration of a barrier government policies.
inhibiting both the development of capabilities and In the meantime, for whatever reason(s) and
the conversion of capabilities into functionings. despite the governments promising framework,
villagers have been deprived of a tool they could
meso- and macro-level have used to obtain capabilities for facilitating
implementation of changes they want to be able
There are rarely clear boundaries between macro- to effect in their communities.
and meso-environments. For the purpose of this

59
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

The macro-level also has an important role While the e-readiness and e-usage indices both
in the provision of e-government services and to increased, the environment index fell from 0.97
that end the Indian government and many of the to 0.69. This index reflects infrastructure and
state governments have developed many innova- associated regulatory and market environments
tive e-government applications. At the central (DIT & NCAER, 2006).
government level, the portal (http://india.gov.in/) The meso-level also includes non-government
provides access to a range of services, including organisations, many of which can and have
the Right to Information Act, 2005, referred to played a very important role for the diffusion
in some of the focus groups as potentially being of ICT, particularly as infomediaries (Ramirez,
of great significance in their dealings with the 2001; Ramirez & Richardson, 2005). The VSeEC
government. already had a working relationship with some
Despite the resources devoted to these many mediating organisatons; it was using Aid Indias
initiatives, the Indian e-readiness index, according lesson plan material for training and was making
to the 2008 UN e-government study (UN, 2008) extensive use of primary school education mate-
declined from 0.4001 in 2005 to 0.3814 in 2008. rial produced by the Azim Premji Foundation.
This resulted in India dropping from 87th place Partnerships also extended to local institutions.
in 2005 to 113th out of 192 countries in 2008. One computer had been made available to one of
The UN study (UN, 2008) noted the paradox that, the primary schools in the area. An environmental
whereas India has witnessed significant growth studies teacher employed by the NGO Pitchandi-
of ICT use in urban centres, this has not been the kulam Forest/Bio Resource Centre used another
case in rural locations, despite the initial view that VSeEC computer in his work at the government
e-government would be a means of overcoming secondary school in the area. India in general, and
distance. The study hypothesised that the lack of the state of Tamil Nadu in particular have a long
progress was, to a large extent, due to underesti- tradition of involvement by innovative mediating
mation of the infrastructure challenges. organisations in the provision of ICT services to
There also appeared to be an absence of insti- rural areas. Tamil Nadu is home to several pio-
tutions at the meso-level that could influence the neering organisations, well known in the ICT4D
government to ensure that such infrastructure be community, including the Telecommunications
provided. One official path for villagers to ap- and Computer Networks (TeNeT) Group at the
proach the government is via the panchayat ward Indian Institute of Technology, Madras (Chennai)
councilor, who can raise issues with the panchayat. and MSSRF. At the time of the study the VSeEC
We understand that this had not occurred, so there was actively seeking co-operation with these and
is scope for more action by elected representatives other organisations.
at the meso-level. The situation in the Kadapakkam-Alamparai
Despite having embraced the development region fits with the general trend in many devel-
of the IT sector from an early stage with a com- oping countries in Asia, where limited connec-
prehensive IT policy and the implementation of tivity in rural areas has tempered improvements
several initiatives (Mitra, 2000), Tamil Nadu in broadband penetration at the national level.
seems to be losing its foothold at the top of the WSIS (2008) attributed this to inadequate and
Indian e-readiness index league table. Although restrictive policy environments, lack of focus
still ranked among the eight e-readiness leaders in on technological R&D innovations, and limited
the 2006 survey, Tamil Nadus position dropped understanding of the effects of ICTs on communi-
from 2nd to 7th place between 2005 and 2006. ties (p.7). The research described in this chapter
Its composite index declined from 0.99 to 0.82.

60
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

has been conducted in an endeavour to improve been planned, but due to practical difficulties this
this understanding. did not take place. Three teachers participated in
the focus group with leaders from farming villages.
research design As this was an exploratory study without any
claims of being representative, there was no at-
Before describing the research methodology, tempt to use probabilistic sampling for the invi-
we first elaborate on what we mean with the tations to participate in focus groups. Invitations
term participatory, which is used to define one were instead to a large extent based on existing
dimension of the evaluation framework. Parfitt contacts and some snowballing. No information
(2004) differentiated between participation as a on socio-economic, caste or any other status
means and participation as an end. The former, (except for the village leaders) of the participants
unlike the latter, is politically neutral in that it does was obtained.
not deal with any power relationships. It simply The seven focus group sessions were conducted
invites participants to present their views about over a period of 20 days in September-October
what is important to them and may, by doing so in 2008. The intention was to conduct additional
a group situation, be able to draw on the strength focus groups, but for practical reasons that was
of others. This is participatory in contrast to the not possible during this wave of research. The
utilitarian approach, which would typically not seven focus groups are considered sufficient for
involve participants in defining the scope of the a meaningful, albeit limited analysis.
research. However this type of participation does As the lead researcher did not speak Tamil,
not occupy the top rungs of Arnsteins (1969) the local language, the research was somewhat
ladder of citizen participation, where Arnstein complicated by the need for interpretation, which
placed partnership, delegated power, and citizen was undertaken by a social worker employed at
control. Although the methodology used in the TEWFIs health clinic and the systems adminis-
field research was not designed to transfer any trator at VSeEC. They were also responsible for
power, there was also no cynical intent behind the recruiting participants.
participation, as in the middle rungtokenismof It is reasonable to question the objectivity,
Arnsteins ladder (informing, consultation, and representativity, and reliability of the information
placation). Whereas the objective of the research provided by participants, when considering that
was learning and understanding, the participatory the sessions took place in the presence of staff,
research process could well have contributed to with what could be perceived as vested interests
empowerment, although this was not defined as in the outcomes of the research. Their presence
an objective for the research. could have influenced participants to express
Falling within the definition of the interpretivist views considered favourable to them and to avoid
or naturalistic paradigm, the research methodology critical comments. There was also a risk of bias
adopted for this study was of a qualitative nature, arising from the lead researchers reliance on in-
with focus groups, each consisting of participants terpretation by staff members and that the views
from specific stakeholder groups: leaders from could reflect what the participants expected the
fishing and farming villages, parents from fishing researcher wanted to hear. Despite these potential
and farming villages, a womens self help group biases, some of the responses were critical of the
including members from fishing and farming existing arrangements associated with the VSeEC,
communities, a youth group and employees of an e.g. participants in two groups expressed the view
NGO. A separate focus group with teachers had that the VSeEC needed publicity to attract more

61
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

users and the remoteness of the centre in relation were organised around first identifying strengths
to where people live was raised in three groups. in the communities. This was followed by asking
These views indicate that participants were not participants to refer to recent improvements and
afraid to voice any criticism. In any case, this was consider contributing factors to these improve-
not an evaluation of the performance of staff, so ments. This questioning aimed at exploring the
whatever bias there may have been is not con- role of the VSeEC in any improvements. We
sidered to have seriously influenced the results. then asked participants whether there were any
It was also in the interest of staff for VSeEC to changes and/or enhancements they would like
provide services that are useful for the intended to see in their communities, how they would go
target groups and that maximum use is made of about implementing these changes and the role
the centre. VSeEC could play for this purpose. With those
There were also some benefits associated with questions we intended to capture the essence of
the role of staff members as interpreters in this capabilities and functionings they would value
study. As they had not previously been exposed to and the role VSeEC could play in contributing to
this type of research, the study provided capacity their achievements. The framework thus encour-
building opportunities for them, particularly in aged participants to identify their own solutions to
the form of learning the importance of listening development and to think about ICT as a potential
to perceptions of community members about tool. In concluding, participants were invited to
services provided by them. Their presence also provide general comments, views, and suggestions
enabled the focus group sessions to take on the about the VSeEC.
form of exchange of information and impressions Cognisant of the difficulties and dangers asso-
as well as research, as they were able to respond ciated with attribution, the focus of the inquiry was
to questions from participants. This would not on contribution, rather than attribution (Ramirez,
have been possible by an interpreter without 2007) of ICT to communities. Any outcome is
knowledge about VSeEC. Such exchanges are likely to be attributable to several factors, some of
consistent with a naturalistic form of inquiry which are within and others beyond the control of
(Guba & Lincoln, 1981). VSeECs management, e.g. government policies.
In some cases, the views expressed by par- The study revealed an insight among villagers
ticipants were simply noted and in others some that there are multiple sources of attribution to
probing was applied for the purpose of clarifica- different outcomes, including education.
tion and verification when bias was suspected. Consistent with the CAs views on the informa-
For example, when the fishing village parent tional base for evaluating outcomes and impacts,
group suggested longer opening hours and more participants were encouraged to suggest possible
computers, we probed why this was necessary, as indicators that would be useful in measuring the
VSeEC was not always fully occupied. extent to which the suggested changes have been
The research centred on the perception of achieved. Participant involvement in defining
participants with respect to whether the VSeEC community based indicators is not limited to the
had played a role in any improvements in the CA. One illustration of where this has been done
community and whether they could see a role in the context of ICT is the KNET (2001) project
for it in changes they would like to see, or aspi- in indigenous communities in Canada.
rations they had for their communities. Using a As the information sought was related to per-
strength-based approach, the structure of the ques- ceptions of the groups, rather than facts, triangula-
tion framework and conduct of the focus groups tion using other methods for obtaining data was

62
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Table 1. Key findings from the first phase of research at the VSeEC

Leaders Parents
NGO
Major strengths/assets in the community Fishing Farming* Fishing Farming group Women Youth
Unity
Farming
Fishing
Education
Recent improvements
Education
Tsunami relief programmes, particularly
womens empowerment
Factors contributing to improvements
Standard of education
Government policies relating to education
Greater interest in and thirst for education
Other TEWFI activities (incl UCH and activi-
ties related to education)
Tsunami relief programmes, particularly
womens empowerment
Priority areas for further improvements
Improved education, particularly in English
More employment opportunities
Local vocational school and other higher
education institutions
Sports and entertainment facilities
New industries in the area
24 hour health service (Multi-specialty hos-
pital with pathology, etc)
Maternity care
Possible indicators for measuring impact of VSeEC and other changes
Changes in employment levels and type of
employment
Education in general
* This group included three primary school teachers

not undertaken. However, the conduct of several key Findings


focus groups could be considered as some form
of triangulation, as it enabled views to emerge This section summarises the general direction
from different contexts. The results were verified of responses during the focus group sessions.
by participants at a meeting called to discuss the Where any of the groups did not include the is-
outcomes of the research. sues included in this section, neither did these

63
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

groups express views that contradicted any of for employment in the formal sector, through
these findings. investment in education.
Table 1 captures themes that arose in at least Education was a recurring and dominant theme
two different focus groups. There are some appar- throughout the sessions, whether in the context of
ent holes in the table, e.g. farmers did not mention identifying strengths or expressing priorities for
farming as a major strength. This does not mean improvements and the role of the VSeEC in this.
that they would disagree with farming being a There was general agreement that the VSeEC
major strength, only that they did not raise it. As has boosted the prospects for good education
shown in Table 1, to be educated emerged as far outcomes for children. Education also appeared
the most important capability, both in terms of to serve functions other than being a ticket for
defining strengths, identifying recent improve- better employment opportunities. It is also a tool
ments in the community and as an area where for empowerment, as illustrated by a description
further improvement is required. in one of the sessions of how community members
felt stigmatised and embarrassed when having to
The Importance of Education rely on others to complete forms and accompany
them to visit government authorities due to their
A striking feature of most focus group discussions low or non-existent literacy skills. This is reminis-
was the enthusiasm about the use of computers cent of the concept of being ashamed to appear in
by children at the centre and the words expressed public, used by Sen (1985b) to define one aspect
in one of the sessions that the VSeEC is the Gift of deprivation. Another example of deprivation
of God reflected a widespread perception. The was the reliance on interpreters when dealing
childrens ability to use computers had strength- with English speaking NGO representatives in
ened their, and thereby their parents confidence the aftermath of the tsunami. In addition to the
and self-esteem. material nature of this deprivation in the form of
It did not matter for the participants, all of suspicions that they may not have received their
whom were over the age of 18, that they did not full entitlements, there was a sense of powerless-
fully understand what their and other children ness in not understanding discussions about their
were doing at the VSeEC. There was trust that lives and livelihoods.
the activities were useful and an understanding The empowering features of education for
that the children used programmes with cartoons normal village life implied in these examples
(Azim Premji software) to learn different subjects. could be one reason for the high importance at-
A prevailing perception was that the new ca- tached to informal as well as formal education,
pability acquired by children to master computers where the former refers to acquiring specific
was valued as a capability for empowerment, and skills outside the formal education system and
not only because of any immediate increase in the latter to education within the formal system.
prosperity that would result from this new skill. Participants nevertheless considered certificates
This does not preclude that the greater confidence to be of significant value, whether or not these are
can later expand to economic aspects, (e.g. by issued by accredited institutions. They represent
improving their ability to find employment or a sense of achievement. The VSeEC thus has an
start their own businesses). The capability of find- important role to play in facilitating supported
ing work outside the farming and fishing sectors and self-directed learning about topics that are
was mentioned as a high priority. Participants of relevance for community members. High on
recognised the importance of narrowing the gap the list of priorities were computer and English
between current skill levels and the requirements language skills and there was a widespread per-

64
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

ception that the use of computers was helping the topic dealing with strengths and assets. Hav-
the children with their English skills, (e.g. by ing expected something more directly related to
getting used to the alphabet and a few English livelihoods, unity came as a surprise. It was
words on keyboards). The importance attached particularly astonishing against the background
to these skills is consistent with the CESVSF, as of what appeared to be common knowledge of
these capabilities are fundamental to being able instances of disunity. There were considerable
to exploit the full potential of ICT. tensions within at least one of the villages, between
some of the fishing villages, and between the
Diversifying Livelihoods fishing and farming communities. Participants in
the youth group explained that they refer to com-
Despite the inherent value of education, the capa- munity members helping each other as unity and
bilities of being educated and employable were illustrated this with how members of their group
nevertheless so intertwined in the minds of the were funding tertiary education for one of their
participants that it is difficult to refer to these in members who suffers from physical disabilities.
separate sub-sections of this paper. Participants in Hidden behind the term unity could also be a
several groups, particularly from fishing villages, wish to portray the community as being united,
were adamant that they wanted their children to a valued capability that could relate to previous
find employment in other sectors. Education was dealings with government authorities and NGOs.
considered a pre-requisite for reasonable employ- It is understood that villagers were told that they
ment conditions, particularly better English lan- must speak with one voice in order to obtain
guage and computer skills. The level of English certain benefits for their communities.
language skills was quite low in the area. The ability to unite, form and join groups is
The wish for a local vocational school and another essential capability, which in turn can also
other higher educational institutions were sug- be a source of empowerment and a manifestation
gested in the context of education for livelihood of the meso-level. There are many inspiring case
diversification. Several participants considered studies of what can be achieved through groups,
this particularly important for young women, many rather than by individuals acting alone, in terms
of whom, due to cultural and financial barriers, of building sustainable livelihoods. However, ac-
do not continue their education after completing cording to Stewart (2005), disadvantaged persons
high school in the local area. They commented that often lack assets such as networks and human
women just sit at home, waiting to get married, capital required to form groups. In an endeavour
but marriage often does not solve their livelihood to overcome this disadvantage, the Indian govern-
situation. There were several cases of women ment has facilitated the establishment of womens
having been abandoned by their husbands after self-help groups.
giving birth. The extent to which the capability of forming
The VSeEC, in partnership with accredited groups (particularly at the regional level where
vocational education providers, could play an im- they could add strength to individual commu-
portant role in developing capabilities that would nities) can be facilitated by ICTs could not be
enable both genders to diversify their livelihoods. tested. Whereas ICT in education can be useful
to a limited extent without any communications
The Illusion of and Search for Unity capability, this is not the case when considering
ICT as a tool for establishing groups. Without
One unexpected finding was the frequent refer- Internet access, it was not possible to explore
ence to unity and co-operation, in response to whether the VSeEC could be useful in extending

65
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

the geographic coverage of groups, e.g. to facilitate e-government portal and the Rights to Informa-
communication between the different villages in tion Act, both of which enable citizens to deal
the area and between the different panchayats in directly with more senior government officials via
the taluk, etc. This will be explored in further detail e-mail, and access information about government
in the next research phase, when it is expected grants and subsidies. There was a perception that
that the VSeEC will be equipped with Internet community members missed many opportunities
access. But Internet access in itself is unlikely to for funding due to ignorance of available grants.
be sufficient, particularly with the low level of Interestingly, while aware of the possibilities
literacy and inexperience with this medium. In arising from access to the Internet, the knowledge
order to maximise the benefits of the Internet, its about what is available through this medium did
introduction will be accompanied with involve- not translate directly into an eagerness to learn
ment by infomediaries (mediating individuals and to use the computers themselves. Many of the
organisations) that can overcome barriers of low participants seemed to be satisfied with using their
levels of literacy and skills to facilitate effective children as intermediaries between themselves and
use of the Internet in a way that can improve information. This may well change when Internet
livelihoods of the communities. The importance becomes available at the centre and adults can
of infomediaries has emerged as a key success experience its power, without intermediaries. Such
factor for ICT4D initiatives (Duncombe, 2006; access could become a catalyst for wider interest
Fillip & Foot, 2007; Ramirez, 2001; Ramirez in using the Internet, although this would require a
& Richardson, 2005; Schilderman, 2002; War- certain level of keyboard literacy, which, with its
ren, 2007). MSSRFs use of village knowledge 247 characters, is not easily attainable in Tamil.
workers, with access to facilities provided by the Other options, including English and Hindi were
village resource centres, is one example of how not viable alternatives, as skill levels in these
infomediaries can synthesise information from languages were very low.
different sources and facilitate contacts between There is a role for staff at VSeEC to act as
villagers and the outside world. intermediaries for those who cannot rely on family
members or acquaintances to access information.
Dealing with the Government
Indicators
None of the groups presented positive views
about dealing with government authorities. The The question about what indicators to use when
reluctance to deal with these was reflected in reac- measuring progress in achieving desired changes,
tions when asked how participants would achieve gave some credence to the CAs critique of the
desired changes. The most common response emphasis on growth and GDP by utilitarian and
was to approach NGOs. However, in considering welfarist approaches to development. Most par-
whether and how the VSeEC would be useful in ticipants focused on indicators for education and
achieving changes, many participants appeared employment. Against this, it can be argued that
keen on using the Internet for contacting the although the importance attached to indicators on
government or obtaining information on different employment levels and types was not explicitly
government (funding) schemes. For someone who linked to income, such linkage could nevertheless
has had limited, if any, exposure to the Internet, have been implied, at least to some extent. It is
many displayed surprisingly high awareness of interesting to note though that income was raised
the Internets potential in dealing with government by participants in one group only and material
authorities. This included knowledge about the items arose only in the youth group.

66
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Similarly, education was not explicitly linked ing services that are ultimately the responsibility
to employment and thereby income. In the minds of the government.
of the participants, there could have been flow-on By more actively co-operating with initiatives
effects from education to income via employ- such as the VSeEC, meso-level institutions could
ment. But when explaining why education was become major resources for their communities,
so important to them, it was clear that it had an amplifying the contributions made by NGOs,
intrinsic value associated with empowerment. without necessarily incurring expenses. The type
Simply knowing the type of indicators the of research presented in this chapter could provide
participants would find useful to measure is not input into negotiations with authorities that have
enough. As government agencies do not collect this power and resources to address the inadequate
type of statistics, the challenge is now to develop infrastructure situation.
the informational base to enable this analysis to be The results also suggest that the many indica-
undertaken. One option being considered for this tors developed at a global level to measure the
is to involve the local school community in this information society and which show levels of
activity as part of the curriculum for high school uptake and activity based on countable items,
students, possibly in conjunction with tertiary such as uptake of computers, Internet and mobile
institutions in Tamil Nadu. services, are not sufficient in themselves. They do
not necessarily reflect what is important for the
Policy Implications population. Governments and international or-
ganisations involved in developing and measuring
The main policy implication to emerge from the ICT related indicators should therefore pay more
meso- and macro-level perspectives is that an attention to factors associated with effective use
ICT initiative such as VSeEC requires a sup- and contribution to improved livelihoods.
portive regulatory environment that can deliver
adequate infrastructure to the area. The lack of
broadband infrastructure has made it difficult for Future trends And reseArcH
VSeEC to operate as intended. While the absence
of infrastructure is a reflection of the telecommu- Although the research conducted so far has
nications policy and its administration, a central provided important insights into the dynamics
government responsibility, the different formal surrounding the application of the CESVSF to an
meso-level institutions also have a role to play, ICT4D initiative, it would be necessary to under-
(e.g. by influencing the government). There was take similar studies in other areas in order to assess
no evidence of elected representatives in the area whether this framework is a useful contribution
doing this, so another policy implication is the to understanding how ICT can contribute to capa-
importance of collaboration between the micro- bilities, empowerment and sustainability. A more
and meso-levels in representing the interests of extensive test of the framework would also include
villagers. Inadequate representation also mani- other types of ICT4D initiatives to compare the
fested itself in the lack of trust in governments, results, including mobile based initiatives. There
indicated by participants when suggesting they has been a shift in focus on ICT4D from shared
would turn to NGOs, rather than a government access facilities to mobiles, as these have become
authority for support in realising aspirations for increasingly ubiquitous and affordable, over the
their communities. An NGO is limited in what past few years (Howard, 2008; McNamara 2008;
it can achieve in an environment without active Sey & Fellows, 2009). This may influence meth-
government involvement, particularly in provid- ods of incorporating ICT into rural livelihoods

67
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

programmes. Comparisons of CESVSF results efforts relating to livelihoods solely on economic


between public access centres and individually indicators, data collection should be channeled
owned mobile services would provide an important towards developing an informational base that
input into policy reviews dealing with what type incorporate indicators that participants consider
of ICT facilities to be encouraged and supported important for leading lives they have reason to
in the future to achieve development objectives. value. Collection of such statistics need not be
expensive, as they could be conducted by com-
munity members themselves with some support on
conclusIon methodological aspects from the government and
other entities, (e.g. tertiary education institutions).
With reference to the CESVSF, this research has This VSeEC case study has confirmed the limit
positioned the VSeEC situation at the time of to what local communities can achieve without
the research at the starting line of the spiral. The supportive meso- and macro-level environments.
VSeEC was building skills that will be useful in The lack of Internet access had, at least until the
mastering the next stage of deployment, which still time when the research was conducted, deprived
awaited broadband Internet access. Participants in communities of their entitlement to an important
the focus groups demonstrated an understanding source of knowledge and a communication tool,
of the potential empowering qualities inherent preconditions for being propelled along the CES
in these skills. virtuous spiral.
The importance attached to education and The study supports the value of a longitudinal
employment provided empirical evidence to sup- perspective when trying to understand the impact
port the validity of the CA, as a framework for of an ICT initiative on communities. For this
understanding what is important to villagers. It is evaluation to have followed the common approach,
not just a theoretical framework, but an approach which is to study the impact a short time after
that is consistent with the ways participants were project completion, defined as installation of
thinking about their and their childrens lives. infrastructure, would have given a distorted view
While there were implied links between of the impact of VSeEC, as it will take some time
education-employment-income, education also for the community to understand and realise the
emerged as having intrinsic value to participants. potential of this facility. A report prepared to TE-
The intrinsic value was associated with dignity WOAF, TEWFI and EWB on this initial research
and empowerment, attributes that would enable has already encouraged some new initiatives.
individuals to effectively shape their own destiny Had the study been undertaken at the end of
and help each other [and] need not be seen as pas- the project period, usually defined as the expiry
sive recipients of the benefits of cunning develop- of the funding period, it could have been too late
ment programs (Sen 2001, p.11). Such attributes, to use the constructive input from participants.
important as they are for human development, The field research methodology, in the form of
are ignored in utilitarian and welfare economics, focus groups, was also found to be useful; both in
which tend to limit its focus to variables such as providing insights that are unlikely to have sur-
income and growth. faced in structured survey forms, and in actively
In this case, at this time, great importance was contributing to greater awareness and promotion
attached to measuring employment and education, of the VSeEC among its constituency.
but other factors may emerge in other places or in The next phases of the research at the VSeEC
the next phase of the VSeEC study. These results and other ICT4D initiatives are designed to popu-
indicate that, rather than focusing informational late the CESVSF with more empirical evidence

68
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

to gain a better understanding of the reciprocal Anand, P. B. (2007). Capability, sustainability,


relationships between ICT and capabilities. and collective action: an examination of a river
water dispute . Journal of Human Development,
8(1), 109132. doi:10.1080/14649880601101465
Acknowledgment
Andrew, T. N., & Petkov, D. (2003). The need for
a systems thinking approach to the planning of
Numerous people have contributed to the research
rural telecommunications infrastructure. Telecom-
presented in this chapter. Many thanks go to the
munications Policy, 27(1-2), 7593. doi:10.1016/
trustees, foundation members and the many staff
S0308-5961(02)00095-2
members and volunteers at TEWOAF, TEWFI and
EWB, as well as the many community members Anyaegbunam, C., Mefalopulos, P., & Moetsabi,
who, in their different ways enabled this study to T. (1999). Participatory rural communication
be conducted. We wish to express special appre- appraisal (PRCA) methodology, the first mile
ciation to Dr Natteri V. Chandran, Founder and of connectivity. Rome: FAO. Retrieved May
Chair, Board of Trustees of TEWOAF and TEWFI 29, 2006, from http://www.fao.org/sd/CDdirect/
for facilitating this research and for his support. CDan0024.htm
The contributions by Professor John Houghton
Arnstein, S. R. (1969). A ladder of citizen par-
for his helpful input to the formulation of the
ticipation. Journal of the American Planning As-
conceptual framework and by Adjunct Professor
sociation. American Planning Association, 35(4),
Ricardo Ramirez for his many inputs, insightful
216224. doi:10.1080/01944366908977225
comments and suggestions on an earlier draft are
also gratefully acknowledged. Barja, G., & Gigler, B.-S. (2005). The concept
of information poverty and how to measure it in
the Latin American context . In Galperin, H., &
reFerences Mariscal, J. (Eds.), Digital poverty: perspectives
from Latin America and the Caribbean. Ottawa:
Alampay, E. A. (2006a). Beyond access to ICTs: IDRC.
measuring capabilities in the information society.
International Journal of Education and Develop- Batchelor, S., & Norrish, P. (2004). Framework for
ment Using Information and Communications the assessment of ICT pilot projects: beyond moni-
Technology, 2(3), 422. toring and evaluation to applied research. Wash-
ington, DC: InfoDev. Retrieved July 21, 2006,
Alampay, E. A. (2006b). The capability approach from http://infodev.org/en/Publication.4.html.
and access to information and communications
technologies . In Minogue, M., & Cario, L. (Eds.), Batchelor, S., & Sugden, S. (2003). An analysis
Regulatory governance in developing countries of InfoDev case studies: lessons learned. Wash-
(pp. 183205). Cheltenham, UK: Edward Elgar. ington, DC: InfoDev. Retrieved May 26, 2006,
from http://www.sustainableicts.org/infodev/
Alkire, S. (2005). Why the capability approach? infodevreport.pdf
Journal of Human Development, 6(1), 115133.
doi:10.1080/146498805200034275 Bebbington, A. (2004). Social capital and de-
velopment studies 1: critique, debate, progress?
Progress in Development Studies, 4(4), 343349.
doi:10.1191/1464993404ps094pr

69
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Biggeri, M., Libanora, R., Mariani, S., & Earl, S., Carden, F., & Smutylo, T. (2001). Outcome
Menchini, L. (2006). Children conceptualizing mapping: building learning and reflection into
their capabilities: results of a survey conducted development programs. Ottawa, Canada: IDRC.
during the first Childrens World Congress on
Evans, J., & Ninole, M. (2004). Minding the
Child Labour. Journal of Human Development,
information gap in Papua New Guinea: a view
7(1), 5983. doi:10.1080/14649880500501179
from Wewak. In R.F. Garcia, R.F. (Ed.), Divide
Byrne, E., & Sahay, S. (2007). Participatory design and connect: perils and potentials of information
for social development: a South African case study and communication technology in Asia and the
on community-based health information systems. Pacific. (pp. 49-60). Mumbai: Asian South Pacific,
Information Technology for Development, 13(1), Bureau of Adult Education (ASPBAE).
7194. doi:10.1002/itdj.20052
Falch, M., & Anyimadub, A. (2003). Tele-centres
Comin, F. (2001 June). Operationalising Sens as a way of achieving universal access: the case
capability approach. Paper prepared for the of Ghana. Telecommunications Policy, 27(1-2),
conference Justice and Poverty, examining Sens 2139. doi:10.1016/S0308-5961(02)00092-7
capability approach, Cambridge, UK. Retrieved
Fillip, B., & Foote, D. (2007). Making the con-
August 20, 2006 from http://www.st-edmunds.
nection: scaling telecenters for development.
cam.ac.uk/vhi/sen/papers/comim.pdf.
Washington, DC: Information Technology Ap-
Corbridge, S. (2002). Development as free- plications Center of the Academy for Education
dom: the spaces of Amartya Sen. Prog- Development. Retrived July 10, 2008, from http://
ress in Development Studies, 2(3), 183217. connection.aed.org/pages/MakingConnections.
doi:10.1191/1464993402ps037ra pdf
Corea, S. (2007). Promoting development Forestier, E., Grace, J., & Kenny, C. (2002). Can
through information technology innovation: The information and communication technologies be
IT artifact, artfulness, and articulation. Informa- pro-poor? Telecommunications Policy, 26(11),
tion Technology for Development, 13(1), 4969. 623646. doi:10.1016/S0308-5961(02)00061-7
doi:10.1002/itdj.20036
Gagliardone, I. (2005). Virtual enclaves or global
Dart, J., & Davies, R. (2003). A dialogical, story- networks? The Role of information and communi-
based evaluation tool: the most significant change cation technologies in development cooperation.
technique. The American Journal of Evaluation, PsychNology Journal, 3(3), 228242.
24(2), 137155.
Garnham, N. (1999). Amartya Sens capabili-
DIT & NCAER (Department of Information Tech- ties approach to the evaluation of welfare: its
nology & National Council of Applied Economic application to communications . In Calabrese,
Research). (2006). India: e-readiness assessment A., & Burgelman, J.-C. (Eds.), Communication,
report 2006 - for States/Union Territories. citizenship and social policy: rethinking the limits
of the welfare state (pp. 281302). Oxford, UK:
Duncombe, R. (2006). Using the livelihoods
Rowan and Littlefield.
framework to analyse ICT applications for poverty
reduction through microenterprise. Information
Technologies and International Development,
3(3), 81100. doi:10.1162/itid.2007.3.3.81

70
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Gasper, D. (1997). Sens capability approach Harris, R., & Rajora, R. (2006). Empowering the
and Nussbaums capabilities ethics. Journal of poor. Information and communications technology
International Development, 9(2). doi:10.1002/ for governance and poverty reduction: a study of
(SICI)1099-1328(199703)9:2<281::AID- rural development projects in India. UNDP Asia-
JID438>3.0.CO;2-K Pacific Development Information Programme.
Gasper, D. (2002). Is Sens capability approach Harris, R. W. (2001). A place of hope, connecting
an adequate basis for considering human devel- people and organisations for rural development,
opment? Review of Political Economy, 14(4), through multipurpose community telecentres
435461. doi:10.1080/0953825022000009898 (MCTs) in selected Philippine Barangays; a
learning evaluation. Report for International
Gaved, M., & Anderson, B. (2006). The impact
Development Research Centre (IDRC), Ottawa.
of local ICT initiatives on social capital and
Retrieved October 5, 2006, from http://www.
quality of life. Chimera Working Paper 2006-6,
idrc.ca/IMAGES/ICT4D/PanAsia/HarrisPhilip-
University of Essex, Colchester, UK. Retrieved
pineReport.pdf
October 30, 2006, from http://www.essex.ac.uk/
chimera/content/pubs/wps/CWP-2006-06-Local- Heeks, R. (2006). Theorizing ICT4D research.
ICT-Social-Capital.pdf Information Technologies and International De-
velopment, 3(3), 14. doi:10.1162/itid.2007.3.3.1
Gigler, B.-S. (2004 September). Including the
excluded can ICTs empower poor communities? Howard, I. (2008). Unbounded possibilities: ob-
Towards an alternative evaluation framework servations on sustaining rural information and
based on the capability approach. Paper for the communication technology (ICT) in Africa. Re-
4th International Conference on the capability ap- trieved on October 29, 2008, from http://www.apc.
proach, University of Pavia, Pavia. Retrieved May org/en/system/files/SustainingRuralICTs_0.pdf
26, 2006, from http://www.its.caltech.edu/~e105/
Hudson, H. E. (2006). From rural village to global
readings/ICT-poor.pdf
village: telecommunications for development in
Grunfeld, H. (2007). Framework for evaluating the information age. Mahwah, NJ: Lawrence
contributions of ICT to capabilities, empowerment Erlbaum Associates.
and sustainability in disadvantaged communities.
Jain, R., & Raghuram, G. (2005). Study on ac-
Paper presented at the CPRSouth2 (Communica-
celerated provisions of rural telecommunication
tion Policy Research) Conference, Empower-
services (ARTS). Ahmedabad, India: Indian In-
ing rural communities through ICT policy and
stitute of Management. Retrieved December 22,
research, Chennai, India, 15-17 December.
2006, from http://www.iimahd.ernet.in/ctps/pdf/
Guba, E. G., & Lincoln, Y. S. (1981). Effective Final%20Report%20Edited.pdf
Evaluation. San Francisco: Jossey-Bass.
James, J. (2006). The Internet and poverty in
Gurstein, M. (2003). Effective use: a community developing countries: welfare economics versus
informatics strategy beyond the digital divide. a functionings-based approach. Futures, 38(3),
First Monday, 8(12). 337349. doi:10.1016/j.futures.2005.07.005
Jhunjhunwala, A., Ramachandran, A., & Bandyo-
padhyay, A. (2004). n-Logue: the story of a rural
service provider in India. Journal of Community
Informatics, 1(1), 3038.

71
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

KNET (Keewaywin Local Government and Mitra, R. (2000). Emerging state-level ICT devel-
Economic Day). (2001). Retrieved on November opment strategies . In Bhatnagar, S., & Schware,
15, 2008 from http://smart.knet.ca/keewaywin/ R. (Eds.), Information and communication tech-
governance.html nology in development (pp. 195205). New Delhi:
Sage Publications.
Kumar, R., & Best, M. (2006). Social impact
and diffusion of telecenter use: a study from the Musa, P. F. (2006). Making a case for modifying
sustainable access in rural India project. Journal the technology acceptance model to account for
of Community Informatics, 2(3). limited accessibility in developing countries.
Information Technology for Development, 12(3),
Lummen, M., & Ruiter, E. (2008). Product re-
213224. doi:10.1002/itdj.20043
port: Edaikazhinadu project. Dissertation, Saxion
University of Applied Sciences, Hospitality Busi- Nielsen, L., & Heffernan, C. (2006). New tools to
ness School, Education: Tourism Management, connect people and places: the impact of ICTs on
Retrieved on November 11, 2008 from: http:// learning among resource poor farmers in Bolivia.
dms01.saxion.nl/C12574DB0035EDCF/All+doc Journal of International Development, 18(6),
uments/52C462DA81331CA4C12574DB006303 889900. doi:10.1002/jid.1321
12/$File/Afstudeerscriptie%20E.%20Ruiter%20
Niles, S., & Hanson, S. (2003). A new era of ac-
en%20M.%20Lummen.pdf
cessibility. URISA Journal, 15, I.
Madon, S. (2004). Evaluating the development
Nussbaum, M. (2000). Women and Human Devel-
impact of e-governance initiatives: an exploratory
opment: The Capabilities Approach. Cambridge,
framework. The Electronic Journal on Information
UK: Cambridge University Press.
Systems in Developing Countries, 20(5), 113.
Nussbaum, M. (2006). Capabilities as fundamental
Mansell, R. (2006). Ambiguous connections:
entitlement . In Kaufman, A. (Ed.), Capabilities
entitlements and responsibilities of global net-
equality: basic issues and problems (pp. 4470).
working. Journal of International Development,
New York: Routledge.
18(6), 901913. doi:10.1002/jid.1310
ONeil, D. (2002). Assessing community infor-
McNamara, K. (Ed.). (2008). Enhancing the rural
matics: a review of methodological approaches for
livelihoods of the poor: recommendations on the
evaluating community networks and community
use of ICT in enhancing the livelihoods of the rural
technology centres. Internet research: electronic
poor. Infodev. Retrieved on April 1, 2009, from
networking applications and policy 12 (1), 76-102.
http://www.infodev.org/en/Publication.510.html
Orlikowski, W. J., & Baroudi, J. J. (2002). Studying
Meera, S. N., Jhamtani, A., & Rao, D. U. M.
information technology in organizations: research
(2004). Information and communication technol-
approaches and assumptions. (2002. In M.D My-
ogy in agricultural development: a comparative
ers. & D. Avison, (Eds.), Qualitative research in
analysis of three projects from India. Agriculture
information systems, (pp. 51-77). London: Sage
Research and Extension Network, ODI Paper
Publications.
No.135. London: Overseas Development Institute.
Retrieved August 1, 2006, from http://www.odi.
org.uk/agren/papers/agrenpaper_135.pdf

72
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Over, R. (2006). Networks, distance and trust: Schilderman, T. (2002). Strengthening the Knowl-
telecommunications development and changing edge and Information Systems of the Urban Poor.
trading practices in Ghana. World Develop- London: DFID.
ment, 34(7), 13011315. doi:10.1016/j.world-
Schischka, J., Dalziel, P., & Saunders, C. (2008).
dev.2005.11.015
Applying Sens capability approach to poverty
Parfitt, T. (2004). The ambiguity of participation: alleviation programs: two case Studies. Jour-
a qualified defence of participatory develop- nal of Human Development, 9(2), 229246.
ment. Third World Quarterly, 25(3), 537555. doi:10.1080/14649880802078777
doi:10.1080/0143659042000191429
Sciadas, G. (Ed.). (2005). The digital guide to
Ramirez, R. (2001). A model for rural and remote digital opportunities: measuring infostates for
information and communication technologies: development. Montral: Claude-Yves Charron.
A Canadian exploration. Telecommunications
Sen, A. (1985a). Well-being, agency and free-
Policy, 25(5), 315330. doi:10.1016/S0308-
dom: the Dewey Lectures: 1984. The Journal of
5961(01)00007-6
Philosophy, 82, 169221. doi:10.2307/2026184
Ramirez, R. (2003). Bridging disciplines: the
Sen, A. (1985b). Commodities and capabilities.
natural resource management kaleidoscope for
Amsterdam: North-Holland.
understanding ICTs. The Journal of Development
Communication, 1(14), 5164. Sen, A. (2000). A decade of human development.
Journal of Human Development, 1(1), 1723.
Ramirez, R. (2007). Appreciating the contribution
doi:10.1080/14649880050008746
of broadband ICT with rural and remote com-
munities: stepping stones toward an alternative Sen, A. (2001). Development as freedom. London:
paradigm. The Information Society, 23(2), 8594. Oxford University Press.
doi:10.1080/01972240701224044
Sen, A. (2005). Human rights and capabilities.
Ramirez, R., & Richardson, D. (2005). Measur- Journal of Human Development, 6(2), 151161.
ing the impact of telecommunication services doi:10.1080/14649880500120491
on rural and remote communities. Telecommu-
Sey, A., & Fellows, M. (2009). Literature review
nications Policy, 29(4), 297319. doi:10.1016/j.
on the impact of public access to information and
telpol.2004.05.015
communication technologies. CIS Working Paper
Rao, S. S. (2004). Role of ICTs in Indias rural No. 6. Seattle: University of Washington Center
community information systems. Info, 6(4), for Information & Society. Retrieved on May 9,
261269. doi:10.1108/14636690410555663 2009, from http://cis.washington.edu/depository/
publications/CIS-WorkingPaperNo6.pdf
Robeyns, I. (2001). Understanding Sens capabil-
ity approach. Cambridge, UK: Wolfson College.
Retrieved on August 20, 2006, from http://www.
ingridrobeyns.nl/Downloads/Under_sen.pdf.
Sawhney, H. (1996). Information superhighway:
metaphors as midwives. Media Culture & Society,
18, 291314. doi:10.1177/016344396018002007

73
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

Souter, D., Scott, N., Garforth, C., Jain, R., UNDP United Nations Development Pro-
Mascarenhas, O., & McKemey, K. (2005). The gramme. (2003). Human Development Report
economic impact of telecommunications on rural 2003: Millennium Development Goals: a compact
livelihoods and poverty reduction: a study of rural among nations to end human poverty. New York:
communities in India (Gujarat), Mozambique and Oxford University Press.
Tanzania. Commonwealth Telecommunications
van Dijk, J., & Hacker, K. (2003). The digital
Organisation for UK Department for International
divide as a complex and dynamic phenom-
Development. Report of DFID KaR Project 8347.
enon. The Information Society, 19(4), 315326.
London.
doi:10.1080/01972240309487
Stewart, F. (2005). Groups and capabilities.
Walsham, G., & Sahay, S. (2006). Research on
Journal of Human Development, 6(2), 185204.
information systems in developing countries:
doi:10.1080/14649880500120517
current landscape and future prospects. Informa-
Stewart, F., & Deneulin, S. (2002). Amartya Sens tion Technology for Development, 12(1), 724.
contribution to development thinking. Studies in doi:10.1002/itdj.20020
Comparative International Development, 37(2),
Warren, M. (2007). The digital vicious cycle: links
6170. doi:10.1007/BF02686262
between social disadvantage and digital exclusion
Talyarkhan, S., Grimshaw, D. J., & Lowe, L. in rural areas. Telecommunications Policy, 31(6-
(2005). Connecting the first mile: investigating 7), 374388. doi:10.1016/j.telpol.2007.04.001
best practices for ICTs and information sharing
Warschauer, M. (2003). Demystifying the digi-
for development. Rugby, UK: ITDG Publishing.
tal divide. Scientific American, 289(2), 4248.
Thomas, J. J., & Parayil, G. (2008). Bridging the doi:10.1038/scientificamerican0803-42
social and digital divides in Andhra Pradesh and
WSIS (World Summit on the Information Society).
Kerala: a capabilities approach. Development
(2008). WSIS follow up Report 2008. Advanced
and Change, 49(3), 409435. doi:10.1111/j.1467-
unedited draft (for comment). Note by the Secre-
7660.2008.00486.x
tariat. Retrieved on August 12, 2008, from http://
Thomas, P. (2007).Telecom musings: public ser- www.unctad.org/en/docs/none20081_en.pdf
vice issues in India. info, 9(2/3), 97-107.
Zheng, Y., & Walsham, G. (2008). Inequality of
Torero, M., & von Braun, J. (Eds.). (2006). In- what? Social exclusion in the e-society as capabil-
formation and communication technologies for ity deprivation. Information Technology & People,
development and poverty reduction: the potential 21(3), 222243. doi:10.1108/09593840810896000
of telecommunications. Baltimore: Johns Hopkins
University Press.
UN United Nations. (2008). e-Government key terms And deFInItIons
Survey 2008: From e-government to connected
governance. New York: United Nations. Capability and Capability Approach (CA):
Capability in the capability approach means the
freedom to achieve valuable beings and doings,
i.e. diverse combinations of functionings that a
person can achieve. The capability approach is an

74
Analysing an ICT4D Project in India Using the Capability Approach and a Virtuous Spiral Framework

economic and philosophical paradigm initiated by degree of generalisation. At the extremes micro
the Nobel Laureate in Economics, Amartya Sen. means that everything is different, so it is impos-
Capability, empowerment, and sustainabil- sible to generalise and macro refers to sweeping
ity virtuous spiral framework (CESVSF): is the generalisations that do not take into account any
conceptual framework underlying the research local differences. The boundaries between the
presented in this chapter. meso- and the other two levels are blurred and
Empowerment: is the process through which dynamic, both from a geographic and conceptual
individuals and communities take charge of their perspective.
multiple environments of which they form part, The East West Foundation of India
e.g. family, economic, physical, and cultural, in a (TEWFI): is the Indian partner organisation of
way that gives them influence and a high degree TEWOAF.
of control over decisions affecting them. The East West Overseas Aid Foundation
Engineers Without Borders Australia (TEWOAF): is an Australian volunteer driven
(EWB): works with disadvantaged communities organisation, with operations in Alamparai, near
to improve their quality of life through education Kadapakkam, a small fishing village in the south-
and the implementation of sustainable engineer- ern Indian state of Tamil Nadu. Its main projects are
ing projects. the Uluru Health Care Centre, the Uluru Childrens
Micro-, meso-, and macro: in the conceptual Home, a coastal eco-education centre, community
framework, there is no precise definition of these development programs concentrating on health,
terms. Geographically, micro refers to the village the environment and education in the region, and
and possibly the next layer, the panchayat and the Vicki Standish e-Education Centre (VSeEC).
macro refers to the central government and pos- Vicki Standish e-Education Centre (VSeEC):
sibly the state government. The importance is to is TEWOAFs computer centre located adjacent
recognise the interplay between the three layers. to the Uluru Childrens home in Alamparai,
At the conceptual level, the terms refer to the Kadapakkam, Tamil Nadu, India.

75
76

Chapter 5
Analysis of Speedy Uptake
of Electronic and Digital
Signatures in Digital Economy
with Special Reference to India
Swapneshwar Goutam
Hidayatullah National Law University, India

AbstrAct
This chapter focuses on the issues evolved out of the Indian Information Technology Act of 2000; the
key subject related to authentication of digital signatures with special reference to India based on case
studies; the benefits of strong information technology infrastructure in India for advancement of future
technologies and expansion of domestic market worldwide as well as the vital suggestions on advantages
of electronic and digital signatures in enriching and ensuring swiftness in business desires and security.

IntroductIon which is used for companies to advertise their


products that result in import and export of their
Information technology (IT) sector added diverse goods and services.
advantages to the contemporary face of India. This chapter discusses recent and emerging
Digital signatures and electronic signatures are legal complexities regarding the use of digital
one of the sophisticated means for authentication signature and electronic signatures in India. It
of electronic records in advancement of elec- also discusses basic evidentiary questions related
tronic commerce in digital world. Information to digital and electronic signatures testimony and
communication technology (ICT) constitutes a authenticity issues related to civil and commer-
threshold requirement for e-commerce adoption. cial disputes. Moreover, it explores benefits of
International e-commerce transactions are based digital Signature in uplifting the best use -in-class
on the sophisticated catalog from end to end technologies and shares best practices within the
digital economy.
DOI: 10.4018/978-1-61692-012-8.ch005

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Analysis of Speedy Uptake of Electronic and Digital Signatures

bAckground captured the raw keystrokes used, to create it,


whereas, in case of a written document it is the
Digital Signature is defined as means of authen- image of the document that has been captured. In
tication of any electronic record by a subscriber a sense, digital electronic documents are normally
by means of an electronic method or procedure. stored and transmitted in computer-readable form
In other words, it is as an electronic identifier, only. The term written document will be used
created by computer, intended by the party using when it is necessary to differentiate between a
it to have the same force and effect as the use of traditional written document, whether recorded
a manual signature. on paper or carved in stone, versus an electronic
Electronic signature means authentication of document in digital form, even if such a document
any electronic record by a subscriber by means were recorded on some semi-permanent medium
of electronic technique and it also includes digital such as a writeable CD-ROM. Digital documents
signature. Also it can be understood as electronic consist solely of streams of binary digits or bits
sound, symbol or process attached to or logically a seemingly endless series of ones and zeroes-they
associated with a record and executed or adopted lack the distinctive, semi-permanent physical at-
by a person with the intent to sign the record. tributes of a written document.
Digital and Electronic signatures attracts
various technical issues; the major concern lies difference between electronic
in legal validity and authentication issues, in signature and digital signature
determining the security concern over business
profitability. The utility of digital or electronic There is no universally accepted meaning of
signatures facilitate trade and secures transactions e-signatures (Sneddon, 1998). When trying to
over the Internets which enhance rapid growth of explore the definition of e-signatures, another
electronic commerce. term digital signatures will have to be men-
The prospect of electronically concluding tioned and differentiated as well. Actually, these
contracts and other legally significant transactions two terms have created considerable confusion
raises a number of technical and legal questions and sometimes they refer to the same meaning
about how to establish the genuineness of elec- (Finocchiaro, 2002). However, digital signatures
tronic documents. The term electronic document is are developed to specially refer to one kind of
understood as electronic message, or electronic e-signature technologies, that is, the e-signature
record which is often used interchangeably. In employing asymmetric encryption. Digital signa-
general, electronic should not be taken to mean ture is a specific term of art within the technical
exclusively electrical, but may also include other community that has been used consistently since
forms of document preparation, transmission, and the landmark publication describing public key
storage, including fiber optic transmission lines. cryptography (Diffie & Hellman, 1976).
As used in this paper, electronic document The digital signature algorithm is based on the
refers to a digital representation of information, use of public key cryptography and involves
where the human-readable characters and images the use of two codes known as keys that are
have been reduced to a unique set of binary digits used by the signer to authenticate the source and
or bitsones and zeroswhich represent those content of his electronic documents, and by the
characters. recipient to validate their correctness. One of a
The difference between a digital, electronic pair of keys which are generated at the same time,
document and an analog image of the same docu- the private key, is kept solely in the possession of
ment is that the digital document has effectively the signer of an electronic document and is used

77
Analysis of Speedy Uptake of Electronic and Digital Signatures

to encode the text of the document into the digital revolve around e- commerce before the court in
signature (ABA, 1996). civil and criminal cases. Normally, electronic
The public and private keys are mathematically commerce is defined as the use of online facilities
related, but the relationship is so complicated that for doing business. It also includes the internet,
it is computationally infeasible to deduce the private networks, and any other facility that en-
private key solely from knowledge of the public ables buyers to communicate with suppliers (Fel-
key or to create a signed message which can be lenstein & Wood, 2000). To resolve such dispute
verified by application of the public key without of authentication and recognition, the legislation
the knowledge of the private key. Hence, the rely- should be construed in a way that accommodates
ing party, having trustworthy access to the public scientific changes; in particular, the meaning to be
key, can validate the documents as having been given to form ... of storage must keep abreast with
signed by someone who had the knowledge of the the digital age (Abichandani, 2004). It has been
corresponding private key, but cannot deduce the recognised worldwide that digital signatures are
private key from the public key, nor create such basis to facilitate authentication toward corporate
a signature without the private key (ABA, 1996). assets, encryption of sensitive information; also
The digital signature thus provides very reliable the use of digital signatures en route aid to verify
algorithmic evidence of the source of an electronic identities (Reed, 2007).
document, assuming that the relying party has a It is also argued that, government should
reliable way of verifying the identity of the person frame the policies welcoming new technological
with whom the private key is associated and as- changes; which will result in pumping up the
suming that the secrecy and control over the private economy of country. The new technology makes
key has been maintained. In order to secure such globalisation a process of wider prospective for
electronic transactions, encryption technologies the changing world (Michael, 2002).
are used. Such encryption technologies, which are
supported by the appropriate legal mechanisms, legal requirement of
have the potential to expand global electronic digital signature
commerce (Swindells & Henderson, 1998).
Digital signatures on electronic records are This section deals with corroboration techniques
of imperative significance to guarantee the au- with respect to electronic and digital signatures
thenticity and integrity of the contents (Aalberts authentication issues in commercial disputes,
& van der Hof, 1999). The Government of India major issue involved with regard to corrobora-
has adopted sound techniques in promoting and tion technique. How much will it be helpful for
affiliating international trade by enhancing sound courts of law?
information technology structures which will fa- Where the Indian Information Technology Act
cilitate in authentication and recognition of new of 2000 is silent over authentication issues, and rec-
techniques before the court of law in resolving ognition of any new emerging technology which
vital important issues around business risk as is challenged before the Indian court of law, such
well as security. issues have always been treated with UNICTRAL
model law before the enactment of the enactment
complex Issues of Authentication of the information technology act, 2000 as tool of
around e-commerce deal interpretation in determining the dispute, but even
after the enactment of the act of 2000, the courts
Major issues of dispute over authentication and in India has relied and referred, the model laws
recognition of electronic and digital signatures as a major source of law in resolving the disputes

78
Analysis of Speedy Uptake of Electronic and Digital Signatures

regarding electronic commerce . In numerous rity services including data confidentiality, data
cases subjected to international arbitrational integrity, and key management (Portable Mass
and commercial disputes before courts of law in Storage Device with Virtual Machine Activation,
India, the courts have noticed that UNCITRAL 2003, Paragraph 29).
Model Law is suitable to Indian industrial climate Today, public private participation is a key
under such circumstance where Indian Informa- element to develop infrastructure in our economy
tion Technology Act, 2000 is silent (Sundaram (Delhi Electricity Regulatory Commission, 2007).
Brake Linings Ltd v. Kotak Mahindra Bank Ltd, Winn (1998) states cryptography is the process
2008). Indian Judiciary has taken a broad view in of taking some information called the plaintext
welcoming sound and sophisticated technologies and passing it through an encryption process to
over the issue of authenticity and recognition in produce an encrypted copy of the information
commercial and civil disputes. The most signifi- (called the ciphertext) that can be decrypted and
cant question is about legitimacy of valid digital restored to the original plaintext through the ap-
signature before courts. In India, such disputes plication of the cipher key(p.1198).
are covered under Information Technology Act, Law recognizes Asymmetric Crypto System
2000 - under section 8 of IT Act, 2000 under the which can be understood as system that creates a
head of authentication of electronic record. In secured key-pair consisting of a private key creat-
order to further facilitate, our courts by and large ing a digital signature and a public key to verify
refer to the common law (Cloud Corp, 2002) the digital signature (Tulsian,2006).
and the Universal Commercial Code (Indian The Private Key is explicitly accessible and
Petrochemicals Corporation Ltd v. Union of India, used by those that need to validate the signers
2006), or other international source and treaties in digital signature. PKI [Public Key Infrastructure]
case of divergence to fill the absence of adequate encompasses different components which include
laws to facilitate adequate infrastructure. a Certificate Authority, (Basu & Jones, 2002)
American Bar Associations drafted Digital end-user enrollment software, and tools for
Signature guidelines over the period 1992 to 1995, organization, renewing, and revoking keys and
with final publication in August 1996 (Jueneman & certificates (Carlisle & Lloyd, 2002).
Robertson, 1998) states that Digital signatures are Mainly certification authorities may create
created and verified by cryptography, the branch special policies and procedures intended for
of applied mathematics that concerns itself with associating individual persons through online
transforming messages into seemingly unintel- identities. Any person by the use of a public key
ligible forms and back again. Digital signatures of the subscriber can verify the electronic record
use what is known as public key cryptography, it is a one of legal requirement for authentication.
which employs an algorithm using two different UNCITRAL MODEL LAW ON ELECTRONIC
but mathematically related keys one for creat- SIGNATURES (2001) intends to develop uni-
ing a digital signature or transforming data into form legislation that can facilitate the use of both
a seemingly unintelligible form, and another key digital signatures and other forms of electronic
for verifying a digital signature or returning the signatures in the electronic environment (Chan
message to its original form. & Gligor, 2002). Many countries have adopted
Generally, public key infrastructure is under- the Model law or introduced legislation related to
stood as an authentication technology. Using a electronic facilitation issues (Panagariya, 2000).
combination of secret key and public key cryp- Working Group recalled that, alongside digital
tography (PKI) enables a number of other secu- signatures and certification authorities, future

79
Analysis of Speedy Uptake of Electronic and Digital Signatures

work in the area of electronic commerce might and cognate expressions means adoption of any
also need to address issues of technical alterna- methodology or procedure by a person for the
tives to public-key cryptography; In digital sig- purpose of authenticating an electronic record by
nature public-key cryptography is the emerging means of digital signature.
electronic-commerce practice, general issues of
functions performed by third-party service pro- Authentication of the
viders; and electronic contracting (United Nation, electronic record
2002), the regulations put forward the PKI system
and are limited to public-key cryptography, (i.e., The authentication of the electronic record shall be
digital signatures) (Cerina, 1998 and Aalberts & affected by the use of asymmetric crypto system
van der Hof, 1999). and hash function which envelop and transform
Information security is now a familiar concept the initial electronic record into another electronic
at the highest levels of corporate structures. The record. A written document can be introduced as
security consultant is taking his place as an advi- an evidence at trial but it must be authenticated,
sor along with the legal and accounting experts a term of art in the law of evidence. Under section
that are essential to conducting business today. 22 A of Indian Evidence Act, 1872; oral admission
Information security, when approached from a as to content of electronic records are not relevant,
corporate perspective, is an enabler of traditional unless the genuineness of the electronic record
business goals in an electronic environment (Nor- produced are in question. Genuineness of docu-
tel, 2002). The Information Technology Act, 2000 ment under the Act under section 47-A whenever
widely covers the major issues over legitimacy of the court has to form opinion as to digital signa-
digital signature when challenge before the courts. tures of any person, the opinion of the certifying
There is no doubt that emerging efforts carried authority which has issued the Digital signature
out by government in providing adequate base to certificate is a relevant fact. Admissibility of
the emerging technology. I believe there is urgent electronic records is to be under Section 65-(B).
need to endorse alertness towards the escape. In (Stovekraft Private Limited, 2007) Karna-
taka High Court held that a secure digital signature
legal Issues Involved in electronic of any subscriber is alleged to have been affixed
and digital signatures laws in India to an electronic record of fact that such digital
signature is the digital signature of the subscriber
This section analyzes issues involved in legal must be proved.
assessment and framework on digital signature Documentary evidence under Indian Evidence
and its utility towards international trade, com- Act, 1872 under sections 85-B, 85-C where it
merce and present regime adopted by India courts specifically states the court may take presump-
to promote the authentication and recognition tion as to electronic records and digital signature
of electronic and digital signatures as tool of along with court may also take presumption as to
modern trend in development of market. Infor- digital signature certificates (Batuk Lal, 2006).
mation Technology Act, 2000 was enacted on the The details of type of digital signature, manner
basis of UNCITRAL Model Law on Electronic and format of affixing, and the procedure related
Commerce 1996; the bill passed by the Indian to authentication of electronic records are handed
Parliament in May 2000; notified on 17 October over to secondary legislation which has provided
2000. Under Section 2(d) of Act, defines affixing a swift in the era of dynamic trade.
digital signature with its grammatical variations

80
Analysis of Speedy Uptake of Electronic and Digital Signatures

It security Procedure rules, 2004 Amendment Act 2000, a bill was introduced in Lok
Sabha during winter session 2006. and the honble
Special rules are framed for securing digital speaker referred the bill to standing committee
signature as per Rule 4, which states that digital on Information Technology. It was presented to
signature shall be deemed to be a secure digital Lok Sabha on 7 September, 2007. The bill is yet
signature for the purposes of the Act if the follow- to be approved by the parliament. Sanghi (2008)
ing essential elements are fulfilled: (1) smart card points that Reports of the Department-related Par-
or hardware token, with cryptographic module in liamentary Standing Committee on Information
it, is used to create the key pair; (2) that the private Technology as well as expert committee Reports
key used to create the digital signature; (3) that the on amendments to IT (amendment) Act 2000
hash of the content to be signed is taken from the submitted by Mr. T D Maran, Honble Minister
host system to the smart card or hardware token for Communications and Information Technol-
and the private key is used to create the digital ogy has noted that the field of cyber laws, being
signature, (4) that the information contained in a nascent area, experience of its formulation and
the smart card or hardware token, is solely under implementation are still evolving worldwide and
the control of the person who is purported to have more so in India. The Act is being made technology
created the digital signature; (5) that the digital neutral with minimum change in the existing IT
signature can be verified by using the public key Act, 2000. This has been made by amendment of
listed in the Digital Signature Certificate issued the relevant sections of Information Technology
to that person; (6) that the standards referred to in Act to provide for electronic signature with digital
rule 6 of the Information Technology (Certifying signature as one of the types of electronic signa-
Authorities) Rules, 2000 have been complied ture and by enabling the details of other forms of
relate to the creation, storage and transmission electronic signature to be provided in the Rules to
of the digital signature; and (7) that the digital be issued by the Central Government from time to
signature is linked to the electronic record in such time. This is an enabling provision for the Central
a manner that if the electronic record was altered Government to exercise as and when the technol-
the digital signature would be invalidated. ogy other than digital signature matures. Certain
related amendments to this effect have been made.
recent development For a country like India where we are trying to
enhance the positive use of Internet and working
In the year 2004, Business Rules Pertaining to towards reducing the digital divide, there is need
Department of Information Technology were en- to ensure that new users do not get scared away
acted to pro-actively motivate, facilitate, promote because of publicity of computer related offences.
and spread IT to masses and ensure speedy IT At the same time, it must be ensured that offenders
led development. One of the main vital issues in do not go unpunished. This balancing spirit has
cyber infrastructure protection is to promote the been incorporated in the proposed amendments
use of digital signatures in the financial sector, in relevant sections.
judiciary and education. This bill calls for substitute of word digital sig-
nature with electronic In Chapter II of the principal
Amendments to Information Act, for the heading, the heading Digital signature
technology Act 2000 And Electronic Signature shall be substituted.
Insertion of new section 6(A) which deals with
In the year 2006 (Information Technology delivery of services to the public through electronic
(amendment) Bill 2006), further to amend IT means authorise, by order, any service provider

81
Analysis of Speedy Uptake of Electronic and Digital Signatures

to set up, maintain and upgrade the computerized Importance of digital signature in
facilities and perform such other services as it may business and technical Issues
specify, by notification in the Official Gazette.
Insertion of new section 10(A) after section 10 Digital signatures have emerged as a sophisticated
of the principal Act, it states validity of contracts mode in promotion of corporate sectors; especially
formed through electronic means. The Central with regards to business and technical issues which
Government may, for the purposes of sections help in promotion of e- governance with regards
14 and 15, prescribe the security procedures and to business and technical issues. Under section 48
practices regard to the commercial circumstances, of Act of 2000; provides for the establishment of
nature of transactions and such other related factors Cyber Appellate Tribunal hereinafter referred to
as it may consider appropriate. Insertion of new as CAT; any person aggrieved by an order made
section 40A; will lay down duties of subscriber by controller or an adjudicating officer under
of Electronic Signature Certificate (Rajesh Saini this Act may make an appeal to a CAT having
v. State of Himachal Pradesh, 2008) jurisdiction in the matter. The IT Act also clearly
mentions under section 61 that civil court do not
digital signature mandatory for have jurisdiction. Any person aggrieved by any
Filing of statutory documents decision or order of the CAT may file an appeal
to the High Court within sixty days from the date
Recently, mandatory use digital signatures have of communication of the decision or order of the
been launched by the Government of India for fil- CAT to him on any question of fact or law arising
ing of statutory documents and other transactions out of such order.
of commercial documents by the help of electronic
mode to facilitate e-commerce. The Ministry
of Corporate Affairs, Government of India, has cAse study
made it mandatory for registered companies to
use digital signatures for e-filing of documents. If any person who dishonestly or fraudulently
All the company authorised signatories or the causes, signs, seals, executes, and alters a docu-
companies professionals who file documents on ment an electronic record or affixes his digital
behalf of the companies are required to obtain signature on any electronic record shall be liable
digital signature certifications to enable e-filing for penal consequences. (M.K. Razdan v. The
have to acquire a digital signatures. State, 2008)
One of the major benefits of acquiring digital Justice S.B. Sinha, (Honble Judge of the Su-
signatures is that it reduces cumbersome paper preme Court of India) strongly argued: Various
work, enhanced observance management, over- new developments leading to various different
all intelligibility from end to end e-governance, kinds of crimes unforeseen by our legislature
customer centric approach, building digitalized come to immediate focus. Information Technol-
corporate operating and monitoring system. ogy Act, 2000 although was amended to include
Digital signatures make the process swifter for various kinds of cyber crimes and the punishments
filing of statutory documents. therefore, does not deal with all problems which
are faced by the officers enforcing the said Act.
In a changing cyber world, the information
may reside in several systems and can be de-

82
Analysis of Speedy Uptake of Electronic and Digital Signatures

ciphered using the process of computer. Under any information through any computer resources
Indian Evidence Act and the IT Act, there are which is not state friendly is provided to the Gov-
provisions relating to digital signatures, which ernment of India,
make the digital records and digital signatures
admissible. Once they are treated as documents, digital signature and Future
the action of the will falls under Sub-sections of digital economy of India
(3) and (4) of Section 110 of the Act and not
under Sub-sections (1) and (2) of Sect 110 of the It cannot be denied that digital Signature uprising
Act held by Supreme Court of India in (State of has brought about far-reaching transformation to
Punjab and Ors. v. Amritsar Beverages Ltd. and the financial industry/institutions, such as fund
Ors., 2006, para 17). intermediation. In present time, the financial
The IT Act, that provides legal recognition for transactions and settlements have been digitalized;
transactions carried out by means of electronic many cyber technologies have been acquired
data interchange and other means of electronic by many national and international financial
communication is commonly referred to as elec- institutions and financial portal services which
tronic commerce (Diebold Systems Pvt. Ltd. have evidentially resulted in boosting the faster
v. Commissioner of Commercial Taxes, 2006). methods of business transactions which are less
The digital signatures are the main degree to any cumbersome and are sound in their nature. It has
transactions and it depends on its authenticity. The also resulted in sound security and transparency
courts while deciding such critical issues must concerns in regular transactions and promoting
look that are unique to the signer, and are under electronic commerce. A rapid uptake of digital
the signers sole control. signatures has supported the major concern of
securities in electronic based transactions. The na-
Proposed Amendment over tions should craft their legislations and regulatory
Admissibility of digital and framework in such a manner which is supportive
electronic signatures to the growth of the nations economy.
Generally, corporate sector of any developing
If the proposed bill becomes a law it will bring vital or developed nation is encouraging the utility of
changes under the present regime of information digital signatures in their main stream of transac-
technology sector in India as well as more clear tion and promotion of economy. India has also
direction over the admissibility of digital and mandated the use of digital signatures for filling
electronic signatures before the court of law in a mandatory documents and transactions. The
dispute related to electronic commerce. government of India has taken strong initiative in
The above said bill shall enhance monitoring mandating the digital signature which result the
cyber crimes and it shall also lay down harsh and market to do good business transactions through-
rigorous penal consequences for disclosure of out the nation and international market.
information with regards to security of national, Digital signature used in e-filing has facilitated
important deals financial transitions and internal networked business. India has recently witnessed
security against e- crimes. A bill proposes to 30 per cent growth but that is due to the manda-
establish the national nodal agency in respect of tory requirements imposed by the MCA; digital
any critical information infrastructure protection signatures is a method to achieve e-governance
is also proposed under a bill before the parliament which will lead to transparency systematic risk-
of India. Under the proposed bill the power to management based e-business security policy
issue directions for blocking for public access of (Otuteye, 2008).

83
Analysis of Speedy Uptake of Electronic and Digital Signatures

The Security Exchange Board of India has there should be mandatory implementation of
also promoted the utility of digital signatures digital signatures which will be less burdensome,
used in primary and secondary markets; brokers secured and faster in making investment in to a
under such markets are allowed to issue contract particular deal. Recently, government of India has
notes authenticated by means of digital signatures mandated the directors of Indian companies (both
provided that the broker has obtained digital Indian and foreigner directors) to obtain Digital
signature certificate from Certifying Authority Signature Certificate. It is one of the mandatory
under the IT Act, 2000. requirements for directors, of Indian companies,
Other Depository institutions in India Na- both Indian and foreigners, to engage in business
tional Security Depository Limited NSDL and transactions in the country.. Digital Signature
Centre Depository Service Limited CDSL, Certificate (DSC) is required for all directors
have also decided to expand the infrastructure or authorized representatives of any company
of SPEED-e for electronic delivery of digitally and professional who will require signing to
signed contract notes by brokers to custodians / Registrar of Companies forms or documents.
fund managers in pre-defined, uniform formats. Digital signature must be adopted by company
Major benefit is to avoid hard cumbersome paper representatives, professionals and others who are
work in to modern sophisticated digital trends; required to affix digital signatures for submitting
digital signature has strengthened security issues an electronic Form (Hand Book MCA21, Pg.
in such deals. The key impact of digital signature 37). Indian banking sector has taken vital step in
on financial sector is evident in accuracy of IT mandating the use of digital signatures in normal
infrastructure blended with internet technologies. days transactions. Digital signature under Indian
Overall accuracy is the major apprehension in the banking sector has emerged as major protection
financial transactions which are based on verified during transmission of cash within banks to banks
signature, certified servers and authenticated and banks to costumers.
digital signatures. The Ministry of Corporate Affairs of India,
The two big stock exchanges in India (i.e., has recently implemented the, information sys-
National Stock Exchange of India and Bombay tems security guidelines for the Banking and
Stock Exchange) are the leading stock exchanges Financial Sectors, which will help in protecting
of India, promoting the use of digital signatures the audit trail informations from deletion, modi-
in stock trading. Trading members to these stock fications, fabrications or resequencing by use of
exchange use digital signatures on contract notes; digital signatures. Moreover, the guidelines also
it is compulsory that digital signatures certificate highlights the major use of digital signature in
should be obtained from certifying authority un- controls against malicious software, protection
der the IT Act, 2000. The Ministry of Corporate during transmission, repudiation and specifically
Affairs of India has taken vital steps implement- spell out legal the advantages, roles and use of
ing mandatory system of digital signatures, for digital signature for banking and financial sector
strengthening to meet the changing requirements India. Digital signatures play a major role in ad-
of the market. dressing the issues relating to the maintenance
The major concern lies on international invest- of the keys, used for encryption, authentication
ments issues where any foreign investor interested of contracts.
in investing in any particular nation has to opt for It is hoped that the legal provision for man-
right kind of business or corporate entity which datory adoption of digital signature in business
best suits its purposes and takes care of liability transaction in India would have tremendous
issues and tax planning issues. It is argued that impact in the digital economy of the country. It

84
Analysis of Speedy Uptake of Electronic and Digital Signatures

will build confidence in promote e-government, reFerences


e-commerce and e-banking in India.
Aalberts., B.P., & Van der Hof, S. (1999). Digital
Signature Blindness Analysis of Legislative Ap-
conclusIon proaches to Electronic Authentication, (pp. 32).
Retrieved on Nov.29, 2008 from; http://www.
In India, bold attempts have been made by the buscalegis.ufsc.br/arquivos/Digsigbl.pdf
government to promote the use of digital sig- Abichandani, R. K. (2004). Controvertial Copy-
natures in commercial transitions as well as in right Issues, National Judicial Academy, Bhopal,
strengthening laws to implement best security Retrieved on August, 21, 2009, from http://
practices in electronic commerce transactions. gujarathighcourt.nic.in/Articles/roundtable.htm.
Digital signatures are also addressed as tools of
building trust between parties. Courts have also American Bar Association. (1996). Digital signa-
recognized and authenticated the utility of modern ture guidelines: Legal Infrastructure For certifica-
sophisticated, high-tech digital records and digital tion Authorities and Secure Electronic Commerce,
signatures in commercial transactions and building (2nd Ed.). Chicago: Author. Retrieved on Oct. 30,
affirmative tools of security and trust. 2008, from American Bar Association website;
It is believed that the whole implementation http://www.abanet.org/scitech/ec/isc/dsg.pdf
exercise is designed to build trust. Digital sig-
Atkinson, R. D. (2001). The New Growth Eco-
natures facilitate secure electronic transactions,
nomics: How to Boost Living Standards through
authentication, confidentiality, and integrity. It
Technology, Skills, Innovation, and Competition.
can be said that digital signature plays a major
Blueprint Magazine. Retrieved on 22 Feb 2009
role to create trust in electronic environment.
from http://www.dlc.org/ndol_ci.cfm?contentid
A bold attempt made by the Indian government
=2992&kaid=107&subid=123
in promoting and mandating the use of digital and
electronic signatures has provided feel safe at- Bae, K. S. (2001). Koreas e-commerce: Present
titude to the banking industry and corporate affairs, and future. Asia-Pacific Review, 8(1), 77.
which led towards has swifter trading process and
Basu, S., & Jones, R. P. (2002). Legal Issues
complete secured system place. If the proposed
Affecting E-Commerce A Review of the Indian
bill converts in to a law, it will provide more bases
Information and Technology Act 2000, 17th An-
to the new security concept and authentication
nual BILETA Conference, Amsterdam. Retrieved
process will be more adaptable to shifting legal
on Oct. 22, 2008; from http://works.bepress.com/
prerequisites.
subhajitbasu/33
Batuk lal. (2006). The Law of Evidence, Allahabad,
Acknowledgment India: Central Law Agency.
Carlisle, A. & Lloyd. (2002). Understanding PKI:
I am grateful to Mrs. Aruna Hyde, MA. B. Ed,
Concepts, Standards, and Deployment Consid-
CIEFL (NELTS), Hidayatullah National Law
erations, (pp. 11-17). London: Addison-Wesley.
University, Raipur, C.G, India for her assistance
and Dr. Esharenana E. Adomi, who graciously Cerina, P. (1998). The New Italian Law on Digital
supported by providing thoughtful comments and Signatures. 6 CTLR, 193.
advised throughout; I am immensely grateful for
his encouragement.

85
Analysis of Speedy Uptake of Electronic and Digital Signatures

Chan, A. H., & Gligor, V. (2002). Information Ministry of Corporate Affairs. (n.d.). MCA21
Security, (LNCS). Berlin: Springer. doi:10.1007/3- Stakeholder Handbook. New Delhi, India: Tata
540-45811-5 Consultancy. Retrieved on July. 12, 2009, from,
http://www.mca.gov.in/MinistryWebsite/dca/
Chwee Kin Keong and Others v. Digilandmall.
help/ProcessHandbook.pdf
com Pvt. Ltd, (2004) 2 SLR 594.
M.K. Razdan v. The State and Shri Indukant
Cloud Corp. v. Hasbro Inc, 314 F.3d 289 (7th
Dixit, Crl.Rev.P. No. 861-62/2005, (Decided on
Cri. 2002).
March.03, 2008), Delhi.
Diebold Systems Pvt. Ltd. v. The Commissioner
Nortel., Shashi Kiran., Lareau P., & Lloyd., S.
of Commercial Taxes, (2006). 144STC59(Kar).
(2002). PKI Basics - A Technical Perspective.
Diffie, W., & Hellman, M. E. (1976). New Di- Retrieved on Nov.19,2008.from http://www.
rections in Cryptography. IEEE Transactions oasis-pki.org/pdfs/PKI_Basics A_technical_per-
on Information Theory, IT-22(6), 644654. spective.pdf
doi:10.1109/TIT.1976.1055638
Otuteye., E. (2008), A Systematic Approach to
Fellenstein, C., & Wood, R. (2000). Exploring E- Business Security: Ninth Australian World
e-commerce, global e-business, and societies, 30. Wide Web Conference. Retrieved on August.
Upper Saddle River, NJ: Prentice Hall. 21, 2009, from http://ausweb.scu.edu.au/aw03/
papers/otuteye/
Finocchiaro, G. (2002). Digital Signature and
Electronic Signatures: The Italian Regulatory Panagariya, A. (2000). E-Commerce, WTO and
Framework After The d.lgs 10/2002. Electronic Developing Countries. World Economy, 23(8),
Communication Law Review, (9), 127. 959978. doi:10.1111/1467-9701.00313
Indian Petrochemicals Corporation Ltd. v. Union Portable Mass Storage Device With Vir-
of India, (Decided on: Sept.19, 2006). (2006). tual Machine Activation, U. S. Patent No.
MANU/GJ/8490. WO/2008/021682, PCT/US2007/074399 (2008,
Nov. 26). fig.6 Retrieved on Oct. 29, 2008, from
Indira, C., & Stone, P. (2005). International Trade
http://www.wipo.int/pctdb/en/wo.jsp?IA=US2
Law. London: Routledge Cavendish.
007074399andwo=2008021682andDISPLAY=
Information Technology Security Procedure CLAIMS
Rules. (2004).
Professional Horizon. (2006). Important Messages
Jueneman., R R. & Robertson, Jr., R. J. (1998). For e-Filing Under MCA21, The Chartered Ac-
Biometrics and Digital Signatures in Electronic countant (p. 1806). ICAI.
Commerce 38 Jurimetrics 427.
Rajesh Saini v. State of Himachal Pradesh, (2008).
Michael, D. (2002), Globalization Of The World Cr. LJ 3712
Economy: Potential Benefits And The Cost And
Reed, C. (2007). Taking a side on Technology
A Net Assessment. Governing Stability Across the
Neutrality . SCRIPTed, 4(3), 263. doi:10.2966/
Mediterranean Sea: A Transatlantic Perspective,
scrip.040307.263
Columbia International Affairs Online. Retrieved
on Dec.3,2008 from http://www.ciaonet.org/
coursepack/cp09/cp09c.pdf

86
Analysis of Speedy Uptake of Electronic and Digital Signatures

Report of Standing Committee on Informa- United Nation. (2002). 56th Sess. General As-
tion Technology. Raja Sabha Parliamen- sembly Resolution. A/RES/56/80. Model Law
tary Bulletin. (n.d.). Retrieved on 22 Oct 2008 on Electronic Signatures of the United Nations
http://164.100.47.5/Bullitensessions/session- Commission on International Trade Law.
no/214/221008.pdf
United Nations. (2002). UNCITRAL Model Law
Reserve Bank of India. (2002). Information Sys- on Electronic Signatures with Guide to Enact-
tems Security Guidelines for the Banking and ment. New York: United Nations Publication.
Financial Sector. Retrieved on Feb 22, 2009, from Retrieved on Jan.02, 2009, from UNICITRAL
http://www.prsindia.org/docs/bills/1168510210/ website http://www.uncitral.org/pdf/english/texts/
bill93_2007112393_Press_Release_for_IT_Act_ electcom/ml-elecsig-e.pdf
Amendment.pdf
United Nations Conference on Trade and Develop-
Russell, I. (2008, Nov.27). Sale of digital sig- ment. (2000). A Positive Agenda for Developing
nature double in 18 months. Business Standard. Countries: Issues for Future Trade Negotiations,
Retrieved on 27 Jan 2009.Business-standard http:// (pp. 474). New York: UN Publication.
www.businessstandard.com/india/storypage.
Ved Ram and Sons Pvt. Ltd v. Director, (2) AWC
php?autono=297405.
2053 (UP), (2008).
Sharma, B. R. (2005). Bank Frauds Prevention
Winn, J. K. (1998). Open Systems, Free Markets,
and Detection, 61. New Delhi: Universal Law
and Regulation of Internet Commerce. Tulane
Publication.
Law Review, 1177, 72.
State of Punjab and Ors. v. Amritsar Beverages Ltd.
and Ors., AIR 2006 SC 2820. (2006). (Paragraph
7 & 17, pp. 3488-89).
key terms And deFInItIons
Stovekraft Private Limited, rep. by its Managing
Director Rajendra Gandhi v The Joint Director, Cyber Security: Protecting information,
Directorate of Revenue Intelligence and Ors. equipment, devices computer, computer resource,
(2007). 214 ELT179(Kar) communication device and information stored
therein from unauthorised access, use, disclosure,
Sundaram Brake Linings Ltd v. Kotak Mahindra disruption, modification or destruction.
Bank Ltd., A. No. 8078 of 2007 in C.S. No. 1072 Electronic Form Evidence: Any information
of 2007, High court of Madras. (2008). MANU/ of probative value that is either stored or trans-
TN/0938. mitted in electronic form and includes computer
Swindells, C., & Henderson, K. (1998) Legal regu- evidence, digital audio, digital video, cell phones,
lation of Electronic Commerce, 3. The Journal of and digital fax machines.
Information, Law and Technology, 3. Retrieved on Electronic Record: An image or sound stored,
Oct. 29, 2008 from http://www2.warwick.ac.uk/ received or sent in an electronic form or micro
fac/soc/law/elj/jilt/1998_3/swindells/#a3 film or computer generated micro fiche.
Electronic Signature: Authentication of any
Tulsian, P. C. (2006). Business Law. New Delhi, electronic record by a subscriber by means of the
India: Tata McGraw-Hill. electronic technique and it also includes digital
signature. Or it can be understood as electronic
sound, symbol or process attached to or logically

87
Analysis of Speedy Uptake of Electronic and Digital Signatures

associated with a record and executed or adopted ers, network service providers, internet service
by a person with the intent to sign the record. providers, web hosting service providers, search
Electronic Signature Certificate: A certifi- engines, online payment sites, online-auction sites,
cate issued by certifying authority and it includes online-market places and cyber cafes.
Digital Signature Certificate in such a form as Secured Electronic Signature: An electronic
prescribed by central government of India. signature shall be deemed to be a secure electronic
Intermediary: With respect to any particular signature if the signature creation data, at the time
electronic records, means any person who on be- of affixing signature, was under the exclusive
half of another person receives, stores or transmits control of signatory and no other person; and the
that record or provides any service with respect to signature creation data was stored and affixed
that record and includes telecom service provid- in such exclusive manner as may be prescribed.

88
89

Chapter 6
Context for ICTs Role in
South African Development
Udo Richard Averweg
Information Services, eThekwini Municipality and University of KwaZulu, South Africa

Geoff Joseph Erwin


The Information Society Institute (TISI), South Africa

AbstrAct
This chapter discusses that information and communication technologies (ICTs) can (and should) be
used to disseminate information and participation to disadvantaged communities in order to foster
socio-economic development in South Africa. The objective of this chapter is twofold: (1) how should
ICT policies and frameworks in South Africa be implemented (e.g. by a top-down, bottom-up or
mixed approach paradigm) in order for the South African government to achieve its socio-economic
goals?; and (2) can socio-economic development in South Africa be effectively assisted by the use of
ICT? A discussion of these points may assist in the formulation of national ICT policies in South Africa
and thereby spawn the setting up of social appropriation of ICT advancement programs. Such programs
are particularly relevant to the digital divide, for fostering socio-economic development and in promot-
ing an inclusive information society in South Africa.

IntroductIon (and should) be used to disseminate information


and participation to disadvantaged communities
South Africas liberation struggle was led by the in order to foster socio-economic development.
African National Congress (ANC) and in 1994 Socio-economic development refers to con-
the first democratically elected State President tinuous improvement in the well-being and in
was Nelson Rolihlahla Mandela. Since the earli- the standard of living of the people (see www.
est days of the post-apartheid era, the ANC-led nepad.org).
government has adopted a position that informa- The impact of this development focus is
tion and communication technologies (ICTs) can evidenced by the fact that South African govern-
ment officials (e.g. South Africas Minister of
DOI: 10.4018/978-1-61692-012-8.ch006 Communications) accept that ICT can play an

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Context for ICTs Role in South African Development

important role in accelerating development in rural of the multi-disciplinary field of Community


areas (Snyman & Snyman, 2003). Furthermore, Informatics (CI) supporting and promoting an
the South African government actively supports inclusive information society in South Africa. CI
the promotion and realisation of the Millennium seeks to realize the social appropriation of ICT
Development Goals (MDGs) through the use for local benefit. Participation in an inclusive
of ICT (UnitedNations, 2003). As part of its information society is a current aim of the South
strategy to promote economic growth, the South African government, enabled by ICT and via the
African government has implemented a plan to national Department of Communications (DOC),
promote the adoption of ICT, especially Internet and reflected in national government structures
technology (South Africa, 2005). However, the and frameworks such as the Meraka e-Skills In-
high cost of broadband access in South Africa stitute, and the related National e-Skills Dialogue
and the limited access of this technology to all Initiative (Ne-SDI) (DOC, 2009; ITWeb, 2009).
South Africa citizens, remains a problem (Ma- The objectives of this paper are to set out the
sango, 2007). Micrososft South Africa (MSA) context in which a developing country such as
and Universal Services Agency in South Africa) South Africa is attempting to include all sectors
(USASA), an ICT parastatal, announced plans of society in an inclusive information society, to
for a partnership to spread access to technology position this within the overall activity for socio-
to an increased number of people in South Africa as well as economic development, and to explore
(Masango, 2005). However, the mechanism, if the relevance of mechanisms by which this can
any, by which increasing access to technology be achieved, potentially by a series of initiatives,
promotes socio-economic development was left both top-down from government, bottom-up
open. The question thus arises whether a policy from civil society, and mixed.
framework should be formulated which will guide
future research in this regard.
The implications for socio-economic develop- bAckground
ment policy and implementation from the South
African context discussed in this chapter are: With the democratisation of South Africa in
1994, coupled with its current level of techno-
How should ICT policies and frameworks logical development, the country is a beacon
in South Africa be implemented (e.g. by a of technological hope for the rest of Africa. As
top-down, bottom-up or mixed ap- declared by a previous South African Minister
proach paradigm) in order for the South of Communications, Dr Ivy Matsepe-Casaburi,
African government to achieve its socio- ICTs present Africans with an opportunity to
economic goals?; and leapfrog decades of development into becoming
Can socio-economic development in South information societies. Government policies in
Africa be effectively assisted by the use of South Africa (ICT Charter) are being established
ICT? which attempt to ensure that all citizens have
the opportunity to access and effectively use
Discussion of these points may assist in the ICT in order to enable them to participate fully
formulation of national (and provincial) ICT in educational, social and economic activities
policies in South Africa and thereby spawn the and democratic processes (Cullen, 2002). In this
setting up of social appropriation of ICT advance- regard, Ne-SDI is an initiative to grow thought
ment programs. Such programs are particularly leadership and intellectual discourse among and
relevant to the digital divide, and the emergence between major sectors of society, namely Higher

90
Context for ICTs Role in South African Development

Education, business / industry, government itself Furthermore, this infrastructure was seen as key
and civil society. to the development of previously disadvantaged
Various spheres of interest in the societal ap- and under-served communities within the country.
plication of ICT exist, such as the digital divide,
information gap, CI and the information society. moving from Policy Formulation
All embrace the idea that ICT can be employed to Implementation
to promote economic growth. Technology plays a
defining role in understanding the concept of the The failure of some governments to achieve the
information society (Oyedemi & Lesame, 2005). goals of ICT policies and the recognition that ICT
There is no universally agreed definition for the policies cannot be understood from the means
term information society. The South African of their execution, provide a rationale for policy
Presidential National Commission on Information implementation research. Policy implementation
Society and Development (PNC on ISAD) defines studies, predominantly in the form of documented
information society as one that has cases studies do offer a variety of explanations, and
these are commonly referred to as the information
Built the necessary capacity to use ICT gap. The arguments and rationale for failure for
maximally to accelerate social and eco- reducing such information gaps differ according
nomic development; to how the process of policy implementation was
Set goals for such development; and conceptualised by the different researchers and
Formulated policy and legislative mea- authors (Grossenbacher, 2000). From a review of
sures to realise these goals. the literature on policy implementation research,
two main conceptual frameworks are identified:
According to the PNC on ISAD, South Africas top-down paradigm and bottom-up approach.
ICT policy assumes that there can be no informa- In the top-down paradigm, Sabatier &
tion society without proper ICT infrastructure Mazmanian (1979, 1980) perceived policy mak-
and delivery mechanisms adapted to the global ing as linear with a clear division between policy
development needs of the people. The second formulation and policy execution. Policy formula-
(post 1994) South African President Thabo Mbeki, tion is seen as political with value judgments while
stated that in co-operation with international and policy execution (i.e. policy implementation) is
regional organisations, government contributes administrative or managerial. Policy implemen-
to the information society through tax and other tation is therefore seen as primarily a technical
incentives. The South African government has process to be carried out by administrative agencies
introduced managed liberalisation of the tele- at the national and sub-national governments. In
communications (and the communications sector South Africa there are three levels of government:
in general), which is designed to encourage the national central government, the nine (second-tier)
entry of new telecommunications companies and provincial governments and the (third-tier) local
to foster competition within the sector (Lesame, government or metropolitan/district municipali-
2005). Managed liberalisation recognised that it ties. In the case of ICT policies this will mean that
was no longer reasonable for the South African decisions by politicians and bureaucrats within
government to own and operate huge telecommu- the Department of Communications are com-
nications and broadcasting infrastructures indefi- municated to managers and planners at central
nitely but to rather foster economic growth and levels who operationalise policies by designing
development by opening these infrastructures to a appropriate programs (with guidelines), rules and
wider ownership and usage by the private sector. monitoring systems. These are then cascaded to

91
Context for ICTs Role in South African Development

the provincial governments and municipalities to CI is the discipline and systematic set of ap-
be put into practice. proaches to the research, design, development,
In the bottom-up approach, Barrett & implementation and evaluation that underpins
Fudge (1981) and Hjern & Hull (1982) argue these activities. The potential impacts of CI fall
that implementation should be regarded as an into five key areas:
integral part of the policy process rather than as
administrative follow on from policy making. Strong democracy: democratic partici-
The political process by which policy is negotiated pation via a meaningful association of
and modified during its formulation do not stop citizens within a community, including po-
when initial policy decisions have been made but litical discussion and online voting among
continue to influence policy through the behaviour others;
of those responsible for its implementation and Social capital development: civic en-
those affected by the policy, who act to protect gagement, social networks, interaction on
and enhance their own interests (Grossenbacher, matters of public concern, solidarity, altru-
2000). Instead of placing a focus on formal ism, loyalty and reciprocity;
organisational hierarchies, communication and Individual empowerment: the ability
control mechanisms, these types of models place of people to gain understanding and con-
more emphasis on trol over personal, social, economic, and
political factors in order to take action to
The multiplicity of actors and agencies in- improve their life situations;
volved in the linkages between them; Enhanced sense of community: facilitat-
The interactions taking between them (par- ing the transition from agrarian to urbanised
ticularly in terms of negotiation and bar- societies, extending local cohesion;and
gaining); and Economic development opportunities:
Their value systems, interests, power bases enabling shared and inclusive commu-
and relative autonomies. nity socio-economic development, small
business encouragement, economies of
In this view, implementers very often play a disaggregation.
significant role in policy implementation. They do
not act as downward-cascaders of policies (such ICT simultaneously increases the porosity
as ICT policies) but act as active participants in a of nation state boundaries and contributes to the
complex process that informs policy upwards as growth of trans-national economies of scale. It also
well. Thus implementers may change the way a provides a means for South Africa to balance the
policy is implemented, or even re-define the objec- disparities in the localised social and economic
tives of the policy because they are closer to the impacts of these developments through the use
problem and the local situation (Grossenbacher, of ICT in locally relevant and beneficial ways.
2000). This approach facilitates the resolution of As part of this process communities are, through
unintended consequences that may arise during the use of ICT being involved in local, national
the course of policy implementation. Since 2000 and international applications to realise effective
the new multi-disciplinary field of CI has arisen social cohesion, civic participation and equity.
reflecting aspects of a bottom-up approach CI is basically a framework and set of collab-
towards socio-economic development (Taylor, orative practices which begin with ICT as a set of
Erwin & Wesso, 2006; Erwin & Taylor, 2006; resources and tools that individuals and communi-
Gurstein, 2007). ties can use to provide access, uptake and usage of

92
Context for ICTs Role in South African Development

Figure 1. Community Informatics: domains and areas of application. Source: Mitrovic (2006).

information management, sharing and processing. gauge the effects of such centres on local com-
Through this use of ICT it is possible to achieve munities. Furthermore, this approach to socio-
community benefits and the electronically-enabled economic development is helpful in understand-
development of community practice (Gurstein, ing other important related issues directly or
1999, 2003; Taylor, 2004). This approach to lo- indirectly, such as1:
cal socio-economic development includes areas
such as electronic commerce, community and The introduction of ICT as a tool to help
civic networks, community Technology Centres, communities meet their needs and aspi-
electronic democracy, cultural enhancement, and rations and in the targeting of effective
online participation (ONeil, 2002) and social uptake and usage of ICT, rather than the
networks; combined with local economic develop- simple provision of access as the basis for
ment, cultural issues, civic activities, community establishing ICT priorities, funding, mea-
based health and environmental initiatives, online surement and evaluation criteria;
support, and service delivery, training and learn- Supporting the community with the neces-
ing networks, and telework (Gurstein, 2003), sary inputs to seed initiatives and as a basis
as shown in Figure 1. for the continuance of investment, not only
CI includes an area of application encompass- in ICT but in the resultant development
ing Education/Training/Learning networks, and outcomes; resulting in broadly embedding
the CI knowledge base has a rich body of experi- the applications in the local community
ence (case studies) regarding the evaluation of and enhancing sustainability;
community networks and community Technol- Ensuring a priority for initiatives to ad-
ogy Centres (also known as telecentres) and in dress the real community based needs of
the development of indicators that can be used to the target communities;

93
Context for ICTs Role in South African Development

Focusing on how to use ICT to improve using a top-down paradigm or whether it will
community outcomes, not simply on be better, following certain kind of standards, to
bringing ICT to the poor and avoiding consider the features of each of the nine provincial
technology-driven approaches designed governments (or municipalities) using a bottom-
externally without a socially-embedded up approach? While we do not specify which
purpose i.e. needs-driven rather than approach should be adopted, we do contend that
technology-driven; ICT policy frameworks (national and provincial)
Leveraging existing community resourc- should be so aligned that they facilitate commu-
esorganisational, leadership, and skills nity engagement and participation towards local
and involving community groups; and decision-making and social appropriation of ICT
Using participatory approaches that en- for local needs (bold style added by authors). The
courage communities to define the need, to opportunities presented by the discipline of CI may
design the implementation based on their augment ICT-based socio-economic development
existing networks and to take ownership. in South Africa.

Currently, CI-based indicators for the assess-


ment of telecentres and their impact on local Future trends
communities are embryonic. Evaluating the social
and economic effects of ICT interventions is a Access to ICT has dominated the agenda of tele-
complex problem, demanding multi-disciplinary communications policies in South Africa since the
approaches (ONeil, 2002; ITU 2006). aim is to redress past inequities (prior to 1994). It
is through the implementation of current policies
that a larger proportion of South African citizens
InFormAtIon And can have access to telecommunications from which
communIcAtIon tecHnologIes they were previously excluded. ICT are now a
standard operating tool in todays information
The use of ICT is not widely socially dispersed society (Jacobs & Herselman, 2006). The long-
in South Africa. The South African government term goal for the South African government should
realises this shortcoming and efforts are under- be to lead the formulation and implementation
way to get ICT to rural areas and to ensure that of ICT policies and frameworks to obtain local
rural people have access to digital and online benefits in the information society. ICT must be
technologies. The USASA is an agency which regarded as a pre-requisite for economic and social
has been set up by the government to facilitate development in South Africa. ICT should be seen
the provision of universal access. Making ICT as tools for facilitating socio-economic develop-
and the associated benefits available in most rural ment as technology per se does not stimulate
areas is a policy implementation challenge faced socio-economic development.
by many governments. South Africa, like many
developing countries, still has a long way to go
to develop and implement its information policy conclusIon
(Oyedemi & Lesame, 2005). Such policies must
be determined according to the different users and Socio aspects of development introduce major
their specific access needs to ICT. This raises the issues not normally addressed or embraced by
question of whether such policies in South Africa economic development approaches. Traditional
should be universalised and implemented by projects and programs often measured success

94
Context for ICTs Role in South African Development

by quantifiable items, such as the number of Erwin, G. J., & Taylor, W. (2006). Assimilation
computers installed, the number of people using by Communities of Internet Technologies: Initia-
the Internet, the amount of money spent on ICT- tives at Cape Peninsula University of Technology,
related infrastructure. The emergence of the World Cape Town . In Marshall, S., Taylor, W., & Yu,
Wide Web allowed connectivity to be extended X. (Eds.), Encyclopedia of Developing Regional
to participation in society by an ill-defined audi- Communities with Information and Communica-
ence. This has threatened the previous paradigm tion Technology (pp. 4046). Hershey, PA: Idea
of government providing information and services Group Publishing.
by giving this audience direct knowledge and
Granqvist, M. (2005). Looking critically at ICT-
access to information and process services of
4Dev: the case of Lincos. Journal of Community
government, including collaboration on policy
Informatics, 2(1), 2134.
and practice. This socio-economic role builds
a democratic form of active citizenship and is Grossenbacher, K. (2000). Implementing the Dis-
altering both the role and methods of all levels trict Health System in KwaZulu-Natal: A Systemic
of government, civil society, Higher Education Inquiry into the Dynamics at the Policy/Practice
Institutions and corporations. Socio aspects, added Interface. Unpublished masters dissertation, Uni-
to economic aspects, of development look towards versity of Natal, Durban, South Africa.
an inclusive society collaborating on societal is-
Gurstein, M. (1999). Flexible networking, in-
sues, including economic policy. Society, now
formation and communications technology and
with unbridled ability for participation between
local economic development, First Monday 4 (2).
groups, including government, is undergoing a
Retrieved March 15, 2003, from http://www.first-
paradigm shift. Government should welcome this
monday.org/issues/issue4_2/gurstein/index.html.
move to government of the people, for the people,
and now, by the people. Gurstein, M. (2003, December). Effective use:
a community informatics strategy beyond the
digital divide, First Monday, 8(12). Retrieved
reFerences June 18, 2004, from http://firstmonday.org/issues/
issue8_12/gurstein/index.html.
Barrett, S., & Fudge, C. (Eds.). (1981). Policy
and Action. London: Methuen. Gurstein. M. (2007). What is Community Infor-
matics (and Why Does It Matter)? Retrieved
Cullen, R. (2002). Addressing the digital divide. February 2008, from http://eprints.rclis.org/
Online Information Review, 25(5), 311320. archive/00012372/01/What is Community Infor-
doi:10.1108/14684520110410517 matics reading.pdf.
DOC. (2009). Launch of the National e-Skills Dia- Hjern, B., & Hull, Ch. (1982). Implementation Re-
logue - From Agrarian, Industrial to Information search as Empirical Constitutionalism. European
Society. Retrieved July 2009, from http://www. Journal of Political Research, 10(June), 105115.
doc.gov.za/index.php?option=com_content&tas doi:10.1111/j.1475-6765.1982.tb00011.x
k=view&id=309&Itemid=457.
ITU. (2006). Measuring ICT for Social and Eco-
nomic Development. World Telecommunication/
Ict Development Report. Retrieved January 2007,
from http://www.itu.int/publications.

95
Context for ICTs Role in South African Development

ITWeb. (2009). Meraka boosts e-skills. Retrieved Oyedemi, T., & Lesame, Z. (2005). South Africa:
July 2009, from http://www.itweb.co.za/sections/ an information Society? In N. C. Lesame (Ed)
business/2009/0903241046.asp?S=IT%20in%20 New Media. Technology and policy in develop-
Government&A=ITG&O=google, 24 March 2009 ing countries (pp. 75-97). Hatfield, Pretoria: Van
Schaik Publishers.
Jacobs, S. J., & Herselman, M. E. (2006). Informa-
tion Access for Development: A Case Study at a Sabatier, P., & Mazmanian, D. (1979). The Condi-
Rural Community Centre in South Africa. Issues tions of Effective Implementation. Policy Analysis,
in Informing Science and Information Technol- 5(Fall), 481504.
ogy, 3, 295306.
Sabatier, P., & Mazmanian, D. (1980). The
Krishna, A. (2002). Active Social Capital, Tracing Implementation of Public Policy: A framework
the Roots of Development and Democracy. New of Analysis. Policy Studies Journal: the Journal
York: Columbia University Press. of the Policy Studies Organization, 8, 538560.
doi:10.1111/j.1541-0072.1980.tb01266.x
Lesame, Z. (2005). Bridging the digital divide in
South Africa. In N. C. Lesame (Ed), New Media. Schware, R. (Ed.). (2005). E-Development: From
Technology and policy in developing countries Excitement to Effectiveness. Washington, DC:
(pp. 17-29). Hatfield, Pretoria, South Africa: Van World Bank Group.
Schaik Publishers.
Snyman, M., & Snyman, R. (2003). Getting in-
Masango, D. (2005). Partnership to bring IT to formation to disadvantaged rural communities:
MPCCs countrywide. Compiled by the Government the centre approach. South African Journal of
Communication and Information System, 3 Oct. Library and Information Science, 69(2), 95107.
Retrieved September 22, 2008, from http://www.
South Africa (2005). South Africa Millennium
buanews.gov.za/news/05/05100316451001.
Goals. Country Report 2005.
Masango, D. (2007). ICT Key for Econom-
Taylor, W. (2004). Community Informatics: The
ic Growth, development. Compiled by the
basis for an emerging social contract for gover-
Government Communication and Informa-
nance, research and teaching. Building & Bridging
tion System, 23 Oct. Retrieved September
Community Networks: Knowledge, Innovation &
22, 2008, from http://www.buanews.gov.za/
Diversity through Communication. Brighton, UK,
news/07/07102316151004.
31 March and 1-2 April.
Mitrovic, Z. (2006). ICT and small business
Taylor, W. J., Erwin, G. J., & Wesso, H. (2006).
development: the importance of government sup-
New public policies for the emerging informa-
port and community involvement. Unpublished
tion society in South Africa - a strategic view.
working paper.
Governments and Communities in Partnership
ONeil, D. (2002). Assessing community infor- conference, Centre for Public Policy, University of
matics: a review of methodological approaches for Melbourne, 25-27 September. Retrieved Septem-
evaluating community networks and community ber 2007, from http://www.public-policy.unimelb.
technology centres. Internet research: electronic edu.au/conference 06/Taylor W.pdf.
networking applications and policy, 12(1), 76-102.

96
Context for ICTs Role in South African Development

UnitedNations (UN). (2003). Tools for Develop- potential policy impact as possible, to lessen the
ment - Using Information and Communications chances that a given policy will have unexpected
Technology to Achieve the Millennium Develop- or unintended consequences.
ment Goals. Working Paper, United Nations ICT Social Network: Is a social structure made of
Task Force, August. nodes (which are generally individuals or organisa-
tions) that are tied by one or more specific types of
interdependency (e.g. values, visions, ideas, etc).
Socio-Economic Development: Refers to
key terms And deFInItIons
continuous improvement in the well-being and
Community Informatics (CI): Refers to an in the standard of living of the people.
emerging set of principles and practices concerned Telecentres: Are a public place where citizens
with the social appropriation of information and can access computers, the Internet, and other
communication technologies for the personal, digital technologies that enable them to gather
social, cultural or economic development of and information, create, learn, and communicate with
within communities. others while they develop essential digital skills.
Digital Divide: Refers to the unequal access World Wide Web: (Commonly abbreviated
by some members of society to information and as the Web) is a very large set of interlinked
communication technologies and the unequal hypertext documents accessed via the Internet.
acquisition of related skills.
Information Society: Is a society in which the
creation, distribution, diffusion, use, integration endnote
and manipulation of information is a significant 1
See, for example, Gurstein (2003); Krishna
economic, political, and cultural activity.
(2002); Schware (2005); Granqvist (2005)
Policy Formulation: Is a process that typically
for a more detailed insight into these issues.
includes an attempt to assess as many areas of

97
98

Chapter 7
Cybercrime Regulation:
The Nigerian Situation
Alex Ozoemelem Obuh
Delta State University, Nigeria

Ihuoma Sandra Babatope


Delta State University, Nigeria

AbstrAct
This chapter discusses cybercrime and cybercrime regulation in the Nigeria. It gives the meaning to
cybercrime, types of cybercrimes (of which advance fee fraud is the most prevalent in Nigeria), means
of perpetrating cybercrimes, the current situation and efforts towards combating cybercrime in Nigeria.

IntroductIon ties. Computers are increasingly more affordable


and Internet connectivity is also becoming com-
Advancements in information and communication monplace. The introduction and embracement of
technologies (ICTs) have led to the representation the Global System for Mobile Communication
of different types of information in electronic (GSM) in Nigeria and the influx of digital and
formats. The consequence is that currently text, online services such as the MP3 players, Ipod,
pictures and voice can all be digitised. Along with cell phones with internet access and blogs (instant
these geometric changes in information presenta- news reporting on personal and corporate web
tion and distribution are tandem demands in user pages) (Longe & Chiemeke, 2008)
expectations for more rapid, open, and global Cybercrime is a major concern to the global
access to information than has been available in community. The introduction, growth, and utilisa-
the past. However, this migration from traditional tion of information and communication technolo-
communication medium to the new mediat seems gies (ICTs) have been accompanied by an increase
to constitute a threat to the existence of a number in criminal activities (Parker, 1998). With respect
of traditional print institutions and has provided a to cyberspace, the Internet is increasingly used
platform for fraudulent (criminal) Internet activi- as a tool and medium by transnational organised
crime (Lyman & Potter, 1998). Cybercrime is an
DOI: 10.4018/978-1-61692-012-8.ch007 obvious form of international crime that has been

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Cybercrime Regulation

affected by the global revolution in ICTs (Parker, in the world with 5.7 per cent of perpetrators of
1998). As a recent study noted, cybercrimes differ cybercrime (2007 Internet Crime Report). The Ni-
from terrestrial crimes in the following four ways gerian government has over the years enacted far-
(McConnell, 2000): reaching laws aimed at checkmating transnational
organized crime and punishing the perpetrators
They are easy to learn how to commit; of these crimes. Efforts in regulating cybercrimes
They require few resources relative to the such as advance fee fraud and 419 are reflected in
potential damage caused; the Criminal Code Act, Economic and Financial
They can be committed in a jurisdiction Crimes Commission Act 2004, Computer Security
without being physically present in it; and and Critical Information Infrastructure Protection
They are often not clearly illegal. Bill 2005 and Advance Fee Fraud and other Fraud
Related Offences Act 2006.
On such a basis, cybercrimes present new chal- This chapter is aimed at explaining the concept
lenges to lawmakers, law enforcement agencies, of cybercrime especially as it relates to Nigeria,
and international institutions. This necessitates the issues relating to cybercrime legislation and sug-
existence of an effective supra-national as well as gests ways of getting out of these problems in the
domestic mechanisms that monitor the utilisation present days of internet usage and applications.
of ICTs for criminal activities in cyberspace.
Nigerian 419 scam has become a major con-
cern for the global community. The introduction, bAckground
growth and utilization of information and tele-
communication technologies (ICTs) have been Cybercrime is generally regarded as any illegal ac-
accompanied by an increase in illegal activities. tivity conducted through a computer. Cybercrime
With respect to cyberspace, anonymous servers, is any criminal activity employing an information
hijacked emails and fake websites are being used system (which may not be computerized) as the
as a tool and medium for fraud by cyber scam- channel through which it is committed (Parker,
mers. Nigerian advance fee fraud on the Internet 1998). It is illegal computer -mediated activities
is an obvious form of cybercrime that has been which often take place in the global electronic
affected by the global revolution in ICTs. This networks (Thomas & Loader, 2000). Cybercrime
form of crimes is not exclusive to advance sums is when criminals use computers or networks as
of money to participate into business proposals but a tool, place, or target for criminal activity and
also covers romance, lottery and charity scams. behavior. The evolvement of cybercrime has af-
The term 419 is coined from section 419 of fected law enforcement agencies and society. En-
the Nigerian criminal code (part of Chapter 38: forcement has led to the creation of laws, policies,
Obtaining Property by false pretences; Cheating) and legislature. Law enforcement agencies must
dealing with fraud. Currently, the axiom 419 vigorously fight and prevent cybercrime in order to
generally refers to a complex list of offences help create a society that is safer (Thomas, 2006).
which in ordinary parlance are related to stealing, Cybercrime is a major problem faced by
cheating, falsification, impersonation, counterfeit- businesses attempting to establish and maintain
ing, forgery and fraudulent representation of facts an online presence (Smith & Rupp, 2002), and
(Tive, 2006). cybercrime attacks can potentially be just as
According to 2007 Internet Crime Report damaging to a nations infrastructure as attacks
prepared by the National White Collar Crime by classical criminals. Computer-related crime
Centre and the FBI, Nigeria currently ranks third includes theft of telecommunications services or

99
Cybercrime Regulation

computer services by using hacking techniques. Wilson (2000) cites the need to combat com-
Servers and websites could be targets of denial- puter crime, cyber terrorism and information war-
of-service attacks, viruses and worms. Computers fare on parallel paths. Development of effective
are also used as instruments to commit crime, such security countermeasures for each and every type
as modification of data, electronic vandalism, of attack are needed to control potential threats.
forgery and counterfeiting, information piracy,
industrial espionage and copyright infringement.
There are many types of computer-related crime cybercrIme In nIgerIA
involving attacks on banks or financial systems,
as well as fraud involving transfer of electronic A nation with high incidence of crime cannot
funds. Other problems involve telemarketing and grow or develop. That is so because crime is the
phishing or spoofing spam. Existing offences direct opposite of development. It leaves a nega-
such as extortion and harassment are also carried tive social and economic consequence (Sylvester,
out online. In recent years, increasing attention 2001). For Nigeria, a nation in the process of
has been devoted to the relation between terrorism saving her face regarding cybercrimes, efforts are
and the Internet, as the Internet is being used to now being directed at the sources and channels
facilitate terrorist financing and as a logistics tool through which cybercrimes are being perpetuated:
for planning terrorist acts (United Nations, 2005). the most popular one being Internet access points.
Cybercrime uses the unique features of the Most of the cybercrimes perpetrated in Nigeria
Internt: sending of e-mail in seconds, speedy generally are targeted at individuals and not neces-
publication/ dissemination of information through sarily computer systems, hence they require less
the web to anyone on the planet. Computer attacks technical expertise. The damage done manifests
can be generated by criminals from anywhere in itself in the real world. Human weaknesses such
the world, and executed in other areas, irrespec- as greed and gullibility are generally exploited.
tive of geographic location. Often these criminal The damage dealt is largely psychological and
activities can be faster, easier and more damaging financial. These crimes are similar to theft, and
with the use of the Internet (Awe, n.d.). the likes that have existed for centuries offline
Regulation is a rule or order prescribed for man- even before the development of high-tech equip-
agement or government; prescription; a regulating ment. Through the internet, the same criminals or
principle; a governing direction; precept; law; as, persons with criminal intents have simply been
the regulations of a society or a school. According given a tool which increases their potential pool
to the free dictionary (2009), regulation is the act of victims and makes them all the harder to trace
or process of regulating or a rule, principle, or and apprehend (Aghatise, 2006).
condition that governs procedure or behavior. Also The challenge in fighting cybercrimes today
according to Merriam-Webster dictionary (2009) relates to the fact that cybercrimes have been in
defines regulation as a rule or order issued by an existence for only as long as the cyber space ex-
executive authority or a regulatory agency of a ists. This explains the unpreparedness of society
government and having the force of law. and the world in general towards combating them
Cybercrime Regulation therefore implies a (Longe & Chiemeke 2008). Numerous crimes are
regulating process which entails a rule, principle committed daily on the Internet with Nigerians
or conditions that governs behaviour or procedure at the forefront of sending fraudulent and bogus
as they relates to cybercrime. And such must be financial proposals all over the world. Criminals
issued by an executive authority or a regulatory involved in the advance fee fraud schemes (419)
agency of a government and enforceable by law. are now popularly referred to as yahooboys in

100
Cybercrime Regulation

Nigeria. The nation has therefore carved a niche of the original owner of the software. This
for herself as the source of what is now generally is known as Internet piracy. Modern day
referred to as 419 mails named after Section 419 piracy may be less dramatic or exciting but
of the Nigerian Criminal Code (Cap 777 of 1990) is far subtler and more extensive in terms of
that prohibits advance fee fraud. the monetary losses the victim faces. This
The following categories of crime are the most particular form of cybercrime may be the
common ones in the Nigerian Internet landscape hardest of all to curb as the common man
(Longe & Chiemeke, 2008). also seems to be benefiting from it.
(d) Hacking: Young Nigerians can be observed
(a) Hucksters: Hucksters are characterized on daily basis engaging in brainstorming ses-
by a slow turnaround from harvest to first sions at cybercafs trying to crack security
message (typically at least 1 month), a codes for e-commerce, Automated Teller
large number of messages being sent to Machine (ATM) cards and e-marketing
each harvested spam-trapped addresses, product sites. The surprising thing is that
and typical product based Spam (i.e. Spam even with their low level of education or
selling an actual product to be shipped or understanding of the intricacies of comput-
downloaded even if the product itself is ing techniques, they get results! Phishing is
fraudulent). Email addresses are obtained also becoming popular as criminals simulate
from Internet access points using e-mail product websites to deceive innocent Internet
address harvesting software (web spiders) users into ordering products that are actually
such as E-Mail Extractor Lite1.4. These tools non-existent. Phishing refers to imitating
can automatically retrieve e-mail addresses product and e-commerce web pages in order
from web pages. They are therefore referred to defraud unsuspecting users. This method
to as harvesters (Longe, & Chimeke, 2006) is used mostly to obtain credit card numbers.
(b) Fraudsters: The fraudsters are characterized
by an almost immediate turnaround from
harvest to first message (typically less than HAvens For PerPetrAtIng
12 hours), only a small number of messages cybercrImes In nIgerIA
are sent to each harvested addresses (e.g.
phishing, advanced fee fraud-419 from Cybercafs provide havens for perpetration of
the Nigerian perspective). Fraudsters often cybercrimes in Nigeria (Adomi & Igun, 2008)
harvest addresses and send only a message Apart from the availability and usage of Internet
to them all at a particular time. The tools facilities in cyber cafes for scam mails and other
for getting addresses are mailing address cybercrimes, the evolution of fixed wireless facili-
extractors (Longe & Chiemeke, 2006). ties in the Nigerian network landscape has added
(c) Piracy: Piracy involves the illegal reproduc- another dimension to the cybercrimes problem
tion and distribution of software applications, (Longe and Chiemeke, 2008). Fraudsters who
games, movies and audio CDs. (Longe, can afford to pay for Internet connection via fixed
2004). This can be done in a number of wireless lines can now perpetrate their evil acts
ways. Usually pirates buy or copy from the within the comfort of their homes.
Internet an original version of a software, In some cybercafs, a number of systems are
movie or game and illegally make copies of dedicated to fraudsters (popularly referred to as
the software available online for others to yahoo boys) for the sole purpose of hacking
download and use without the notification and sending fraudulent mails. Other cybercafs

101
Cybercrime Regulation

share their bandwidth (popularly referred to as Annual global loss of $ 1.5 billion in 2002.
home use) to some categories of customers who 6% of global Internet spam in 2004.
acquire systems for home use in order to per- 15.5% of total reported FBI fraud in 2001.
petuate cybercrimes from their homes (Longe & Highest median loss of all FBI Internet
Chiemeke, 2008). fraud of $ 5,575.
Efforts at preventing financial Cybercrime in VeriSign, Inc., ranked Nigeria 3rd in to-
Nigeria are on both at entrepreneurial, private and tal number of Internet fraud transactions,
public pedestal. For caf owners, notices are pasted accounting for 4.81% of global Internet
on walls warning of possible arrests of scammers fraud.
who send fraudulent mails. Individuals can only American National Fraud Information
take precautions within the limit of the knowledge Centre reported Nigerian money offers as
of the dynamics of the Internet and the e-mail sys- the fastest growing online scam, up 900%
tem. Users are generally learning not to respond in 2001.
to scam mails or mails presenting financial bogus
proposals. For the government, the Economic and Nigerian Cybercrime has the potential to im-
Financial Crimes Commission (EFCC) has been pact technology growth which is a key requirement
given powers to arrest and prosecute individuals for productivity improvement, and ultimately for
and organisations suspected to be involved in the socio-economic growth because (WITFOR 2005;
promotion of cybercrimes. The bill on cybercrime Adomi & Igun, 2007):
has also been passed by the National Assembly
and it is not unusual to see bill boards donning International financial institutions now
Nigerian roads warning cybercriminals that the view paper-based Nigerian financial in-
hands of the law will soon get to them (Longe struments with scepticism. Nigerian bank
& Chiemeke, 2008). drafts and checks are not viable interna-
tional financial instruments.
Nigerian ISPs and email providers are al-
eFFects oF cybercrIme ready being black-listed in e-mail blocking
on nIgerIA blacklist systems across the Internet.
Some companies are blocking entire
According to Chawki, (2009), an Internet Crime Internet network segments and traffic that
Report in 2007 prepared by the National White originate from Nigeria.
Collar Crime Centre and the FBI, Nigeria cur- Newer and more sophisticated technolo-
rently ranks third in the world with 5.7 per cent of gies are emerging that will make it easier
perpetrators of cybercrime (2007 Internet Crime to discriminate and isolate Nigerian e-mail
Report). Though the perpetrator percentage of traffic.
5.7 from Nigeria appears low, we can regard it Key national infrastructure and informa-
as rather high considering that less than 10 per tion security assets are likely to be dam-
cent of the 150 million population of Nigeria use aged by hostile and fraudulent unauthor-
the internet (Adomi, 2007). In Africa, though ized use.
internet use is higher in South Africa, cybercrime
perpetrators percentage is higher for Nigeria than Accordingly cybercrime has created an image
South Africa. Cybercrime has a negative impact nightmare for Nigeria. When one comes across
on Nigeria. It can be explained in the terms of the phrases like Nigerian scam, the assumption
following statistics (WITFOR 2005): which crosses ones mind is that virtually all

102
Cybercrime Regulation

scam e-mails originate from Nigeria or Nigerians, Any person who by any false pretence, and with
though this is actually not the case . Advance fee intent to defraud, obtains from any other person
fraud has brought disrepute to Nigeria from all anything capable of being stolen, or induces any
over the world. Essentially, Nigerians are treated other person to deliver to any person anything
with suspicious in business dealing. Consequently, capable of being stolen, is guilty of a felony, and
the honest majority of Nigerians suffer as a result is liable to imprisonment for three years. If the
(Adomi & Igun, 2008). thing is of the value of one thousand naira or
upwards, he is liable to imprisonment for seven
years. It is immaterial that the thing is obtained
cybercrIme regulAtory or its delivery is induced through the medium
eFForts In nIgerIA of a contract induced by the false pretence. The
offender cannot be arrested without warrant un-
It has been argued that organized crime weakens less found committing the offence. (Laws of the
the very foundation of democracy, as there can Federation of Nigeria, 2009)
be no good governance without rule of law. This
observation is quite apt for the situation in Nigeria. Furthermore, a suspect could alternately be
As the nation faces the challenges of nurturing a charged under section 421 of the Criminal Code
stable democracy, after many years of military Act which provides as follows:
dictatorship, organized crime poses a great threat
to the survival of the country. Therefore, the Ni- Any person who by means of any fraudulent trick
gerian government has mapped out strategies to or device obtains from any other person anything
deal with cybercrimes (Chawki, 2009). capable of being stolen, or induces any other per-
son to deliver to any person anything capable of
1. legislative Approaches being stolen or to pay or deliver to any person any
money or goods, or any greater sum of money or
The Nigerian government has, over the years, greater quantity of goods than he would have paid
enacted far-reaching laws aimed at checkmating or delivered but for such trick or device, is guilty
transnational organized crimes and punishing of a misdemeanour, and is liable to imprisonment
the perpetrators of these crimes. Under this sub- for two years. A person found committing the of-
section, we shall focus on the Criminal Code fence may be arrested without warrant. (Laws
Act, Economic and Financial Crimes Commis- of the Federation of Nigeria, 2009)
sion Act 2004, Computer Security and Critical
Information Infrastructure Protection Bill 2005 The Criminal Code is a British legacy which
and Advance Fee Fraud and other Fraud Related predates the Internet era and understandably does
Offences Act 2006. not specifically address email scams (Oriola,
2005). Advance fee fraud methodology obvi-
Criminal Code Act ously falls within the remit of the Act for the
following reasons: first, there is a false pretence
Advance fee fraud scam under the Nigerian to the existence of non-existent money; second, a
Criminal Code Act, qualifies as a false pretence solicitation for financial help to get the fictitious
(section 418), while a successful Internet scam money released; and third, the fraudulent retention
would amount to a felony under section 419. This of various fees paid to the scammers to release the
section provides as follows: phony millions of dollars. The scammers modus

103
Cybercrime Regulation

operandi fits snugly the elements of the offence Economic and Financial Crimes
under section 419 of the Criminal Code Act cited Commission Act 2004
above, and have been used for years by the Ni-
gerian law enforcement agencies for prosecuting The Economic and Financial Crimes Com-
alleged acquisition of property by false pretence mission (EFCC) Act was adopted in June 2004.
(Oriola, 2005). However, the Criminal Code Act Under this act, the Commission has the power
provisions on advance fee fraud are ill-suited for to investigate all financial crimes relating to ter-
cyberspace criminal governance. Oriola (2005) rorism, money laundering, drug trafficking, etc.
argues that: Sections 14-18 stipulate offences within the remit
of the Act. This includes offences in relation to
Although section 419 of the Criminal Code Act financial malpractices, offences in relation to
deems advance fee fraud a felony, the provision terrorism, offences relating to false information
that an advance fee fraud suspect cannot be and offences in relation to economic and financial
arrested without a warrant, unless found com- crimes [Chawki, 2009].
mitting the offence, does not reflect the crimes
presence or perpetration in cyberspace. Only in Money Laundering (Prohibition) Act
rare circumstances could a suspect be caught in 2004
the act because most of the scam emails are sent
from Internet cafs. Aside from the fact that the According to Chawki (2009) the Money Laun-
country lacks the resources to police every known dering (Prohibition) Act 2004, makes provisions
cyber cafe, doing so could actually raise privacy for prohibition of the laundering of the proceeds
or other rights issues. If found guilty, an advance of crime or an illegal act. Although advance fee
fee fraudster is liable to a mere three years im- fraud is not expressly mentioned in the Act, pro-
prisonment or seven years if the value of stolen ceeds of the scam would appear covered under
property exceeds 1000 naira. The punishment, section 14(1) (a) which, prohibits the concealing
to say the least, is paltry relative to the enormity or disguising of the illicit origin of resources or
of the crime and unjust rewards that character- property which are the proceeds of illicit drugs,
istically run into millions of dollars. Thirdly, in narcotics or any other crime. The Act also im-
criminal trials, the State is the complainant, and plicates any person corporate or individual who
there is hardly any compensation for victims of aids or abet illicit disguise of criminal proceeds.
crime under the Nigerian criminal justice system. Section 10 makes life more difficult for money
The victims could no doubt resort to civil court launderers. Subsection (1) places a duty on every
for remedies. However, the prospects for success financial institution to report within seven days
for the plaintiff in the typical advance fee fraud to the Economic and Financial Crimes Commis-
case scenario are extremely slim. For instance, a sion and the National Drug Law Enforcement
contract to assist in the transfer from Nigeria of Agency any single transaction or transfer that is
millions of dollars illegally to a foreign account, in excess of N1m (or US$7,143) in the case of
or to pay bribes to certain government officials an individual or N5m (US$35,714) in the case
to ensure release of such moneys, or to facilitate of a body corporate (Chukwuemerie, 2006). Any
advance fee payment for patently illegal activi- other person may under sub-section (2) also give
ties, would be unenforceable. The plaintiff would information on any such transaction, or transfer.
be branded as a party to a culpable crime by the Under sub-section (6) even if a transaction is
Nigerian courts. below US$5,000 or equivalent in value, but the

104
Cybercrime Regulation

financial institution suspects or has reasonable AFF and other Fraud Related Offences
grounds to suspect that the amount involved in the Act 2006
transaction is the proceed of a crime or an illegal
act it shall require identification of the customer. Another relevant legislative measure in the
In the same way, if it appears that a customer may fight against advance fee fraud on the Internet is
not be acting on his own account, the financial the Advance Fee Fraud and other Fraud Related
institution shall seek from him by all reasonable Offences Act 2006. This is a replacement of an
means information as to the true identity of the Act of the same title passed in 1995. The act pre-
principal (Chukwuemerie, 2006). This enables scribes, among others, ways to combat cybercrime
authorities to monitor and detect suspicious cash and other related online frauds. The Act provides
transactions. for a general offence of fraud with several ways
of committing it, which are by obtaining property
Computer Security and Critical by false pretence, use of premises, fraudulent
Information Infrastructure Protection invitation, laundering of fund obtained through
Bill 2005 unlawful activity, conspiracy, aiding, etc. Section
2 makes it an offence to commit fraud by false
In 2005, the Nigerian government adopted the representation. Subsection (2)(a) and (2)(b) makes
Computer Security and Critical Information Infra- clear that the representation must be made with
structure Protection Bill (known as the Cybercrime intent to defraud. Section 3 makes it an offence if
Bill). The Bill aims to secure computer systems a person who is being the occupier or is concerned
and networks and protect critical information in the management of any premises, causes or
infrastructure in Nigeria by prohibiting certain knowingly permits the premises to be used for
computer based activities and to impose liability any purpose which constitutes an offence under
for global crimes committed over the Internet. The this Act. This section provides that the sentence
Bill requires all service providers to record all for this offence is the imprisonment for a term of
traffic and subscriber information and to release not less more than 15 years and not less than five
this information to any law enforcement agency years without the option of a fine.
on the production of a warrant. Such information Section 4 refers to the case where a person who
may only be used for legitimate purposes as de- by false pretence, and with the intent to defraud
termined by a court of competent jurisdiction, or any other person, invites or otherwise induces
other lawful authority. The Bill does not provide that person or any other person to visit Nigeria
independent monitoring of the law enforcement for any purpose connected with the commission
agencies carrying out the provisions, nor does the of an offence under this Act. The sentence for
Bill define law enforcement agency or lawful this offence is the imprisonment for a term not
authority. Finally the Bill does not distinguish more than 20 years and not less than seven years
between serious offences and emergencies or without the option of a fine.
minor misdemeanours. As a result it may conflict According to section 7, a person who conducts
with Article 37 of Nigerias Constitution, which or attempts to conduct a financial transaction which
guarantees the privacy of citizens including their involves the proceeds of a specified unlawful
homes and telephone conversations, absent a threat activity with the intent to promote the carrying
on national security, public health, morality, or on of a specified unlawful activity; or where the
the safety of others (Chawki, 2009), transaction is designed to conceal or disguise the
nature, the location, the source, the ownership or

105
Cybercrime Regulation

the control of the proceeds of a specified unlaw- The Economic and Financial Crimes
ful activity is liable on conviction to a fine of N l Commission (EFCC)
million and in the case of a director, secretary or
other officer of the financial institution or corporate The Economic and Financial Crimes Com-
body or any other person, to imprisonment for a mission (EFCC) is a Nigerian law enforcement
term, not more than 10 years and not less than agency that investigates financial crimes such as
five years (EFCC Act, 2004). advance fee fraud (419 fraud) and money launder-
However, while in previous laws the onus ing. The EFCC was established in 2003, partially
was on the government to carry out surveillance in response to pressure from the Financial Action
on such crimes and alleged criminals, the new Task Force on Money Laundering (FATF), which
law vests this responsibility on industry players, named Nigeria as one of 23 countries non-coop-
including ISPs and cybercaf operators, among erative in the international communitys efforts
others. While the Economic and Financial Crimes to fight money laundering. The Commission is
Commission (EFCC) becomes the sub-sector regu- empowered to investigate, prevent and prosecute
lator, the Act prescribes that henceforth, any user offenders who engage in
of Internet services shall no longer be accepted as
anonymous. Through what has been prescribed as money laundering, embezzlement, bribery, loot-
due care measure, cybercafs operators and ISPs ing and any form of corrupt practices, illegal arms
will henceforth monitor the use of their systems deal, smuggling, human trafficking, and child
and keep a record of transactions of users (Adomi, labour, illegal oil bunkering, illegal mining, tax
& Igun, 2008). These details include, but are not evasion, foreign exchange malpractices including
limited to, photographs of users, their home ad- counterfeiting of currency, theft of intellectual
dress, telephone, email address, etc. So far, over property and piracy, open market abuse, dumping
20 cybercafs have been raided by the EFCC as of toxic wastes, and prohibited goods (Ribadu,
of August 7, 2007. The operators appear set to 2006, p.4).
comply with the law by notifying users of the
relevant portion of the law, corporate user policy, The Commission is also responsible for iden-
firewall recommendation, protection procedure, tifying, tracing, freezing, confiscating, or seizing
indemnity and right of disclosure, and so forth proceeds derived from terrorist activities. EFCC
(Adomi and Igun, 2008) is also host to the Nigerian Financial Intelligence
Unit (NFIU), vested with the responsibility of
2. Administrative measures collecting suspicious transactions reports (STRs)
from financial and designated non-financial in-
Administrative measures chiefly involve the stitutions, analyzing and disseminating them to
setting-up of special bodies by the Nigerian gov- all relevant Government agencies and other FIUs
ernment to combat advance fee fraud. Equally all over the world (Ribadu, 2006). In addition to
important, however, are the technical measures any other law relating to economic and financial
which these bodies then take to prevent and/ crimes, including the criminal and penal codes,
or prosecute this activity, and these will also EFCC is empowered to enforce all the pre-1999
be examined below. It must be emphasised that anti-corruption and anti-money laundering laws.
many European countries have established special Punishment prescribed in the EFCC Establishment
computer units to take specific measures against Act range from combination of payment of fine,
cybercrime. The following are some examples of forfeiture of assets and up to five years imprison-
these bodies (Chawki, 2009): ment depending on the nature and gravity of the

106
Cybercrime Regulation

offence (Ribadu, 2006). Conviction for terrorist responsiveness to forwarding records to the NFIU
financing and terrorist activities attracts life im- (International Narcotics Control Strategy Report,
prisonment. It must be mentioned that EFCC has 2006). Under the EFCC act, whistle-blowers are
excellent working relationship with major Law protected. Nigeria has no secrecy laws that prevent
Enforcement Agencies all over the world (Ribadu, the disclosure of client and ownership information
2006). These include the International Criminal by domestic financial services companies to bank
Police Organization (INTERPOL), the United regulatory and law enforcement authorities (Inter-
Kingdom (UK) Metropolitan Police, Federal Bu- national Narcotics Control Strategy Report, 2006).
reau of Investigations (FBI), Canadian Mounted The NFIU has access to records and databanks of
Police, the Scorpions of South Africa, etc. all government and financial institutions, and it
has entered into memorandums of understandings
(MOUs) on information sharing with several other
nIgerIAn FInAncIAl financial intelligence centres. The establishment
IntellIgence unIt (nFIu) of the NFIU is part of Nigerias efforts toward
removal from the NCCT list (International Nar-
In 2005, the EFCC established the Nigerian cotics Control Strategy Report, 2006).
Financial Intelligence Unit (NFIU). The NFIU
draws its powers from the Money Laundering Nigerian Cybercrime Working Group
(Prohibition) Act of 2004 and the Economic and (NCWG)
Financial Crimes Commission Act of 2004. It
is the central agency for the collection, analysis The NCWG is an inter-agency body comprising
and dissemination of information on money law enforcement, intelligence, security as well as
laundering and terrorism financing. All financial ICT agencies of Government and key private sec-
institutions and designated non-financial institu- tor ICT organizations (NCWG website, 2008). It
tions are required by law to furnish the NFIU with was established by the Federal Executive Council
details of their financial transactions. Provisions (FEC) on the recommendation of his Excellency
have been included to give the NFIU power to President of Nigeria on March 31 2004. The group
receive suspicious transaction reports made by was created to deliberate on and propose ways of
financial institutions and non-designated financial tackling the malaise of Internet 419 in Nigeria.
institutions, as well as to receive reports involv- This includes (NCWG, 2008):
ing the transfer to or from a foreign country of
funds or securities exceeding $10,000 in value Educating Nigerians on cybercrime and
(International Narcotics Control Strategy Report, cybersecurity;
2006). The NFIU is a significant component of Undertaking international awareness
the EFCC. It complements the EFCCs directorate programs for the purpose of informing
of investigations but does not carry out its own the World of Nigerias strict Policy on
investigations. It is staffed with competent offi- Cybercrime and to draw global attention to
cials, many with degrees in accounting and law the steps taken by the Government to rid
(International Narcotics Control Strategy Report, the country of Internet 419 in particular
2006; Chawki (2009)). and all forms of cybercrimes;
The Nigerian Financial Intelligence Unit Providing legal and technical assistance to
(NFIU) is playing a pivotal role in receiving the National Assembly on cybercrime and
and analyzing Suspicious Transactions Reports cybersecurity12 in order to promote gen-
(STRs). As a result, banks have improved their

107
Cybercrime Regulation

eral understanding of the subject matters arrests, and precautions of cybercafs and cyber-
amongst the legislators; criminals as a result of the constant embarrassment
Carrying out institutional consensus build- posed to the Nigerian Federal Government by
ing and conflict resolutions amongst law their nefarious activities. Some Nigerian fraud-
enforcement, intelligence and security sters have perfected the act of using the internet
Agencies in Nigeria for the purpose of eas- via cybercafs as their criminal platform to dupe
ing any jurisdictional or territorial conflicts unsuspecting citizens across the globe (Adomi and
or concerns of duties overlap; Igun, 2008). This ban on night browsing is likely
Reviewing, in conjunction with the Office to negatively affect clients who use the cafes for
of the Attorney General of the Federation, academic and other useful and positive purposes
all multilateral and bilateral treaties be- in night browsing sessions. Other decisions of
tween Nigeria and the rest of the World on EFCC and ATCON reached to combat cybercrime
cross-border law enforcement known as include (Adomi and Igun, 2008):
Mutual Legal Assistance Treaties (MLAT),
for the purpose of amending the operative Undertaking international awareness
legal framework to enable Nigeria secure programs for the purpose of informing
from, as well as render, extra-jurisdictional the World of Nigerias strict Policy on
assistance to its MLAT Partners in respect Cybercrime and to draw global attention to
of cybercrime. the steps taken by the Government to rid
the country of Internet 419 in particular
3. technical measures and all forms of cybercrimes;
That each sector of the telecom industry,
Criminals are often quicker to exploit new tech- namely the global system for mobile com-
nologies than law-enforcers who, to some extent, munication operators, private telecomm
always seem behind the game. In order to operators and cybercafs should come
salvage Nigeria from the negative consequences up with a due care document that would
of cybercrime, the government has been making be a standard guide and proffer measures
frantic efforts to ensure that this malaise is nipped for the effective policing of cybercrime in
in the bud. These efforts are discussed below Nigeria;
(Chawki, 2009): That all cyber cafes must be registered
with the Corporate Affairs Commission,
Regulation of Cybercafs NCC and EFCC;
That cybercafs will now be run on mem-
Cybercafs in Nigeria render overnight brows- bership basis instead of pay-as-you-go;
ing, a special internet service is offered by cyber- All cybercafs must install acceptable
cafs from 10.00 p.m. to 6.00 a.m. This service hardware surveillance;
allows users who have a lot to obtain from the net The architecture of cyber cafes must be
to do so at a minimal cost (Adomi, 2007). Though done such that all computers are exposed;
overnight browsing is very important and useful ATCON members must subscribe to regis-
to cybercaf users, it was banned by the EFCC tered and licensed ISP in the country;
and the Association of Cybercaf and Telecentres Each cybercaf is expected to be a watch-
Owners (ATCON) in Nigeria (Adomi, 2008). The dog to others, as they have been detailed
ban is coming on the heels of several attempts by to have direct access to EFCC (Adomi &
the EFCC to arrest the ugly trend through raids, Igun, 2008).

108
Cybercrime Regulation

Government Partnership with Microsoft nity. Teenagers are one of the top cyber criminals.
Providing community awareness workshops for
The Government of Nigeria and Microsoft both parents, and teenagers, are important. Com-
Corp signed a Memorandum of Understanding munity policing is just as important, there must
defining a framework for co-operation between be online leadership promoting safe neighbour-
Microsoft and the Economic and Financial Crimes hoods and providing citizens with information
Commission (EFCC) of Nigeria with the aim on possible security breaches on their systems
of identifying and prosecuting cybercriminals, and networks (Thomas, 2006).
creating a safe legal environment and restore Most home users and businesses do not realize
hundreds of millions of dollars in cost investment the vulnerabilities in their networks or systems
(Chawki, 2009). This agreement is the first of its until it is too late. Law enforcement agencies must
kind between Microsoft and an African govern- cross the line into the information age and take
ment and will give the EFCC access to Microsoft an active part in identifying such vulnerabilities
technical expertise information for successful in a timely manner. Law enforcement must target
enforcement. The Memorandum combats issues those criminals who create spam, spyware, adware,
such as spam, financial scam, phishing, spyware, viruses, and worms. They are the heart of corrup-
viruses, worms, malicious code launches and tion on the Internet. One must work in a pyramid,
counterfeiting. Microsoft is expected to instruct finding the creators of the viruses and worms will
Nigerian investigators on techniques of extracting create a better Internet (Thomas, 2006)
useful information from PCs compromised by Although there are already examples of codes
botnet attacks, how to monitor computer network of conduct, which have been introduced online
to detect such attacks, and how to identify the to tackle the problem of cybercrime and advance
people behind them. Microsoft will also provide fee fraud, a self-regulation system should also be
leads on spam emanating from Nigeria, enabling introduced. Self-regulation is based on three key
the authorities to pursue investigations more elements (Chawki, 2009): first, involvement of all
quickly and successfully (Adomi & Igun, 2008). interested parties (government, user associations,
and access providers) in producing new strategies;
secondly, implementation of these strategies by
Future trends the party concerned; thirdly, evaluation of the
measures taken. Self-regulation can be backed
The future of cyber crime is uncertain, however, by clear legal regulation and this is what the term
cyber terrorism is a threat to society that will al- co-regulation means. A co-regulatory system
ways exist, and law enforcement agencies must is one in which the public authorities accept that
continue to expand into the cyber universe. A protection of the society can be left to self -regula-
terrorist can do more with a computer than he can tory schemes, but reserve the right to intervene,
with a gun. People rely heavily on telephones, if self-regulation fails to work.
computers, and the Internet. Criminal information For the purpose of prosecuting advance fee
is stored, and often transmitted via Internet, as well fraud scammers, we should use local, regional
as legal, medical, and other confidential informa- and national co-ordination and information shar-
tion. People would be surprised if they knew how ing mechanisms; national liaison officers posted
much information is stored on the Internet, and on overseas or links with liaison officer networks;
computers, about them (Thomas, 2006). Europol and its Liaison Bureaux; Interpols
Law enforcement agencies must expand their National Contact Bureaux; Eurojust; and direct
services, and most of all, reach out into the commu- bi-lateral contacts. Channels that already exist for

109
Cybercrime Regulation

other purposes should be activated and adapted. developing and upgrading to stay ahead of the
Finally, we need to make the laws more effective law; hence the Internet community must therefore
by improving the quality of criminal codes and engage in a collective effort to curb the Internet
increasing the penalties to match the seriousness of the demeaning crimes it is helping to fuel. For
of loss. Laws will be effective against scammers Nigeria, the EFCC and of course ICT profession-
who are deterred by criminal law and frightened by als will have to take decisive steps and formulate
the prospect of incarceration; however, there will policies that will help in drastically reducing this
always be scammers who are motivated to engage menace at Internet access points. A combination
in online fraud to overcome these laws and the of sound technical measures tailored to the origin
efforts of the criminal justice community(Chawki, of spam in conjunction with legal deterrents as
2009):. currently being pursued by the EFCC will be a
potent remedy (Longe and Chiemeke, 2008)

conclusIon
reFerences
The embracement of the Internet culture in Ni-
geria has come with a lot of mixed feelings. The Adomi, E. E. (2007), Overnight Internet browsing
proliferation of ICTs and progressive development among cybercaf users in Abraka, Nigeria. Journal
in digital transactions and communications have of Community Informatics, 3(2). Retrieved Octo-
created new opportunities and opened up new ber 30, 2009 from http://ci-journal.net/index.php/
windows which have resulted in the emergence of ciej/article/viewPDFInterstitial/322/351
new forms of criminal behaviour and cybercrime. Adomi, E. E., & Igun, S. E. (2008). Combating
Advance fee fraud ranks amongst the most impor- cybercrime in Nigeria. The Electronic Library,
tant and virulent forms of cybercrime; not only 26(5), 16725. doi:10.1108/02640470810910738
due to its adverse impact on the development of
cyberspace but also due to the diversity of means Aghatise, E. J. (2006). Cybercrime Definition.
and methods that could be utilized in committing Computer Crime Research Center. June 28, 2006.
this crime as well as the inherent risk of using Available online at www.crime-research.org
advance fee fraud as a leeway and instrument to
Awe, J. (n.d.). Fighting cybercrime in Nigeria.
commit other crimes using the stolen identities of
Retrieved October 30, 2009 from http://www.
victims. Besides other domestic approach such as
jidaw.com/itsolutions/security7.html
legislating against cybercrime menace, this chap-
ter agrees with Chawki (2009), that cybercrime Chawki, M. (2005). A Critical Look at the
especially advance fee fraud should be subject Regulation of Cybercrime. The ICFAI Journal
to a global principle of public policy that aims at of Cyberlaw, 4(4).
combating and preventing this form of organized
Chawki, M. (2006). Anonymity in Cyberspace:
crime through raising global awareness, increasing
Finding the Balance between Privacy and Security.
literacy rates, coordinating legislative efforts on
Revista da Faculdade de Direito Milton Campos.
national, regional and global levels, establishing a
high level global network of cooperation between Chawki, M. (2006). Le Droit Penal lEpreuve
national, regional, and international enforcement de la Cybercriminalit. Lyon, France: University
agencies and police forces. of Lyon III.
Just as it is with other forms of crime, it is likely
that cybercrime and its perpetrators will continue

110
Cybercrime Regulation

Chawki, M. (2008). Combattre la Cybercriminal- Longe, O. B., & Longe, F. A. (2005). The Nigerian
it. Perpignan, France: Editions de Saint Amans. Web Content: Combating the Pornographic Mal-
aise Using Content Filters. Journal of Information
Chawki, M. (2009) Nigeria Tackles Advance Fee
Technology Impact, 5(2), 5964.
Fraud. Journal of Information, Law and Tech-
nology. Retrieved May 21st, 2009. From: http:// Lyman, M., & Potter, G. (1998). Organized Crime.
www2.warwick.ac.uk/fac /soc/law/elj/jilt/ 2009 Upper Saddle River, NJ: Prentice Hall.
_1 /chawki/chawki.pdf
Mcconnell International. (2000). Cybercrime
Chawki, M. & Wahab, M. (2006). Identity Theft and Punishment?Archaic Laws Threaten Global
in Cyberspace: Issues and Solutions. LexElec- Information.
tronica, 11(1).
Oriola, T. (2005). Advance Fee Fraud on the In-
Chukwuemerie, A. (2006). Nigerias Money ternet: Nigerias Regulatory Response. Computer
Laundering (Prohibition) Act 2004: A Tighter Law & Security Review, 21(3).
Noose. Journal of Money Laundering Control,
Paper delivered at Financial Lecture Series in
9(2). doi:10.1108/13685200610660989
Lagos, August 10, 2006.
Economic and Financial Crimes Commis-
Parker, D. B. (1998). Fighting Computer Crime:
sion (Establishment) Act. (2004). Retrieved
A New Framework for Protecting Information.
10th May, 2009. From http://efccnigeria.org/
Chichester, UK: Wiley Computer Publishing.
index.php?option=com_ docman&task=doc_
download&gid=5 Ribadu, N. (2006). Money laundry in Emerging
economies: Nigeria as a case study. A
Money Laundering (Prohibition) Act, of the Fed-
eral Republic of Nigeria. (2004). Smith, A. D., & Rupp, W. T. (2002). Issues in
cybersecurity: understanding the potential risks
Longe, O.B. (2006). Web Journalism In Nigeria:
associated with hackers/crackers. Information
New Paradigms, New Challenges. Journal of
Management & Computer Security, 10(4), 178
Society and Social Policy.
183. doi:10.1108/09685220210436976
Longe, O. B., & Chiemeke, S. C. (2006). The De-
Sylvester, L. (2001). The Importance of Victimol-
sign and Implementation of An E-Mail Encryptor
ogy in Criminal Profiling. Retrieved May 21st,
for Combating Internet Spam. In Proceedings of
2009, from: http://isuisse.ifrance.com/ emmaf/
the Ist International Conference of the Interna-
base/ impvic.html
tional Institute of Mathematics and Computer
Sciences, (pp. 1 7). Ota, Nigeria: Covenant Thomas, D., & Loader, B. D. (2000). Introduction
University. - Cybercrime: Law Enforcement, Security and
Surveillance in the Information Age. In Cyber-
Longe, O. B., & Chiemeke, S. C. (2008). Cyber-
crime: Law Enforcement, Security and Surveil-
crime and Criminality in Nigeria What Roles
lance in the Information Age. New York: Taylor
are Internet Access Points in Playing? Retrieved
& Francis Group.
May 21st, 2009. From: http://www.eurojournals.
com/ejes_6_4_12.pdf

111
Cybercrime Regulation

Thomas, J. (2006). Cybercrime: A revolution in virus distribution, data theft, extortion, fraud,
terrorism and criminal behaviour creates change forgery, child pornography, trafficking in illegal
in the criminal justice system. Retrieved November substances, digital copyright infringement, etc.
1, 2009 from http://www.associatedcontent.com/ Cyberspace: Refer to the virtual world of
article/44605/cybercrime_a_revolution_in_ter- digital communication, in which human beings
rorism_pg12_pg12.html?cat=37 interact with one another electronically via com-
puter networks instead of face-to-face.
Wilson, C. (2000). Holding Management Ac-
Cybercaf: A commercial place equipped with
countable: A New Policy for Protection Against
computers for the use of its customers.
Computer Crime. In National Aerospace and
Cybersecurity: Security issues relating to the
Electronics Conference . Proceedings of the IEEE,
cyberspace especially the Internet.
2000, 272281.
Fraud: Crime of deceiving somebody to get
something.
Regulation: An official rule made by govern-
key terms And deFInItIons ment and some other authority.
Scam: Dishonest plan for making money.
Crime: An illegal act or activity that can be Legislation: Process of making and passing
punishable by law. laws.
Cybercrime: Illegal activities carried out
over the Internet, such as malicious hacking,

112
113

Chapter 8
Emerging Information and
Communication Technology
Policy Framework for Africa
Saul F.C. Zulu
University of Botswana, Botswana

AbstrAct
While emerging information and communications technologies (ICTs) offer possible solutions to some
of the problems of applying ICTs in Africa, there are many challenges that have to be addressed in order
to create an environment that is conducive for harnessing these technologies. This chapter, therefore,
reviews emerging ICTs and their potential for application in leveraging Africas efforts towards meet-
ing its development efforts. The Chapter highlights the digital divide barriers that may inhibit emergent
ICTs in Africa. A review of current ICT policies of selected African countries indicates that the policies
are geared towards application of ICTs other than their production. The review also reveals a lack of
appreciation for emerging ICTs in Africa, both at the national as well as the sub-regional economic
bloc levels. The chapter proposes policy frameworks for emerging ICTs for Africa that are necessary
for creating an enabling environment for harnessing the emerging ICTs that will propel the continent
into the 21st Century and beyond. The barriers to ICTs cut across many different issues. As such, they
require multi-pronged policy approaches to address them. And that an emerging ICT environment must
be anchored on a number of strategic policy frameworks including the legal, regulatory/administrative
institutional framework, infrastructure, technology advocacy, financial, human resources, education
and research frameworks. It concludes that Africa can prepare for its future by creating an appropriate
environment for fostering the adoption and application of emerging technologies.

DOI: 10.4018/978-1-61692-012-8.ch008

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Emerging Information and Communication Technology Policy Framework for Africa

IntroductIon exists between the developed countries of the


North and developing countries of the South. The
Information and communications technologies digital divide also exists within the countries of
(ICTs) is a collective term used to describe the the South between the majority of the rural-based
various technologies that are used in the process- citizens who have no access to ICTs and a tiny
ing of information including its coding, creation, urban-minority that has access to ICTs. Emerging
storage, retrieval, manipulation, dissemination and ICTs can assist the digitally excluded regions of
transmission. ICT technologies include computers the world, including Africa to leapfrog the digital
that are used for processing information, publish- divide and catch up with the digitally connected
ing that is used for coding and dissemination of world. Emerging ICTs, if well harnessed through
information including broadcasting, and telecom- the creation of an appropriate environment, offer
munications, which are used for the transmission opportunities for bridging the digital divide in
of information (Zulu, 1994; Moll, 1983). Since Africa that can be used to leverage its develop-
the invention of the digital computer and the birth ment efforts.
of the micro-electronics industry, the ICT revolu- The purpose of this chapter is to discuss issues
tion has been marked by three major waves. The of the digital divide in Africa and how emerg-
first wave, which ran from the time the computer ing ICTs can be employed to address the issues
was invented in the late 1940s up to 1970s, was of the digital divide towards achieving Africas
characterized by centralized computing where development goals. The chapter is presented in
many people were connected to one computer. six main sections as follows: a discussion on the
The second wave of computing, which started in concept of the digital divide and its impacts on
the 1980s with the introduction of the microcom- Africa; based on the global strategic vision of
puter, has run throughout the 1990s to the present, the Millennium Development Goals (MDGs), a
has been dominated by personal computing that discussion on how ICTs can contribute towards
has been marked by each person being tied to a realizing issues of development in Africa; a review
personal computer. We are now on the threshold of developments in emerging ICTs and how they
of the third wave, where computing is moving can be used to overcome the digital divide, a re-
away from an individual to the environment. view of ICT policies of selected African countries
This is an era of widespread computing, which and regional economic blocs in Africa vis--vis
will be characterized by one individual-to-many emerging ICTs, and; a presentation of a policy
computers, dominated by handheld, intelligent, framework which Africa should put in place in
and everyday devices with imbedded technol- order to create a conducive environment for har-
ogy and connectivity. This is the era of pervasive nessing the emerging ICTs to leverage Africas
computing, which Agoston, Ueda and Nishimura development goals.
(2000) have described as being characterized by
Anytime/Anywhere, Any Device, Any Network,
Any Data total connected computing environ- bAckground
ment of the third wave (p.3).
Owing to a variety of factors, Africa and most Emerging technology may mean different things
of the developing world were largely by-passed by to different people. As such, there is no standard,
the first two waves of the ICT revolution, which universally adopted definition of the term. The
were the building blocks for entry into the digital definitions of the term are therefore as diverse as
age. The consequence of this has been what has the technologies to which they refer. According to
been termed as the digital divide that currently Adomi (2009), emerging technologies are those

114
Emerging Information and Communication Technology Policy Framework for Africa

new and important technological developments in emerging Hardware developments


the field.(p.87). The SAE International Emerging
Technologies Advisory Board (2009) (originally There are three major emerging computing
known as Stanford Applied Engineering) describes hardware technology platforms that can be dis-
emerging technologies as consisting of new cerned from the literature on computer hardware
technological discoveries that possess the poten- (Encyclopdia Britannica, 2009; Walker, 2002;
tial to significantly affect the mobility industries; Foster, 2005; The Foresight Nanotech Institute;
existing technologies that have impending new 2008; Wang; 2008)). These are:
or revised applications; and major issues and
trends that may have profound, new technology Platform 1: making further improvements
(p.1). Other definitions and descriptions of on the existing computing hardware tech-
emerging technologies are provided by Mutula nology by changing the architecture of the
& Wamukoya (2007). computer and increasing the density of
Emerging ICTs are a result of the continuous downsizing or miniaturization of hardware
development of technology. The technology life components;
cycle is a continuum of processes that involve Platform 2: grid computing, where com-
(Forrester, 2003): puting power is maximized by linking
several existing computers to operate as
Development of new processes through re- one supercomputing machine: the virtual
search and development, supercomputer;
Application of the new processes or tech- Platform 3: creating computing technology
nologies in the market for everyday use based on a totally new technology para-
INNOVATION: (i.e. making improve- digm known as nanotechnology.
ments on the existing technologies to make
them better and more efficient), and Platform 1: Improving the Existing
Creation of new technologies through re- Hardware Technology
search and development
The major thrust in this platform has been to design
The end product of this technology lifecycle computer hardware that is based on alternative
is the production of qualitatively better technolo- architectures away from the Von Neumann serial
gies that are cheaper and more efficient. Since processing architecture. This has seen the devel-
the invention of the first electronic computers opment of computer hardware that is based on:
in the 1940s, efforts in the ICT sector have been
geared towards consolidating the technologies of Parallel processor technology that makes it
the electronic age into better performing devices possible for more than one computer pro-
and systems to facilitate the processing and com- cessor to share the same memory (i.e. the
munication of information. This has resulted in random access memory (RAM)), thereby
the development of newer hardware, software and allowing the processing of more than one
telecommunications systems that are based on set of instructions per time as opposed to
emerging technology platforms. We briefly review von Neumanns serial processing archi-
these emerging ICT developments in hardware, tecture that allowed only one set of in-
software and telecommunication below. structions to be processed per time. This
technology has greatly increased the pro-
cessing speed of computers;

115
Emerging Information and Communication Technology Policy Framework for Africa

Multi-parallel processor (MPP) technol- Platform 2: Grid Computing


ogy that allows many processors to process
many different sets of instructions simul- Also known as distributed or cluster comput-
taneously on one machine, similar to the ing, the emerging technology in grid computing
way a human body functions in absorbing involves linking existing computers in a grid to
and processing knowledge and informa- make them behave as one computer so that they
tion capable of simultaneously using the are able to share their combined capabilities to
senses of sight, smell, hearing, touch and produce computer processing power similar to
taste. Buyya (2001) provides a graphic tu- a stand alone supercomputer. This approach en-
torial on the operations of parallel comput- ables an organization to increase its computing
ing hardware technology. and processing power without having to spend
a lot of money on buying a conventional stand-
In tandem with the development of alternative alone supercomputer whose prices are beyond the
computer architectures, has been the development budgets of most organizations. Grid computing
of technology that makes it possible to produce requires installation of special software and tele-
physically smaller but very powerful computing communications hardware that makes it possible
devices. This has been achieved through further to link computers in the grid and make them work
miniaturization of computer circuitry by the ap- together as one machine in the same local area.
plication of very large scale integration (VLSI) Walker (2002) and Foster (2005) provide useful
technology which makes it possible to pack many tutorials on grid computing.
computer components on a very small circuit
board. For additional information on VLSI com- Platform 3: Nanotechnology
puting technology see Encyclopdia Britannica
(2009) and Wikipedia (2009). The technologies that have been used so far in
The current ICT hardware devices are based the construction of computer hardware have
on VLSI, parallel processor and MPP technolo- been based on serial architecture or alternative
gies. These technologies involve denser packing architectures such as parallel and multi-parallel
of computer processors on circuit boards. A architectures. All these technologies are based
combination of ultimate integration of computer on miniaturization in the fabrication of com-
circuitry such as VLSI and use of alternative puter hardware. As stated above, miniaturization
computer architectures such as MPP has resulted technology has involved progressive massive
in the production of the most powerful comput- packing of computer circuitry. The shorter the
ing machines ever made before. These powerful distance between computer circuits, the faster the
computing machines, known as supercomputers, processing speed of the computer. However, there
have processing speeds measured in teraflops is a physical limit to miniaturization of computer
per second, where 1 teraflop represents 1 tril- circuit boards. It is for this reason that a totally new
lion operations per second. IBMs Blue Gene/P, technology platform is being proposed. The new
released in 2007 was at the time touted to be the technology paradigm shift is what has come to be
fastest supercomputer in the world with a reported known as nanotechnology. The nanotechnology
processing speed of 3000 trillion calculations per technology platform is based on various fields of
second (or 3 petaflops) (Knight, 2007). knowledge including bio-technology, physical sci-
ences technology (atomic and nuclear technology),
neuro-science technology, molecular physics,
materials science, chemistry, biology, computer

116
Emerging Information and Communication Technology Policy Framework for Africa

science, electrical engineering, mechanical engi- everyday use. It is these new machines that will
neering and cognitive science or what has been lead us into a new ICT interconnected environ-
termed as the convergence of the sciences. The ment: what has been called the age of pervasive
Foresight Nanotech Institute (2008) has defined computing. Harper (2003), Wang (2008), Fore-
Nanotechnology as: sight Nanotech Institute (2008), The Centre for
Responsible Nanotechnology (2008) and the Na-
a group of emerging technologies in which the tional Nanotechnology initiative (2008) provide
structure of matter is controlled at the nanometer useful insights into nanotechnology and the new
scale, the scale of small numbers of atoms, to field of science behind it, known as nanoscience.
produce novel materials and devices that have
useful and unique properties. Some of these tech- emerging software developments
nologies impose only limited control of structure
at the nanometer scale, but they are already in Many emerging software developments that drive
use, producing useful products. They are also the emerging ICT environment are taking place at
being further developed to produce even more both systems and applications level. They include
sophisticated products in which the structure of developments in the following major areas:
matter is more precisely controlled. The goal
of nanotechnology is to improve our control over Artificial intelligence (AI): where efforts
how we build things, so that our products can be have been towards developing software
of the highest quality(p.1) that mimic human intelligence with pow-
ers to learn reason and draw conclu-
Nanotechnology will make it possible to sions. AI software is already being applied
achieve further miniaturization of the machines of in everyday use including banking (e.g. in
the future by manipulating the internal constitution Automatic Teller Machines); telecommu-
of matter at the atomic level. Just like the smallest nications (e.g. voice simulators when using
element in living things is the gene, the smallest prepaid recharge, credit balance informa-
element in non-living things is an atom. It is the tion facilities, voice recognition dialing)
smallest because it cannot be divided into smaller and other areas;
particles, although it has positive and negative Expert systems: research efforts have
elements. Nanotechnology will make it possible been towards making software that is en-
to produce physically tiny ICT devices that are coded with the expertise of a professional
several times more powerful than machines that in any field of knowledge, which, given a
have been created using the existing technologies problem it is able to reason as a human
based chiefly on micro-electronics technology. professional in that area of expertise;
Terms associated with nano-based computing Web management and applications soft-
platforms include DNA computing, liquid com- ware such as Web 2.0 that is providing
puting, wet computing, molecular computing platforms for creating new web-based ap-
(Farrier (2010), Hagiya (2000), Hsu (2010), plications such as social networking;
Palmer (2010), Loygren (2003), Bonsor (2000), Telecommunications software that is
Gavaghan (2010), Ernest & Shetty (2005), Roco used to run emerging telecommunications
(2003). Nanotechnology will make it possible to systems such as wireless networks;
produce different types of intelligent products Open systems software: this is a move-
including household appliances, motor vehicles, ment towards producing software that is
intelligent fabrics, tools and other products of non-proprietary which anyone can access,

117
Emerging Information and Communication Technology Policy Framework for Africa

modify and use to create new applications files and documents in organization, track-
without the need to seek permission of the ing animals, people and good;
creators of the original software. The goal Wireless Application Protocol (WAP) is a
of the open software movement is to make communications standard used for devel-
software accessible, shareable and promote oping applications over wireless networks.
innovation in software development. And The WAP standard makes it possible for
that this initiative will ultimately entrench people to send text-based information
ICT use in society. across wireless-based networks such as
cell-phone systems. WAP also makes it
emerging telecommunications possible to provide Internet services over
technology cell-phones. Another significant communi-
cations standard is Wireless Fidelity (Wi-
A lot of emerging developments are talking place Fi) which has been designed to facilitate
in the area of telecommunications. Some of the communication across different wireless-
major innovations have been in the following based networks;
areas (Mutula & Wamukoya 2007; Afele, 2003; General Packet Radio Services (GPRS) is
the National Council on Disability, 2008): another mobile-based transmission stan-
dard that allows faster transmission rates
The development of broadband intelli- of data than the speeds of ordinary mo-
gent networks powered by artificial intel- dems. This technology has made it possi-
ligence communications software; ble to send broadband messages (text, data,
The development of wireless communica- voice, picture) over cell-phones;
tions systems that have rendered the ex- Wireless Local Area Network (WLAN)
pensive fixed line networks unnecessary. is a new network technology that allows
Wireless communications systems employ the establishment of local area networks
free space to transmit information. They based on free-space communication me-
are based on radio microwave. A number dia. Using this technology, an organization
of wireless-based communication technol- can set up a Local Area Network (LAN)
ogies are being developed and coming on without the need for physical cabling as is
the market. Some the significant wireless the case with ordinary networks that em-
telecommunications which will impact ploy physical cabling such twisted pair,
on the communication of information and coaxial cable, and fibre optics. The major
data in a networked environment include advantage of this technology is that, it is
the following: cheap, neat and requires very little physical
Voice over Internet Protocol (VoIP) that infrastructure;
makes it possible to make very cheap voice Bluetooth technology is another wireless
phone calls over the Internet; technology that affords fast access between
Radio-frequency identification (RFID) is communications points. Unlike other wire-
an automatic identification method, relying less-based telecommunications technolo-
on storing and remotely retrieving data us- gies that are based on infra-red light waves
ing devices called RFID tags or transpon- that require a line of sight between com-
ders. This technology has many applica- munications devices, Bluetooth-based de-
tions including tracking of the movement vices can sense and recognize each other
without the need for seeing each other to

118
Emerging Information and Communication Technology Policy Framework for Africa

effect a communication link. It facilitates, simultaneous voice and data transmission (Mutula
among others, roaming and remote mouse & Wamukoya, 2007).
applications; Another telecommunication innovation that
Very Small Aperture terminal (VSAT) is utilizes existing infrastructure is Power Line
a satellite telecommunications technology Technology (PLT) that allows fast broadband
that allows individuals to directly send transmissions using ordinary office and household
and receive Internet-based services with- electricity power wiring to carry radio signals that
out the need to go through an ISP gateway. connect consumers in offices and homes, thereby
It employs telecommunications devices making it unnecessary to install expensive network
linked to computers at the users location transmission media such as fibre optics to achieve
that sends and receives signals, this is in connectivity (Intellon, 2007;)
turn connected to a space satellite that is
linked to an earth-based satellite which is Products and services
linked to a computer that serves as a hub from emerging Icts
and directs the flow of information in the
network. The combined current and future developments
The development of common communi- in the key ICTs areas of hardware, software and
cations standards such as the Integrated telecommunications are fostering the emergence
Services Digital Network (ISDN) technol- of new hand-held, physically smaller devices and
ogy is an international communications applications that are beginning to change the ways
standard which makes it possible to send in which humans create, store, communicate, use
voice, video, and data over digital tele- and manage information and knowledge. Some of
phone lines or normal phone wires. This the leading hand-held ICTs include the National
technology employs a transmission tech- Council on Disability (2008):
nique that allows ordinary telephone sys-
tems to handle large quantities of data. It iPods: a data compression technology that
turns a low frequency, narrowband trans- has capabilities to store vast amounts of
mission medium into a broadband, high information that can be carried around to
frequency medium that is making it pos- be used where it may be needed. This will
sible to communicate across different net- make it possible to deliver information
works and applications. services to remote areas that have no ac-
cess to ICT infrastructure. Other products
Developments in telecommunications have that have emerged from this technology
also seen major innovations in the utilization of include iPhones, and other models that can
fixed-line communications media such copper- capture video as well,
based telecommunications infrastructures by the Personal Digital Assistants (PDAs): also
introduction of new technologies that converts called palmtops, hand-held computers and
these inefficient analog voice-based narrowband pocket computers, are handheld devices
systems into digital broadband, high-speed com- that combine computing, telephone/fax,
munications networks such as the Asymmetric Internet and networking features. A PDA
Digital Subscriber Line (ADSL) technology. can function as a cellular phone, fax send-
This has been made possible by employing a er, Web browser and personal organizer.
technology that harnesses the portion of the lines Other features of PDAs include handwrit-
bandwidth that is not used by voice to achieve a ing recognition, voice input. PDAs extend

119
Emerging Information and Communication Technology Policy Framework for Africa

access to computing facilities outside the prepare for it. There is need, therefore, to create
homes and offices. an environment that is conducive for emerging
technologies. How can this be achieved? This
Other new hardware initiatives that will go question is addressed in the section on Emerging
long way in improving accessibility to ICTs in technology policy framework for Africa.
developing countries include the $100 Com-
puter Initiative, spearheaded by MITs Nicholas
Negroponte whose goal is to produce a low cost, tHe dIgItAl dIvIde And AFrIcA
low power, networked laptop PC to improve ac-
cessibility by school children in poor countries: Webopedia (2008) defines and characterises the
the prototype of the laptop known as the Green digital divide as:
Machine because of its distinctive colour, was
unveiled at the UN Net Summit Tunis, Tunisia in the discrepancy between people who have ac-
2005 (Twist, 2005); and the proposed development cess to and the resources to use new information
of a low cost, low power, integrated multifunc- and communication tools, such as the Internet,
tion information appliance called PCtvt (personal and people who do not have the resources and
computer television telephony) which includes access to the technology. The term also describes
the functions of a PC, TV, digital VCR, Video the discrepancy between those who have the skills,
Phone and IP-Telephone as an all-in-one device knowledge and abilities to use the technologies
designed for use by the poorest of the poor and and those who do not. The digital divide can ex-
even the illiterate (Reddy, Arunachalam, Tongia, ist between those living in rural areas and those
Subrahmanian, & Balakrishnan, (2004)) living in urban areas, between the educated and
Developments in wireless telecommunications uneducated, between economic classes, and on a
will make it possible to link rural communities global scale between more and less industrially
that currently have no access due to infrastructural developed nations (p.1).
difficulties. Cell-phone technology has continued
to develop many capabilities that were unthink- Reddy, Arunachalam, Tongia, Subrahmanian,
able only a few years ago. The cell phone now & Balakrishnan, (2004) have identified nine
has broadband capabilities that have made it categories of the digital divide including infra-
possible to capture, receive, store and transmit structure divide, access divide, literacy divide,
information in different formats including: audio, language divide, information and knowledge
video, text, data, computing and Internet access. access divide, jobs divide, health-care divide,
These developments make the cell-phone to have entertainment divide and demographic divide.
the potential to be a multi-media information Mutula (2008) & Murelli (2002) have identified
management and communications device of the a number of factors that fuel the digital divide
near future. Further, the development of common on the African continent and other developing
communications standards will make it possible to countries including: the general poor economic
link various networks that will connect individu- conditions obtaining in most countries of sub-
als, communities, nations and across nations and Saharan Africa; local content factors whereby
continents in a truly networked digital environment most of the digital resources are irrelevant to the
Developments in ICTs will continue and will re- needs of Africans because they are dominated by
sult in the provision of better information services. foreign cultures and contexts; cultural and linguis-
If Africa is to benefit from this new ICT-driven tic factors where digital resources are presented
future, the continent and its people will need to in foreign languages and depict foreign cultures

120
Emerging Information and Communication Technology Policy Framework for Africa

and in addition, where the education systems have and regulatory constraints that militate against
also adopted foreign languages such as French creating a conducive environment for ICTs, and;
and English as mediums of instruction in schools political factors that result in inequitable distri-
and for conducting of research; HIV/Aids, where bution of national resources and development,
financial resources are being diverted towards leading to social and political instability. Jensen
meeting the challenges of the pandemic in terms (2002) provides a detailed picture on the state of
of procuring medicines and putting in place other the digital divide in Africa.
mitigation strategies instead of investing in ICT
infrastructure; telecommunications constraints,
which as summarised by Mutume (2005) and the Icts And tHe AttAInment oF
ITU (2005), show that Africa has the most under- mIllennIum develoPment
developed telecommunications infrastructure in goAls In AFrIcA
the world characterised by having the lowest ICT
indicators in terms of connectivity, access to radio, Millennium Development Goals (MDGs) are
television, computers, and the Internet. Recent development targets that are designed to improve
studies however show a positive growth in the human living conditions by 2015. The MDGs
telecommunications sector for the continent, as were agreed upon by world leaders at a United
Africa has now become the worlds fastest grow- Nations conference held in 2000 (Department
ing telecoms market with an annual growth rate of for International Development 2008). They
50%, an estimated 300 million people owning cell cover eight broad areas that are critical to human
phones in 2008, and total subscribers estimated development including education; health (includ-
to reach the 400 million mark by the end of 2009 ing reduction of child mortality and improving
(African Business, 2009). maternal health); gender equality; HIV/AIDS; the
Other digital divide factors identified by Mu- environment; eradication of extreme poverty and
tula (2008) include the brain drain, where Africas developing a global partnership for development.
intellectual resources are constantly migrating to The international community agreed to dedicate
Western countries in search of greener pastures; its efforts towards attaining these goals as a way
education budgetary factors, where all the levels of accelerating development in under-developed
of the education sector (from primary to tertiary) regions of the world such as Africa.
are under-funded and yet education is one of ICTs are now recognized as general facilita-
the pre-requisites to a sustainable adoption and tors in different areas of human endeavour. They
application of ICTs; literacy challenges where a are important in fostering development at all
significant portion of the population, particularly levels of time and space: personal, community,
in rural Africa, is still illiterate, a situation that is organizational, national, and regional as well as
incompatible with sustainable application of ICTs; global. Many ICT and development experts agree
institutional level policies which have resulted in that the application of ICT can significantly con-
under-utilization of even the little available ICT tribute to the attainment of Africas MDGs in the
resources; research and development factors, following areas (Okot-Uma, 2002; Murelli, 2002;
where the low ratio of scientists on the continent, Mbumwae, 2006, Jensen, 2002, Department for
relative to other regions of the world, continue to International Development, 2006; Chetty, 2005):
hamper research and development activities on
the continent to drive the creation, absorption, Education: where ICTs can extend access
adaptation and application of new knowledge and to education through ICT-based platforms
technologies such as ICTs; national ICT policies such e-learning and video conferencing.

121
Emerging Information and Communication Technology Policy Framework for Africa

The application of these education deliv- munications services. The mushrooming


ery platforms can go a long way in solv- of Internet cafes and telecentres in urban
ing some of the problems of shortage of centres of Africa is providing employment
teachers and the physical infrastructure opportunities that never existed before.
at all levels of the education spectrum in Another area in which ICTs can leverage
most African countries because ICTs can the fight against poverty is by providing
reach many people spread across vast geo- timely information to peasant farmers in
graphical areas. This can be achieved very such areas as weather patterns and fore-
quickly and at much lower cost than the casting, agricultural prices, markets for ag-
traditional approaches of building schools ricultural produce, sources of finance and
and other centers of education, training and agricultural inputs, information on agricul-
retaining education sector personnel; tural services, etc. This information can as-
Health: ICTs can leverage health delivery, sist farmers to plan effectively and make
for instance, through such platforms as informed decisions in their agricultural
telemedicine (for example via remote diag- activities. At the governance level, a bet-
nosis of ailments and prescription of rem- ter-informed government can better plan
edies). The application of such ICT-based for resource mobilization and distribution
health delivery systems can go a long to mitigate poverty through e-government
way in mitigating the critical shortage of platforms. For instance, ICTs can lever-
qualified health personnel in Africa. Public age tax revenue collection, through better
health campaigns such as vaccination of tracking of tax payers as well as default-
under-five children against diseases, HIV/ ers. A World Bank (2002) report ably sum-
AIDS, and basic hygiene, can be more ef- marises the potential of ICTs in fighting
fectively delivered by improved radio and poverty thus:
TV reception and access by all citizens, in-
cluding those in rural areas. Further, ICTs
can result in better managed health infor- Access to telecommunications and information
mation such as patient records and the pro- services and to ICTs in general, provides crucial
vision of timely information for planning, knowledge inputs into the productive activities of
monitoring and management of the health rural and poor households; makes large regional,
delivery systems; national, and even global, markets accessible to
Eradication of extreme poverty: the intro- small enterprises; and increases the reach and
duction of ICT-based value added services efficiency of the delivery of government and so-
in the telephony sector (both fixed and mo- cial services. Furthermore, access to ICTs gives
bile) as well as Internet services, has cre- the poor a voice, with which they can influence
ated and continue to create new opportuni- the decisions of policy-makers, and allows them
ties for employment for many households. to participate in the decision-making process
For instance, since the introduction of the
cell phone industry in the late 1990s, many
new jobs have been created in the formal Gender equity: ICTs can be used as vehi-
sector by cell phone service companies. In cles for disseminating information that can
addition, many people are serving as self- go a long way in educating society on gen-
employed agents who sell pre-paid phone der issues that hinder human development.
recharge cards as well as other telecom- In addition, ICTs can be used to provide

122
Emerging Information and Communication Technology Policy Framework for Africa

gender-focused information to empower that the vast majority of the citizens of Africa are
women to participate fully in business, still excluded from these global experiences and
accessing of loans and land, and where to resources because of the digital divide. Emerging
seek assistance on issues that affect them. ICTs can go a long way in mitigating some of
Environmental sustainability: ICTs can the digital divide factors. In particular, emerging
leverage better management of the envi- technologies can overcome most of the problems
ronment by providing accurate informa- associated with poor infrastructures including
tion and better monitoring of the environ- such issues as accessibility, connectivity, low
ment so that preventive action is taken bandwidth, and the high costs that are associated
before environmental degradation sets in. with implementation of ICT projects.
For example, ICT-based environmental
management systems such Geographic
Information Systems (GIS) and remote PolIcIes on emergIng
sensing can go a long way in ensuring bet- Icts In AFrIcA
ter mapping, management and monitoring
of genetic resources (both flora and fauna) This section of the chapter reviews national ICT
for sustainable use by present and future policy documents of 10 selected African countries
generations. In addition, ICTs can be used in order to determine the extent to which they
to deliver sensitization and education cam- cover emerging ICTs. The countries are Botswana,
paigns to the public on a wide range of en- Burkina Faso, Egypt, Ethiopia, Mauritius, Mozam-
vironmental issues. bique, Nigeria, Rwanda, Tanzania, and Zambia.
Developing a global partnership for de- The review of the ICT policies was further done
velopment: ICTs are already serving as according to the four regional groupings to which
the means for sharing global information, the 10 countries are members. The regional group-
knowledge and experiences in all areas of ings covered were the East African Community
human endeavour including science and ((EAC): represented by Tanzania and Rwanda;
technology, culture, monitoring and pres- the Common Market for Eastern and Southern
ervation of global biodiversity resources, Africa ((COMESA): represented by Zambia,
politics, education and training, health, Ethiopia and Egypt; the Economic community
trade and commerce and mobilizing glob- of West African States ((ECOWAS), represented
al responses to natural disasters (such as by Nigeria and Burkina Faso; and the Southern
earthquakes, tsunamis, cyclones and hur- Africa Development Community ((SADC): repre-
ricanes, droughts) as well as human made sented by Zambia, Tanzania, Botswana, Mauritius
disasters (such as nuclear and industrial ac- and Mozambique. It should be noted that some
cidents, wars and genocides). countries belong to more than one regional bloc
(e.g. Zambia (SADC and COMESA) and Tanzania
It is evident from the foregoing that ICTs can (EAC and SADC)
directly contribute to the realization of each of The findings on the extent to which national
the MDGs in Africa. ICT policies in the surveyed countries embrace
While ICTs have the potential to significantly emerging ICTs are presented in summary form
contribute to the attainment of MDGs in Africa, in Table 1.
major challenges still remain however on what The analysis generally shows that out of the
needs to be done to overcome factors which impede 10 countries only two (Botswana and Mauritius)
their application. One of the major challenges is specifically mention emerging ICTs in their

123
Emerging Information and Communication Technology Policy Framework for Africa

Table 1. Content of ICT Policies of selected African countries (Sources: Indicated on the Table)

Country Date of Key Strategies/objectives in the document Role of Emerging ICTs


Policy
Ethiopia (The Communica- January 2005 Human resource development, physical and ICT infra- None. Emphasis on adoption
tion Initiative Network, structure development, ICT for governance/e-government, and application of ICTs
2009) ICT industry and private sector development, electronic
commerce, community access and service delivery, local
content and applications development, ICT for research and
development, ICT systems security and standards, the legal
and regulatory environment, promotion of ICT in education,
use of ICT in health, and ICT for agricultural modernisation.
Mozambique (Sesan, 2004; September Education, human resources development, universal access, None. Emphasis on adoption
Communication Initiative 2000 infrastructure and governance, agriculture, natural resources, and application of ICTs
Network, 2008)). the environment, tourism, electronic commerce, business
protection, public protection, the academic institutions and
research network, women and youth, culture and art, and
social communication and the press
Tanzania (Tanzania, United May 2002 Focus is on: service sectors, availability of universal access, None. Emphasis on adoption
Republic of, 2002) peace, stability and unity: strategic ICT leadership, legal and application of ICTs
& regulatory framework, good governance: public service
(e-government), ICT infrastructure, a well-educated and
learning society: human capital and, local content
Botswana (Botswana, Re- August 2007 Community access and development, government, learning, One phrase in the whole docu-
public of, 2008) health, economic development, infrastructure and security ment refers to emerging ICTs.
legislation and policy Emphasis on adoption and
application of ICTs
Zambia (International In- March 2007 To promote the economy; to improve the provision of public None. Emphasis on adoption
stitute for Communication sector services to rural communities and other disadvantaged and application of ICTs
(IICD), 2008) groups; and to boost the performance of the public sector,
education, health, telecommunications
Egypt (PanAfrL10n, 2009) 1999 Objectives are to: create a vibrant and exportable CIT (com- None. Although the policy
munications and information technology) industry; support goes beyond the mere adop-
the development of a state-of-the-art national telecommu- tion and application of ICTs
nications network that provides an enabling environment to production and export of
for business and electronically links Egypt with the rest ICT products
of the world; increase employment opportunities in the
communications and information technology sectors; build
an information society capable of absorbing and benefit-
ing from expanding sources of information; develop and
upgrade CIT systems
Mauritius (Mauritius, Re- September Objectives are to: provide a framework that In addition to putting emphasis
public of, 2007) 2007 will enable ICT to contribute towards achieving on production and export of
national development goals; develop the export markets for ICT products, Mauritius has
ICT Services and BPO/ITES; position Mauritius as a regional also established a special com-
ICT centre of excellence and knowledge hub; ensure that mittee that addresses issues of
ICT infrastructure and capacity are utilised effectively, are emerging ICTs
compliant with regional and international standards and are
internationally competitive; establish a trusted and secure
information infrastructure and a culture of cyber security at
all levels of society; enhance the exploitation of ICT across
the economy for increased productivity and efficiency;
and transform Mauritius into an Information-based society
where everyone has equitable and affordable access to ICTs
Nigeria (Jidaw Systems March 2001 Has 22 objectives that centre on creating an enabling ICT None. Although the policy
Limited, 2009) environment, legislative and regulatory environment, ICT goes beyond the mere adop-
production and export, socio-economic development, hu- tion and application of ICTs
man capital development, education and training, access, to production and export of
infrastructure development ICT products

continued on following page

124
Emerging Information and Communication Technology Policy Framework for Africa

Table 1. continued

Country Date of Key Strategies/objectives in the document Role of Emerging ICTs


Policy
Rwanda (United Nations January 2000 Focus is on the following sectors: human resource develop- None. Emphasis on adoption
Economic Commission for ment, education, civil and public services, service sector, and application of ICTs
Africa (2008). private sector, infrastructure, legislative and governance
Burkina Faso October 2000 The focus of the policy is on: computerization of the state/ None. Emphasis on adoption
administration, reinforcement of the national capacities and and application of ICTs
the quality of training and research, improvement of the eco-
nomic potentials, development of community communication
centers, and infrastructure development

policies. Of the two countries that cite emerging emergIng Ict PolIcy
ICTs, it is only Mauritius which has put in place FrAmework For AFrIcA
an institutional and policy framework for dealing
with issues of emerging ICTs (Seebaluck, (2006), While emerging technologies offer possible solu-
Dabeesing (2006)). Botswana only devotes a tions to some of the problems of applying ICTs in
phrase to emerging ICTs. The rest of the countries Africa, there are many challenges that have to be
are silent on issues of the emerging ICTs. addressed in order to create an environment that is
Another finding from the review shows that conducive for harnessing these technologies. The
out of the 10 countries surveyed, only ICT poli- barriers to ICTs cut across many different issues
cies of three (Nigeria, Egypt and Mauritius) go including legal, regulatory, infrastructure, technol-
beyond mere adoption and application of ICTs to ogy advocacy, human and financial resources. As
the production and export of ICT products. This such, they require a multi-pronged approach to
seems to suggest a consumption or user orienta- address them. The main objective of this section
tion in the ICT policies of most African countries. is to propose a policy framework and highlight
On the regional economic blocs (EAC, COME- the various strategies and actions that have to be
SA, ECOWAS and SADC), the analysis reveals taken in order to create an enabling environment
that none of these bodies are specifically address- for the adoption and sustenance of emerging
ing issues of emerging ICTs in their regional ICT technologies that will propel Africa into the 21st
policies. Current efforts in these bodies seem to Century and beyond.
centre on developing regional ICT policies in areas A policy framework provides the guidelines
of coordination, harmonization and integration of on the approved way of operating in relation to a
national regulatory and legislative frameworks, particular matter. Although a number of countries
and regional infrastructural issues among member in Africa have put in place national ICT policies
states (Muchanga, (2004), ECOWAS (2009), EAC to guide their legal and other ICT environment-
(2009, 2007), COMESA (2009, 2004)). The Africa setting frameworks, many are yet to do so. In the
economic bodies are yet to embrace emerging absence of policy guidelines, it becomes very
ICTs. This is in contrast to the European Union difficult to implement ICTs because it is policies
which is actively promoting the development of that guide activities.
emerging ICTs through funding of research in Those countries that may have policies on
universities and other research institutes (Com- some aspects of ICTs, (e.g. telecommunications),
munity Research and Development Information by and large, those policies tend to be protective
Service (CORDIS, 2009)). of the existing ICT institutions that are owned by

125
Emerging Information and Communication Technology Policy Framework for Africa

the government. Such protectionist policies tend Legal Framework


to work against the introduction of emerging ICTs
that are perceived to be threatening the status quo Formulation of policies, per se, is not enough.
in those countries (Arnold, Guermazi & Mattoo, Good policy formulation must be backed by en-
2007). A case in point here is the decision by abling pieces of legislation. Legislation is very
the Zambian government in 2007, to ban VoIP important in enabling any activity. The absence of
technology for no other reason than that it was ICT-friendly legislation or the presence ICT-un-
seen to threaten the market dominance of the friendly legislation militates against introduction
state-owned telecommunications service provider of emerging technologies. Most of the developing
(Malama, 2007). This decision to ban the much countries, especially in Africa, still have outdated
cheaper voice communication technology will no pieces of legislation on telecommunications,
doubt, delay its entry onto the Zambian market which still favour state control and makes it dif-
for many years. Another policy issue common in ficult for private sector investment to penetrate the
most developing countries is the tendency to treat telecommunications sector. ICT legislation must
ICTs as a luxury goods sector that attracts very address, among other things supporting new policy
heavy and prohibitive customs tariffs and other initiatives on ICTs and reviewing and repealing
forms of taxation. High taxes on ICTs discourage the existing pieces of legislation that inhibit the
investment and hampers growth of the ICT sector. growth of the ICT sector.
Creation of an ICT-friendly environment
must be anchored on policies that clearly define Regulatory/Administrative
the role of ICTs in national development efforts. Institutional Framework
It is only when ICTs are seen in the context of
leveraging national development that their place The administration of ICT-related industries, such
in society will be appreciated. A policy frame- as the telecommunications sector, is characterized
work, besides acknowledging the enabling role by bureaucratic bottlenecks and red tape, where it
of ICTs in national development must act as a takes a very long time to grant licenses to inves-
stimulus for promoting the growth of the ICT tors who wish to operate ICT-related businesses,
sector by removing all inhibiting barriers in the particularly in the telecommunications sector.
sector. Such an environment must be anchored on Further, ICT regulatory institutions tend to fa-
a number of strategic policy frameworks includ- vour state-owned national telecommunications
ing the following: companies as noted by Frost & Sullivan (2008)
the African Internet market is characterised by
Legal framework national incumbents which command the highest
Regulatory/administrative institutional market share given that they control most of the
framework infrastructure and most regulatory frameworks
Infrastructure framework are geared in their favour. These bureaucratic
Technology advocacy framework bottlenecks have tended to discourage investors
Human resources, education and research who would have brought new and innovative
framework technology in those countries (Toure, 2006).
Financial resources framework An effective institutional framework for the
regulation and administration of the ICT sec-
tor is essential for the promotion of emerging
technologies. Among other things, an effective
regulatory institutional framework ensures fair

126
Emerging Information and Communication Technology Policy Framework for Africa

play and accountability in the sector; quality in private sector participation should be encour-
service delivery; fair pricing of ICT services and aged because the private sector has the financial
products to customers; fair competition among resources as well as technical expertise to bring
the players in the sector; and fair application of about a speedy availability of the requisite ICTs
regulations to all the players in the sector. The (Pais, 2006). As noted by Juraske (2007), Hewlett
existing institutional framework for regulating and Packards Public Sector Vice President for Eu-
administering the ICT sector must be overhauled rope, Middle East and Africa, forming strong
to make them efficient, transparent and account- collaboration between African governments and
able in the way they conduct the business of their the corporate sector is the smartest way to do meet
mandate. It is only when stakeholders have trust the challenge of deploying ICTs in Africa (p.1)
and confidence in the manner in which regula- This is so because governments generally do not
tory and licensing bodies conduct their business have adequate capacity (human, financial, tech-
that investors can be attracted to the sector. As nology) to cope with developments that require
Pais (2006) correctly observes The eradication rapid changes in adopting new technologies in
of corruption at all levels is a prerequisite for a fast changing sector such as the field of ICTs.
creating a framework that is transparent, fair and
amenable to economic growth (p.2). In addition, Technology Advocacy Framework
the institutions that are responsible for regulating
the ICT sector must be well supported in terms of Technology can only be appreciated when it is
legislation, policy, financial as well as provision understood in the environment where it is deployed
of appropriately qualified human resources to or will be deployed. In some cases, people will
enable them carry out their mandate effectively. be averse to a technology, not because it is a bad
These regulatory issues are essential in achieving technology, but because they do not understand
an effective institutional regulatory framework. it. To this end, there is need to sensitise not only
the policy makers (political leaders, government
Infrastructure Framework officials, members of parliament, institutional
leaders, etc), but society as whole on the implica-
Information technology can only thrive where tions of the emerging technologies for the present
the necessary infrastructure is in place. In most and future.
African countries, the basic physical infrastructure Technology advocacy will go a long way in
required to sustain or even apply ICTs, is not in buying-in the support of the critical decision
place. For instance, electricity supply is a basic makers (Chetty, 2005). Once the decision mak-
requirement for ICTs, and it is not adequately ers begin to see the benefits of ICTs, most of the
and reliably supplied in most of the developing barriers that inhibit the sustainable promotion
countries, particularly in Africa. Telecommunica- and application of ICTs in developing countries
tions infrastructure (both fixed and space-based) may be minimized. Governments by their very
is also not in place in most of Africa. nature are conservative institutions that approach
If national governments are not able to provide issues of technology very cautiously. Government
the essential infrastructures, then they should allow conservatism on issues of technology is a barrier
the private sector to invest in infrastructure either because in most developing countries, the private
on their own or in partnership with government sector is usually very small to make a significant
(Department for International Development, impact in the adoption and sustenance of a new
2006). While governments will always play a technology. Without the participation of the gov-
major role in issues of infrastructure development, ernment, a new technology cannot be sustained

127
Emerging Information and Communication Technology Policy Framework for Africa

because it is governments that have the financial Financial Resources Framework


clout to spend on new technology.
The creation (through education, training, research
Human Resources Framework and development), acquisition (for application),
and maintenance of technology require a lot of
Appropriately trained human resources are a pre- financial resources. Most of the countries of
requisite to the effective implementation of any Africa lack adequate financial resources to fund
technological innovation. As the Africa Policy their development efforts. The little money that
information Centre (APC) Africa Policy Monitor is at their disposal is allocated to what are seen
(2009) has ably observed: to be priority areas of health and education and
provision of other basic services. It is therefore
While policies and strategies must address the a major challenge to advocate for investment in
extension of the communications infrastructure ICTs (even in terms of infrastructure) in the face
through telecommunications reform to stimulate of a government that has to meet immediate needs
private sector growth and create job opportunities, for the people.
this is a necessary but by no means sufficient con- However, introducing and sustaining emerging
dition for an effective ICT contribution to national ICTs will require financial resources to support all
development goals. ICT policy and strategies must the frameworks that have been highlighted above.
also incorporate social goals by building human If African countries can buy-in the argument
capacity and creating the conditions for the de- that ICTs are critical inputs into their national de-
velopment of relevant applications and content. velopment efforts and also that emerging ICTs are
an investment into the future, then policy makers
The need for highly trained expertise is even can start prioritizing ICTs in national budgetary
more critical in a highly sophisticated field such allocations that will go towards financing the
as the ICT sector (Chetty, 2005). Highly trained frameworks that are being proposed.
ICT engineers in systems design and development,
hardware, software, telecommunications, and ex-
perts in regulatory, policy and legal are required Future trends
to drive and maintain a viable ICT sector. Africa
and other Third World regions lack this critical Developments in emerging ICTs will continue
ICT expertise. particularly in the areas of artificial intelligence
All these areas of expertise will require to be software, wireless telecommunications technol-
put in place through an appropriate education, ogy and the development of molecular computing
training and research policy framework that will hardware based on nanotechnology. Future areas
drive the production of the requisite human re- of research from the African policy perspectives
sources and knowledge to drive ICT activities in would be to explore to what extent African gov-
Africa. Further, the critical ICT expertise must be ernments, institutions of higher learning, research
retained within Africa by putting in place attrac- institutes and industry are addressing these emerg-
tive financial rewards and other staff retention ing ICT developments in terms of their research
incentives. agendas, financing of research and human resource
development, training and its retention.

128
Emerging Information and Communication Technology Policy Framework for Africa

conclusIon reFerences

Technology has, throughout the history of hu- Adomi, E. E. (2009). Library and information
mankind, provided the great quantum leaps that resources. Benin City, Nigeria: Ethiope Publish-
have propelled civilization and progress. ICTs ing Corporation.
and associated technologies are now at the centre Afele, J. S. (2003). Digital bridges: developing
of all areas of human endeavour: scientific and countries in the knowledge economy. Hershey,
technological, social, economic, cultural, military, PA: Idea Group.
and security, etc. Emerging ICTs, if properly har-
nessed, can provide what Kuttan & Peters (2003) Africa Policy Monitor, A. P. C. (2009). Retrieved
call the digital opportunities to leapfrog and on March 27 2009 from http://africa.rights.apc.
bridge the ever widening digital divide between org/?apc=he_1&w=s&t=21873
Africa and the rest of the world and within and
African Business. (2009, Thursday, January
between African nations, communities and indi-
1). Retrieved on March 27, 2009 from http://
viduals. A review of the literature on ICT policies
www.allbusiness.com/media-telecommunica-
in Africa shows that, by and large, these policies
tions/11745598-1.html retrieved on 27/03/2009
are essentially designed to facilitate the adoption
and application of ICTs in various sectors, with Arnold, J., Guermazi, B., & Mattoo, A. (2007).
no emphasis on their production. The implication Telecommunications: the persistence of monopoly
of this is that African countries will continue to . In Mattoo, A., & Payton, L. (Eds.), Services, trade
source their ICTs from outside the continent. The and development: the experience of Zambia (pp.
study also seems to indicate a lack of appreciation 101153). Washington, DC: The International
of emerging ICTs both at the national as well as Bank for Reconstruction and Development/World
the regional economic bloc levels. It is therefore Bank.
proposed that in order to prepare for the future,
BITPIPE. COM. (2008). Retrieved on August 15,
Africa must embrace emerging technologies by
2007 from http:/www.bitpie.com.
creating a conducive emerging ICT environment.
Africa cannot afford to ignore ICTs again as has Bonsor, K. (2000). How DNA Computers Will
been the case in the first two waves of the ICT Work. Retrieved on July 6, 2010 from HowStuff-
revolution. The development of nanotechnology Works.com. <http://computer.howstuffworks.
and artificial intelligence software have dire com/dna-computer.htm>
consequences for sharpening not only the digital
Botswana, Ministry of Communications, Science
divide but the technology divide between those
and Technology (2008). Maitlamo: National
nations and regions that will possess and control
Information and Communications Technology
this new industrial technology platform and those
Policy. Gaborone, Botswana: Government Printer.
that will not have it.
Africa should not behave like the proverbial Buyya, R. (2001). Parallel processing: architec-
ostrich that buries its head in the sand in the face ture and system overview. Retrieved on March 27
of a formidable foe, in the vain hope that by not 2009 from http://www.cs.mu.oz.au/678/ParCom.
seeing the enemy, the enemy will not see it! It is ppt#352,1,Parallel Processing: Architecture and
said that the future favours those who prepare for System Overview.
it. Africa can prepare for its future by creating an
appropriate environment for fostering the adoption
and application of emerging technologies.

129
Emerging Information and Communication Technology Policy Framework for Africa

Chetty, M. (2005). Information and Communica- Encyclopaedia Britannica. (2009). Very large-
tions Technologies (ICTs) and Africas develop- scale integration. Retrieved on March 27, 2009,
ment. Retrieved on March 5, 2009 from http:// from Encyclopdia Britannica Online from http://
www.nepad.org/2005/files/documents/124.pdf. www.britannica.com/EBchecked/topic/626791/
very-large-scale-integration
Common Market for Eastern and Southern Af-
rica. (2009). COMESA Regional e-Government Ernest, H., & Shetty, R. (2005). Impact of Nano-
Framework. Retrieved on September 23, 2009 technology on Biomedical Sciences: Review of
from http://programmes.comesa.int/attach- Current Concepts on Convergence of Nanotech-
ments/144_COMESA%20e-GOV%20Frame- nology With Biology. Journal of Nanotechology
work%20PresentationKampala.pdf. online. Retrieved on July 6, 2010 from http://
www.azonano.com/details.asp?ArticleID=1242
Common Market for Eastern and Southern Africa,
Association of Regulators of Information And Farrier, J. (2010, January 11). Wet Computer
Communications for Eastern and Southern Africa. Will Mimic A Biological Brain. Retrieved
(2004). Policy Guidelines on Universal Service/ on July 7, 2010 from http://www.neatorama.
Access. Retrieved on September 22, 2009 from com/2010/01/11/wet-computer-will-mimic-a-
http://programmes.comesa.int/attachments/118_ biological-brain/
Policy_Guidelines_Universal_Service.pdf.
Foresight Nanotech Institute. (2008). Retrieved
Community Research and Development Infor- on October 10, 2007 from http://www.foresight.
mation service. (CORDIS, 2009). ICT - Future org/nano/
and emerging technologies: a continuing well
Forrester, E. C. (2003). A Life-Cycle Approach
established successful ICT scheme. Retrieved on
to Technology Transition. Retrieved on June 15
September 22, 2009 from http://cordis.europa.eu/
2008 from http://www.sei.cmu.edu/news-at-sei/
fp7/ict/programme/fet_en.html
features/2003/3q03/feature-4-3q03.htm
Dabeesing, T. (2006). National ICT Strategic Plan
Foster, I. (2005). Internet computing and the
Emerging Technologies and Standards Working
emerging grid. Retrieved on October 9, 2007
Group. Retrieved on September 22, 2009 from
from http://www.nature.com/nature/webmatters/
http://www.gov.mu/portal/goc/ncb/file/Presenta-
grid/grid.html
tion_NWGET.pdf.
Frost & Sullivan. (2007). Cited in ZAMNET
Department for International Development
gains global recognition as market leader.
(DFID). (2006). Financing ICT for Develop-
Retrieved on December 8, 2007 from http://
ment: the EU approach. Retrieved on March 27,
www.zamnet.zm/newsys/news/viewnews.
2009 from http://www.dfid.gov.uk/pubs/files/
cgi?category=30&id=1197109256
eu-financ-wsis-english.pdf.
Gavaghan, T. (2010). DNA computing. Retrieved
Department for International Development
on July 6, 2010 from http://EzineArticles.
(DFID). (2008). Millennium Development Goals.
com/?expert=Thomas_Gavaghan
Retrieved on March 27, 2009 from http://www.
dfid.gov.uk/mdg/ Hagiya, M. (2000). Theory and Construction of
Molecular Computers. Retrieved on July 6, 2010
from http://hagi.is.s.u-tokyo.ac.jp/MCP/.

130
Emerging Information and Communication Technology Policy Framework for Africa

Harper, T. (2003). What is Nanotechnology? Knight, W. (2007). IBM creates worlds most
2003 Nanotechnology 14. doi:10.1088/0957- powerful computer. New scientist.com news ser-
4484/14/1/001. Retrieved on October vice, June 2007. Retrieved on January 15, 2008
10, 2007 from http://www.iop.org/EJ/ab- from http://technology.newscientist.com/article/
stract/0957-4484/14/1/001 dn12145-ibm-creates-worlds-most-powerful-
computer.html
Hsu, J. (2010, January 11). Wet Computer Liter-
ally Simulates Brain Cells. Retrieved on July 7, Kuttan, A., & Peer, L. (2003). From digital divide
2010 from http://www.popsci.com/technology/ to digital opportunity. Lanham, MD: Scarecrow.
article/2010-01/wet-computer-literally-simultes-
Loygren, S. (2003). Computer Made from
brain-cells
DNA and Enzymes. Retrievd on 6 July 2010
Intellon. (2007). What is powerline communica- from http://news.nationalgeographic.com/
tions? Retrieved on March 5, 2009 from http:// news/2003/02/0224_030224_DNAcomputer_2.
www.intellon.com/technology/powerlinecom- html
munications.php
Malama, F. (2007, April 17). Lets take advantage
International Institute for Communication and of VoIP. The Post.
Development (IICD). (2008). Introducing Zambia.
Mauritius, Ministry of Information Technology
Retrieved on September 21, 2009 from http://
and Telecommunications. (2007). National ICT
www.iicd.org/countries/zambia.
policy 2007-11. Retrieved on September 21, 2009
International Telecommunications Union. (2005). from http://www.gov.mu/portal/goc/telecomit/
Whats the state of ICT access around the world? file/ICT%20Policy%202007-2011.pdf
Retrieved on February 22, 2009 from http://www.
Moll, P. (1983). Should the Third World have
itu.int/wsis/tunis/newsroom/stats/
Information Technology? IFLA Journal, 9(4),
Jensen, M. (2002). Information and Communica- 296308. doi:10.1177/034003528300900406
tion Technology (ICTs) in Africa a status report.
Muchanga, A. M. (2004). Statement by Albert M.
UN ICT Task Force Bridging the Digital Divide
Muchanga SADC Deputy Executive Secretary
in the 21st Century Presented to the Third Task
Delivered at the Opening of The SADC Regional
Force Meeting United Nations Headquarters 30
Seminar on Website Policy Development Held at
September 1 Oct 2002. Retrieved on January
President Hotel Gaborone. Retrieved on Septem-
27, 2009 from http://www.unicttaskforce.org/
ber 23, 2009 from http://www.sadc.int/archives/
thirdmeeting/documents/jensen%20v6.htm
read/news/56.
Jidaw Systems Limited. (2007). The Nigerian Na-
Mutula, S. M. (2008). Digital divide in Africa:
tional Information Technology Policy. Retrieved
its causes, and amelioration strategies . In Aina,
on August 22, 2009 from http://www.jidaw.com/
L. O., Mutula, S. M., & Tiamiyu, M. A. (Eds.),
itsolutions/ict4dreview2007.html
Information and knowledge management in the
Juraske, I. (2007). Some success tips for deploy- digital age: Concepts technologies and African
ing ICTs in Africa. Retrieved on January 10, 2008 perspectives. Ibadan, Nigeria: Third World Infor-
from http://communications-online.blogspot. mation Services.
com/2007/06/some-success-tips-for-deploying-
icts-in.html

131
Emerging Information and Communication Technology Policy Framework for Africa

Mutula, S. M., & Wamukoya, J. M. (2007). Web Roco, M. C. (2003). Nanotechnology: con-
Information management: a cross-disciplinary vergence with modern biology and medicine.
textbook. Oxford, UK: Chandos Publishing. Current Opinion in Biotechnology. Volume 14,
Issue 3, June 2003. Retrieved on July 7, 2010
Mutume, G. (2005). Africa takes on the digital
from http://www.sciencedirect.com/science/
divide: new information technologies change the
journal/09581669 346
lives of those in reach. Retrieved on November
16, 2007 from http/www.africarecovery.org SAE International Emerging Technologies Ad-
visory Board. (2009). Retrieved October 2, 2009
National Council on Disability. (2007). Over the
from http://www.sae.org/about/board/commit-
horizon: potential impact of emerging trends in
tees/etab.htm
information and communication technology on
disability policy and practice. Retrieved on May Seebaluck, R. (2006). Improving Your Business
22, 2007from http://www.disabilityinfo.gov/ Environment Through Public and Private Part-
nerships: Strategies that Work. Retrieved on
Okot-Uma, R. W. (2002). The challenge of the
September 22, 2009 from http://idisc.infodev.org/
digital divide . In Murelli, E. (Ed.), Breaking
proxy/Document.48.aspx
the digital divide: implications for developing
countries (pp. ixxi). London: Commonwealth Sesan, G. (2004). Africa, ICT policy and the
Secretariat. millennium development goals. Retrieved on
August 22, 2009 from http://wsispapers.choike.
Pais, A. (2006). Bridging the digital divide by
org/africa_ict_mdg.pdf
bringing connectivity to underserved areas of
the world. Retrieved October 2, 2009 from http:// Tanzania, United Republic of, Ministry of Com-
www.itu.int/osg/spu/youngminds/2006/essays/ munications and Transport (2002). National ICT
essay-adrian-pais.pdf Policy of Tanzania. Retrieved on August 22, 2009
from http://www.ethinktanktz.org/esecretariat/
Palmer, J. (2010, January 11). Chemical computer
DocArchive/zerothorder.pdf.
that mimics neurons to be created. BBC News.
Retrieved on July 6, 2010 from http://news.bbc. The Communication Initiative Network. (2008).
co.uk/2/hi/8452196.stm Mozambique ICT4D National Policy. Retrieved on
September 22, 2009 from http://www.comminit.
PanAfrL10n. (2009). Egypt. Retrieved on Sep-
com/en/node/148306.
tember 21, 2009 from http://www.panafril10n.
org/pmwiki.php/PanAfrLoc/Egypt The Communication Initiative Network. (2009).
Ethiopia ICT4D National Policy [Draft]. Retrieved
Reddy, R., Arunachalam, V. S., Tongia, R.,
on September 22, 2009 from http://www.com-
Subrahmanian, E., & Balakrishnan, N. (2004).
minit.com/en/node/148306.
Sustainable ICT for emerging economies: mythol-
ogy and reality of the digital divide problem a The World Bank. (2002). Telecommunications
discussion note. Retrieved on December 30, 2008 and information services for the poor: Towards
from http://www.rr.cs.cmu.edu/ITSD.doc a strategy for universal access. Washington, DC:
The World Bank.
Twist, J. (2005). UN debut for $100 laptop for
poor. Retrieved on November 15, 2007 from http://
news.bbc.co.uk/2/hi/technology/4445060.stm

132
Emerging Information and Communication Technology Policy Framework for Africa

United Nations Economic Commission for Africa. munities, urban and rural areas, regions, countries
(2008). Burkina Faso: NICI Policy. Retrieved and continents.
on August 25, 2009 from http://www.uneca. Emerging ICTs: New and emerging ICTs
org/aisi/nici/country_profiles/Burkina%20Faso/ that are based on the converged ICTs (comprising
burkinapol.htm telecommunications, computing and publishing
technologies).
United Nations Economic Commission for Africa.
Grid Computing: Also known as distributed
(2008). Rwanda National ICT Policy. Retrieved
or cluster computing, the emerging technology in
on August 17, 2009 from http://www.comminit.
grid computing involves linking existing comput-
com/en/node/148446.
ers in a grid to make them behave as one computer
Walker, D. W. (2002). Emerging distributed so that they are able to share their combined ca-
computing technologies. Retrieved on August pabilities to produce computer processing power
10, 2007 from http://www.cs.cf.ac.uk/User/ similar to a stand-alone supercomputer.
David.W.Walker Information and Communications Tech-
nologies: Various technologies that are used in the
Wang, Z. L. (2008). What is Nanotechnology?
in the creation, acquisition, storage, dissemina-
Retrieved on February 22, 2008 from http://
tion, retrieval, manipulation and transmission of
www.nanoscience.gatech.edu/zlwang/research/
information. In its broader context, ICTs include:
nano.html
Computers: used for processing of information;
Waters, D. (2007). Africa waiting for net revolu- Telecommunications: used for the transmission of
tion. BBC. Retrieved on March 10, 2009 from information; Publishing: used for coding/record-
http://news.bbc.co.uk/1/hi/technology/7063682. ing of knowledge and information. Publishing in its
stm entirety including broadcasting and narrowcasting,
the press and other media such as micrographics,
Webopedia. (2008) Retrieved on January 15,
audio-visuals, etc.
2008 from http://inews.webopedia.com/TERM/d/
Millennium Development Goals: Millen-
digital_divide.html
nium Development Goals (MDGs) are develop-
Wikipedia. (2009). Very-large-scale integra- ment targets that are designed to improve human
tion. Retrieved on July 28, 2009 from http:// living conditions by 2015. The MDGs were agreed
en.wikipedia.org/wiki/Very-large-scale_integra- upon by world leaders at a United Nations confer-
tion. ence held in 2000). They cover eight broad areas
that are critical to human development including
Zulu, S. F. C. (1994). Africas survival plan for
education; health (including reduction of child
meeting the challenges of information technology
mortality and improving maternal health); gender
in the 1990s and beyond. Libri, 44(1), 7794.
equality; HIV/AIDS; the environment; eradica-
doi:10.1515/libr.1994.44.1.77
tion of extreme poverty and developing a global
partnership for development. The international
community agreed to dedicate its efforts towards
key terms And deFInItIons attaining these goals as a way of accelerating
development in under-developed regions of the
Artificial Intelligence: Software that has ca- world such as Africa.
pability to learn reason and draw conclusions. Nanotechnology: a new technology paradigm
Digital Divide: Disparities in accessing ICTs platform that is based on various fields of knowl-
by people within and between in individuals, com- edge including bio-technology, physical sciences

133
Emerging Information and Communication Technology Policy Framework for Africa

technology (atomic and nuclear technology), neu- spread computing which will be characterized
ro-science technology, molecular physics, materi- by one-individual-to-many computers which are
als science, chemistry, biology, computer science, connected in a seamless web: the era which has
electrical engineering, mechanical engineering been characterized as Anytime/Anywhere-->Any
and cognitive science: technology development at Device --> Any Network --> Any Data.
the atomic, molecular, or macromolecular range. Policy: A concise, formal statement of prin-
Pervasive or Ubiquitous Computing ciples which indicate how an organization country,
Environment: Also called ubiquitous comput- region, etc will act in a particular area of its opera-
ing, refers to the Third Wave of the computing tion e.g. in relation to ICTs. A policy provides the
revolution dominated by computing devices that guidelines on the approved way of operating in
will control everyday life. This is an era of wide- relation to a particular matter.

134
135

Chapter 9
Ethics and Social Issues Related
to Information Communication
Technology (ICT)
Nelson Edewor
Delta State Polytechnic, Nigeria

AbstrAct
Information Communication Technology (ICT) has raised new ethical concerns about the protection of
personal privacy, protection of intellectual property, user responsibility, acceptable access and use of
information, software licenses and piracy. A good ICT policy must be able to adequately consider these,
and many other associated issues. This chapter therefore describes these ethical issues and how to deal
with them as an individual or an organization. It provides information on the concept of ethics and the
technological advancements responsible for the ethical concern. It discusses privacy, information rights,
and intellectual property rights and ethics policy. The Nigerian national intellectual property right laws
were examined in line with World Trade Organization/Trade Related Aspects of Intellectual Property
Rights (WTO/TRIP) compliance.

IntroductIon society and thus raise serious ethical questions for


individuals and organisations. These issues have
In the rapidly changing technological environment been raised to a new and often perplexing level
in which we live; ethical issues are increasingly which has greatly affected the society in various
been raised, demanding attention and efforts ways. The pressing issues raised by ICT include
towards resolution. Of particular interest for us the invasion of individual and corporate privacy,
and the information society are those related to intellectual property rights, individual and societal
information communication technologies (ICTs). rights, values preservation and accountability for
The explosive growth of ICT and the use of its the consequences arising from the use of ICT, etc.
enabling technologies have had major impacts on These issues have thrown up important
challenges in the area of employment; working
DOI: 10.4018/978-1-61692-012-8.ch009 conditions and individuality. However, not much

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Ethics and Social Issues Related to Information Communication Technology (ICT)

progress has been made in addressing these is- ethics in the Annual Review of Information Sci-
sues and challenges associated with ICT. This ence and Technology in 1992. This suggests that
is because of lack of clear understanding of the there is an ethical agenda associated with the use
issues involved. of ICT. Individuals and organisations therefore
In this chapter, we will explore ethical and need to be ethically sensitive as they deploy ICT
social issues/challenges that surround the use of on their operations. The impact of ICT on human
ICT. Specifically, the chapter sets out to: relationship has been tremendous. ICT has helped
to enhance family relationship (e.g. mobile phones,
Identify ethical issues/challenges and how palmtops, laptops, virtual conferencing and so on),
the use of ICT has greatly invaded indi- as well help to separate family and friends from
vidual privacy and the protection of intel- each other. ICT has enabled new friendship and
lectual property. relationships in virtual communities. How genu-
Analyze principles that can serve as the ba- ine are such relationship? What does it portend
sis for ethical conduct by users of ICT. for individual satisfaction? In the workplace for
Identify ethics policy structure and frame- instance, new kinds of jobs are being created such
work for ICT use. as data miners, web-counselors etc, but these op-
Evaluate the impact of ICT on the protec- portunities are also endangered by problems of
tion of individual and collective privacy, unemployment from computer replacing humans.
information rights and intellectual prop- A wide range of new laws, regulations, rules and
erty rights. practices are therefore needed if society is to
Evaluate intellectual property rights pro- manage these workplace and other changes and
tection laws in Nigeria with respect to development brought about by ICT. Thus the so-
WTO/TRIPS compliance. ciety need to consider the following ethical and
Research and apply a range of transferable social challenges related to ICT use:
knowledge required for ethical decision
making and strategy. Recognition for personal and corporate
ethics associated with ICT.
Striking a balance between ethical, eco-
bAckground nomic and technological (Rogerson, 2008)
as well as political considerations.
Ethics is a reflection on morality. It refers to the Intellectual property rights issue (trade-
principles of right and wrong in making choices marks, patents, copyright and trade
by individuals. It has been described as the art and secrets).
science that seeks to bring sensitivity and methods Non violation of privacy and associated
to the discernment of moral values (Carbo, 2006). rights amidst electronic information data
Thus, ethics guide human and societal behavior. mining.
Capuro (2006) had no difficulty in asserting that The opportunity to commit crime with ICT
ethics is an unending quest on explicit and implicit (computer crime).
use of the moral code. Legal issues and limitations.
The subject of social and ethical implications Consequence of using ICT.
of Information and Communication technology Professional responsibilities (Kallman and
has been addressed in the literature. As noted by Grillo, 1996).
Carbo (2006) ethical considerations for ICT related
issues first appeared under the topic information

136
Ethics and Social Issues Related to Information Communication Technology (ICT)

Every organisation, society or nation must The forces of globalization and advances in
recognize and address the aforementioned issues ICT have helped to heighten ethical and social
thrown up by the enormous and rapid change in concerns. The rapid development of ICT has a
ICT. The full impact of such changes needs to ripple effect on society, thereby challenging exist-
be considered, because it affects how individu- ing social structure that must be dealt with as an
als operate. To this end, ethics and social issues individual, organization and government. These
are closely linked. As observed by Bynum(1999) issues throw up new situations hitherto not known.
more and more of societys activities and oppor- Reactions to these issues differ at all levels of the
tunities enter cyberspace: business opportunities, information society: individuals, organizations
educational opportunities, medical services, and government.
employment, leisure time activities etc. to this Little progress has been made in addressing
end it becomes imperative therefore to develop the ethical issues associated with ICT, especially
policies that will include all parties (ICT have- in developing countries, because of the level of
nots and haves). ignorance pervading the society in relation to ethi-
Globalization and advances in ICT has helped cal issues associated with ICT. This is reflected
to fuel the trends responsible for these ethical in most laws not drafted with the benefit of the
issues. More so ICT is developing so rapidly digital environment in mind. Furthermore social
that new possibilities emerge before the social and ethical implications of ICT are enormous
consequences can be understood (Rogerson and and mostly unknown (Bynum, 1999). However
Bynum, 1995) .Traditional barriers between re- we need to find a balance between technology,
gions, states countries and continents no longer shaping social events and vice versa. To this end
exist, because of the interconnection brought about some governments particularly in the Western
by the Internet technology. Gorniak (1995) pointed World and most professional computing bodies
out that ICT has been responsible for genuinely have turned their attention to the problem and
global discussion about ethics and values, for the instigated measure to include consideration of
very first time. For example if an information social, legal and ethical issues associated with ICT
is posted on the Web in a culture/setting, which (Sherratt, Rogerson and Fairweather, 2005). This
does not consider such an information offensive is aimed at raising ethical awareness.
but is accessed by someone in a culture/setting, The Internet and digital firm technologies
where such information is considered offensive make it easier than ever to assemble integrate and
and outlawed; whose values apply? Should the distribute information, unleashing new concerns
values of the first culture/setting, be permitted or about the appropriate use of information, the pro-
not? What about the values of the second culture/ tection of personal privacy and the protection of
setting? Arising from this situations, what kind intellectual property (Laudon and Laudon, 2006).
of conflicts might arise and how should they be The issue of privacy is at the core of any ethical
tackled, and by whom? What policies would be consideration.
fair to all concerned? Will this bring about bet- Privacy has been interpreted differently by
ter understanding between peoples and cultures, various persons. According to Froehlich (1992)
new shared values and goals, new national and privacy refers to the right to be left alone. This
international laws and policies? Will individual definition is strategically mirrored in the light of an
cultures become diluted homogenized, blurred? electronically enabled environment. Its applicabil-
(Bynum and Rogerson, 1996). These are amongst ity is relatively narrow. Privacy is a situation of an
the many social and ethical issues related to ICT. individual to be free from any form of interference
or surveillance. With the advent of ICT, there is

137
Ethics and Social Issues Related to Information Communication Technology (ICT)

little or no control over an individuals personal individuals and organisations for their actions is
information. Every time an individual visits a site primarily responsible for the damaging effects
on the World Wide Web, personal information is of ICT.
been collected about that individual.
Information technology makes it possible for
organization to collect, store, exchange and re- InFormAtIon rIgHts:
trieve data and information about any individual. clAIm to PrIvAcy
Millions of employees are subject to electronic and
other forms of high-tech surveillance (Ball, 2001). It is obvious that the power of Information
With ICT personal claims to privacy is threatened. Technology to store and retrieve information has
The unauthorized use of such information has eroded the right to privacy of every individual.
seriously damaged the privacy of individuals. Privacy is the right to be left alone. This includes
To worsen the case much of the Net and Web are freedom from State interference in all matters. It
easy targets by hackers. involves the sanctity of confidentiality as a right
Every ethical consideration must be addressed of individuals, confidentiality in all matters, both
from socio cultural and individual standpoints. private and non private. Privacy has been eroded
The vast majority of such challenges are largely by the widespread use of advanced Information
unknown and still emerging as new technology Communication Technology. Confidential infor-
of ICT generates them. Meanwhile every social mation on individuals contained in existing files
and ethical consideration must take into account and databases by financial institutions, govern-
the following: ment agencies and private organisations have been
misused, resulting in the invasion of privacy. The
Individual right to liberty: every action unauthorized access and use of such confidential
must be based on every individuals right information has seriously hurt and damaged the
to liberty without much restrictions and privacy of individuals. Invasion of individuals
unnecessary inhibitions. Every society and privacy occurs when there is an intrusion into a
culture must be recognized and respected. persons private information bank with intent
Equal rights and opportunities of every in- to expose, or encroach upon individuals privacy.
dividual must be respected. Every action The claim to privacy is protected in existing
should take this into consideration. statute books and laws of various countries, though
Action to be taken must be right and ben- differences exist from countries to countries. For
eficial to the organization and society: take example, in the United States, privacy laws at-
the action that benefits the generality of all tempt to enforce the privacy of computer based
concerned. files and communications (O Brien2003). The
Respect for human dignity: take the action United States, electronic communications privacy
that produces least harm Act of 1986 and the Computer security Act of
Respect for human basic rights. 1987 prohibits the interception of data commu-
The Golden Rule; do unto others as you nication messages, stealing or destroying data or
would have them do unto others. trespassing in Federal related computer systems.
Also the US computer matching and privacy of
These guidelines are however not fool-proof, 1988 regulates the matching of data held in federal
but can serve as the basics for ethical conduct agency files viz a viz eligibility verifications for
by users of information technology. The non federal programs. There are also protection laws
consideration of these ethical responsibilities by

138
Ethics and Social Issues Related to Information Communication Technology (ICT)

about individuals in financial services, health in- Adequate, relevant and not excessive.
formation management, education and insurance. Accurate
An important law worthy of mention here is the Not kept longer than necessary.
Freedom of Information Act (FOIA) of the United Processed in accordance with the data sub-
States. This law provides public access to federal jects right.
Government files. FOIA came alive on July 4, Secure
1967. It is founded on the belief that government Not transferred to countries without ad-
is accountable for its actions and that the public equate protection
possesses a right to obtain information about those
actions regardless of ideological origin or artistic In 2000, the UK Government implemented
content. FOIA requires government agency to new legislation to bring the Act in line with the
publish descriptions of its operations. Any person Data Protection Directive of the European Union
or organisations is recognized by law under the (Davies,2002,p.297). There is no doubt that the
FOIA Act to also obtain data from a government spread and use of ICT has made the world a less
agency through a FOIA request. private place. The Internet has been described as
In Europe it is the general belief that informa- an omnipresent network of surveillance. For
tion privacy should be treated as human right. example e-mail data/messages of individuals are
Europe has applied its data protection principles monitored, existing companies files and large
both to government and the private sector. This database can be tracked, misused and altered. The
directive requires companies to inform individual Internet however, has gained wide acceptance, as
when they collect information about them and an important forum and avenue for meaningful
how such information is to be stored and used. venture among individuals. Human society is at
This suggests that the consent of the individual a crossroad.ICT that may be used as object and
must be given before any information can be instrument of criminality is also beneficial to
accessed. All EU member states are expected to modern society in all ramifications. The choice
translate these principles into their own laws. The is ours.
agreement took effect in October 1998. A major In Africa, privacy law, have not been given
concern of this agreement with the United States serious consideration. This is traceable to the
is its prohibition of trade with any nation that absence of Information Policy amongst various
does not have adequate privacy laws. The United countries in Africa. An information policy aims to
States has raised serious security implications to provide legal and institutional frameworks within
this, especially after the 9/11 attacks. The Data which formal information exchange can take place
Protection Directive is in danger of adequate non- (Ifidon, 2006). An information policy regulates
enforcement amongst member Nations vis a vis the use, storage and communication of informa-
security implications. tion. In Nigeria for instance, there is absence of
In UK, the Data Protection Act of 1984 is aimed National Information Policy (NIP). This is further
at enforcing good practices in the management worsened by the un-conducive environment for
of personal data/information by organization. the development and management of Information
Accordingly anyone processing personal data Communication Technology (ICT) and National
must comply with eight enforceable principles Information Infrastructure.
of good practices, data must be;

Fairly and lawfully processed.


Processed for limited purposes.

139
Ethics and Social Issues Related to Information Communication Technology (ICT)

tHe nIgerIAn Freedom its successful consideration, the Bill is in danger


oF InFormAtIon bIll of not been passed into law.

The freedom of information bill currently before


the Nigerian Senate has had a chequered legisla- IntellectuAl ProPerty
tive history. It has been pending before the Na-
tional Assembly for Nine years. The bill seeks to Intellectual property is creative works of indi-
guarantee the right of the citizens to know. The viduals or organisations that have economic value.
freedom of Information Bill, when it becomes These works are usually intangibles; that is product
law, will give Nigerian citizens access to public of human creativity and imagination which are
records and documents, subject to certain ex- protected by law. This law prevents others from
emptions specified in the Bill. The categories of copying, duplicating and distributing such work
information exempted from public access under of human ingenuity without authorization. This
the proposed law include: is aimed at securing economic rewards for their
efforts. The rapid development of information
Information that may be injurious to the technology has made it increasingly difficult to
defense of Nigeria protect intellectual property. This is largely due
Information relating to the conduct of in- to ICT capability to duplicate, share and copy
ternational affairs. information via several channels and networks.
Information that can interfere with ongo- Patents, copyright, trademarks and trade secrets
ing law enforcement investigations. are all forms of intellectual property.
Information that can prevent a fair tri- Patent law protects technological invasion. It
al or undermine the security of penal requires that an inventor or creator of any given
institutions. work is recognized by law and is given exclusive
Information that can contain trade secrets, right and monopoly for the underlying concepts,
financial commercial or technical informa- ideas behind such work for a given period of time.
tion that belongs to the government and This however differs from country to country.
has economic value. Copyright law recognizes and protects literary
Personal information. and artistic work such as paintings, sculpture,
Information that is subject to solicitor/cli- prose, poetry, musical composition, dances,
ent privilege. photographs, motion pictures, radio and televi-
Research information materials pre- sion programs, sound recordings and computer
pared by faculty members in an academic software programs. Copyright law protects the
institution. copying, distribution or duplicating, in whole or in
parts of any intellectual property without permis-
The freedom of information bill is based on sion. Trademarks protects brand words, symbols
the belief that every citizen have right of access and slogans of goods and services. Trade secrets
to information held by the state or its agencies. protect confidential information of any given
It anchors that partnership between government business. Such confidential information pertain-
and citizens is necessary in ensuring accountable ing to how, why, and essence of the business or
government and development (Edewor, 2008). venture must be protected from the general public
Given the general apathy of lawmakers towards arena. Most intellectual property right expires
the freedom of Information Bill which has hindered after a specific period depending on the country.

140
Ethics and Social Issues Related to Information Communication Technology (ICT)

However trade mark never expires, so long as it formulate and enforce them? A wide range of
is in use to identify a product or service. new laws are needed if society is to manage these
The growth of the Internet and associated tech- issues associated with the digital environment.
nologies is a serious problem for the protection of In an attempt to protect intellectual property
intellectual property. The Internet facilitates the rights; most nations of the world signed the agree-
transmission of data/information freely around ment on Trade Related Aspects of Intellectual
the world, even copyrighted information. This is Property Rights (TRIPS) in 1994. TRIPS is ad-
particularly true in the sense that with the World ministered by World Trade Organization (WTO) to
Wide Web, virtually anything can be copied strengthen legal protection of intellectual property
and distributed to millions of people around the rights around the world. The TRIPS agreement
world. Unauthorized persons can copy duplicate is a harmonized standard in intellectual property
and share music and movies in the Net, through rights (IPR) protection. Nigeria will be focused on
various devices. Digitized versions of books can in detail as a case study. This is to examine exist-
be easily made available to millions of people to ing privacy laws and intellectual property rights
download through the Internet without permission; laws compliance with the ICT environment, more
e-mail file attachment can also be used to share or so whether the provision of the existing laws are
copy copyrighted information across the globe. tailored to resolve ethical and social issues con-
The entertainment industry is been threatened as nected with ICT, directly or expressly.
copyrighted music and motion pictures continues
to be traded for free without authorization. These
are serious challenges to effective protection of nAtIonAl IntellectuAl
intellectual property rights. The major ethical ProPerty rIgHts
challenge is to determine the continued relevance lAws And wto/trIPs
of protecting copyrighted data/information when comPlIAnce In nIgerIA
they can be copied and shared easily without
authorization. There is therefore the need for the Nigeria is a signatory to TRIPS agreement and
development of new intellectual property rights must therefore comply with all its stipulations.
protection strategies in this era of rapid devel- Nigeria was meant to comply by January 2000;
opment of ICT, capable of protecting software, however as at the time of writing, it is yet to over-
eBooks, music and motion picture. In the music haul its intellectual property law. The significance
and film industry broadcasting organization func- of TRIPS in terms of IPR is extensive.
tion as purveyors of copyright works. In addition, There exist a body of law, enactment and
they contribute to the repertoire of works by their decrees that regulate intellectual property rights
independent creations, which are also subject to issues in Nigeria. Many laws are well conceptual-
copyright protection. In the same vein, broadcast- ized; however the greatest problem is that they are
ing organizations can digitize texts, pictures, im- rarely enforced. Moreover, there is some overlap
age sequences and sounds which are intellectual and at times the law creates confusion as to which
property. At the same time separate media can be agencies are responsible for implementation and
combined to create multimedia and can be altered enforcement. At times, this leaves ambiguous the
by the user in a number of ways. The questions appropriate bodies to determine the violation of
are; do broadcasting organizations require fresh the law. Many of these laws are currently under
authorization of right owners? Does this violate review, but it is difficult to track exactly how
any of the rights of the original copyright own- much streamlining process is been debated and
ers? What should the rules be and who should discussed (Obileye, 2001). The copyright law of

141
Ethics and Social Issues Related to Information Communication Technology (ICT)

1998 (as amended) and the Patent and Design Act allows works to be used under conditions defined
of 1990 are discussed hereunder; as fair use. This means that limited copying
of copyrighted work for academic purposes; as
the copyright law of 1998 long as such work is acknowledged is allowed.
This is not to be considered as an infringement
Nigeria is signatory to the universal copyright on intellectual property right. Copyright law in
convention in1961. This led to the promulgation of Nigeria has little or no recognition for electronic
the copyright decree of1970, which established the resource, including the establishment of standards
Nigerian copyright council (Omoba and Omoba, of competence, conduct and ethical practice in
2009). This decree was replaced by the copyright honor of property rights for computer profession-
Act of 1988. In 1989, the Nigerian copyright als. Modern copyright devices have become so
commission was established. The copyright Act common that the duplication of copyright works
of 1988 stipulates 50 years for creators or authors cannot be effectively monitored. Moreover, the
of copyrighted work. It is meant to protect the problem has been made difficult by the present
owner of a work from unauthorized copying, unfavorable economic condition.
duplicating or distribution. It seeks to prohibit However there is need to raise the level of
the circulation of such work without permission; awareness of people about copyright law so that
however through a lack of implementation, this they can operate within the confines of the law.
decree has not brought about effective organiza- The existence of enforcement of a comprehen-
tion of intellectual property rights protection. Also sive copyright regulatory system supported by
there is the problem of copyrighted work registra- legislation is a prerequisite. While it is correct to
tion under this Act, which is cumbersome. This state that copyright law is aimed at encouraging
leads to manufacturers ignoring the registration creative intellectual efforts, it should be noted that
process which ultimately creates enforcement provision of access to existing knowledge and
obstacles. The Nigerian copyright commission is information is as important as the encouragement
however grossly underfunded. Its infrastructure of intellectual property.
is dilapidated and it lacks personnel to carry out
its mandate, while human and financial resources Patent and design Act of 1990
are not available to meet the scope of this law.
The present copyright law was not drafted The existing patent and designs Act of 1990
with the benefits of the ICT environment in mind. requires 20 years span for any patented work.
In terms of enforcement, copyright law relies on The Nigerian patent and designs Act provides for
the police: an institution also in decay, enmeshed compulsory licensing of created works in unre-
in corruption for the detention of suspects. The stricted ways. However, the patent and designs
copyright law is not adequately backed up with Act is currently under review and a 1991 draft
the logistics to establish adequate and competent version is in circulation. This draft was written
regulatory functions/activities. The WIPO Act and before the TRIPS agreement; thus work still needs
the WIPO performance and phonogram treaty that to be done to make it compliant with TRIPS while
Nigeria is a signatory, enjoin countries to make creating an enabling environment framework for
provisions in their domestic laws for sanctions IPR protection. Under the TRIPS agreement, there
against the circumvention of devices used by au- are new requirements for compulsory licensing,
thors to protect works, but Nigeria is yet to align which include obtaining permission of the patent
its domestic legislation to address this and other holder if possible before usage.
issues of concern (Adewopo, 2009) Copyright law

142
Ethics and Social Issues Related to Information Communication Technology (ICT)

There is little understanding of the TRIPS Establish contacts, perhaps a working group
agreement among government workers in term of with ministries of science and technology
its relationship to IPR. Within several ministries, and information and communication.
some senior officers did not even know about the Obtain reliable specialized legal advice.
patent and designs Act. This might be because of Develop a mechanism to monitor the ICT
the nature of business practices in Nigeria. More- impact on IPR protection
over the notion of IPR is not intuitively linked to Promote standards for IPR that takes ICT
trade regime and protocol; and with the chronic into account.
problem of ministries not sharing information or
networking. It is reasonably understood that the
regulatory agencies may not realize its objectives etHIcAl PolIcy FrAmework
when it comes to TRIPS and IPR protection. It is
imperative that the federal ministry of information Organization and governments must develop
and communication, the ministry of science and policies that take into account related ethical and
technology and other governmental agencies, civil social issues. Organizations should develop ethi-
society, and others are considered stakeholders cal policy covering privacy, intellectual property
in the rewriting of the new patent law. For this and associated issues. Ethics policy must provide
to happen there needs to be thorough education guidelines and operational procedures on issues
(for government, professional organisations and such as privacy, software licenses and agreement,
NGOs) on the implications of TRIPS and intel- access to information, acceptable use of electronic
lectual property protection. information, user responsibility, permission rights,
On the whole in Nigeria, violations and in- system quality, and acceptable ICT use, security
fringement of intellectual property rights is on restrictions, authorized use and users, etc. the
the increase (Omoba and Omoba,2009).This is effectiveness of any ethics policy is dependent
further exacerbated by the negative use of ICT on the administrator who is responsible for the
to access, use, and copy, distribute and duplicate development and enforcement of the policy.
intellectually protected work. This is because of Rogerson (1998, p.1) provides the following
the problems of underdevelopment in every facet steps to help organisations to establish an ethics
of the Nigerian landscape: politics, economy, policy to address the ethical issues arising in the
education, commerce and trade, information use of ICT.
technology etc. the Reproduction Rights Society
of Nigeria (REPRONIG) is bedeviled with leader- 1. Decide the organizations policy, in broad
ship problems and not active. terms, in relation to ICT. This should:
Take account of the overall objectives
of the organization, drawing from
ProPosAl For PolIcy such existing sources as the organiza-
mAkers: IPr And trIPs tional plan or mission statement;
Use the organizations established
Government should; values, possibly set out in its code of
practice, for guidance in determining
Identify IP focal points within the differ- how to resolve ethical issues;
ent sectors and ministries in Nigeria as it Get the scope of policy in terms of
relates to ICT. matters to be covered;

143
Ethics and Social Issues Related to Information Communication Technology (ICT)

2. Form a statement of principles that would The explicit consideration of


probably include social cost and benefit of ICT
Respect for privacy and application;
confidentiality; The testing of systems (includ-
Avoid ICT misuse; ing risk assessment where pub-
Avoid ambiguity regarding ICT sta- lic health, safety and welfare, or
tus, use and capability; environmental concerns arise);
Be committed to transparency of ac- Documentation standards; and
tions and decisions related to ICT; Security and data protection
Adhere to relevant laws and observe Whilst organisations have a responsi-
the spirit of such laws; bility to act ethically in the use of ICT
Support and promote the definition so to do individual employees. Those
of standards in, for example, devel- involved in providing ICT facilities
opment, documentation and training; should support the ethical agenda of
and the organization and in the course of
Abide by relevant professional codes. their work should:
Identify the key areas where ethical Consider broadly who is affect-
issues may arise for the organization, ed by their work;
such as: Examine if others are being
ownership of software and data; treated with respect;
integrity of data; Consider how the public would
preservation of privacy; view their decisions and actions;
prevention of fraud and com- Analyze how the least empow-
puter misuse; ered will be affected by their de-
the creation and retention of cisions and actions; and
documentation; Consider if their decisions and
the effect of change on people acts are worthy of the model
both employees and others; and ICT professional.
global ICT.
Consider the application of policy The development of such ethical policy should
and determine in detail the approach require active participation of individuals, orga-
to each area of sensitivity that has nizations, government, professional bodies and
been identified. associations, NGOs and ultimately the world
Communicate practical guidance to community.
all employees, covering:
The clear definition and assign-
ment of responsibilities; Future trends
Awareness training on ethical
sensitivities; Violations and infringement of intellectual prop-
The legal position regarding in- erty rights occasioned by the use of Information
tellectual property, data protec- Communication Technology (ICT) will continue
tion and privacy; to be on the increase. There would be continued
copying, distribution and duplication of intellec-
tually protected work on the World Wide Web.

144
Ethics and Social Issues Related to Information Communication Technology (ICT)

Proprietary software and network piracy using issues should be considered before a full imple-
electronic networks in digitized form is expected mentation of ICT. Ethics guide human behavior
to increase. The world will continue to witness in all areas. When applied to ICT, it concerns the
series of protest by companies, organizations and relationship of system with the people who use
individuals in this regard. This would be further them. The major ethical issues thrown up by ICT
exacerbated by the near lack of global standards involves protection of individual and collective
on acceptable practices. The case of developing privacy and confidentiality, ownership and use of
countries is expected to grow worse as a result of software, data integrity, protection of intellectual
the problems of underdevelopment. property etc .Individuals and organisations must
Information Communication Technology analyze their actions even as they use ICT for daily
(ICT) and the Internet will fundamentally, irrevers- operations. This is necessary to determine who is
ibly and comprehensively affect our ethics and to be affected; public perception of decision and
social systems. Clearly therefore, the critical role actions, infringement on individual or collective
of government, organizations professional bodies privacy. We have a responsibility to act ethically
and individuals at this time is heightened rather in the use of ICT. This is because our actions have
than diminished. The beginning of wisdom in the social consequences.
ICT world is realizing just how little of the future Advances in ICT have greatly affected in-
you can predict, therefore the role of stakeholders dividual and corporate information storage and
can only be best proposed, not predicted. dissemination practices. Information on the Net
It is therefore proposed that organizations, can be accessible, monitored, copied, duplicated
government and professional bodies should put and distributed at many points. Digitized books,
in place a robust information policy that takes motion pictures and music are easily distributed
into account ethical and social issues arising from via electronic devices and the Internet. Software
the use of ICT. The policy is expected to address is easily pirated, although some database owners
such issues such as privacy, software licenses have been able to provide licensing agreements
and agreement, acceptable use of information with their users, it is very costly and sometimes
in electronic environment, user responsibility, impossible to enforce the contracts (Zhu et al,
permission rights, acceptable ICT use, security 2002). The ease and convenience with which data
and authorized use and users, among others. can be copied, manipulated, duplicated and dis-
Training and skill development on the technical, tributed without permission is increasing. Though
legal, ethical and policy aspects of information there are several possible, legal mechanism for
communication technology (ICT) is expected to the protection of individual and collective rights;
be addressed advances and use of ICT has made the protection
of intellectual property difficult. There is therefore
the need for ethical consideration by people who
conclusIon manufacture and use ICT. Organization should
develop ethics policy statements to guide individu-
The use of ICT has raised new and perplexing als in making appropriate use of ICT.
ethical issues and challenges. This is occasioned Intellectual property rights protection laws
by the near absolute dependence on ICT as well as in Nigeria should be expanded and strengthen to
rapid advances in data/information handling and incorporate sensitive areas in ICT usage. IPR laws
processing. These ethical issues have social im- should take into account ethical issues/challenges
pacts and therefore must be viewed and addressed in relation to ICT.
frotum cultural, social, political standpoint. These

145
Ethics and Social Issues Related to Information Communication Technology (ICT)

reFerences Ifidon, S.E. (2006, March). Planning without


information: the bane of national development.
Adewopo, A. (2009, June 9). Pay subscription Inaugural lecture delivered at Ambrose Alli Uni-
broadcasting: rights acquisition and infringement. versity, Ekpoma, Edo State, Nigeria.
The Guardian, (p.96).
Kallman, E. A., & Grillo, J. P. (1996). Ethical
Ball, K. S. (2001). Situating workplace surveil- decision making and information technology: an
lance: ethics and computer based performance introduction with cases. New York: McGrawHill.
monitoring. Ethics and Information Technology,
3(3). doi:10.1023/A:1012291900363 Laudon, K., & Laudon, C. (2006). Management
Information Systems: managing the digital firm,
Bynum, T. W. (2009). Ethics in the information (9thed.). New Delhi, India: Pearson Education.
age, (Tech.Rep.). New Haven, CT: Southern Con-
necticut State University. OBrien, J. A. (2006). Introduction to information
systems: essentials for the e-business enterprises,
Bynum, T. W., & Rogerson, S. (Eds.). (1996). (9thed.). New York: McGraw-Hill.
Global information ethics. USA: Opragon press.
Obileye, O. (2001). Combating counterfeit drugs:
Capuro, R. (2006). Towards an ontological founda- the way forward. Paper presented at the public
tion of information ethics. Ethics and Information hearing of the health and social services commit-
Technology, 8(2), 175186. doi:10.1007/s10676- tee, Federal House of Representative, National
006-9108-0 Assembly, Abuja, Nigeria.
Carbo, T. (2006). Understanding information Omoba, O.R. & Omoba, F. A. (2009). Copyright
ethics and policy: integrating ethical reflection law: influence on the use of information resources
and critical thinking into policy development. in Nigeria. Library philosophy and practice.
Retrieved February 28, 2009, from http:/www.
ethicspolicy.pitt.edu Rogerson, S. (1998). The ethics of information
and communication Technologies: ICT in busi-
Davies, P. B. (2002). Information systems: an ness. IMIS journal, 8(2), 1-2.
introduction to Informatics in organizations. New
York: Palgrave. Rogerson, S. & Bynum, T.W. (1995, June 9).
Cyberspace: the ethical frontier. London times.
Edewor, N. (2008). Freedom of Information Bill:
issues, imperatives and implications for Nigerian Sherratt, D., Rogerson, S., & Fair-weather, N. B.
libraries. Ozoro Journal of General Studies, 1(1), (2005). The challenge of raising ethical awareness:
3440. a case based aiding system for use by computing
and ICT students. Science and Engineering Ethics,
Froehlich, T. J. (1992). Ethical consideration 11(2), 29931. doi:10.1007/s11948-005-0047-7
of information professionals. Annual Review of
Information Science & Technology, 27, 29132. Zhu, H. (2002). The interplay of web aggregation
and regulations. (Tech.Rep.). Cambridge, MA:
Gorniack, K. (1996). The computer revolution MIT Sloan School of Management.
and the problem of global ethics. In Bynum &
Rogerson (Eds.), Global information ethics,
(pp.177-190). USA: Opragon press.

146
Ethics and Social Issues Related to Information Communication Technology (ICT)

key terms And deFInItIons Freedom of Information: Ability to access


information without any form of restriction or
Ethics: Value of right or wrong of any decision inhibition.
made or reached by an individual or organisation. Information Right: The right of citizens to
Privacy: A state of freedom from any form of information as stipulated by law.
damaging interference. Ethics Policy: A set of activities, rules or
Intellectual Property: Intangible human strategy for determining whether an action or
work, protected by law. decision is wrong or right.
Copyright: An authority granted an individual Unauthorized Access: Series of actions or
for his/her imaginative creation. activity performed without due permission.

147
148

Chapter 10
Framework for Effective
Development of Information
and Communication
Technology (ICT) Policy in
University Libraries in Nigeria
Okon E. Ani
University of Calabar, Nigeria

Margaret Edem
University of Calabar, Nigeria

AbstrAct
ICT is transforming library practices and procedures the world over. The aim of this chapter is to address
the access gap to ICT by highlighting the framework for effective development of relevant ICT policy
in university libraries in Nigeria. The chapter explores variety of ICT infrastructure/services that are
available in university libraries, sources of ICT funding, ICT policy priority areas, key ICT policy issues
and strategies for formulating ICT policy. Questionnaire survey was used for the study. The findings of
the study indicate that, there is a widespread use of Internet in the 14 surveyed university libraries; and
only 5 of these libraries have computerized library services. NUC/ETF, library development fund (LDF)
and university management are major ICT funding sources. ICT funding/budgeting, ICT infrastructure
procurement/maintenance, ICT literacy/capacity building and ICT use are the highest ranked ICT policy
priority areas in the surveyed libraries. And annual budgetary allocation to ICT in university libraries,
training/capacity building for librarians, as well as, organization of ICT literacy programme for patrons
are the highest ranked key ICT policy issues in university libraries. The chapter recommends that, each
university should formulate relevant ICT policy for its library, besides the national ICT policy.

DOI: 10.4018/978-1-61692-012-8.ch010

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Framework for Effective Development of Information and Communication Technology (ICT)

IntroductIon ties have only started embracing it ((Editorial,


ThisDay Newspaper, 2008)
Information and communication technology (ICT) Norris, Sullivan, Poirot & Soloway (2003)
has a critical role to play in development efforts have also confirmed the low level of use of ICT
around the world (Sierra, 2006), particularly in education, particularly limited access to com-
in developing countries (such as Nigeria). The puter technology and the Internet in developing
widespread use of ICT in the provision of quality countries. Thus there is dire need to tackle the
education and research towards national devel- problem of inequitable access to ICT or digital
opment has been advocated. Thus, developing divide in Nigerian universities to enhance global
countries have begun taking concrete actions to competitiveness in our educational and research
integrate ICT not only into their economic policies output. This chapter would therefore explore the
and development agendas, but in the formula- state of information and communication technol-
tion of ICT policy towards effective educational ogy (ICT) in Nigerian university libraries; and
development of the citizenry, as education is the thereafter develop framework for formulation of
bedrock for nation building. This is so, because ICT policy as a tool for effective applications of
access to information and ultimately, knowledge, ICT in the libraries to support teaching, learning
is essential to societal development, and ICTs are and research in the universities.
tools for effective and efficient information access, Timely access to information and knowledge in
processing, storage and retrieval, management and the academic environment such as the university
dissemination in educational/research institutions is dependent on the degree of application and inte-
(the universities), and their libraries in particular. gration of modern ICTs in academic and research
However, there exists a widespread disparity activities. The development of a stable, predict-
in access to ICTs both among and within countries able and transparent policy, legal and regulatory
and institutions (universities), a notion which is framework is a prerequisite for any sustainable
commonly referred to as digital divide. The approach to improve access to information and
effort of narrowing these access gaps or barri- communication services (Navas-Sabater, Dymond
ers to information dissemination and access to & Juntunen, 2002) in the university libraries in
knowledge is therefore a priority in promoting sus- Nigeria. With ICT, faculty/students could access
tainable educational development in developing information beyond their immediate academic
countries (Navas-Sabater, Dymond & Juntunen, environments, nationally and internationally for
2002). And this could essentially be achieved their teaching, learning and research. The univer-
through the provision of relevant ICT policy in sity libraries have been the major access points
the affected countries/institutions (universities). for information/knowledge by the staff/students
For instance, in Nigerian universities, especially towards quality teaching, learning and research.
in the libraries, poor/lack of access to relevant ICT But the Nigerian university libraries are relatively
infrastructural facilities such as robust Internet less competitive in the application of ICTs, in the
connectivity is widespread, and this is principally provision of information to their clientele.
attributable to poor/lack of appropriate ICT policy The aim of this chapter is to address the ac-
in the university system, with the resultant effects cess gap to ICT in Nigerian university libraries
of low ranking of Nigerian universities in global by highlighting the framework for effective
perspective in terms of quality education and development of appropriate ICT policy towards
research. While the rest of the world utilized the enhanced information-handling and management.
advantages provided by ICT, Nigerian universi- Thus it is the objective of this chapter to explore

149
Framework for Effective Development of Information and Communication Technology (ICT)

different ICT infrastructural facilities that are bAckground


available in the surveyed university libraries, their
major sources of funding, and thereafter develop In the last decade, developing countries have
policy framework to sustain, regulate and control experienced a revolution in information and com-
ICT funding/budgetting. The chapter would also munication technology (World Bank, 2008). ICT is
investigate other key policy areas/issues in uni- crucial to educational development of any nation,
versity libraries; these would include ICT literacy/ as it improves the quality of teaching, learning and
capacity building, ICT use, ICT infrastructure research in the university. ICT has wider applica-
procurement/maintenance, electronic collection tions in the practice of modern librarianship, and
development, resource sharing and copyright thus university librarians must work out modalities
(Intellectual Property Right) to enhance effec- towards its effective adoption and integration in
tiveness and efficiency in access to information libraries for access to global information resources
and knowledge in the university libraries. This is as well as national resource sharing (Ani, 2007).
in line with the postulation of Guislain, Qiang, ICT is a term that refers to the various technolo-
Lanvin, Minges & Swanson (2006), that, there gies that are used in the creation, acquisition,
is a growing consensus that countries or institu- storage, dissemination, retrieval, manipulation and
tions seeking to strengthen their education and transmission of information (Zulu, 2008). Grace,
research outcomes should make it a priority to Kenny & Qiang (2004) described ICTs as tools that
improve ICT access and quality in their academic facilitate the production, transmission, and pro-
environments. And the universal approach towards cessing of information. In a broader context, ICTs
equitable and sustainable access to and use of ICT include, computers: which are essentially used for
in Nigerian universities to support quality teach- processing and storage of information; telecom-
ing, learning and research is to develop relevant munications: which are used for the transmission
ICT policy particularly in the libraries. Accord- of information; and publishing technologies (e.g.
ing to Information Development News (2006), the Internet), which are the technologies used for
this can principally be achieved by developing documenting, presenting and disseminating of
and implementing enabling policies that reflect information and knowledge (Zulu, 2008). Thus
national realities and promote a supportive inter- Ani & Biao (2005) have referred to ICTs as glo-
national environment, as well as the mobilization balization tools that enhance access to research
of domestic resources nationally, regionally and information universally.
institutionally. These policies should also be Adeyeye & Iwela (2005, p202) defined policy
reflected in a transparent equitable regulatory as the vision, goals, principles and plans that guide
framework to create competitive academic and the activities of governments, and organizations/
research environment. Thus effective development institutions. Policy makers in education (univer-
of ICT policy in our universities or specifically in sities) are therefore responsible for developing a
university libraries would enhance equitable and vision and strategy for educational development,
affordable access to ICT to both faculty/students and mobilizing support and cooperation for imple-
to tap relevant information and knowledge with menting the vision and strategy from a wide range
increasing efficiency and productivity. This is of constituencies (Mingat, Tan & Sosale, 2003) or
so, as the emergent of digital technologies and stakeholders. These stakeholders in the university
globalization has called for ICT policy which system in Nigeria include government minis-
should be high on the list of priorities of academic tries, lecturers, university administrators who
libraries (Banou, Kostagiolas & Olenolou, 2008). do the work of delivering educational services;

150
Framework for Effective Development of Information and Communication Technology (ICT)

students who are the immediate beneficiaries of ICT policy at both national and institutional levels
the services provided, employers and public at as applicable to university libraries in Nigeria.
large who look to the university system to sup- The aim is to streamline ICT policy in the uni-
ply the skilled labour and future leaders who can versity libraries at the national level through the
contribute meaningfully to the socio-cultural and intervention of National Universities Commission
technological development of the nation. (NUC), while at the same time encouraging the
So, ICT policy is concerned with the provi- development of relevant ICT policy institution-
sion of appropriate law, rule and regulation or ally in each university library in order to allow
guideline by a university library to direct, control for smooth and transparent applications of ICT
and regulate its staff/patrons on the adoption and in the provision of library tasks/services in line
integration of ICT in information management, with technological development.
processing and dissemination (Uhegbu, 2007). In view of the importance of ICT in socio-
Hence for optimal operation and implementation economic development of Nigeria, the Federal
of ICT policy, appropriate legislation by relevant Executive Council (FEC) of Nigeria had approved
authority within the organization/institution (e.g. the National Information Technology Policy in
university management/senate) or outside the March 2001. And the National Information Tech-
institution (university) by the supervisory body nology Development was established in April 2001
(e.g. National Universities Commission (NUC)) to implement the national ICT policy (Adeyeye &
may be required. For instance, the national policy Iwela, 2005). Nigerian national policy for informa-
of Library Development Fund (LDF) by National tion technology (IT) is the bedrock for national
Universities Commission (NUC) that 10% of survival and development in a rapidly changing
governments subvention to each university in global environment, and challenges us to devise
Nigeria should be set aside for funding of the bold and courageous initiatives to address host
university library has been discussed by Ifidon of socio-economic issues, such as reliable infra-
(2002). Banou, Kostagiolas & Olenoglou (2008) structure, skilled human resources and capacity
have therefore viewed ICT policy as a term that building (Nigerian National Policy for Information
describes the ways of promoting and using ICT Technology (IT), 2001). It is for this reason that
in the provision of library tasks/services. A well every progressive country has a national IT policy
developed ICT policy is the key to effective and and an implementation strategy to respond to the
efficient information-handling and access to emerging global reality and thus avert becoming
knowledge in university libraries. a victim of digital divide. The mission statement
Adeyeye & Iwela (2005) therefore considered of the ICT policy in Nigeria is centered on the use
ICT policy nationally and institutionally, as the of IT as the engine for sustainable development
vision for ICT and its link to national develop- and global competitiveness. The objectives of the
mental goals through the provision of access to national ICT policy include the following (Adey-
information and knowledge. Thus ICT policy eye & Iwela, 2005; Nigerian National Policy for
may be national, institutional, regional or interna- Information Technology (IT), 2001):
tional in scope, and each level may have its own
decision-making bodies. Institutional ICT policy To ensure that information technology re-
would therefore be concerned with the principles sources are readily available to promote ef-
and plans that guide the applications and integra- ficient national development
tion of ICT in different institutions (such as the To improve accessibility to public admin-
universities) toward the realization of the goals istration for all citizens, bring transparency
of these institutions. This chapter would examine to government processes

151
Framework for Effective Development of Information and Communication Technology (ICT)

To develop human capital with emphasis Esin & Edem (2005, p703), in their survey of 17
on creating and supporting knowledge- university libraries found that only six of them
based society are fully computerized, five university libraries
To empower the youth with IT skills and have OPAC, and that many university libraries
prepare them for global competitiveness are yet to join the internet and the information
To integrate IT into the mainstream of edu- superhighway. In a survey, with 14 university
cation and training librarians in Nigeria as respondents, Ani (2005,
To create IT awareness and ensure univer- p69) found that only four of the surveyed uni-
sal access in order to promote universal IT versity libraries have websites on the Internet.
diffusion in all sectors of our national life Gbaje (2007) study had revealed that, the shortage
To build a mass pool of IT literate man- of web technologies skilled librarians; poor infor-
power, and mation infrastructure and high cost of equipment
To establish appropriate institutional have hindered university libraries from provid-
framework to achieve the goals stated ing online information services. Though, Ani &
above. Ahiauzu (2008) had reported an improvement
in Internet connectivity in university libraries in
From the above national objectives of ICT Nigeria; the problems of low bandwidth and lack
policy, it is imperative to develop an institutional of sustainability of the available Internet services
framework for relevant ICT policy in university are major challenges that need to be overcome.
libraries towards sustainable ICT access and use Etim (2006) has confirmed that, in most African
to support quality research and development (R universities adequate Internet access presents a
& D) in the country. great challenge for university administrators. In
The goal of a university the world over is Nigeria, the situation is worsened by the epileptic
to provide enabling environment with relevant power supply in the country, as university librar-
infrastructural facilities for teaching, learning ians need additional funds to acquire and maintain
and research by the teaching staff/students. And generating plants for alternative power supply.
no university would effectively and efficiently A recent report by Foster, Heppenstal, Lazarz
achieve this goal without a functional library & Broug (2008) to examine the problems faced
equipped with relevant materials: current books/ by African authors in getting their work published
journals, modern information and communica- in international journals and how these problems
tion technologies (ICTs) particularly the com- could be overcome, showed that access to elec-
puters and the Internet (or related networks e.g. tronic resources is patchy due to internet connec-
virtual libraries) to provide access to electronic tivity and electronic infrastructure issues. And that
resources (electronic books/journals, online data many institutions only have a limited number of
bases etc.) with information technology literate PC terminals and downloading a full text PDF will
librarians. This informed the basic reason why usually take a long time due to bandwidth issues.
a library is often described as the heart of an Besides low bandwidth, the report also indicated
academic institution. Regrettably, most university that, the budget allocation for electronic resources
libraries in Nigeria are far from meeting up this and other ICT infrastructure is not provided for by
standard as is obtained by their counterparts in the university managements to support ICT diffu-
developed countries. The dearth of ICT facilities sion and application in university libraries. Foster,
in university libraries in Nigeria has been widely Heppenstal, Lazarz & Broug (2008) report also
reported in literature (Ani, 2005; Ani, Esin & revealed a low publication output of researchers
Edem, 2005; Etim, 2006; Gbaje, 2007). Ani, in Nigeria and other African countries. The poor

152
Framework for Effective Development of Information and Communication Technology (ICT)

quality of research from Nigerian universities is technologies in the provision and dissemination
essentially attributed to lack of access to relevant of information. There is also a need to develop
electronic resources in the university libraries measures and ICT policies that would bridge
(Ani & Ahiauzu, 2008; Foster, Heppenstal, Laz- digital divide in order to provide universal and
arz & Broug, 2008). In the final analysis, Foster, equitable access to these vital technologies both
Heppenstal, Lazarz & Broug (2008) opined that within and outside the university environments
subscription to electronic collections by African (Mutula, 2008).
(Nigerian) university libraries would increase the
number of successful article submissions from
Africa (Nigeria). This requires a reliable Internet Ict PolIcy Issues In
connectivity in university libraries across the unversIty lIbrArIes
country, and huge financial funding to support
subscription of relevant electronic resources. There are variety of ICT policy issues that need
This is why there is need for the formulation, to be tackled in university libraries in Nigeria,
development and implementation of relevant ICT in order to accelerate the diffusion of ICT in
policy in university libraries in Nigeria to enhance information access and utilization among library
effective adoption and integration of ICT in the patrons. Nigerian students, teaching/research staff
provision of library tasks/services. Besides, ICT need to be linked to global academic and research
policy would ensure the provision of equitable, resources through equitable and sustainable access
affordable and sustainable access to ICTs and to ICT in university libraries. Thus we need to
electronic resources in libraries by the patrons, diagnose key issues that hinder the proliferation
academic researchers/students. And these would and diffusion of ICT in information management
correspondingly make Nigerian researchers/stu- and dissemination in university libraries in Nigeria,
dents to be active participants in the competitive and proffer appropriate solutions to these problems
global knowledge. through the development of relevant ICT policy.
Therefore, the purpose of developing ICT In order to achieve this goal, empirical data were
policy in university libraries in Nigeria is for the collected in this study from university librarians to
creation of new users and the provision of satis- facilitate the development of framework for ICT
factory service to those already using them. The policy in Nigerian university libraries.
development of ICT policy in university libraries
is of strategic importance for investing in ICT as research methodology
a means to fully comprehending, managing and
developing any kind of information and knowl- A survey method was used in the study. Cop-
edge, which would shape erudite researchers and ies of questionnaire were mailed to university
scholars and sensitize the students to improve librarians in 20 federal universities in Nigeria as
their learning potential (Banou, Kostagiolas & respondents in January 2009. A self-addressed and
Olenoglou, 2008). Thus ICT policy is necessary stamped envelope was enclosed with the mailed
for efficiency and effectiveness in acquisition, questionnaire to each of the respondents to return
management and maintenance of ICT resources the completed questionnaire. The choice of the
(Adedibu, 2005/2006). For university libraries in mailed questionnaire survey was principally to
developing countries (Nigeria) to catch up with save cost of traveling to the 20 selected federal
their counterparts in developed nations in digital universities for data collection. And federal uni-
parity, proactive policies are needed to enable versities were selected based on their uniqueness
these universities to implement the latest low cost on ownership, funding and generally policy on all

153
Framework for Effective Development of Information and Communication Technology (ICT)

Table 1. ICT infrastructure/service available in


the ICT issues raised in the designed question-
university libraries
naire. Fourteen (14) duly completed and usable
copies of questionnaires were retrieved within the ICT infrastructure/service Response %
stipulated period for data analysis representing a Internet services 14 10.0
response rate of 70.0 percent. Photocopier 14 10.0
Scanner 13 9.4
results and discussion CD-ROM databases/search 11 7.9
Online databases/search 11 7.9
ICT Infrastructure/Service
Electronic journals 10 7.2
Available in University Libraries
Library LAN 10 7.2
Electronic books 9 6.5
The emergence of modern ICTs have transformed
VSAT 8 5.8
the practice of librarianship the world over. With
Library website 7 5.1
ICTs, newer library services are now offered to
Online Public Access Catalogue (OPAC) 7 5.1
library patrons in university libraries across the
country. The respondents were asked to indicate Land line telephone 6 4.3

as in Table 1, different ICT infrastructural facili- Intercom 5 3.6

ties/services that are available in their university Computerized library service 5 3.6

libraries for their information-handling, process- Radio link 4 2.9

ing, storage and retrieval, and dissemination. The Fax machine 2 1.4
results of the study have shown that, all the 14 Others 3 2.2
surveyed university libraries (representing 10.0%
of the total frequency response) have provided
Internet services to their library patrons. The new and yet to be commissioned in one other uni-
Internet technology has the capacity to host a lot versity. Computerized library service is provided
of academic and research resources to supplement by only 5 (3.6%) university libraries, while one
inadequate library holdings in Nigerian universi- other university library is about to be comput-
ties. The Internet promotes and facilitates resource erized. This shows that, most university libraries
sharing in the country, besides enhanced access to are still involved in the use of traditional/manual
global information and knowledge. With access operations and procedures to provide key library
to the Internet, Nigerian students and researchers and information services to their patrons. Simi-
can relatively compete with their counterparts larly, only 4 (2.9%) university libraries have radio
in developed nations in knowledge acquisition, link, and yet to be commissioned in one other
production and dissemination. Besides, the Inter- library. The need for the provision of wireless
net, other major ICT facilities/services that are connectivity for sustainable educational develop-
available in the surveyed university libraries are ment, particularly in university libraries to enhance
photocopiers (10.0%), scanners (9.4%), CD-ROM resource sharing has been advocated by Livings-
databases/search (7.9%), online databases/search ton (2004). Others ICT facilities mentioned by
(7.9%), electronic journals (7.2%), library LAN the respondents are web camera, digital camera,
(7.2%) among others (Table 1). multimedia projector, overhead projector, public
From the findings of the survey, Library LAN address system (PAS) and printers.
is currently available in 10 university libraries,

154
Framework for Effective Development of Information and Communication Technology (ICT)

Table 2. ICT funding source in university libraries


The Need for Alternative Power
Supply in University Libraries ICT Funding Source Response %
National Universities Commission 14 24.1
Lack of constant public power supply has been a (NUC)/Education Trust Fund(ETF)
major impediment towards effective application Library Development Fund (LDF) 13 22.4
of ICT in Nigeria, particularly in the public sector. University management 9 15.5
This has hindered the integration of ICT in the International organizations/agencies 8 13.8
provision of library and information services in Library internal revenue 4 6.9
Nigerian university libraries. Hence, the need for Individuals/alumni 4 6.9
acquisition of generating plant by each university Special government intervention fund 3 5.2
library as source of alternative power supply Private/multinational companies/orga- 2 3.4
towards effective and reliable ICT application in nizations
the library cannot be overemphasized. The find- Loan 1 1.7
ings of the study indicate that, 13 (92.9%) of the Others 0 0.0
14 surveyed university libraries have generating
plants to cater for the inadequacy of the public
power supply. This is a major progress towards (NUC) in partnership with Education Trust Fund
effective applications of ICTs in modern librari- (ETF) has made annual financial provision for
anship in Nigeria. each public university library in the country to
support any project(s) of its choice. From the
ICT Funding Source in findings of the survey, it is apparent that, 22.4%
University Libraries university librarians prefer to use fund from the
National Universities Commission (NUC)/Educa-
The issue of ICT funding has been a major source tion Trust Fund (ETF) to support ICT projects in
of concern in the literature of ICT applications in their university libraries. As indicated in Table 2,
Nigeria; for without adequate financial support, LDF is the second ranked source of funding ICT
there can be no good resources for teaching and applications in university libraries in Nigeria.
research, good staff (ICT personnel) cannot be According to Ifidon (2002), the National Univer-
recruited, and ICT facilities cannot be acquired (Ifi- sities Commission (NUC) has directed that each
don, 2002). This is why according to Ifidon (2002), year 10% of the total recurrent grant to each
the words funds and funding are continuously university should be set aside for the librarys
belaboured by university library administrations operation; this special fund is referred to as library
towards integration of ICT in library procedures development fund (LDF). The third major source
and operations. It was therefore considered as of ICT funding is the fund provided by the uni-
pertinent to explore different ICT funding sources versity management, according to Bozimo
in university libraries in Nigeria. The respondents (2005/2006), it is usually the take off funds for
were asked to select different sources of funding ICTs in the university libraries. Another important
ICT in their libraries as shown in Table 2. source of funding ICT in university libraries in
As shown in Table 2, the highest ranked ICT Nigeria comes from international organizations/
funding sources in Nigerian university libraries agencies. For instance, Bozimo (2005/2006) has
are NUC/ETF (24.1%), library development fund reported that the bulk of funding the computeriza-
(LDF) (22.4%), university management (15.5%), tion of the ABU Library System came from a
and international organizations/agencies (13.8%) MacArthur Foundation grant, an international
respectively. National Universities Commission

155
Framework for Effective Development of Information and Communication Technology (ICT)

Table 3. ICT policy priority area in university


organization/agency. Therefore Foreign Direct
libraries
Investment (FDI) on funding of ICT in univer-
sity libraries should be encouraged. Individuals/ ICT Policy Priority Area Response %
alumni and library internal revenue are also good ICT funding/budgeting 14 16.5
sources of funding ICT in the surveyed univer- ICT infrastructure procurement/mainte- 14 16.5
sity libraries. The results of the survey have also nance
shown, occasionally, respective governments and ICT literacy/capacity building 13 15.3
private/multinational companies do provide spe- ICT use 13 15.3
cial funds to support ICT applications in univer- Electronic collection development 12 14.1
sity libraries in order to make them globally Copyright (Intellectual property right) 10 11.8
competitive. Resource sharing 9 10.6
Others 0 0.0
ICT Policy Priority Area in
University Libraries
been one of the major impediments for effective
The respondents were asked to rank different areas application of ICT in Nigerian university libraries.
of formulating ICT policy in order of priority in Thus it is pertinent to develop appropriate ICT
Nigerian university libraries as shown in Table 3. policy to improve/promote ICT literacy/capacity
The findings of the survey have shown that, ICT building among librarians in Nigerian universi-
funding/budgeting (16.3%), ICT infrastructure ties. And this should be supported by providing a
procurement/maintenance (16.3%), ICT literacy/ policy that would encourage effective use of ICT
capacity building (15.3%), and ICT use (15.3%) by library patrons in the universities. The findings
are ranked as major ICT policy priority areas in of the study have also revealed the need for ICT
the surveyed university libraries. According to policy on copyrights (intellectual property rights)
Ifidon (2002), the quality and adequacy of the and resource sharing respectively.
(ICT) resources and services available in univer-
sity libraries are function of the level of financial key Ict Policy Issues in university
support which the libraries receive from their libraries
governing authorities. He therefore calls on the
librarians to take the trouble to examine in-depth The survey put forward key ICT policy issues
the policy issues involved in funding. Therefore that need to be developed in university libraries
adequate policy on ICT funding, will discourage for the respondents to examine and rank as shown
or minimize mismanagement of money meant for in Table 4. Key ICT policy issue is concerned
ICT applications in Nigerian university libraries. with the basic policy on ICT that is imperative
Besides funding, the need to formulate relevant for adoption and application of ICT in university
policy that would guide the procurement of ICT libraries in Nigeria. In this, study, key ICT policy
infrastructure as well as their maintenance cannot issues include annual budgetary allocation for
be overemphasized. This would make respective ICT, ICT training/capacity building, ICT literacy
university managements/university librarians to be programme for library users, implementation of
conscious of the need to provide basic ICT facili- ICT budget in university library, payment of an-
ties/services to their library patrons. One cardinal nual ICT levy in university library by students,
area that requires appropriate ICT policy according and budgetary allocation for electronic collection
to the findings of this survey is ICT literacy/ca- development.
pacity building. Lack of/inadequate personnel has

156
Framework for Effective Development of Information and Communication Technology (ICT)

Table 4. Key ICT policy issues in university li-


As shown in Table 4, the high ranking of regular
braries
training/retraining and capacity building (21.3%)
Key ICT Policy Issue Response % for all categories of library staff as a key ICT issue
Annual budgetary allocation to ICT in 14 23.0
is targeted to address this problem. Therefore the
university libraries development of appropriate ICT policy to enhance
Regular ICT training/retraining and capacity 13 21.3 capacity building for librarians and other library
building for all categories of library staff staff will accelerate ICT diffusion and application
Organization of ICT literacy programme 10 16.4 in university libraries in the country.
for new library users annually
Monitoring of implementation of ICT bud- 9 14.8
get in university library by library committee ICT Literacy Programme
Payment of ICT levy in university libraries 8 13.1 for Library Users
annually by students
Allocation of 40% of budget for collection 7 11.5 Regular organization of ICT literacy programme
development to electronic resources (elec-
tronic collection development)
for library users is ranked third by the respondents
as a key ICT policy issue in Nigerian university
libraries. Library users need to be trained on how
Annual Budgetary Allocation for ICT to use and get familiar with the new technologies,
ICTs the computers, the Internet, OPAC, CD-
Most scholars are generally concerned about the ROM/online databases etc. for effective and ef-
issue of inadequate funding of university libraries ficient information access and retrieval in libraries.
in Nigeria (Adedibu, 2005/2006; Foster, Heppen-
stal, Lazarz & Broug, 2008; Lawal, 2004; Mutula, Implementation of ICT Budget
2008; Ojebode, 2007). Adedibu (2005/2006) had in University Library
suggested that, due to inadequate funding of uni-
versity libraries, and in order to use the little fund According to Table 4, respondents are also of the
available in each library judiciously, there is need view that, it is not enough to have annual budgetary
for librarians to have written ICT policy. Thus, allocation for ICT, but its implementation should
responding university librarians in the survey are also be given attention in ICT policy formulation.
unanimous in their ranking of annual budgetary Hence there is a need for monitoring of imple-
allocation for ICT in Nigerian university libraries mentation of ICT budget in university library by
(23.0%) as the most important ICT policy issue library committee or any other supervisory body
as in Table 4. It is obvious that, annual budgetary in each university in Nigeria.
allocation for ICT will relatively increase the level
of ICT diffusion in university libraries. Payment of Annual ICT Levy in
University Library by Students
ICT Training/Capacity Building
The results of the study have also indicated that
Lack of/scarcity of skilled ICT personnel has been there is need for the development of policy frame-
another major factor that impedes ICT applications work for the payment of ICT levy in university
in university libraries in Nigeria. ICT literacy libraries annually by students. Already, in a few
is central to capacity building, which in turn Nigerian universities, students do pay certain
impacts on IT development and use, particularly amount of money for library fee to support library
in university libraries (Adeyeye & Iwela, 2005). internal revenue (Ifidon, 2002), which is one of

157
Framework for Effective Development of Information and Communication Technology (ICT)

Table 5. ICT Policy Strategy


the common sources of funding ICT in Nigerian
university libraries as shown in Table 2. ICT Policy Strategy Response %
Formulation of relevant ICT policy would 14 14.1
Budgetary Allocation for Electronic enhance integration of ICT in the provi-
sion of library tasks/services
Collection Development
Besides national ICT policy, each uni- 13 13.1
versity should formulate relevant ICT
Collection development is the backbone of any policy for its library
library, especially academic library. Collection National ICT policy would bring stan- 12 12.1
development policy is a vital instrument in making dardization in information management
in university libraries
selections to support the curricula of any academic
There is need for national ICT policy in 12 12.1
institution, and it should be brought to cater for university libraries
all aspects of collection in the library (Adedibu, National Universities Commission 11 11.1
2005/2006). Foster, Heppenstal, Lazarz & Broug (NUC) should monitor the implementa-
tion of national ICT policy in university
(2008) have reported that, budgetary allocation for libraries especially during accreditation
electronic resources is not provided for in African of programmes
universities, particularly in Nigeria. However, the University staff (teaching/non-teaching) 10 10.1
policy of allocating 40% of annual budget for should be involved in the formulation
of ICT policy in the university libraries
collection development to electronic resources
National Universities Commission 9 9.1
or electronic collection development in Nigerian (NUC) should coordinate and streamline
university libraries is imperative, if library users relevant ICT policy in university libraries

must have access to relevant digital resources for There is existing formal/official ICT 7 7.1
policy in my university library
their teaching, learning and research.
Students (undergraduates/postgraduates) 6 6.1
should be involved in the formulation of
Ict Policy strategy ICT policy in university libraries
Only university administration/library 5 5.1
management should be involved in the
The respondents were asked to rank different formulation of ICT policy in the univer-
strategies for developing ICT policy in university sity libraries
libraries as shown in Table 5. The findings of the
survey have shown that, formulation of relevant
ICT policy would be a good strategy for enhanced should monitor its implementation especially
ICT integration in the provision of library tasks/ during accreditation of academic programmes in
services (14.1%). And the basic strategy to be Nigerian universities. In order to underscore the
adopted should involve the formulation of ICT importance of this strategy, one of the respondents
policy both at the national as well as the insti- has put forward the following comment:
tutional levels (13.1%). This is affirmed by the
respondents as in Table 5 that: besides national ICT National Universities Commission (NUC) should
policy, each university should formulate relevant not only monitor, it should enforce implementation
ICT policy for its library. The goal of national ICT of the ICT policy in the university libraries and
policy according to the results of the study is to make it one of the conditions for programmes
bring standardization in information management accreditation
in university libraries in the emerging digital in-
formation environment. However, for effective The findings of the survey have also indicated
national ICT policy in Nigerian university librar- that, major stakeholders such as university staff
ies, National Universities Commission (NUC)

158
Framework for Effective Development of Information and Communication Technology (ICT)

(teaching/non-teaching), and the students should awareness and sensitization of major stakehold-
be involved in the formulation of relevant ICT ers: National Universities Commission (NUC),
policy in university libraries. Thus the formulation university managements, university librarians
of ICT policy in university libraries should not among others, in future appropriate ICT policy
be the prerogative of the university managements would be put in place to tackle the inequitable
only. For instance, there is need for the university access to ICT in university libraries.
management to involve students representatives
in the determination of how much each student
should pay annually as ICT levy as earlier indi- conclusIon
cated in Table 4.
ICTs are modern tools for efficient information
management, processing and dissemination in
Future trends university libraries. But in Nigeria access to ICTs
in university libraries is not equitable and sustain-
According to Adeyeye & Iwela (2006), there is able. Many ICT infrastructure/services are still
need for periodic review of ICT policy to reflect not available in most (of the surveyed) Nigerian
technological development and advances. Etim university libraries. The solution to the problem
(2006) had posited that there would be progres- of digital divide or inequitable access to ICTs
sive ICT applications in university libraries in in Nigerian university libraries lies in effective
Nigeria in line with the emerging global trend development of relevant ICT policy. Appropriate
for equitable access to information. This study ICT policy would accelerate the rate of diffusion
has confirmed this prediction in terms of Inter- of ICTs, as it would remove the bottlenecks in the
net connection, as all the 14 surveyed university applications and use of ICT in Nigerian university
libraries are connected to the Internet compare libraries. Apparently, ICT has brought enormous
to earlier reports (Ani, 2005; Ani, Esin & Edem, transformations and innovations in librarianship
2005). What need to be done to improve access in Nigeria. The development of relevant ICT
is increase in bandwidth. Although, other ICT policy would relatively increase access to ICT
infrastructure/services as shown in Table 1 such in university libraries and optimally enhances in-
as computerized library services, OPAC, library formation management and utilization. Although
website, land line telephone, VSAT, radio link are the framework for effective development of ICT
available in a few university libraries; there are policy should be holistic in approach, the follow-
indications that efforts are being made to improve ing recommendations would assuage the process:
access to these facilities/services in the future.
The results of the study have shown that Nigerian 1. Each university should develop an ICT policy
university libraries are making progressive efforts for its library.
to fully integrate ICT in their library procedures/ 2. National Universities Commission (NUC)
operations. For examples, one university library is should coordinate the framework for the
about to computerize its library services, radio development of national ICT policy in uni-
link and library LAN are yet to be commissioned versity libraries.
in one other library. Apparently, with relevant ICT 3. National Universities Commission (NUC)
policy in place, access to these ICT infrastructure/ should monitor the implementation of
services would be accelerated significantly within national ICT policy in university libraries
the next half decade. Presently, the issue of ICT e.g. through accreditation of academic pro-
policy seems to be new in university libraries, with grammes. That is, each university library

159
Framework for Effective Development of Information and Communication Technology (ICT)

should meet and satisfy a certain minimum Ani, O. E. (2005). Evolution of Virtual Li-
standard of ICT integration, adoption and ap- braries in Nigeria: Myth or Reality? Jour-
plication in the provision of library tasks/ser- nal of Information Science, 31(1), 6770.
vices before certain academic programmes doi:10.1177/0165551505049262
could be accredited in such university.
Ani, O. E. (2007). Information and Communica-
4. Institutionally, university library commit-
tion Technology (ICT) Revolution in African
tee (or any other supervisory body) should
Librarianship: Problems and Prospects. Gateway
monitor the implementation of ICT policy
Library Journal, 10(2), 111118.
in each university library.
5. The areas that need effective ICT policy Ani, O. E., & Ahiauzu, B. (2008). Towards
should include but not limited to the follow- Effective Development of Electronic Informa-
ing: ICT funding/budgeting, ICT procure- tion Resources in Nigerian University Librar-
ment/maintenance, ICT literacy/capacity ies. Library Management, 29(6/7), 504514.
building, ICT use, electronic collection de- doi:10.1108/01435120810894527
velopment, copyright (intellectual property
Ani, O. E., & Biao, E. P. (2005). Globalization: Its
right) and resource sharing.
Impact on Scientific Research in Nigeria. Journal
6. Other stakeholders such as staff (teaching/
of Librarianship and Information Science, 37(3),
non-teaching) and the students should be
153160. doi:10.1177/0961000605057482
involved in the formulation of relevant ICT
policy in Nigerian university libraries. Ani, O. E., Esin, J. E., & Edem, N. (2005).
7. Workshops/seminars should be organized Adoption of Information and Communica-
to sensitize major stakeholders: National tion Technology (ICT) in Academic Libraries:
Universities Commission (NUC), university A Strategy for Library Networking in Nige-
managements and university librarians on the ria. The Electronic Library, 23(6), 701708.
imperative of developing and implementing doi:10.1108/02640470510635782
relevant ICT policy in university libraries
Banou, C., Kostagiolas, P., & Olenoglou, A.
towards enhanced access to global electronic
(2008). The Reading Behavioural Patterns
information resources to support effective-
of the Ionian University Graduate Students:
ness and efficiency in teaching, learning and
Reading Policy of the Academic Librar-
research in Nigerian universities.
ies. Library Management, 29(6/7), 489503.
doi:10.1108/01435120810894518
Bozimo, D. O. (2005/2006). ICT and the Ahmadu
reFerences Bello University Libraries. Nigerian Libraries,
39, 120.
Adedibu, L. A. (2005/2006). Collection Develop-
ment Policy: The Case of University of Illorin Editorial, (2008). The ranking of our Universities.
Library. Nigerian Libraries, 39, 7991. ThisDay Newspapers (Tuesday 9, December).

Adeyeye, M., & Iwela, C. C. (2005). To- Etim, F. (2006). Resource Sharing in the Digital
wards an Effective National Information and Age: Prospects and Problems in African Universi-
Communication Technologies in Nigeria. ties. Library Philosophy and Practice, 9(1), 1219.
Information Development, 21(3), 202208.
doi:10.1177/0266666905057337

160
Framework for Effective Development of Information and Communication Technology (ICT)

Foster, K., Heppenstal, R., Lazarz, C., & Broug, Mutula, S. M. (2008). Digital Divide in Africa:
E. (2008). Emerald Academy 2008 Authorship Its Causes, Amelioration and Strategies . In Aina,
in Africa. Retrieved March 20, 2009 from http:// L. O., Mutula, S. M., & Tiamiyu, M. A. (Eds.),
info.emeraldinsight.com/pdf/report.pdf/ Information and Knowledge Management in the
Digital Age: Concepts, Technologies and African
Gbaje, E. S. (2007). Provision of Online Infor-
Perspectives (pp. 205228). Ibadan, Nigeria: Third
mation Services in Nigerian Academic Libraries.
World Information Services Limited.
Nigerian Libraries, 40, 114.
Navas-Sabater, N., Dymond, A., & Juntunen, N.
Grace, J., Kenny, C., & Qiang, C. Z. (2004). In-
(2002). Telecommunications and Information
formation and Communication Technologies and
Services for the Poor: Toward a Strategy for Uni-
Broad-Based Development: A Partial Review of
versal Access (World Bank Discussion Paper No.
the Evidence. Washington, DC: The World Bank.
432). Washington, DC: The World Bank.
Guislain, P., Qiang, C., Lanvin, B., Minges, M., &
Nigerian National Policy for Information Technol-
Swanson, E. (2006). Overview . In Information and
ogy (IT). (2001). Retrieved March 18, 2009 from
Communications for Development: Global Trends
http://nitda.gov.ng/document/nigeriaitpolicy.pdf/
and Policies. Washington, DC: World Bank.
Norris, C., Sullivan, T., Poirot, T., & Soloway, E.
Ifidon, S. E. (2002). Policy Issues in the Fund-
(2003). No Access, No Use, No Impact: Snapshot
ing of Nigerian University Libraries . In Lawal,
of Surveys of Educational Technology in K-12.
O. O. (Ed.), Modern Librarianship in Nigeria: A
Journal of Research on Technology in Education,
Festschrift to mark the Retirement of Chief Nd-
36(1), 15-27. Retrieved June 15, 2009 from http://
untuei Otu Ita, University Librarian, University of
search.epnet.com/direct.asp; http://ez/noxy.us.edu
Calabar, 1977-1997 (pp. 4954). Calabar, Nigeria:
University of Calabar Press. Ojebode, F. I. (2007). Library Funding and Book
Collection Development: A Case Study of Oyo
Information Development News. (2006).
State College of Education and Federal College of
Information Development, 22(1), 721.
Education (SP), Oyo. Gateway Library Journal,
doi:10.1177/0266666906062685
10(2), 119126.
Lawal, O. O. (2004). Libraries as Tools for Edu-
Sierra, K. (2006) Foreword. In The World Bank,
cational Development. A Paper presented at NLA
(Ed.), Information and Communications for Devel-
42nd National Conference and AGM at Solton
opment: Global Trends and Policies. Washington,
International Hotel & Resort, Akure.
DC: The World Bank.
Livingston, P. (2004). Laptops Unleashed: A
Uhegbu, A. N. (2007). The Information User:
Middle School Experience. Learning and Leading
Issues and Themes. Okigwe, Nigeria: Whytem
with Technology, 31(7), 12-15. Retrieved June 15,
Publishers.
2009 from www.usq.edu.au/material/edu5472
World Bank. (2008). The Little Data Book on
Mingat, A., Tan, J., & Sosale, S. (2003). Tools for
Information and Communication Technology.
Education Policy. Washington, DC: World Bank.
Washington, DC: The World Bank.

161
Framework for Effective Development of Information and Communication Technology (ICT)

Zulu, S. F. C. (2008). Intellectual Property Rights ICT Literacy: Ability to use ICT in process-
in the digital Age . In Aina, L. O., Mutula, S. ing, disseminating and accessing information in
M., & Tiamiyu, M. A. (Eds.), Information and university libraries by librarians/patrons.
Knowledge Management in the Digital Age: ICT Policy: Rules and regulations, guidelines
Concepts, Technologies and African Perspectives etc. that allow for effective and efficient use of
(pp. 335354). Ibadan, Nigeria: Third World ICT in university libraries.
Information Services Limited. Internet: Global network of networks of
millions of computers, that provides access to
academic and research information in university
libraries.
key terms And deFInItIons
Library Development Fund (LDF): A finan-
Computerized Library Service: The applica- cial policy by National Universities Commission
tion of computers in the management, processing (NUC) of setting aside 10% annual governments
and dissemination of information in university subvention to each public university in Nigeria in
libraries. funding university library.
Digital Divide: A term use to describe inequi- Library LAN: Local Area Network, a network
table access to ICT, in a specific term in university of computers in a university library, which im-
libraries. proves communication and access to information
Information and Communication Technol- within the library.
ogy (ICT): Modern digital technology: computer, OPAC: Online Public Access Catalogue, a
Internet and telecommunications that is used computer network that provides access to biblio-
in acquisition, processing and dissemination of graphic information in university library.
information in university libraries.

162
Framework for Effective Development of Information and Communication Technology (ICT)

APPendIx: lIst oF resPondIng unIversIty lIbrArIAns

1. University of Calabar, Calabar

2. Obafemi Awolowo University, Ile-Ife

3. University of Agriculture, Abeokuta

4. University of Port Harcourt, Port Harcourt

5. University of Nigeria, Nsukka

6. Federal University of Technology, Owerri

7. University of Benin, Benin

8. University of Maiduguri, Maiduguri

9. University of Ibadan, Ibadan

10. Michael Okpara University of Agriculture, Umudike

11. University of Ilorin, Kwara State

12. University of Abuja, Abuja

13. Federal University of Technology, Yola

14. University of Lagos, Lagos

163
164

Chapter 11
Gender and ICT Policy
Tracy Efe Rhima
Delta State University, Nigeria

AbstrAct
This chapter is devoted to discussion of ICT and gender policy. It explores the need for gender con-
sideration in ICT policy, gender issues in ICT policy, adoption of gender perspective in ICT policies,
challenges for the adoption of a gender perspective in the formulation and implementation of ICT poli-
cies, case studies of gender and ICT policies in Asia, Africa, Europe, Latin America and Caribbean and
Australia, gender approaches to ICT policies and programs, guidelines for policy-making and regulatory
agencies. It was concluded that various national government have started addressing gender issues in
their policies. Recommendation was given that policy makers should ensure that Gender considerations
are truly included in national ICT policy.

IntroductIon parency; provide a platform for diverse voices;


and cross-cultural knowledge exchange. The
In the last decades, information and communi- social, political and economic changes wrought
cation technology (ICT) has become a Power- by ICTs have prompted certain shifts in develop-
ful and widespread communications platform, ment thinking. Development strategists now see,
particularly given the convergence of existing as recognized for example in the United Nation
communications media with new communication Millennium Declaration, the need to adapt ICTs
technologies. ICTs can be used to increase access as a way to avoid further marginalization, and also
to employment, education or health services; as a potential force for creating new economic
strengthen political participation; improve trans- growth opportunities and for pushing democratic
boundaries (Genderit.org, n.d.)
DOI: 10.4018/978-1-61692-102-8.ch011

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Gender and ICT Policy

According to Marcelle (2000) ICTs have perspectives in order to effect womens empower-
enormous potential to benefit girls and women in ment and social change. However, women also
terms of enhanced income: generation opportuni- need to be involved in the policy processes that
ties, employment, and improved quality of life, define access to and use of these ICTs. (Radloff,
but because technologies are not gender neutral, 2005)
it is important to advocate for ICT strategies to While there is recognition of the potential of
reduce and manage the potential for ICTs to cre- ICT as a tool for the promotion of gender equal-
ate economic and social exclusion and reinforce ity and the empowerment of women, a gender
existing social disparities. divide has also been identified, manifested in
Bonder (2002) states that access to informa- the lower numbers of women accessing and using
tion, to knowledge and the interaction between ICT compared with men.
cultures and social groups have never been so Unless this gender divide is specifically ad-
within the reach of humanity or as valued as dressed, there is a risk that ICT may aggravate
in the last decades. The continuous innovation existing inequalities between women and men and
and global spreading of ICTs appears like a create new forms of inequality. .If, however, the
fundamental resources which has goals to attain gender dimensions of ICTin terms of access and
which will inaugurate a change of era known as use, capacity-building opportunities, employment
information society. and potential for empowermentare explicitly
Subramaman & Saxena (2005) have reported identified and addressed, ICT can be a powerful
that the development of ICT has been termed as catalyst for political and social empowerment of
ICT revolution due to its transforming potential women, and the promotion of gender equality
affecting all dimensions of human civilization of (United Nations, 2005)
our times which is unprecedented and the ultimate Gender equality aspects need to be fully
aim of the information society is the empowerment incorporated in all works which relate to ICT at
and development of all its citizens through equal national, regional and global levels, including in
access to and use of information. With the growth the development of policies and regulatory frame-
of infrastructure and access, ICTs are beginning works, projects and research and data collection.
to permeate even the most isolated regions. Ac- A basic starting point for incorporating gender
cess or lack of access to a medium that in some perspectives in ICT initiatives is the use of gender
places has become a principal means of expres- analysis to ascertain the needs and priorities of
sion, economic survival, and decision making is both women and men and the manner in which
vital for women. (ARC WNSP, 2005). policy-making, planning and other activities can
ICTs can be used to close gender gap by creating really support equitable access, use and benefits,
new jobs for impoverished women. Women, for including employment opportunities (United
instance, have been at the forefront of the village Nations, 2005)
phone movement, selling airtime to rural people This chapter dwells on the need for gender
too poor to own their own phones. ICTs can also consideration in ICT policies, gender issues in
be used to enhance basic literacy and education ICT policy, adoption of gender perspective in
for women and girls, provide job training and ICT policies, challenges for adopting gender
prepare women for careers in the ICT sector as perspective in formulation and implementation
well as to ensure health and safety (International of ICT policies, case studies of gender issues in
Telecommunication Union, 2009). ICT policies of countries from different continents,
ICTs are already being used by womens orga- gender approaches to ICT policies and programs
nizations to communicate their own agendas and

165
Gender and ICT Policy

and guidelines for policy making and regulation opportunities. They are one of the driving forces
agencies. of globalization The ICT sector is heterogeneous,
extending beyond traditional classifications of
industrial or services sectors and because produc-
bAckground tion and diffusion of ICTs are of equal importance,
the ICT sector intersects with a number of other
ICTs are collectively defined as innovations in areas of policy making. (Idowu, Ogunbodede &
microelectronics, computing (hardware and soft- Idowu, 2003)
ware), telecommunications and optic-electronic Amuriat & Okello (2007) see policy as law that
micro-processors, semiconductors fiber optics draws upon a number of strategies to accomplish
that enable the processing and storage of enor- its vision, including mainstreaming gender into
mous amounts of information along with rapid policy programs and implementation strategies;
distribution of information through communica- sensitization and awareness creation; ICT capac-
tion networks. Linking computing devices and ity development among rural peoples building
allowing them to communicate with each other appropriate infrastructure; supporting favorable
create networked information systems based on a investment projects, stimulating production stor-
common protocol. This has greatly altered access age and dissemination of national information, and
to information and the structure of communication facilitate of access to public domain information.
extending the networked reach to many parts of The government envisages that by implementing
the world. (Human development report, 2001) the strategies, major problems such as access,
The last decade of 20th century marked the application and utilization will be appropriately
shift to a global information society character- addressed.
ized by the rapid development of information and
communication technologies that have blurred the
boundaries between information, communication need For gender
and the various types of media. ICTs refer to tech- consIderAtIon In Ict PolIcy
nologies and tools that people use to share, distrib-
ute, and gather information and to communicate ICT is the driving force that is increasingly result-
with one another through the use of computers ing in tremendous change in all aspects of our lives,
and interconnected computer networks. They are including education, knowledge dissemination,
media that utilize both telecommunication and social interaction, political engagement, health,
computer technologies to transmit information. economic and business practices. In the last de-
(Ramilo & Villanueva, 2001). cades ICT has become a powerful and widespread
According to Amuriat & Okello (2007) ICTs communications platform, particularly given the
are technologies which facilitate communication, convergence of existing communication media
processing and transmission of information by with new communication technologies. ICT can
electronic means, ICTs are tools that can enable be used to increase access to employment, edu-
the participation of poor women and men in eco- cation or health services; strengthen democracy;
nomic and civil life and help them to move out of improve transparency; provide a platform for
poverty. ICTs have change the face of the world diverse voices; and cross-cultural knowledge
we live in, They enable people to communicate exchange. The social, political and economic
with relatives, friends and colleagues around the changes wrought by new information and com-
world instantaneously, gain access to global librar- munications technology have promoted certain
ies, information resources and numerous other shifts in development thinking. (genderit.org n.d)

166
Gender and ICT Policy

Womens empowerment is central to human gotten a gender equality policy that obviate the
development, as a process of enlarging peoples need to spell out gender issues in every policy
choices, this cannot be realized when half of the sector, on the contrary, there is much evidence to
choices of the humanity are restricted. Targeted show that policy making in technological fields
actions aimed at empowering women and righting often ignore the need, requirements and aspira-
gender inequities in the social and economic shape, tion of women unless gender analysis is included
as well as in terms of civil and political rights, (Marcelle, 2002). If gender issues are not articu-
must be taken alongside efforts to engender the lated in ICT policy,it is unlikely that girls and
development process. According to Subramanian women will reap the benefits of the information
& Saxena (2008) todays technological transfor- age (Hafkin, 2002).
mations as tools for human development requires Information and communication technology
shifts in national and global public policy. It puts policies and regulation are developed, managed,
forward a global call for policy not charity to build and controlled in majority by men. One problem
technological capacity in developing countries. is that at both the global and national levels,
Jansen (1989) also states that unfortunately despite decision-making in ICTs is generally treated as a
the potential ability of information to empower purely technical area (typically for male experts),
disadvantaged groups and despite the massive where little or no space is given to civil society
investments in information and communication viewpoints, rather than a political domain. Deregu-
technologies the information society has remained lation and privatization of the telecommunications
largely silent on gender issues. In our society today, industry is also making decision-making in this
there are evidences of a gender imbalance in the sector less and less accountable to citizens and local
use of ICT that threaten to restrict women to be communities, which further compounds womens
the equal partners. Beneficiaries of the emerging role in decision-making and control of resources.
information society thus creating a gender based Given the under-representation of women in
digital divide. It has been felt that unless concerted ICT policy-making processes, womens needs and
and corrective policy initiatives are taken, women views are not reflected in ICT policy frameworks.
well continue to be excluded from the information If women are to benefit from ICT interventions,
society. Engendering ICT policies and programs mainstreaming the perspectives and concerns of
becomes relevant especially when there is much women is one of the important tasks that should
evidence to show that policy making in techno- be undertaken. Very few governments, however,
logical field often ignores the need, requirements involve women in processes of formulating na-
and aspirations of women unless gender analysis tional ICT strategies and policies, beginning
is included (Marcelle, 2002). If gender issues are with the nomination of gender-balanced teams,
not articulated in ICT policy, it is unlikely that consulting gender and ICTs experts or supporting
girls and women will reap the benefits of the in- womens groups to provide inputs from a civil
formation age Hafkin (2002) closing ones eyes to society perspective (Genderit.org, n.d.).
this fact can entrench inequality and even enlarge Another obstacle to drafting gender sensitive
the gender gap, making ICT s gender negative policies on ICTs, and mapping and analyzing
technology. (UNDP, 2003). their impacts on womens and mens lives, is the
Despite the views of many government policy absence of comparable sex-disaggregated data on
makers that a well thought out general policy ben- ICT access, use, education, employment, partici-
efits all, there is no such thing as a gender blind or pation in decision-making and development, etc
neutral ICT policy. The government has already (Genderit.org, n.d.).

167
Gender and ICT Policy

gender Issues In Ict PolIcy cation system. As information dynamics


accelerate their migration towards the in-
During the past decade, women and other feminist ternet, people without access must suffer
movement has been very active in the use of elec- greater exclusion. In areas where access
tronic communications and internet tools. This has to new technologies is still not practical,
enable them to take advantage quite soon of ICTs more traditional media such as community
for networking for their rights, raising awareness or radio, audio-visual media and popular me-
the issues that concerned them, lobbing authorities dia should continue to be used by and for
and planning actions for womens empowerment women.
and drastic social change. (Plou, 2005) Education, Training and Skill
Gender issues in ICT are understood as adjunct Development: Education, training and
to the larger issues on womens right and gender skill development are critical to ICT in-
equality since the former also spring from differ- terventions. Illiteracy rate for women in
ences and the continuing absence of recognition of developing countries are far higher than
these differences in the very production meanings, the percentage of men. Training methods
ideologies, languages, behavior, practices, policies are not customized to womens needs.
and technologies. Yet these gender issues neces- Learning practices for women should be
sitate specific interventions as they arise within extended to girls and women, made gender
specific milieus and affect specific communities sensitive (making training women-specif-
and group of women. Most of the women involve ic, ensuring ongoing user support and men-
with ICTs are middle class young urban women, toring in the communities where women
that are well educated, employed or with little live). Other major concerns are illiteracy
economic problems. The digital gap, which also and languages as impediments to informa-
reflect other gaps that exist in our world today tion access; the need to breakdown gender
like social, economic and cultural barriers that and cultural barriers to womens access to
marginalize large sectors of the population, is clear carriers in technology; and the design of
when it comes to considerate womens access to software, which often does not respond to
ICTs .(Plou, 2005) the need of women and girls.
According to Ramilo &Villanueva (2001) far Industry and Labour: In the ICT sector,
greater numbers of women are now using new labour is highly sex segregated. Women
communication technologies and the internet in are found in disproportionately high num-
their work. The following issues remain critical bers in the lowest paid and least secure
for most women in the world (Ramilo &Villan- jobs. The concentration of women in cleri-
ueva, 2001) cal work in the information and commu-
nication industry does not translate further
Access and Know How: Womens access up the industry hierarchies. While women
to ICTs is dependent on several factors such fill up the factories that produce computes
as gender discrimination in jobs and edu- components, in working conditions often
cation, social class, illiteracy, geographic damaging to their health very few are rep-
location (North or South, urban or rural) resented in computer systems administra-
influence the fact that the vast majority of tion and technical development. Women in
the worlds women have no access to ICTs low grade technical and service jobs also
or to any other sort of modern communi- make up the largest group of computer

168
Gender and ICT Policy

users. Still many more women have been countability of the institutions responsible
displaced due to increasing automation and for developing ICT policies.
computerization of workplace. Privacy and Security: Privacy, security
Content and Language: The dominance and internet rights are other vital thematic
of English language, often from countries areas for women. They include having se-
in the North, on the internet is a major cure online spaces where women can feel
concern raised by womens organizations. safe from harassment, freedom of expres-
Womens viewpoints, knowledge and inter- sion, privacy of communication and pro-
ests are not adequately represented while tection from electronic snooping. They
gender stereotypes also pre-dominate the also include the passage of ICT legislation
World Wide Web. Some of these concerns that can threaten human right. While many
are an extension of those formulated previ- developing countries are grappling with
ously in relation to sexism and portrayal of the basic access and IT infrastructure is-
women in the media. But they also relate to sues, many countries in the Northern part
a broader range of issues such as the need of the globe are now defining the basic
for women to systematize and develop rights infrastructure for internet use and
their own knowledge and perspectives and governance.
make sure they are adequately reflected in
these spaces.
AdoPtIon oF gender
Language barriers to information access PersPectIve In Ict PolIcIes
require the development of applications like
multilingual tools and databases, interfaces for As stated earlier, the women and feminist move-
non-Latin alphabets, graphic interfaces for illiter- ment has, during the past decade, been very active
ate women and automatic translation software. in the use of electronic communication and internet
tool which they have adopted in their work as an
Power and Decision-Making: Women important tool. Women have been able to take
are under-represented in all ICT decision- advantage quite soon of ICTs for networking for
making instructive including policy and their rights, raising awareness for the issues that
regulatory institutions ministries that are concerned them, lobbing authorities and planning
responsible for ICTs, boards and senior actions for womens empowerment and social
management of private ICT companies change. (Plou, 2005)
whether at the global or national levels. Most of the women that are involved with ICTs
One problem is that at both the global are middle class young urban women, that are
and national levels, decision making in well educated, employed or with little financial
ICTs is generally treated as purely techni- problems. The digital gap, which reflects other
cal area (typically for male experts) where gaps that exist in our world today like social,
civil society viewpoints are given little or economic and cultural barriers that marginalize
no space, rather than a political domain. large sectors of the population, is clear when it
Representation is important in creating the comes to considerate womens access to ICTs.
conditions and regulations that will enable Although the womens movement has adopted
women to maximize their possibilities of ICTs in their work as an important tool, it has
benefiting from ICTs, and ensuring the ac- paid little attention to ICT policies. Mostly,

169
Gender and ICT Policy

women have seen ICTs only as a tool and have cHAllenges For AdoPtIng
left aside other issues, like their strategic use and gender PersPectIve
the relevance of ICT policies that would facilitate In FormulAtIon And
more and better access to women, especially those ImPlementAtIon oF Ict PolIcIes
in marginalized areas, unemployed, illiterate or
who have not the chance to, even know how a The challenges for adopting gender perspective
computer works (Plou, 2005). in ICT policies will be to ensure that the efforts
Government tends to be open to recognize of gender advocated do not simply live within
gender as a cross cutting issue and even to ad- the printed page of policy documents, rather they
dress it within certain contexts (such as universal result in practical solutions that address gender
access programs). However, they are normally equality in ICT development (Selaimen, 2006).
not able to make the link between gender and the The challenges are as follows:
need for gender analysis in many other aspects Lack of Skills: The lack of appropriate skills
of ICT policy, including pricing and affordability and capacity to effectively operate equipment
issues, network development, universal service, and utilize ICT tools was a major factor which
fund selection criteria, licensing etc; even in those prevented womens groups from fully using ICTs.
cases where gender has made it to the policy level, This includes limited knowledge of computer and
there is still need to ensure that implementation information management systems, hardware and
will reflect a gender perspective and work towards software installation and maintenance and limited
gender equality. (Selaimen, 2006). internet and non-internet based skills (Ramilo &
As early as 1992 when the internet was fairly Villanueva, 2001).
new in the developing world, a number of women Given their limited access to schooling,
organizations had already started to adopt the use women, especially those in rural areas, are also
of ICT to support their information, communica- much less likely than men to have computer skills.
tion and networking initiatives. By the time of Information literacy essentially involves using
the Fourth World Conference on Women held in information contextually, a skill that women are
Beijing in 1995, various women organizations less likely than men to have (Heeks, 1999).
led by the Association for Progressive Commu- Limited Finance: Many women, girls and their
nications (APC) womens networking support organizations find difficulty getting online due to
programme were not only training women in the limited finance. Cost includes ICT-related equip-
use of electronic mail and the World Wide Web but ment, software purchase, maintenance, training
were also raising awareness about the urgency of and connectivity. In many countries, women face
broadening media and communication concerns high access cost due to the presence of Internet
to include the new ICTs and addressing womens service provider (ISP) monopolies, lack of reli-
access to ICT and womens participation in the able connections as well as limitation of facilities.
determination of how technologies are designed Financial capacity which for Non Governmental
and deployed. Women have benefited less from, Organizations (NGO) is often determined by donor
and been disadvantaged more by, technological resources also influences ICT access. Ramilo &
advances; women need to be actively involved in Villanueva(2001)
this development of new technologies; otherwise Hafkin (2002) posits that when it involves
the information revolution might bypass them or paying for information access, such as at a rural
produce adverse effects on their lives (Ramilo & information center or cybercaf, women are likely
Villanueva, 2001) to have disposable income to do so (or hesitate to

170
Gender and ICT Policy

use family food, education and clothing resources facilitating e-commerce and job opportunities,
for information). human resource development and promotion of
Lack of capacity on the part of policy makers good governance and citizens participation.
and implementation agencies to address gender
considerations and conduct gender analysis and Asia
failure by most institution to integrate gender
experts in all policy and regulatory teams (even Case studies on Korea, Japan and India.
when there is a generally accepted need to consider
gender as an important area). And there is an em- Korea
phasize that having women ICT professionals is
important, but not a sufficient condition to ensure The task of implementing the Korean govern-
that gender analysis will be conducted there needs ments gender policies rests on the Ministry on
to be a services commitment to gender in ICT Gender Equality (MOGE) a cabinet-level agency
work and all capacity building programs need to which was created in 2001 to replace the Presiden-
reflect that (Jorge (2006) cited by Selaimen (2006). tial Commission on Womens Affairs. The MOGE
Social and Cultural Barrier: Women tend is also responsible for convening and coordinating
to have less access than men to those ICT facili- the gender focal point for each government min-
ties which exist. Most rural information centers istry .The ministry is a key player in the Korean
or cybercafs are located in places that women governments drive to achieve the goals of cyber
may not be able to visit frequently. Women also Korea 21 plan. It closely collaborates with the
have problem of limited time because of their Ministry of Information and Communication on
multiple responsibilities in running their homes the implementation of the national ICT literacy
which makes their leisure hours very few and their campaign targeting some 2 million house wives as
mobility is also more limited than men. well as employees and staff of some 1,000 private
In some countries, especially Africa, traditional institutes. On its own, the Ministry on Gender
cultural attitudes discriminate against women Equality (MOGE) has launched its own anchor
having access to education and technology. Girls projects aimed at advancing gender equality
are not encouraged to take any jobs or get higher through ICT. These projects include the creation
education. The alternative of doing two or three of a portal site for Korean women called women-
things at the same time is not realistically enter- net, and the building of the cyber IT education
tained (Common Wealth of Learning, 2001; cited center which is targeting to train 1,000 female
by Hafkin, 2002). Information Technology (IT) experts within its
first year. (Ramilo & Villanuella, 2001)

cAse studIes on gender Japan


And Ict PolIcy
Before the closing of the last millennium, the Japan
In this section, case studies of gender and ICT government passed the basic law for a gender-
policies of some countries are presented. All the equal society which laid down the basic principles
countries covered in this chapter have existing pertaining to the information of a gender-equal
IT policy frameworks and strategic ICT develop- society, as well as set the direction these should
ment plans. Several key result areas are common take. The basic law for gender-equal society also
in these policy frameworks, namely, provision of clarified the responsibilities of the state and local
networking and telecommunications infrastructure government and citizens, set down provisions to

171
Gender and ICT Policy

form the basis of policies related to promotion europe


of formation of a gender-equal society, and man-
dated the creation of a council for gender equal- Case studies on Albania Bosnia and Herzegovina.
ity. Also highlighted in the plan are challenges
such as eliminating all forms of violence against Albania
women, respecting the human rights of women
in the media and supporting life-long health for Albania is situated in South Europe. Its national
women. (Ramilo & Villanuella, 2001) ICT strategy is one of its kinds in the region, with a
marked effort to include womens need and views.
India Gender incorporation in ICTs is part of Albanias
attempt to address growing disparities in income,
In 1998, India set a goal to become an infor- gender and geographical location. Information and
mation technology superpower and one of the communication technologies were seen as power-
largest generators and exporters of software in the ful tools that can assist to bridge these disparities
world within ten years. In May 2000, a working and support the socio-economic development of
group called the IT for the Masses initiative Albania. In order to take advantage of the potential
embodies the Indian governments strategic vision of ICTs, countries need to elaborate a national vi-
of information technology as an enabler of new sion or strategy that reflects the needs of various
opportunities to bridge the gap between Indias stakeholders, including traditionally magnetized
have and have not. The working group tasked groups. The government of Albania launched the
to set the priorities of this initiative identifies the participatory ICT strategy process at a national
poor, comprising 40% of the Indian population, conference. Several expert working groups were
as the immediate concern of the government in established. The Albanian experience can inform
providing new opportunities through information other countries attempts to incorporate a gender
technology. India has made tremendous headway perspective in ICT policy processes. Tinning and
in the knowledge-based industry and the computer sustained presence of womens representation was
software industry through human resource devel- a critical factor in the Albania case. Perhaps the
opment. It is estimates that about 73,000 students Albanian national ICT policy could have fulfilled
are trained every year in the field of information its aim of gender inclusiveness if the policy makes
technology and projects that there will be no involved had gone through gender sensitization
shortfalls of personnel till 2008 even allowing for sessions in the beginning of the process (Gus-
international migration. The government released tainiene, 2005)
the sum of Rs 2,800 crore ($633 million) for the
training and re-training of IT professionals and Bosnia and Herzegovina
teachers. Indias IT for the Masses. (Ramilo &
Villanueva, 2001). Bosnia and Herzegovina is situated in the Middle
Gender considerations do not figure in any of East Europe, the current ICTs situation in Bosnia
the schemes or programs being developed under and Herzegovina is paying particular attention
the banner of IT for the masses. The IT the to the development of their national ICT policy
masses initiative offer some opportunities for strategy, and the responses towards the need to
addressing gender concerns in the formulation integrate gender, concerns both the womens na-
and implementation of ICT policies (Ramilo & tional machinery and civil society organization .
Villanueva, 2001)

172
Gender and ICT Policy

For Bosnia and Herzegovina (BiH) analysis Africa


and understanding of the impact of ICTs upon
women and men is far behind other in the Cen- Case studies on Zambia and Uganda.
tral and Eastern Europe and the Commonwealth
of Independent States (CEE/CIS) region. This Zambia
is caused by several factors. One, the country
could not follow the initial development of ICT According to (Zulu, 2005) Zambia, like many
technologies because it was interrupted by the other African countries, has recognized informa-
atrocious war in the early 1990s. Secondly, BiH tion, knowledge and technology as major drivers
is a whole decade behind the time when devel- of social and economic development. Zambia
opment of ICTs was at its peak. Throughout this made a decision to adopt information and com-
time, the country has been struggling with post- munication technologies (ICT) as part of national
conflict reconciliation and reconstruction as the development, expecting to narrow the digital
two main factors shaping development processes. divide and leap-frog the development process.
In addition, it seems that technology instructors While the government is committed to pursue
and educational system operate on the same prin- appropriate institutional, legal and regulatory
ciple, which greatly diminishes the potential and measures to achieve broad policy goals, Zambias
interest of young Bosnian women in technology. national ICT policy framework still lacks gender
To change the trajectory and see an increase integration. Zambias Ministry of Communica-
in womens participation in ICT networks, one of tion and Transport produced a second ICT draft
the core tasks is to institute and develop capacity policy to undergo validation in November 2004
of female technology experts within primarily before being submitted to cabinet office. The
male-dominated BiH ICT provider organization. policy validation process was away to involve
Gender equality train-the-trainer project is multiple stakeholders in the policy development
currently taking place in Sarajevo at the E.Net and the policy validation workshop was held and
centre and in the organization of the United Na- participants at the policy validation observed the
tions Development Programme (UNDP). BiH and absence of gender analysis in the draft document.
the BiH gender mechanisms could serve as an One of the challenges faced by Zambians in
example of successful contribution to the increase the validation workshop was to engender the
of the awareness of the relation between gender draft ICT policy document. This is important as
and technology. Governmental bodies such as it can reduce the digital divide between men and
the ministries of transport and communications, women. Technology is still viewed as a male
the ministries of education and culture, as well as domain in Zambia and all over Africa. The docu-
non-governmental organizations and international ment emphasized the need for civil society, Non
organizations such as United Nations Develop- Governmental Organization (NGOs), media and
ment Program (UNDP), etc has defined strategies government to create awareness and sensitization
and develop programme objectives for realization on gender and ICT policy. The Zambian experience
of equality between women and men in the BiH of policy formulation in relation to gender and
information society and are also the main actors ICT shows that there is a lack of awareness and
in defining strategies for reducing gender discrep- sensitization in the country about the importance
ancy in the ICT field. (Kosovic, 2006). of gender and ICTs. (Zulu, 2005)

173
Gender and ICT Policy

Uganda the levels of social inequity, together with the


weakness of the national states and the lack of
The Uganda National ICT Policy framework, ap- public investment in strategic sectors for human
proved by Cabinet in December 2003 envisions development, such as education or health, together
a country where national development, good with other alarming signs such as the lack of
governance and human development, are sustain- transparency of the state administration of budgets
ably enhanced, promoted and accelerated by the for social programs and purchase of technological
efficient application and use of ICTs including infrastructure, A significant number of countries
timely access to information. in the region show degrees of connectivity higher
The policy draws upon a number of strate- than expected according to the income level per
gies to accomplish its vision, which include inhabitant, and the gap that separates them from
mainstreaming gender into policy programs the leading countries in the field of information
and implementation strategies; sensitization and communication technologies (ICTs) has, to
and awareness creation; ICT capacity develop- some extent, been reduced, does not guarantee that
ment among rural people; building appropriate in the next few years they will be automatically
infrastructure; supporting favorable investment incorporated into the digital era. Unless additional
environment; supporting innovative ICT projects; efforts are made on the part of the state societal
stimulating production, storage, and dissemination groups, it is highly probable that e-gaps will
of national information; and facilitation of access continue to or grow. The economic commission
to public domain information. The government for Latin America and the Caribbean (ECLAC)
envisages that by implementing strategies, the recommends carrying out a systematic strategy that
Uganda Women Caucus on ICT (UWCI) was initi- articulates promotion of technological capabilities
ated; UWCI is comprised of women and gender in all the countries support transformation of the
practitioners working on issues of women and productive structures, development of national
ICTs in Uganda. UWCIs mission is to engender and regional production networks setting up a
ICT policy formulation, implementation, monitor- quality infrastructure. Bonder (2002) suggests
ing and evaluation. There are other groups like that the general frame offers new entry points
the Council for the Economic Empowerment of for the integration of women, not only as ICT
Women in Africa (CEEWA-Uganda), the Uganda users, but also as researchers, producers, work-
National Council for Science and Technology ers, educators, project managers and in many
(UNSCT), the Uganda Communication (UCC) other positions from which they can contribute
and other NGOs have made effort to expand ICT through the new technologies to the economic
centres in rural areas and to increase and expand growth with equity as needed in the LAC region.
infrastructure coverage. (Amuriat & Okello, 2007) The situation of women/gender and ICTs in the
region shows that high appraisal of the oppor-
latin America tunities that ICTs offer to women as a means of
exchanging information and the use of ICTs has
Case studies on Latin America and the Caribbean. brought about a spectacular progress in terms of
The possibilities of Latin America countries organization, articulation of demand legitimacy,
to be integrated in the information society is to current knowledge building and creation of alli-
remember that this global tendency has taken ances among women NGOs over the last decade.
place along with one of the most critical historical Countries from South America like Argentina,
stages in the economic and social scenarios since Bolivia, Brazil, Chile, Colombia Uruguay etc,
the 1970s. The scandalous growth of poverty and and countries from Central America like Belize,

174
Gender and ICT Policy

Costa Rica, El Salvador, Mexico etc and the damental points of the theoretical and strategic
Caribbean like Haiti, Jamaica, Cuba, Bahamas, discussion around this topic. Its aim is not to show
and Puerto Rico etc. are making progress since an evolutionary progress from one conception to
the formation and implementation of ICTs in this the next; neither does it imply a judgment of value
region (Bonder, 2002) of any of the strategies proposed. Its sole purpose
is to enrich the elaboration of new proposals by
Australia taking advantage of what has been achieved so
far in Latin America (Bonder, 2002)
The Commonwealth Office of the Status Women
(henceforth, OSW) is the main government agency
that provides policy advice to the Prime Minister guIdelInes For PolIcy-mAkIng
and the minister assisting the prime minister for And regulAtory AgencIes
status of women on issues affecting women in the
Australia. The OSW also develops strategies for The International Telecommunication Union Task
addressing priority issues and concern in gender. Force on Gender Issues (2001) has set gender-
These strategies are reviewed every three years. aware guidelines for policy-making and regulatory
Currently the OSWs priority concerns are agencies are intended to assist decision makers to
conduct their work in such a way that both women
Economic self-sufficiency and security for and men are considered in the process i.e. both
women. are involved in decision making.
A life time optimal status and position for The following are the set of guidelines for
women. policy making and regulatory agencies, with dis-
The elimination of violence in the lives of cussions on each point, they are; General, Human
women. resources, Training and licensing activities. The
The maintenance of optimal health and guidelines are to be used to ensure that gender
well being throughout womens live. analysis becomes an integral part of regulatory/
policy activities Successful implementation of
The Office of the Status Women (OSW), for its these guidelines requires the development and
part is currently developing what it calls womens promotion of new policies within the institu-
data warehouse and a web-based system that tions seeking transformation into a gender-aware
integrates statistical information about womens environment. The process of implementing
needs and concerns. This information system is these guides should also be conducted with full
being developed in consultation with organization participation of all parties and if possible, with
engaged in gender analysis and policy develop- participation of gender experts (for example,
ment work (Ramillo & Villanueva, 2001) from gender units or consultants in the area) to
ensure full understanding of the issues and avoid
unproductive resistance to the process (Interna-
gender APProAcHes to Ict tional Telecommunication Union Task Force on
PolIcIes And ProgrAms Gender Issues, 2001)

Bonder (2002) has highlighted some fundamental General


conceptions, principles, objectives and actions that Facilitate and promote the estab-
are being used and implemented for engendering lishment of a gender unit within the
ICT policies. The following table enshrines fun- regulatory agency, by ministry or

175
Gender and ICT Policy

Table1. Approaches to ICT Policies and programs (Source: Bonder, 2002)

Problem Definition Perspective Goals Measures/Actions Ethical/ Political


Principles
Unequal access and Deficit model Promotion of equal op- Community based Womens rights
participation of women Women seen as a group portunities for all women projects (telecenters or Equal opportunities
in ICTs as users, stu- in social and economic in terms of access to similar). Gender justices
dents, teachers, workers disadvantage. ICTs as well as par- Educational and train- Integration of women
and professionals. Compensatory ticipation in educational ing programs, scholar- in the development
Explanations: Strategy programs and technol- ship, public campaigns, and modernization of
Lack of economic ogy industries. provision of equipment economy and culture:
resources, education and and other incentives. being part of the global
infrastructure Networking society.
Cultural values and
gender discrimination
patterns in society and
institutions.
Gender nature and Difference model (Val- Integration of womens Emphasis on research Inclusivity
characteristics of ICTs: orization of womens needs, ways of know- and academic debates, Diversity
focus on contents, cultures, values and ing and relating with cyber-feminist theories Empowerment
formats, uses, impacts, visions in/for ICTs). information and commu- and innovative experi- KEYS for improving
regulations, etc. Critical Strategy nication in educational, ences. the quality and social
ICTs as a field of research and innovation Women-friendly uses of ICTs.
power relations. project. training and educational
Devaluation/invis- Generation of new con- projects.
ibility of womens need, tents, formats, tools, etc. Promotion of critical
knowledge, skills and Deconstruction of tech- analysis of power/gender
technological culture. nology discourses and relations in contents,
Homogenization vs. dominant practices tools and ICT policies.
diversity.
How to change gender/ Transformative Mainstreaming gender Collection and dis- Long term transforma-
power relations in and Strategy analysis, planning and semination of statistics tional strategies.
through ICTs. evaluation in ICT poli- and elaboration of gender Building a new social
Information/knowledge cies, programs and proj- indicators in ICTs. paradigm: a gender fair
society: meaning, power ects at national regional (Interdisciplinary) re- knowledge society.
and impacts on gender and international levels. search of gender relations
equality and human Addressing all dimen- in all dimensions of ICTs.
development. sions of ICTs (access, Lobbying and continu-
uses, appropriation, pro- ous dialogue among re-
duction, management, searchers, policy makers,
ownership, regulation, women groups, corporate
policies etc). sector.
Networking and collab-
orative projects at regional
and international levels.
Continuous evaluation
of policies and programs.
Development of gender
scientific science and
technology education at
all levels of the educa-
tional system.
Promotion of equal
participation of women
and men at all levels of
the technology industry.
Assertive action and
other measures to remove
subtle obstacles prevent-
ing women professional
development in S&T.

176
Gender and ICT Policy

an inter-agency effort: Regulatory bodies that govern national policy on


and policy making agencies should access and education issues.
establish units or inter-agency units Human Resources
to promote gender awareness and Ensure Equal Hiring Opportunities
perspective and further facilitate the for all Women and Men, Regardless
process of mainstreaming gender in of Race, Ethnicity, Class and
the institutions processes and work. Age: Women and men should be af-
Review, revise or develop new reg- forded equal opportunity to all po-
ulations, circulars, issuances and sitions available in any institution.
procedures to remove any gender Institutions should ensure that all
bias: Regulatory and policy mak- positions are advertised in public
ing bodies should review, revise or channels and in avenues available to
develop new regulations to remove a diversified group of candidates (i.e.
any gender bias that adversely af- women and men of different racial,
fect women (e.g. poor working con- ethnic, class and age groups).
ditions, lack of child-care facilities, In addition, where appropriate, establish af-
lack of maternity leave, limited op- firmative action policies or quotas (based
portunities for training and advance- on the real levels of qualifies people for
ment etc). each position) to ensure equal opportunity
Promote Gender Analysis as Part and avoid any tendencies to increase labor
of the Policy Process: Gender analy- segmentation and/or occupational segrega-
sis is needed to ensure that the policy tion in the work place.
process is based on a complete set of Ensure that a Certain Percentage,
facts and a comprehensive analysis of Targeting 50% of all Supervisory
the problem. Integrating gender anal- and Management Positions are
ysis is a means to increase the quality Occupied by Women: Institutions
and positive impact of the policy. should establish a policy to raise the
Develop and Establish Systems number of women in all superviso-
to Gather Gender Statistics: ry and management positions at all
Regulatory and policy making bod- levels of work, from clerical to top
ies should work in conjunction with management.
national statistics bureaus or other Develop Campaigns to Attract
statistics agencies (such as the census Women Professional (Particularly
bureau) to develop sex disaggregated for Technical and Decision making
statistics and new gender-specific sta- Positions: Institutions should devel-
tistics (such as, access by gender or op hiring campaigns to attract women
number of lines per women headed professionals to work in technical,
households). regulatory and policy-making posi-
Dialogue with other National tions. Such campaigns can be devel-
Entities: To assist in harmonizing oped in coordination with other gov-
national efforts, regulatory and poli- ernmental bodies as part of an overall
cy-making agencies should promote campaign to increase the number of
contacts with other ministries and women at all levels and areas of gov-
ernment work.

177
Gender and ICT Policy

Develop and ensure the Existence nities at all departments, divisions, or


of Appropriate Support Systems work groups, particularly those with
for Professional Women and Men: a greater number of women work-
Institutions should provide (by them- ers, and 3) provide adequate condi-
selves or in partnership with other tions for womens participation (e.g.
government or non-government in- scholarships to cover training costs
stitutions) support systems for pro- and a gender-aware environment, in-
fessional women and men, such as cluding women trainers for various
on-site support to deal with male/ specialties).
female tensions and other important Promote Gender-Awareness Training
issues, such as day care, access to Opportunities for Women and Men:
training opportunities, and flexible Institutions should promote gender-aware-
work schedules. Such systems not ness and gender analysis training for all
only facilitate womens participation their employees.
but also increase workers productiv- Support Technical and Management
ity and dedication. Programs that Train Women
Ensure that there are no Wage Professional and Create Internship
Disparities among the Gender and Programs with Educational Institutions:
Establish a Policy to Eliminate any Regulatory and policy making bodies
such Gaps: Human resources divi- should create partnerships with education-
sions should ensure fair and non-dis- al institutions to promote womens enroll-
criminatory salary practices. Where ment in educational programs and, where
disparities occur, these should be cor- possible, develop an internship program to
rected immediately. provide training opportunities for women
Training in regulatory and policy making agencies.
Ensure Equal Access to Training In addition, partnerships with educational
Opportunities: Regulatory and poli- programs (such as business, law or engi-
cymaking institutions must ensure neering) may also increase the potential for
equal access to all training opportuni- future business ventures headed by women
ties domestically and internationally. in the telecommunications market place.
Women should not be discriminated Licensing Activities
against because of other responsi- Licensing activities are associated with the
bilities (e.g. motherhood) or their process of awarding authorization for provi-
current professional level. Instead, sion of services in the telecommunications
institutions should attempt to pro- sector. This is usually the responsibility of
vide the necessary conditions so that the regulator, which, in addition to setting
all employees have equal opportu- licensing criteria and rules, is responsible for
nity to attend training programs and awarding the licenses themselves. The fol-
consequently benefit from improved lowing guidelines provide a basic checklist of
qualifications. issues that should be followed by regulators
In order to ensure equal access, insti- or those responsible for the licensing process.
tutions should, among other things: (1 These guidelines assume that the implement-
invite women and men to attend pro- ing agency also follows the general gender
grams, 2) advertise training opportu- aware guidelines for regulatory purposes.

178
Gender and ICT Policy

A Certain Percentage of Licenses to promote disadvantaged youth to attend


should be Awarded to Women-owned technical degrees, or projects specially tar-
Companies and/or Companies with geting women).
Women in top Management Positions: Ensure that Licenses Awarded Contain
Regulatory agencies should establish a Certain Conditions to Promote Gender
policy to promote licensing criteria that Analysis and Mainstreaming for the
gives preference to women-owned compa- Particular Company: As part of the li-
nies and/or companies with women in top cense awards, regulators should include
management positions. provisions to ensure that licensees engage
Develop and Market Licensing in programmes to mainstream gender in
Procedures where Potential Women their organizations, by accepting the gen-
Owners can have Access to the der-aware guidelines for women techni-
Information: Ensure that licensing pro- cians and managers, and by providing a
cedures and advertisements are placed in gender-sensitive work environment.
public sources and in particular those that
women have access to, such as newspapers, The use of these guidelines themselves should
universities, local and regional commerce be the rule for policy and decision makers. They
associations, womens organizations, the can be used in two ways.
internet and specific web pages of interest
to businesswomen. 1. It is used as a checklist of issues to consider
Promote the Development of Business when making decision.
Assistance Programs and Partnerships 2. A consultative document to provide ideas
with Expertise in Assisting Women on how to mainstream gender in regulatory
Entrepreneurs: Institutions should pro- and licensing agencies.
mote the development of business assis-
tance programs or partnerships to ensure
that interested women have access to all conclusIon
business related services, such as license
application, development of successful This chapter discussed the need for gender consid-
business plans, access to financing and ap- eration in ICT policy, gender issues in ICT policies,
propriate capital loans, and training pro- adoption of gender perspective in ICT policies,
grams, among others. challenges for adopting gender perspective in
Develop License Award Criteria based formulation and implementation of ICT policies,
on Social Responsibility of the Business case studies of Asia, Africa, Latin America and
as well as Universal Access Objectives of Caribbean, Europe, and Australia. Gender ap-
the Proposed Venture: Institutions should proaches to ICT policies and programs, guidelines
develop licensing criteria that considers for policy making and regulatory agencies, future
the companies social responsibility re- trends on gender and ICT policies, were treated.
cord as well as their plans to contribute to Various national governments have started ad-
universal access to communications, (such dressing gender issues in their policies. However,
as willingness and plans to contribute to In the light of what has been presented in this
development projects, particularly those chapter, the following are recommended:
with a gender component, telecentre-type
projects, funding of educational programs

179
Gender and ICT Policy

Policy makers should ensure that Gender Hafkin, N. (2002). Gender issues in ICT policy
considerations are truly included in na- in developing countries: An overview. Retrieved
tional ICT policy, both in the development 9 th January 2009, from http://www.un.org/
and implementation process advocacy is womenwatch/daw/egm/ ict2002/reports/paper--
needed. NHafkin.pdf
More professional experts in both gender
Heeks, R. (1999). Information and communication
and ICT issues are involved at all aspect of
technologies, poverty and development. Retrieved
ICT developed.
9th January 2009, from http://idpm.man.ac.ik/
There is urgent need for greater involve-
idpm/diwpf5.htm
ment of women in decision making espe-
cially on ICT policy related matters. . Human Development Report. (2001). Making New
Technologies Work for Human Development. New
York: Oxford University Press.
reFerences
Idowu, B., Ogunbodede, E., & Idowu, B. (2003).
APC WNSP. (2005). New gender and policy Information and communication in Nigeria. The
monitor help women make ICT policy a priority. health sector experience. Journal of Information
Retrieved 2nd November 2009. from: http://www. Technology Impact, 3(2), 6976.
genderit.org/ en/index.shtml?w=9&x=91258 International Telecommunication Union. (2009).
Bonder, G. (2002). From access to appropriation: Special initiatives: Gender. Retrieved Decem-
women and ICT policies in Latin America and ber 23, 2009 from http://www.itu.int/ITU-D/
the Caribbean. A Report from the United Nations sis/Gender/
Division for the Advancement of Women (DAW) International Telecommunication Union Task
Seoul Republic of Korea II to IV November 2002. Force on Gender Issues. (2001). Gender-aware
Retrieved December 23, 2009 from http://www. guidelines for policy-making and regulatory
un.org/womenwatch/daw/egm/ict2002/reports/ agencies. Retrieved December 23, 2009 from
Paper-GBonder.PDF http://www.itu.int/ITU-D/gender/projects/Final-
Burch, S. (1997). Latin American women take GendAwrnGuidelns.pdf
on the Internet. Retrieved 2nd November, 2009. Kosovic, L. (2006). Gender and ICT policy in
Retrieved from http://www. apcwomen.org/net- Bosnia and Herzegovina: Rethinking ICT devel-
support/articles/art.01.html opment through gender. Retrieved November 2,
Genderit.org. (n.d). Why gender in ICT policy? 2009, from: http://www.gednerit.org/en/index.
Retrieved November 25, 2009 from http://www. shtml?w=a&x=95059
genderit.org/en/beginners/whygender.htm Marcelle, G. (1998). Strategies for including a
Gustaniene, A. (2005). Gender focused ICT policy gender perspective in African information and
making. Retrieved 2nd November 2009. From: http:// communications technologies (ICTs). Retrieved
www. genderit.org/en/indexshtml?w=a&x=91489 9th January 2009, from http://www.un-instraw.
org/des/martines.doc

180
Gender and ICT Policy

Marcelle, G. (2000). Gender and information UNDP. (2003). Transforming the Mainstream:
revolution in Africa. Retrieved November 2 Gender Mainstreaming Past, Present and future.
2009, from http://www.genderit.org/en/index. Retrieved Dec. 29, 2009 from www.undp.org/
shtml?w=98x=91489 gender/policy/htm
Marcelle, G. (2002). Gender equality and ICT United Nations. (2005). Gender equality and
policy. Retrieved January 9 2009, from http:// empowerment of women through ICT. Retrieved
www.worldbankorg/gender/digitaldivide/world- December 23, 2009 from http://www.un.org/
bankspresentation.ppt womenwatch/daw/public/w2000-09.05-ict-e.pdf
Plou, D. S. (2005). Gender and ICT policies: how
do we start this discussion? Retrieved November
2, 2009. from http://www.gender.org/en/index. key terms And deFInItIons
shtml?w=a&x=90862
Development Strategies: Are the plans to
Radloff, J. (2005). Whats gender got to do with achieve, or a potential force for creating new
IT? Retrieved November 30, 2009 from http:// economic growth opportunities.
www.apcwomen.org/node/273 Formulation and Implementation of ICTs
Ramilo, G., & Villanueva, P. (2001). Issues, poli- Policy: To create and carry out ICT policy that will
cies and outcome: Are ICT policies addressing address the needs of women and men, improve
gender equality? Retrieved December 27, 2009 their well being and facilitate their participation
from http://www.genderit.org/upload/ad6d215b7 in their development process.
4e2a8613f0cf5416c9f3865/UNESCAP_Gender_ Gender: The fact of being male or female
and_ICT_Policy_Research_Report_Feb02.doc ICT Policy: Is an integrated set of guidelines,
decisions, laws, regulations and other mechanisms
Selaimen, G. (2006) Gender issue at all levels to direct and enhance the production, acquisition
From policy formulation to implementation. and use of ICTs.
Retrieved November 2, 2009. From: http://www. ICT: Refers to technologies and tools that
genderit.org/ en/index.shtml?w=a&x=93423. people use to collect, process, organize and dis-
Subramanian,M., & Saxena, A. (2008). Gender seminate information.
mainstreaming of information and communica- Issues: Are the topics of discussion concerning
tion technologies (ICT) policies and programs. A gender and ICT policy globally.
case study of Ghattisgarth State of India, Project Needs: Are necessities or importance of en-
Report Submitted by WSIS-2 Awarder. gendering ICT policy.

181
182

Chapter 12
Name Authority Control
Paradigm Shift in the
Network Environment
Mirna Willer
University of Zadar, Croatia

AbstrAct
The purpose of this chapter is to give an international perspective and overview of the theory, standard-
ization processes and following practices in the field of authority control, with particular view on the
name authority control since the 1960s to the present. In the focus of interest of this chapter is paradigm
shift in the field, and the possibilities of semantic web technologies in meeting library users needs, as
well as librarians tasks to produce tools convenient to the user in the network environment.

IntroductIon World Wide Web infrastructure. As we are faced


with the explosion of information on the web,
The theory and practice of Universal Bibliographic what we need at the end of a day is authoritative
Control (UBC) of published intellectual and artis- and authentic data. Libraries and other heritage
tic production belongs to the field of organization institutions traditionally provide such data. Those
of information within library and information sci- institutions, however, are faced with the problems
ence. The significance of the topic of name author- of how to process the ever growing quantities of
ity control, as part of the information organization traditional media as well as web resources in ef-
which comprises bibliographic and authority data ficient and effective ways, and how to make them
control can be viewed as the one which over-passes available globally to all for professional and/or
the boundaries of library, and, indeed, heritage private use, education or entertainment. Libraries
institutions community. Today, practically every in particular are challenged by the Internet infor-
type of service depends, in one way or the other, mation providers such as Google and Amazon
on retrieving information provided through the which draw library users away from their services
due to providing links to instantly available re-
DOI: 10.4018/978-1-61692-012-8.ch012 sources. However, it is exactly that those Internet

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Name Authority Control Paradigm Shift in the Network Environment

information providers are ever more becoming her/his search with, as all forms would point to
aware of the need to retrieve, if not incorporate, that one (nationally and internationally) agreed
vast amounts of organized information provided upon name. In other words, the user would not
by heritage institutions into their services, while find her or himself in a situation where s/he would
at the same time the heritage institutions seek the not know when to stop her/his search (S.M. Ma-
ways how to include their services into those of linconico), i.e., under what other forms of name
Internet information providers. s/he would yet have to search!
Without control of a name: whether personal, The period between 1961 and 1991 in which
corporate body, work, place or topic, there would the concept of UBC and appropriate bibliographic
not be a successfully performed search nor retrieval tools were developed by International Federation
of information from catalogues, bibliographies, of Library Associations and Institutions (IFLA) is
lists, full text databases, etc. in any format or form described in the first part of the chapter.
of a service, as indeed of information provider There are a number of reasons why such
services of various kinds. International agree- an ideal could not have been realized, yet the
ments that started within the library community majority of them could be subsumed to one: the
defined mechanisms to control the forms of names basic principle of information organization is the
with the aim of recording national production of convenience of the user, so the form of the name
publications and exchange of authority data in should be adapted to users expectations. And
line with economic and efficient management. although it is a common understanding that the
The theoretical foundation of the concept of user of contemporary bibliographic services in a
Universal Bibliographic Control was straightfor- global information environment could be anyone
ward: bibliographic description which comprises (as indeed, it could have been in the UBC modelled
of bibliographic and authority data should be cre- environment, but, it must be admitted, under sig-
ated in the source of its origin, such as a national nificantly more restricted circumstances), and that
bibliographic agency, and made publicly available. the (proclaimed) aim of these services is indeed to
As part of that description, and represented by reach everyone, they are built to address the needs
authority data, a bibliographic entity, whether a of those that are closest the local community.
person, corporate body, topic or some other entity The second part of the chapter deals with de-
of interest to the user of a bibliographic service, velopment of ideas, concepts and tools as a reac-
should be represented by one form of a name, tion to these developments since the beginning of
and that form of name should be establish by the the 1990ies to the present. The divergence from
bibliographic agency of the entitys origin. The the UBC concept was brought to the full atten-
aim of the UBC is to enable any user anywhere tion of IFLA not primarily because of the lack of
in the world in any of bibliographic sources (e.g., libraries meeting their users needs, but because
catalogue, bibliography, list) to find all the works of the noticed lack of international exchange
(in whatever manifestation) by the chosen entity of authority data, the production of which was
collocated under that one form. The efficiency considered the most resource consuming library
of the concept for the user (not to mention the processing task. The reaction to the situation was
economy for libraries due to adopting already prompt: two analytical studies sponsored by IFLA
processed authoritative data into their services) presented a blueprint of the problem and recom-
is obvious: searching one or more distributed mendations. The result of IFLAs answer to these
catalogues would get all the works by an entity recommendations was basically the recognition
(e.g., personal author) under one authorized form of the paradigm shift in practices in the field of
of name regardless of the form of name s/he started name authority control. IFLA also recognized

183
Name Authority Control Paradigm Shift in the Network Environment

that certain problems inherent to bibliographic within the semantic web phenomena. There are
control could be solved, if not fully, at least to a already certain initiatives within IFLA and national
considerate extent, in co-ordinating its work with libraries that could provide a context for such
other communities/sectors such as publishers an inquiry. The author finds that the solution to
and rights management communities, and also the convenience of the user problem could be
archives and museums. A new conceptual model searched in the semantic web technologies and
which aimed at defining functional requirements their underlying concepts applied to the biblio-
for authority data was developed taking into graphic entity/name with its respective metadata
consideration the complexity of the described identified within a recognized namespace. In other
context. Being a conceptual model, though, its words, the possible future trend is seen in the
aim is not to solve two issues that are at the core deconstruction of the present machine-readable
of the name authority control: the identification record or in some other way formatted authority
(numbering) of the bibliographic entity and/or and bibliographic record into data and their rela-
its name that is of interest to the library user, and tionships that could be understood (manipulated)
actual practices on which libraries online cata- by the machine in performing users queries, and
logues (WebPAC: Web Public Access Catalogue) in designing new services.
are based and which would have to be changed to The purpose of this chapter is therefore to
meet newly appearing forms of users needs. As give an overview of the theory, standardization
to the latter, however, the conceptual model for processes and practices in the field of authority
authority data draws attention to certain issues that control, with particular view on endeavours which
have been formulated into recommendations for the International Federation of Library Associa-
amendments and/or changes of IFLA standards. tions and Institutions (IFLA) has invested into the
The abstracting processes performed during the field since the 1960s to the present. In the focus
design of the conceptual model released certain of interest of this chapter is paradigm shift in the
common understandings that could bring further field, and the possibilities of semantic web tech-
refinements into recording authority information, nologies in meeting library users needs, as well
and also in expressing the complexities of relations as librarians need to produce tools convenient to
that govern the present bibliographic universe. the user in the network environment.
Another major undertaking to bring national
cataloguing theories and practices back under
common denominator was a series of worldwide HIstorIcAl bAckground:
consultations through a series of meetings on tHe concePt oF unIversAl
cataloguing principles organized by IFLA. The bIblIogrAPHIc control
purpose of these meetings was to review and
replace the cataloguing principles of the 1961, Since the 1960s the theory and its practical
principles on which majority of cataloguing rules implementation in the international environment
have been based, with the new ones required in of the Universal Bibliographic Control, and its
the contemporary theoretical and technological constituent part authority control of names has
context. been pursued within the International Federation
To link the present with the possible future, of Library Associations and Institutions (IFLA)
the future trends part of the chapter deals with bodies by numerous experts with basically one
charting the territory for the name authority con- goal: to enable the library user to find a book
trol as part of the broader context recognized in in a library. However, such a requirement of an
library literature, emerging practice and projects organizing system as is a library catalogue indeed

184
Name Authority Control Paradigm Shift in the Network Environment

comprises of two objectives: a crucial factor in work on standardization of cataloguing proce-


organizing information in a system that would dures and had fundamental impact not only on
not be made just a finding list (a list of items, the future of cataloguing practice but also on the
e.g., find a book) is to enable the user to find col- cataloguing theory.
located information. Collocation means bringing The context for the adopted statement could
together under given name editions, translations, be analysed through three major factors. The two
adaptations, etc. of a work, i.e., expressions of a have already been mentioned: cataloguing prac-
work, as well as their manifestations in a different tice and theory, while the third one is the form
physical format and specific copy characteristics. of the catalogue of the time. The first factor, the
The aim of collocation is to inform the user of a one concerning the practice, was the objective
context of the sought information, and even to to bring bibliographic and cataloguing traditions
educate him/her. The latter objective Svenonius and procedures under one set of rules which
emphatically considers as what users have a right would enable the production of the efficient and
to expect from systems for organizing informa- economically justified record for multiple uses
tion, stating that a final argument in defense and diverse services: library catalogues and,
of full-featured bibliographic systems [meeting indeed, integrated library information systems,
both objectives, MW] is that they are required if national/special bibliographies, centralized/union
knowledge is to advance. Progress depends on catalogues providing other libraries within the re-
cumulative scholarship, which in turn depends on gion and worldwide with a standard bibliographic
scholars ability to access all that has been created description of a book. Building on the responsi-
by the human intellect (Svenonius, 2000, p. 29). bility of each national bibliographic agency (i.e.,
This argument brings us to two major issues that national library) to provide such a description,
IFLA pursues through its activities: the Universal IFLA developed its first core programme, the
Bibliographic Control of all published documents one of Universal Bibliographic Control (UBC).
through adhering to common standards, and the In Universal Bibliographic Control: A Long Term
design of bibliographic information system based Policy, a Plan for Action the concept of UBC was
on those standards and their underlying theory. defined as the one that presupposes the creation
Collocation function of the catalogue is founded of a network made up of component national parts,
on name authority control. each of which covers a wide range of publishing
and library activities, all integrated at the interna-
IFlAs cataloguing Principles and tional level to form the total system (Anderson,
the concept of uniform Heading 1974, p. 11). The long term programme of UBC
was defined in a series of resolutions confirming
International cataloguing theoreticians and the responsibilities of national libraries for mak-
practitioners met in 1961 in Paris for the Inter- ing the definitive bibliographic record of its own
national Conference on Cataloguing Principles publications in accordance with agreed interna-
(International Conference, 1963) with the aim to tional standards, and accepting responsibility for
define international principles on which national establishing the authoritative form of names for
cataloguing rules could be based. The Statement its countrys authors, both personal and corporate,
of Principles, so called Paris Principles was ad- and authoritative lists of its countrys authors,
opted by delegations from fifty-three countries personal and corporate (Anderson, 1974, p. 47) .
representing national library associations and That task was further confirmed by the thirteenth
twelve international organizations. Such a major recommendation of the International Conference
undertaking was the beginning of the international on National Bibliographies held in Paris in 1977

185
Name Authority Control Paradigm Shift in the Network Environment

(International Conference, 1978) that a national editions and references in one of the languages
bibliographic agency should maintain an author- normally used there (International Conference,
ity control system for national names, personal 1963, pp. 91-96). Another bibliographic condi-
and corporate, and uniform titles, in accordance tion that should be referred to here is when the
with international guidelines, and by IFLAs author is known by more than one name or form
publications of international rules for structuring of name, the catalogue should contain more than
normalized forms of names. The rules and lists one entry (i.e., variant forms of name) to discharge
were intended to help cataloguers in creating such the functions of the catalogue. The particular sec-
normalized forms for names of persons, corporate tion in question is section 3.21, but the intention
headings, anonymous classics, liturgical works of quoting it here, as indeed in quoting 7.1, is
of the Latin Rites of the Catholic Church, names to enable us to assess from the present situation
of states, and higher legislative and ministerial conditioned by the change of technological en-
bodies in European countries. vironment, bibliographic conditions, functions of
The theoretical background behind the above the catalogue and user requirements, what should
mentioned activities as adopted in Paris in 1961 have been taken into account while charting the
was the concept of the already mentioned term rules for international co-operation in building
uniform heading. It was not only agreed that catalogues and serving users of the time. Speak-
each national bibliographic agency would provide ing of bibliographic conditions, comments on
authoritative lists of names, i.e., its countrys section 3.21 should be cited from the annotated
authors names and titles of anonymous works edition of Statement of Principles prepared by Eva
for others to consult, but that forms of names as Verona and associates published in 1971 (State-
published in those lists and according to national ment, 1971). The commentary and examples (here
cataloguing rules would be adopted by other na- omitted) run as follows:
tional bibliographic agencies for recording those Variation in a personal authors name or form
names in their catalogues. Such a form of name of name may arise from many causes, for example:
is expressed in a uniform heading. Putting into
practice such an agreement the libraries would Variant spellings of a name
enable their users to uniquely identify the name Different Romanization of a name origi-
of an author or a title in catalogues globally, and nally not written in the roman script
to find all works by that particular author and all Different phonetic transcriptions, that is,
editions, translations, adaptations of a work col- different conversions of a name originally
located under that one name. written in the roman script into a non-Ro-
According to the general principle of the Paris man script, for example, into the Cyrillic
Principles in section 7 Choice of Uniform Head- script
ing, the uniform heading should normally be the Different linguistic forms
most frequently used name (or form of name) or Use of complete and incomplete forms
title appearing in editions of works catalogued..., Change of status
while the subsection 7.1 specifies the choice of Arbitrary or legal change of name or form
that form in given bibliographic conditions. The of name
given conditions being the appearance of editions Use of pseudonyms, nicknames, clandes-
in the original and in translations, thus subsection tine names assumed for political activities
7.1 requires that preference should in general be or other assumed names, generic appella-
given to a heading based on editions in the original tions, etc.
language; but if this language is not normally used Use of the title of another work.
in the catalogue, the heading may be derived from

186
Name Authority Control Paradigm Shift in the Network Environment

Variation in the name or form of name of a The Impact of Electronics upon Cataloguing Rules
corporate body [...] may also arise from various by C. D. Gull (Gull, 1969). Gull draw an image of
causes, for example: the electronic environment that at the time already
started to influence the type of materials libraries
Variant spellings of a name were collecting, the nature of these new materials
Different linguistic forms and the impact they should have on cataloguing
Use of shorter names or of official names procedures and rules. His primary concern in that
Change of name or form of name context was to alert librarians to the new type of
(Statement, 1971, pp. 9-11). authorship: non-human authorship, or to use
a positive phrase, automatic authorship (Gull,
The annotated edition was the result of deci- 1969, p. 281). That type of authorship, named
sions made during the first part of the IFLAs automaton would be introduced into the new
International Meeting of Cataloguing Experts, held IFLA Statement of International Cataloguing Prin-
in Copenhagen in 1969 (International Meeting, ciples (Statement, 2009) almost forty years later.
1969).1 The discussion prepared and led by Eva The Principles prescribed the type (4. Kinds
Verona analysed various interpretations of Paris of Entry), use (5. Use of Multiple Entries), and
Principles in national cataloguing rules designed function of catalogue entries (6. Function of Dif-
since 1961. Other problematic areas in relation ferent Kinds of Entry): main entry, added entry
to the choice and form of a heading that were and references which headings carry identification
recognized as needing further comment in the and collocation functions. Yet, the Paris Principles
annotated edition were the following: treatment do not prescribe one specific type of entry: an
of an author who wrote under different names for authority entry which function in the catalogue
different types of material, change of name by a is to gather all information about various forms
living author, works issued by dignitaries which, of names of authors and titles in order to control
although appearing under their personal names, their use in the catalogue and to function as a
carried a collective authority, original forms of guide to users.
cities and states, nature of entries under states Being rooted in the technology of the time
for laws, constitutions, etc., works produced by was realistic: even the structure of the machine
several authors, and transliteration according to a readable cataloguing format: MARC developed
standard international system, with an exception at the time followed the order and elements of a
of ancient Greek names which may be written manually produced printed catalogue card. As Mi-
in the Latin form. However, in order to advance chael Gorman described it n the article published
international uniformity in relation to the choice in 1978 entitled The Anglo-American Cataloguing
of uniform heading, it was decided that the com- Rules, Second Edition, and then again thirty years
mentary should encourage the use wherever later, the MARC record remains an automated
possible of the original forms of names and titles, version of a manual catalogue entry (Gorman,
rather than the forms used in the language of the 1978, p. 210; Gorman, 1998). In continuation to
country in which the library is located (Report, the mentioned remark, Gorman warned of the lack
1970, p. 110). of full understanding of the nature and function
The third factor that had fundamental impact of the authority file (i.e., a set of authority entry
on Paris Principles was the technology, i.e., the records) in an automated catalogue which had
prevailing use of the printed card catalogues. It considerable impact on the formulation of cata-
should be noted, though, that the working paper loguing rules. He stated: The crucial questions of
presented as the last one on the conference was levels of information in bibliographic records and

187
Name Authority Control Paradigm Shift in the Network Environment

of the nature of authority file records in machine To develop the UNIMARC format for the
systems have only been raised; they have come exchange of authority data.
nowhere near to being resolved. In short, AACR To develop the methods for the efficient
2 could not take the effect of library automation and effective exchange of authority data
fully into account because those effects have yet to (Delsey, 1980, p. 10).
be completely assessed and understood (Gorman,
1978, p. 210). The lack of international guidelines The Working Group developed a general
that would enable national cataloguing rules to framework based on objectives and requirements
prescribe the content of such authority entry record for the work needed to meet the given goals. Four
was stated also by Eva Verona in a comment to the levels at which an international authority systems
temporary rule on the authority entry in her Code might operate were recognized: at level 1, the
and Manual for the Compilation of Alphabetical exchange of authority data in print or microprint
Catalogues (Verona, 1983, p. 636).2 form in a standard format, at level 2, the exchange
of authority data in machine-readable form, at level
IFlA standards for the creation 3, a system established to provide for the unique
of Authority entry records identification (for bibliographic purposes) of per-
sons, corporate bodies, etc. by means of a numeric
Verona and Gorman were voicing the common identification, and at level 4, a system designed
problem. In 1978 during the IFLA General Con- for creating and exchanging authority data in a
ference in trbsk Pleso in the then Republic of network. The prerequisite for such a system would
Checkoslovakia, Working Group on an Interna- be a record format of sufficient sophistication to
tional Authority System was set up as a result of support the kind of dynamic, multi-directional
a project established by IFLA International Office data transfer that would be involved, and flexible
for UBC and endorsed by the IFLA Sections on enough to carry simultaneously data originating
Cataloguing and Mechanization. According to from different sources, formulated according to
its chairman Tom Delsey, following the deci- different standards (Delsey, 1980, p 11).
sions of the UBC programme made in 1974, and Guidelines for Authority and Reference Entries
considerable activity, both at the national and (Guidelines, 1984) answered to the first term of ref-
international level, in developing guidelines for erence, or level 1 of the framework. The Guidelines
catalogue headings and in compiling authority defined a set of elements to be included in three
lists... [w]e are now at a point where planning for types of entries: authority entry, reference entry,
the efficient exchange of authority data between and general explanatory entry, assigned an order
and among national bibliographic agencies is criti- to the elements, and specified a system of punctua-
cal (Delsey, 1980, p. 10). The Working Groups tion for the entry in print and micro-print form.
goal was to establish principles for the creation Three types of headings were defined: headings
of authority files and procedures to facilitate for personal names, headings for corporate bodies,
international exchange of authority information including conferences and territorial authorities,
to be accomplished through the following terms and uniform titles for anonymous classics. The
of reference: guidelines, however, were confined to defining
only the broad structure of the entry, and did not
To discuss and formulate the specifications prescribe the actual form of headings, references,
for an international authority system to sat- notes, etc., nor [did] it prescribe punctuation that
isfy the bibliographic needs of the libraries. is internal to those elements (Guidelines, 1984,
p. x). The specifications pertaining to the form of

188
Name Authority Control Paradigm Shift in the Network Environment

heading should be made according to IFLA rules fulfil their traditional function of recording the
for structuring normalized forms of names, and authoritative form of name for an entity, but theyll
according to national cataloguing rules. also provide access to the bibliographic records
National cataloguing rules published before and aid their manipulation. Its with these last
the Guidelines were issued, as two examples two functions that we can come to the kernel of
mentioned above show, do not either address the the new prospects which authority files can now
creation of authority entries or lack the neces- offer (Oddy, 1986, pp. 3-4).
sary framework for specifying their content, as
in Veronas case. What was missing, even after Only in 1991 IFLA published UNIMARC/
the Guidelines were published, was the common Authorities: Universal Format for Authorities
agreement about the content of the authority (UNIMARC/Authorities, 1991) as a result from
record, and the definition of the relationships a work started in 1984, immediately after the
between the authority file and the bibliographic Guidelines were finished. The second objective
file within a given catalogue. The practice con- defined in terms of reference for the Working
firmed these needs too. That could be found in Group on an International Authority System was
the description of first automated bibliographic thus fulfilled. The machine-readable format for
systems with integrated authority file (Malinco- authorities was complementary to UNIMARC
nico & Rizzolo, 1973; Buchinski & Newman & format for bibliographic records which first edi-
Dunn, 1976) and theoretical considerations about tion was published already in 1977. It had needed
the role of a machine based authority file in such fourteen years of effort of international experts to
a system (Malinconico, 1975; Durance, 1978; produce an instrument for international exchange
Gorman, [1979] 1982; Taylor 1984, 1989), as of authority data, and for implementation of au-
well as in voicing the needs for authority control thority control in those systems that were using
in union or cooperative international authority UNIMARC formats as the internal format of
files in Canada (Clement, 1980), the USA (Avram, their catalogues or integrated library information
1984) and Great Britain (Oddy, 1986). Pat Oddy systems. That shows the complexity of the task
particularly clearly envisioned3 the function and voiced in the stated requirements for the design
use of authority files as part of full-featured of such a format of the level 2 of the framework.
bibliographic systems, which Svenonus would UNIMARC/Authorities is based on the Guidelines
argue for yet fifteen years later: in defining the type and structure of entries, and
the content designators for the same entities with
The on-line catalogue of the future will contain addition of those for family name, territorial or
two kinds of records perhaps they correspond geographic name, title (uniform and collective
to the mechanical and the intellectual aspects of uniform title) for works by individual author and
cataloguing. The first file will consist of stan- topical subjects. The format, just as in the case of
dardized descriptions of bibliographic items. Guidelines does not specify the content of authority
These individual records will be linked, often in and reference records but refers this problem to the
more than one way, to the second file, consisting application of IFLA standards (rules and lists of
of discrete authority records for personal and uniform headings) and national cataloguing rules.
corporate names. These authority records will It is important to point out here the mention
be linked to each other by references. For the in the formats foreword of the third objective
first time catalogues will escape from the linear defined in the terms of reference, i.e., development
structure found in card, fiche, or conventional of methods for efficient and effective exchange
MARC record files. The authority records will of authority data, or level 3 of the framework.

189
Name Authority Control Paradigm Shift in the Network Environment

Following the Guidelines, the format contains a with international experts, national bibliographic
field for an International Standard Authority Data agencies and services succeeded in consolidating
Number (ISADN), but it is not defined: it is re- the ground for the efficient and economically
served for the ISADN, and therefore giving no founded creation and exchange of authority data.
direction as to its use and structure that could have Theoretically, bibliographically significant condi-
been taken from specifications in the Guidelines, tions were identified, while cataloguing principles
elementary as they are. Namely, the stipulation and standards were based on the concept of uniform
of the Guidelines is ambiguous. It specifies the heading. To enable the theory to function, conces-
function and the use of the number in relation to sion was made by principles and implemented
the authority entry (record) and to the heading in in cataloguing rules to meet the needs of local
the same rule. The general rule in 1.7 specifies users and traditions in allowing the use of forms
that the ISADN serves to identify the number of names in the language of the country in which
assigned to the authority entry for purposes of the library is located.
international exchange and control, while the Variations in abiding to the rule of uniform
specific rule, 1.7.1.2, makes a condition: if an heading related to linguistic differences were not
ISADN has been assigned to the heading given the only ones that were recognized. In the commen-
in area 1 [uniform heading], the ISADN must be tary to Paris Principles (Statement, 1971) Verona
given. Such a provision should be born in mind exposed other problematic areas in establishing
because of the future developments relating to the uniform headings in different cataloguing rules
identification concept in this field. published since 1961. She highlighted the prob-
However, the creators of the format had to lem of inconsistency in the definition and use of
present an answer to the task given by the third the term author, which according to Principles
term of reference or level 4 of the framework. includes personal author and corporate body,
What they did was visualize requirements the and commented that differences resulting from
future development of an international authority these definitions are particularly noticeable in
system would put on the extension of the format. the rules which differentiate between publica-
In the preface to the format, its editor Christine tions to be entered under the name of a personal
Bossmeyer says: When a model for an interna- author and those to be entered under the name
tional authority system is worked out by IFLA, of a corporate body, in the rules for publications
target for data element requirements may be set containing a work which has been produced under
out so that records exchanged internationally will editorial direction, and in the rules for collections
have more consistency. Such a model may also (Statement, 1971, p. 24). Definition of the au-
indicate the need to add data elements to UNI- thor and the realization of the authority control
MARC/Authorities in order to accommodate and over authors names has become again a point of
facilitate exchange in a worldwide environment discussion related to decision to bibliographically
(UNIMARC/Authorities, 1991, p. 8). control web resources.4
What was not solved yet, and what IFLA rec-
summing up: Achievements ognized as needing to focus on in the following
of IFlAs work in the Field of period, was to design a model for an international
Authority control: 1961-1991 authority system, to define international standard
number for authority data as part of it, and to de-
In the period of thirty years, between Paris velop methods of putting the system into function
Principles adopted in 1961 and publication of globally. The period of almost twenty years since
UNIMARC/Authorities in 1991, IFLA, together then has been devoted to that goal.

190
Name Authority Control Paradigm Shift in the Network Environment

APPlIcAbIlIty oF PrIncIPles tion infrastructure (Delsey, 2004), showing that


oF unIversAl bIblIogrAPHIc in 1989 he delineated problems that are present
control In InternAtIonAl still today. He concludes his 1989 article with the
networked envIronment statement that although the standard authority
entry and the adequate machine readable format
In the article entitled Authority Control in an might eventually be expected to function,
International Context (Delsey, 1989) published there was still an enormous amount of work to
towards the end of the above period in 1989, Delsey be done on the technical aspects, administrative
summarizes IFLAs efforts in building a model complexities and cost-benefits of various schemes
for an international authority system. Analysing for the implementation of an international author-
implementation of UNIMARC Authorities format ity system for authority control. It was likely, he
by national bibliographic agencies from the aspect states, to be non-technical issues, in fact, that
of bilateral exchange of authority data he states ultimately determine the extent to which the
that when one looks more closely at the com- concept of Universal Bibliographic Control is
plexities of authority control on an international realized as an international system for authority
scale, one soon realizes that an infrastructure more control (Delsey, 1989, p 27).
sophisticated than that supporting simple bilateral Apart from different linguistic forms that Paris
exchange is required (Delsey, 1989, p. 23). Al- Principles explicitly made concession to, there
though referring to the context of the design of were other bibliographic conditions that cause
infrastructure for international authority control, variations in personal and corporate body names,
Delsey has opened up the issue of insufficiency and which Verona enumerated in the commentary
of the concept of bilateral exchange on which to Paris Principles (Statement, 1971, pp. 9-11).
IFLA founded development of its standards. He Another aspect of the problem were the mentioned
further assumes that theoretical and implementation issues related to
the linked bibliographic and authority files within
[w]ithout a central database to serve as a regis- an online library system elaborated by Gorman,
ter of authority entries and their corresponding Malinconico, Oddy, Taylor and others.
standard numbers it would be next to impossible There were still other specific questions that
for national agencies to established that vital link needed answers. Some of these were: Is there a
between the entries in their own authority files change of the functions of the catalogue due to
and the standard number that will identify the the change of technology?, i.e., the functions of
variant forms of heading that have been used by the catalogue with integrated bibliographic and
other agencies and which will be circulating as authority files; Is the UBC concept still relevant
headings in bibliographic records emanating from in the context of internationally exchange of au-
perhaps dozens of different national agencies. ... thority files, and if not, which other concept can
[A]ll such processing would be dependent on the replace it?; What are the methods or procedures in
key function of registering standard numbers hav- establishing authority entry records, particularly
ing been carried out in some sort of centralized as to their content; What is a nature of relation-
fashion (Delsey, 1989, pp. 25-26). ship between authority records within an auto-
mated authority file?; What are implications of
Delsey would return to this topic fifteen years reference structures to the authority control in an
later with basically the same arguments yet which online catalogue?; Do online retrieval techniques
take into consideration the contemporary informa- influence the content of authority entry records?

191
Name Authority Control Paradigm Shift in the Network Environment

IFlAs studies on the International to the function they perform. Management name
exchange of Authority data authority files are those that are designed simply
to ensure the formal management of name head-
Following the publication of the UNIMARC/ ings to a given catalogue, and therefore can be
Authorities format in 1991, two important stud- used effectively with constant reference to the
ies were issued under the auspices of IFLA UBC catalogue on which they are dependent. Such files
International MARC Programme. IFLAs concern are not suitable for the international exchange. The
was to pinpoint the reasons why the effective opposite is true for the second type of authority
international exchange of authority data was files, which Bourdon calls identification name
hindered, while the exchange of bibliographic authority files. They are characterized by unam-
data was flourishing. The studies commissioned biguous identification of the entity which is the
by IFLA were Management and Use of Author- content of the authority record through additions
ity Files by Marcelle Beaudiquez and Franoise to headings and different types of notes (an addi-
Bourdon (Beaudiquez & Bourdon, 1991), and tion to the management function), which makes
International Cooperation in the Field of Author- this type of authority file independent from the
ity Data by Franoise Bourdon (Bourdon, 1993). catalogue in which it was created and therefore
In the first study, Beaudiquez and Bourdon applicable for re-use in a new context (Bourdon,
surveyed 15 automated authority files containing 1991, pp. 31-67). The majority of files of national
names of persons, corporate bodies and uniform libraries Bourdon analysed were of the first kind.
titles for anonymous classics. The report suggested The explanation for such a situation she finds in
that the failure of international cooperation in the the development of shared cataloguing and the
field of authority data was due to the fact that the need for re-used authority data which all cre-
division of labour defined by UBC had been tacitly ated new functions for name authority files at
ignored, and that there was a lack of precision in the national and international level which were
the terminology in the field of authority data. The not at all among the objectives assigned to them
aim of the second study, International Coopera- by the national bibliographic agencies when they
tion in the Field of Authority Data: An Analytical created them (Bourdon, 1991, p. 67).
Study with Recommendations, was to identify the The means for unique and unambiguous
current obstacles to the international exchange of identification of the content, or subject of the
authority data, whether in manual or automated authority record, Bourdon emphatically finds in
form, and to submit recommendations to IFLA to the design of the International Standards Author-
be ratified and thus to contribute to international ity Data Number (ISADN). She argues that the
cooperation in this area (Bourdon, 1991, p. 6). number should not be attributed to the authority
In this seminal work, Bourdon first presents form (uniform heading) but to the whole of the
analyses of international standards and concludes identification authority record drawn up by the
that they showed gaps in regard to the definition national bibliographic agency which is responsible
of the typical content of authority records that for the author in question (Bourdon, 1991, p. 80).
were intended to be re-useable outside the context She explicitly states that she thus takes further the
in which they were created. That failure resulted suggestions of the IFLA Working Group on an
from a lack of clarity in the aims of international International Authority System that the number
standardization, and the lack of identification would serve to identify the object of the authority
of different functions of an authority file in an entry (Delsey, 1989, p. 24), or indeed the follow
automated environment. In this respect, Bourdon up of the ambiguous treatment of the numbers
identifies two types of authority files according function as the identifier of authority entry (record)

192
Name Authority Control Paradigm Shift in the Network Environment

and a heading in the Guidelines for Authority and UNIMARC/Authorities, but, more importantly,
Reference Entries (stipulations 1.7 and 1.7.1.2). promoted certain ideas and concepts which were
Bourdons profound understanding of the considered the answer to the changed technologi-
problem from theoretical and practical point of cal environment.
view resulted in a proposal which, however, got The Working Group on Minimal Level Au-
blurred along the experts search for a solution thority Records and ISADN (WG on MLAR
since then, but could be seen today reaffirmed and ISADN) created under the auspices of IFLA
in the research of implementations of semantic UBCIM in 1996 analysed nine national authority
web tools to (bibliographic) services. The idea to formats and UNIMARC, and made a list of Man-
attribute a number (e.g., ISADN) to the identifi- datory Data Elements for Internationally Shared
cation authority record containing the authorized Resource Authority Records. In the introduction
form of name of an entity with additional data and recommendations section of its report the
elements to disambiguate it from other entities Group states that it has come to realize that the
within the authority file of a national bibliographic IFLA goal of Universal Bibliographic Control
agency, is a commonality today where a Uniform by way of requiring everyone to use the same
Resource Identifier (URI) identifies an entity and form for headings globally is not practical. It
its attributes within a given namespace. further recognizes the importance of allowing
the preservation of national or rule-based differ-
towards a new Paradigm: ences in authorized forms for headings to be used
redefinition of the ubc in national bibliographies and library catalogues
concept: From bilateral that best meet the language and cultural needs
exchange to global sharing of the particular institutions users (Mandatory
data elements, 1998, p. 1). The term sharing
Following the publication of UNIMARC/Au- used in the title instead of exchange is of the
thorities and the two studies by Beaudiquez and importance. In order to facilitate international
Bourdon, IFLA UBCIM organized a series of sharing of authority data the Group also proposes
meetings, workshops and conferences with the that IFLANET hosts libraries authority files as
strongly expressed goal to not only promote the a kind of virtual shared resource authority file.
programme of international exchange of author- As to its second mandate, to resolve the issue
ity data, but to see to its practical implementation of the identifier: ISADN, the Group refers this
(Bourne, 1992; Plassard & McLean Brooking, to some future time for review, recommending
1993; Willer, 1994). Related to the latter goal, one co-operation with publishing and archival5 com-
should also mention discussions held within IFLA munities, and waiting to see how the emerging
Standing Committee on Cataloguing between international electronic environment and advances
1991 and 1993 that were published in the notes in developing technologies impact the linking of
form under the title Problems and Prospects of records (Mandatory data elements, 1998, p. 2).
Linking Various Single-language and/or Multi- The first recommendation to relieve the UBC
language Name Authority Files (Murtomaa & concept of the uniform heading was realized in
Greig, 1994). the second edition of the Guidelines for authority
This period of IFLAs intensive involvement in records and references published in 2001(Guide-
the international authority control is characterized lines, 2001) by the introduction of the concept au-
by the work of two subsequently established work- thorized heading. This term, which now replaces
ing groups which findings and recommendations uniform heading, is defined as the uniform
directly influenced the revision of Guidelines and controlled heading for an entity (Guidelines,

193
Name Authority Control Paradigm Shift in the Network Environment

2001, p. 2). The explanation of the reason for the A Conceptual Model (Functional requirements,
change with reference to the WG on MLAR and 2009) (FRAD). The time that took the Group
ISADNs recommendations is described in detail to finalize the model shows the complexity of
in the introduction (Guidelines, 2001, pp. ix-x). the problem they had to deal with. More recent
The UBC concept of requiring the use of the same description of the Groups background, its liai-
form for headings globally is considered not prac- son activities and the working model at the time
tical and [...] no longer necessary, because with named FRANAR can be found in the article by its
computer capabilities developing more sophistica- chairman Glenn E. Patton (Patton, 2004), while
tion, we can link the authority records created in the models impact on the future development of
one country according to one set of cataloguing UNIMARC Authorities format is described in
rules with those in another country to facilitate detail by Willer (Willer, 2007).
sharing of authority records and potentially to In the mentioned article Patton addresses also
enable computer-assisted switching to display the Groups second term of reference, which was
authorized forms (Guidelines, 2001, p. ix).The to study the feasibility of an ... ISADN, to define
term access point as a means under which a possible use and users, to determine for what types
bibliographic or authority record can be searched of authority records such an ISADN is necessary,
in online catalogues, is also introduced but only to examine the possible structure of the number
in the definition chapter (Guidelines, 2001, p. and the type of management that would be neces-
2), as it does not yet have a function within the sary (Patton, 2004, p. 93). Patton gives a short
Guidelines. Furthermore, a list of mandatory data overview of the Groups dealing with the number,
elements which contained recommendations by referring to Bourdons proposal from 1991, rec-
the WG on MLAR and ISADN to the Permanent ommendation of the WG on MLAR and ISADN,
UNIMARC Committee for additions to the UNI- liaison with publishers (<indecs> and its successor
MARC Authorities format was duly analysed and project InterPARTY) and archives community, and
incorporated into the second edition of the format with representatives of ISO/TC46/SC9 working
and its manual (UNIMARC Manual: Authorities groups that were developing standard numbers
format, 2001; Willer, 2004). such as ISAN, ISWC, ISRC, etc. All this activity
The Working Group on Functional Require- focused on one single question what exactly
ments And Numbering of Authority Records were we attempting to number? Was it the entity
(FRANAR) was established in 1999 under the aus- regardless of the form of the heading used for that
pices of IFLA Division of Bibliographic Control entity? Was it each different authorized heading
and UBCIM as a continuation of the WG on MLAR for that entity? Was it the authority record itself
and ISADN. The Groups first goal was to design to which the number implied? (Patton, 2004,
a conceptual model for authority data that would p. 95). The Group therefore decided to prepare
correspond to the model for bibliographic data a separate document which was eventually pub-
published in the study Functional Requirements for lished in September 2008 under the title A Review
Bibliographic Records (Functional requirements, of the Feasibility of an International Standard
1998) (FRBR). The FRBR is based on the entity Authority Data Number (ISADN) (Tillett, 2008).
relationship model, so the one for authority data The review prepared for the Group by Barbara B.
should built on it in defining entities, attributes Tillett was approved by the Standing Committee
and relationships based on user tasks performed of the IFLA Cataloguing Section, thus giving the
in relation to authority data. The goal was met in official IFLAs approval of its first recommenda-
a publication that needed ten years to be finalized tion which runs: IFLA should not pursue the
Functional Requirements for Authority Data: idea of an International Standard Authority Data

194
Name Authority Control Paradigm Shift in the Network Environment

Number (ISADN) as it has been defined (Tillett, requirements for bibliographic and authority data:
2008, p. 1). ISADN was thus put to death. Three FRBR and FRAD, and user tasks defined in FRBR
following recommendations outline directions as critically analysed and extended by Svenonius
which could be taken at this time of technologi- (Svenonius, 2000, pp. 15-20). Namely, to meet
cal development and state of the art in national the objectives of a full-featured bibliographic
and international endeavors in the field of name system, Svenonius modified the original FRBR
authority control. These are: user tasks to provide model independence, con-
tinuation with tradition, and navigation objective
IFLA should continue to monitor the (Svenonius, 2000, p. 20).6 The Statement builds
progress of efforts of the ISO 27729 ISNI user tasks into the objectives and functions of the
Working Group and the VIAF Project and catalogue which run as follows:
any potential numbering that may result The catalogue should be an effective and ef-
from those efforts. IFLA member institu- ficient instrument that enables a user:
tions should also actively seek to influence
the ISNI with a view to identifying com- 4.1. to find bibliographic resources [...]:
mon purposes with other communities. 4.1.1. to find a single resource,
IFLA should continue to encourage the 4.1.2. to find sets of resources [...];
testing of various models to enable global 4.2. to identify a bibliographic resource or agent;
sharing of authority information. 4.3. to select a bibliographic resource that is
IFLA should encourage the use of author- appropriate to the users needs;
ity information in presenting improved 4.4. to acquire or obtain access to an item de-
catalog interfaces (Tillett, 2008, p. 1). scribed [...] or to access, acquire, or obtain
authority data or bibliographic date;
Parallel to the Groups work on the conceptual 4.5. to navigate within a catalogue and beyond
model for functional requirements for authority (Statement, 2009, p. 3-4).
data, another group of IFLAs experts started the
revision of cataloguing principles, the Paris Prin- Thus, Svenoniuss plea for continuation with
ciples of 1961. In a series of international consul- tradition has been met with in the first, finding
tations and discussions within the IFLA Meetings objective being elaborated to fulfil identification
of Experts on an International Cataloguing Code (find a single resource), as well as collocation
that started in 2003 and finished in 2007 (IFLA (find sets of resources) function of the catalogue
Meetings of Experts, 2009) the new Statement as stated in the Paris Principles, and built into
of International Cataloguing Principles (State- the cataloguing rules that were developed since.
ment, 2009) was adopted. The statement takes In regard to the uniform heading concept
into account new technological environment: and concession to different linguistic forms of the
online library catalogues and beyond, all types Paris Principles, the new statement takes the same
of materials and all aspects of bibliographic and stand. The name should be given in the original
authority data. It also includes not only principles language and script (6.3.2.1), 6.3.2.1.1. but if the
and objectives (i.e., functions of the catalogue), original language or script is not normally used in
but also guiding rules that should be included in the catalogue.... [it] may be based on forms found
cataloguing codes internationally, as well as guid- on manifestations or in reference sources in one
ance on search and retrieval capabilities (State- of the languages or scripts best suited to the us-
ment, 2009, p.1). The statement builds on two ers of the catalogue (Statement, 2009, p. 5). The
corresponding conceptual models for functional concession of the Paris Principles which principal

195
Name Authority Control Paradigm Shift in the Network Environment

aim was, indeed, the concept of uniform heading in a need to abstract even further from a fully
built into the UBC programme, has now been developed model being a response to worldwide
levelled up in the name of the first principle of comments asking for clear concepts and defini-
the statement which is to serve the convenience tions. The three basic entities are bibliographic
of catalogue users (Statement, 2009, p. 1). The entities, names and/or identifiers and controlled
practice (or, perhaps, best practice) has found access points. The entities are described with their
its way into objectives (i.e., principles) of a (bib- relationships as follows:
liographic) system. To describe this new situation,
the creators of the statement had to establish a new Entities in the bibliographic universe (such as
suitable terminology. The partial abandoning of those identified in the Functional Requirements
the term uniform heading for the term autho- for Bibliographic Records) are known by names
rized heading was done already in the Guidelines and/or identifiers. In the cataloguing process
for Authority Records and References. The term (whether it happens in libraries, museums, or
access point, considered to be more appropri- archives), those names and identifiers are used as
ate in the online catalogue environment, gained the basis for constructing controlled access points
eventually over heading of the card catalogue. (Functional requirements, 2009, p. 3).
The Statement having to deal with the fact that
any bibliographic or authority data can be made The relationshipsknown by and [used as]
an access point in an online environment,7 defined basis forare bidirectional and multiple. Such a
two new terms: controlled and uncontrolled access definition is important as it is necessary to express
point. The first named access points are recorded all the complexities of the bibliographic universe,
in the authority record, while the latter are defined together with legalizing practices in serving the
in a negative sense: not controlled by an authority convenience of catalogue users. For example,
record (Statement, 2009, p. 13). According to this a bibliographic entity person is known by the
negative definition, anything that falls within the name Lewis Carroll which is used as a basis for
range of authority record is considered controlled. controlled access point following rules by one
For example, a variant form of name, i.e. the form bibliographic agency. That same person is also
that was not chosen by a bibliographic agency as known by the name Charles L. Dodgson which is
an authorized one, still makes a controlled access used as basis for another controlled access point
point. The name of a publisher, on the other hand, by the same rules. It could happen, though, that a
which one bibliographic agency does not have a certain bibliographic agency following different
need to control, can be retrieved in its uncontrolled (national) cataloguing rules would recognize the
form from a bibliographic record file, while in the second name as a separate name of the entity (i.e.,
case of another agency that controls publisher/ a variant name form), but not as belonging to the
printers name for its antiquarian material, would separate bibliographic entity person, (i.e., other
be retrieved as a controlled access point from the biographic identity). Such a situation would result
authority data file. in two different online catalogues as follows: in
To understand the complexity of the use of the first instance/catalogue, a user searching for
terms related to the name authority control, one works by Lewis Carroll would get (collocated) all
has to revert to the FRAD conceptual model. the works under that name of the bibliographic
The fundamental basis for the conceptual model entity person (in fact a pseudonym of Dodgson,
constitutes of three types of entities and their and in the model considered as persona adopted
relationships. That basis for the model was de- by the individual); the same would be the case
veloped at quite a late stage of the Groups work when searching under the name Dodgson. (There

196
Name Authority Control Paradigm Shift in the Network Environment

would be a see also reference or a link between summing up: Further Achievements
these two access points for the real name and the of IFlAs work in the Field
pseudonym, however, this is not the point here.) of name Authority control:
In the second instance/catalogue, a user search- since 1991 to the Present
ing for works by the author named Lewis Carroll
would get (collocated) all the works published The period of the last twenty years saw intensive
under that name, but also the works written under work in the field of authority control under the
the name of Dodgson, as they are considered to auspices of IFLA, equal to the one of the previous
belong to the same bibliographic entity. That is, period. That work could be characterized by theory
the rules that govern the latter access points in the informed by practice, and practice informed by
catalogue, do not allow the concept of separate theory in its fullest sense.
biographic identities of a person. The answer to the basic question is there a
Thus, in the first instance, both forms of names change in the functions of the catalogue due to the
would be authorized forms of names (by specific change of technology? can be found in IFLAs
rules) and chosen for the authorized access point, new Statement of International Cataloguing
while in the second instance only one form of name Principles which accepted Svenoniuss emphatic
(of bibliographic entity person, i.e. biographic intervention on formalizing the objectives (func-
identity) would have been chosen. In the latter case, tions) of the catalogue. Svenonius insisted on
it would be necessary to decide which one is the expanding finding function of FRBR user task
preferred name: preferred by the user community in order that the collocation function would be
which particular bibliographic agency serves. In adequately dealt with. Thus, the answer to the
the given example, the preferred name is Lewis question is there a change in the functions of the
Carroll, and that particular form will be authorized catalogue? is negative. What is different is the
form of name (by the rules) and chosen for autho- expanded and complex bibliographic universe, to
rized access point. The second name, Dodgson, is which some of the tools should be adapted and
considered a non preferred name, and is chosen as some should evolve into the new ones.
a variant form of name which can be used to access IFLA has answered to these challenges by
the authority record or as a link to authorized ac- mobilizing a wide range of international experts,
cess point. The example uses terminology defined whose theoretical knowledge, research and practi-
in the Statement of Principless, which when read cal experience built a consensus about common
sequentially is rather opaque. It should be also bibliographic tools. The milestone of these efforts
noted that a term variant access point is missing was IFLAs study Functional Requirements for
from the Glossary, and that it would be useful to Bibliographic Records (FRBR) which impact
define it in a positive sense. Namely, variant form crossed library community boarders.8 The study
of name is defined as a form of name not chosen is based on the entity-relationship model, in which
as the authorized access point (Statement, 2009, the entities are defined as the key objects of inter-
p.13), thus blurring the entities that FRAD keeps est to users of bibliographic records (Functional
specifically apart: the name and the controlled Requirements for Bibliographic Records, 1998,
access point. Another argument for introducing p. 4). Elements of a bibliographic record were
the term would mean recognition of the function thus put under scrutiny of their relevance for the
of a variant access point in an online catalogue user of the catalogue. In deciding to adopt the
(see reference structure). new type of modelling bibliographic data, IFLAs
study has broken with the long tradition of linear

197
Name Authority Control Paradigm Shift in the Network Environment

representation and, indeed, linear structuring of Standard Authority Number obsolete, and intro-
data. The objections to such a structure and pro- duces a new one: 003 Persistent Record Identifier.
posals for a disaggregated record structure were The field is defined as the one that contains the
made already in the 1970ies (Durance, Buchinski, persistent identifier of the record assigned by the
Gorman, Malinconico) and also later (Willer, agency which creates, uses or issues the record,
1999) in relation to designing MARC formats, explicating that it is the persistent identifier
and implementing authority control in automated for the authority record, not for the described
library catalogues. entity itself. Referencing the record through a
The tools in the field of name authority control persistent identifier by using the address which
which answered to the changed environment are is displayed in the browser during an online ses-
Guidelines for Authority Records and Refer- sion (UNIMARC Manual, 2009), it is possible
ences, UNIMARC Manual: Authorities Format, to put the record, but, more importantly, records
Functional Requirements for Authority Data: A content to new use in new services.9
Conceptual Model and Statement of International
Cataloguing Principles. The FRAD conceptual
model and the Statement of Principles have pro- Future trends: semAntIc
vided theoretical basis for harnessing the new web And contInuAtIon
bibliographic universe by reaffirming the concepts wItH trAdItIon
of authority control and fixing terminology.
What has been left yet unresolved is the task At this point of time, one can state that IFLA, as
delineated in the late 1970ies the international the international body with the responsibility for
system for authority control. Summarizing discus- the development and promotion of the programme
sions, reviews, proposals and practical achieve- of Universal Bibliographic Control globally,
ments, three basic facts can inform future work: has made the major effort to meeting that goal.
ISADN as an idea and key functioning element in Based on the developed frameworks, conceptual
an international authority system has been aban- models, standards and guidelines in the field of
doned, i.e. there is no need to pursue it further; authority control, two main trends can be seen in
Bourdons concept of numbering authority record, their implementation.
i.e. the need for the creation of identification name The first one refers to the design of an interna-
authority record by bibliographic agencies; and tional system for authority control, the one Delsey
IFLAs monitoring research and practice, i.e., envisaged in 1989 as needing to be based on an
testing of various models to enable global sharing infrastructure more sophisticated than that sup-
and re-use of authority data. porting bilateral exchange, and which he revisited
The new, third edition of UNIMARC Manual: in 2004. Such a system could be identified with
Authorities Format (UNIMARC Manual, 2009) the development of the VIAF Project. VIAF: the
can be considered a prompt reaction to, as well as Virtual International Authority File started in 2002
the implementation of these directions for future by the OCLC, the Library of Congress and the
work. It incorporates both new concepts and the Deutsche Nationalbibliothek as a proof of concept
methodology developed by the FRAD conceptual project to test the centralized union authority file
model, as well as concepts and terminology of the model using OAI protocols (Tillett, 2004, p. 38).
Statement of Principles thus enabling the user of The project was to test the viability of program-
the format to build a comprehensive identification matically linking personal names in authority files
name authority record (Willer, 2009). As to the from different national authority files regardless
ISADN, the format makes field 015 International of format or cataloging rules used for the creation

198
Name Authority Control Paradigm Shift in the Network Environment

of such data. The project was joined subsequently with the URI http://errol.oclc.org/laf/nb2001-
by the Bibliothque nationale de France, while in 72552.html.10
September of 2008, Barbara B. Tillett on behalf
of the VIAF partners issued invitations to over 20 Both the predicate and object instances creator
potential participants signaling the official start and Gordon Dunsire have URIs because they
of a full-scale production of the VIAF (Lupe are entries in vocabularies which have been made
Cristn, 2008, p. 2). available as namespaces in Semantic Web ap-
The second trend can be seen in the visualiza- plications (Dunsire, 2009, p. 3).
tion of disaggregation of what we now deal
with as bibliographic and authority records in Based on this technology, and having at dis-
the semantic web environment, by using biblio- posal available bibliographic and authority records
graphic infrastructure tools which are now in the on the web, Dunsires disaggregated bibliographic
development phase. Independently from IFLA record of an FRBR model will have the follow-
work, but being fully aware of it, and working in ing future:
continuation with tradition, Gordon Dunsire
recently published an article entitled The Semantic So the original catalogue card, with explicit local
Web and Expert Metadata: Pull Apart then Bring content and implicit structure, has evolved into a
Together (Dunsire, 2009). Dunsire researches the multi-record aggregation with explicit structure
ways how to encode bibliographic and authority and distributed global content shared amongst
data expert metadata to be understood by the many such records. If this is a truly different
machines, enabling their transformation into new species, then the traditional library record based
uses and services. on the catalogue card has become extinct. The
Dunsire takes for an example a sentence This Semantic Web will allow machines to create a
presentation - has creator - Gordon Dunsire metadata record for a particular resource just-in-
expressed as an RDA triple (statement in the form time- and on-the-fly, rather than have static records
of subject-predicate-object expressions), which, to just-in-case. The benefits of metadata creation and
be fully machine-processed requires three URIs maintenance by information professionals will be
embedded in an RDA/XML syntax. He further available to all (Dunsire, 2009, p. 11).
explains the process in the following way:

In RDF, the things requiring identification or URIs conclusIon


are the specific classes, properties, and instances
associated with RDF subjects, predicates, and The turbulence of the past twenty years expressed
objects. In the example triple given above, the in the need to chart unknown territories of the
subject This presentation has an electronic newly emerging bibliographic universe seems
location given by the URL http://cdlr.strath.ac.uk/ to be stabilized. What that period proved was
pubs/dunsireg/AKM2008.pps. The predicate has that the breakthrough in theory, research and,
creator uses a property creator already defined indeed, practice owned its strength in building
in the Dublin Core metadata format with a URI on the continuation with tradition (Svenonius).
http://purl.org/dc/terms/creator. And the object Therefore, it is expected that development in the
instance Gordon Dunsire has an entry in the field of authority control, and wider, in the field
Library of Congress Name Authority File which of Universal Bibliographic Control as such, will
has been made available on the Web by OCLC go in the direction of bringing newly developed
conceptual models, bibliographic standards, and

199
Name Authority Control Paradigm Shift in the Network Environment

content of national and international catalogues Delsey, T. (1980). IFLA Working Group on an
into a semantic web environment. International Authority System: A progress report.
The direction for the future work has been International Cataloguing, 9(January/March),
shown: obviously, it is not so direct and easily 1012.
attained, but it is built on sound foundations. How-
Delsey, T. (1989). Authority control in an interna-
ever, it could happen that real life forces which
tional context. Cataloging & Classification Quar-
often cannot be controlled could impede (again)
terly, 3(9), 1328. doi:10.1300/J104v09n03_02
the realization of the design of an information
system that aims at the ideal. It is now up to us, Delsey, T. (2004). Authority records in a networked
library professionals to visualize and realize new environment. International Cataloguing and
services for our users. Bibliographic Control, 4(33), 7174.
Dunsire, G. (2009). The Semantic Web and ex-
pert metadata: Pull apart then bring together:
reFerences
Presented at Archives, Libraries, Museums 12
Anderson, D. (1974). Universal Bibliographic (AKM12), Pore, Croatia, 2008. Retrieved March
Control: A long term policy, a plan for action. 25, 2009, from http://cdlr.strath.ac.uk/pubs/dunsi-
Mnchen, Germany: Verlag Dokumentation. reg/akm2008semanticweb.pdf

Avram, H. D. (1984). Authority control and its Durance, C. J. (1978). Whats in the name?
place. Journal of Academic Librarianship, 6(9), Summary of the workshop . In Whats in a name?
331335. Control of catalogue records through automated
authority files (pp. 225227). Vancouver, Toronto:
Beaudiquez, M., & Bourdon, F. (1991). Manage- University of Toronto Library Automation System.
ment and use of name authority files (personal
names, corporate bodies and uniform titles): Functional requirements for authority data: A
evaluation and prospects. Mnchen, Germany: conceptual model. (2009). G. Patton, (Ed.). IFLA
Saur. Working Group on Functional Requirements and
Numbering of Authority Records (FRANAR).
Bourdon, F. (1993). International cooperation Final Report, December 2008. Approved by the
in the field of authority data: an analytical study Standing Committees of the IFLA Cataloguing
with recommendations. Mnchen, Germany: Saur. Section and IFLA Classification and Indexing
Bourne, R. (Ed.). (1992). Seminar on Biblio- Section, March 2009. Mnchen, Germany: Saur.
graphic Records: proceedings of the Seminar held Functional requirements for bibliographic re-
in Stockholm, 15-16 August 1990. Mnchen, cords: Final report. (1998). IFLA Study Group
Germany: Saur. on the Functional Requirements for Bibliographic
Buchinski, E. J., Newman, W. L., & Dunn, M. J. Records. Mnchen, Germany: Saur. Retrieved
(1976). The automated authority subsystem at the March 25, 2009, from http://www.ifla.org/VII/
National Library of Canada. Journal of Library s13/frbr/frbr.pdf
Automation, 4(9), 279298. Gorman, M. (1978). The Anglo-American cata-
Clement, E. A. H. (1980). The automated authority loguing rules, second edition. Library Resources
file at the National Library of Canada. Interna- & Technical Services, 3(22), 209225.
tional Cataloguing, 4(9), 4548.

200
Name Authority Control Paradigm Shift in the Network Environment

Gorman, M. ([1979] 1982). Authority control in International Conference on National Bibliog-


the prospective catalog. In M. W. Ghikas (Ed.), raphies, Paris, 1977 (1978). Final report. Paris:
Authority control: The key to tomorrows catalog: UNESCO.
Proceedings of the 1979 Library and Information
International Meeting of Cataloguing Experts,
Technology Institutes (pp. 166-180). Phoenix,
Copenhagen, 1969: Report (1969). IFLA Annual.
AZ: Oryx Press.
Also published in: Report of the International
Gorman, M. (1998). The future of cataloguing Meeting of Cataloguing Experts, Copenhagen,
and cataloguers. International Cataloguing and 1969 (1970). Libri, 1(20), 105-132.
Bibliographic Control, 27(4), 6871.
International standard archival authority record
Guidelines for authority and reference entries for corporate bodies, persons and families:
(1984). Recommended by the Working Group ISAAR(CPF). (1996). Ottawa, Canada: Secretariat
on an International Authority System, approved of the ICA Commission on Descriptive Standards.
by the Standing Committees of the IFLA Section
Lubetzky, S. (1979). The traditional ideals of
on Cataloguing and the IFLA Section on Infor-
cataloging and the new revision . In Freedman,
mation Technology. London: IFLA International
M. J., & Malinconico, S. M. (Eds.), The nature
Programme for UBC.
and future of the catalog: proceedings of the
Guidelines for authority records and references ALAs Information Science and Automation Divi-
(2001). Revised by the Working Group on GARE sions 1975 and 1977 Institute on Cataloging (pp.
(Rev., 2nd ed.). Mnchen, Germany: Saur. 153169). Phoenix, AZ: Oryx Press.
Gull, C. D. (1969). The impact of electronics upon Lupe Cristn, A. (2008). Virtual International Au-
cataloguing rules. International Conference on thority File: Update 2008. SCATNews: Newsletter
Cataloguing Principles, Paris, 9th-18th October, of the Standing Committee of the IFLA Catalogu-
1961 (1969). Report (pp. 281-290). London: ing Section, 30, 23.
Clive Bingley.
Malinconico, S. M. (1975).The role of a machine
IFLA Cataloguing Section FRBR Working Group. based authority file in an automated bibliographic
(n.d.). Retrieved March 25, 2009, from http:// system. In Automation in Libraries: Papers
www.ifla.org/VII/s13/wgfrbr/ presented at the CACUL Workshop on Library
Automation, Winnipeg, June 22-23, 1974. Ottawa,
IFLA Meetings of Experts on an International
Canada: Canadian Library Association. Cited ac-
Cataloguing Code. (2009). Retrieved March 25,
cording to: Carpenter, M. & Svenonius, E. (Eds).
2009, from http://www.ifla.org/VII/s13/icc/
(1985). Foundations in cataloging: A sourcebook
International Conference on Cataloguing Prin- (pp. 211-233). Littleton, Co.: Libraries Unlimited.
ciples, Paris, 9th-18th October, 1961. (1963).
Malinconico, S. M., & Rizzolo, J. A. (1973). The
Report. London: International Federation of
New York Public Library automated book catalog
Library Associations. Reprinted in: International
subsystem. Journal of Library Automation, 1(6),
Conference on Cataloguing Principles, Paris,
336.
9th-18th October, 1961 (1969). Report. London:
Clive Bingley.

201
Name Authority Control Paradigm Shift in the Network Environment

Mandatory data elements for internationally Statement of Principles adopted at the Interna-
shared resource authority records: Report of the tional Conference on Cataloguing Principles
IFLA UBCIM Working Group on Minimal Level Paris, October, 1961. (1971). Annotated ed. with
Authority Records and ISADN. (1998). Frunkfurt/ commentary and examples by Eva Verona assisted
Main, Germany: IFLA Universal Bibliographic by Franz Georg Kaltwasser, P.R. Lewis, Roger
Control and International MARC Programme. Pierrot. London: IFLA Committee on Cataloguing.
RetrievedMarch25, 2009, fromhttp://www.ifla.
Svenonius, E. (2000). The intellectual foundation
org/VI/3/p1996-2/mlar.htm
of information organization. Cambridge, MA:
Manual, U. N. I. M. A. R. C. Authorities Format. The MIT Press.
(2001). (2nd rev. & enlarged ed.). Mnchen, Ger-
Taylor, A. G. (1984). Authority files in online
many: Saur.
catalogs: an investigation of their value. Cata-
Manual, U. N. I. M. A. R. C. Authorities Format. loging & Classification Quarterly, 3(4), 117.
(2009). (3rd ed., ed. by Mirna Willer). Mnchen, doi:10.1300/J104v04n03_01
Germany: Saur.
Taylor, A. G. (1989). Research and theoretical
Murtomaa, E., & Greig, E. (Eds.). (1994). Prob- considerations in authority control. Catalog-
lems and prospects of linking various single- ing & Classification Quarterly, 3(9), 2956.
language and/or multi-language name authority doi:10.1300/J104v09n03_03
files: Notes. International Cataloguing and Bib-
Tillett, B. B. (2004). Authority Control: State of
liographic Control, 3(23), 55- 58.
the Art and New Perspectives. In A.G. Taylor &
Oddy, P. (1986). Name authority files. Catalogue B. B. Tillett, (Eds.), Authority control in organiz-
& Index, 82(Autumn), 1 & 3-4. ing and accessing information: Definition and
international experience (pp. 23-57). Binghamton,
Patton, G. (2004). FRANAR: A conceptual model
NY: Haworth Information Press. DOI 10.1300/
for authority data. In Taylor, A.G. & Tillett, B. B.
J104v38n03_04
(Eds), Authority control in organizing and access-
ing information: Definition and international ex- Tillett, B. B. (2008). A Review of the Feasibility of
perience (pp. 91-104). Binghamton, NY: Haworth an International Standard Authority Data Number
Information Press. DOI 10.1300/J104v38n03_09 (ISADN). Prepared for the IFLA Working Group
on Functional Requirements and Numbering of
Plassard, M.-F., & McLean Brooking, D. (Eds.).
Authority Records, edited by Glenn E. Patton, 1
(1993). UNIMARC/CCF: proceedings of the Work-
July 2008. Approved by the Standing Committee
shop held in Florence, 5-7 June 1991. Mnchen,
of the IFLA Cataloguing Section, 15 September
Germany: Saur.
2008. Retrieved March 25, 2009, from http://
Report of the International Meeting of Catalogu- www.ifla.org/VII/d4/franar-numbering-paper.pdf
ing Experts, Copenhagen, 1969 (1970). Libri,
UNIMARC/Authorities. Universal format for
1(20), 105-132.
authorities. (1991). Recommended by the IFLA
Statement of international cataloguing principles. Steering Group on a UNIMARC Format for Au-
(2009, February). Retrieved March 25, 2009, from thorities, approved by the Standing Committees of
http://www.ifla.org/VII/s13/icp/ the IFLA Section on Cataloguing and Information
Technology. Mnchen: Saur.

202
Name Authority Control Paradigm Shift in the Network Environment

Verona, E. (1983). Pravilnik i prirunik za izradbu Willer, M. (2004). UNIMARC format for authority
abecednih kataloga. 2. dio: Kataloni opis. Za- records: Its scope and issues for authority control.
greb, Croatia: Hrvatsko bibliotekarsko drutvo. In A.G. Taylor, & B. B. Tillett, (Eds.), Authority
control in organizing and accessing information:
VIAF. Virtual International Authority File. (n.d.).
Definition and international experience, (pp.
Retrieved June 16, 2009, from http://www.oclc.
153-184). Binghamton, NY: Haworth Information
org/research/projects/viaf/
Press. DOI 10.1300/J104v38n03_14
Vrbanc, T. (2007). Choice of author headings
Willer, M. (2007). IFLA UBCIM Working Group
for finite internet resources. In M. Willer & A.
on FRANAR recommendations for potential
Barbari (Eds.), Meunarodni skup u ast 100-te
changes in the UNIMARC Authorities format. In
godinjice roenja Eve Verona, Zagreb, 17.-18.
Plassard, M.-F. UNIMARC & friends: Charting
studenoga 2005. = International Conference in
the new landscape of library standards: Pro-
Honour of the 100th Anniversary of Eva Veronas
ceedings of the International Conference held in
Birth, Zagreb, November 17-18, 2005 (pp. 459-
Lisbon, 20-21 March 2006 (pp. 61-68). Mnchen,
475). Zagreb, Croatia: Hrvatsko knjiniarsko
Germany: Saur.
drutvo = Croatian Library Association.
Willer, M. (2009, in press). Third edition of UNI-
Willer, M. (1994). UNIMARC/Authorities: A new
MARC Manual: Authorities Format: Implement-
tool towards standardization. In M.-F. Plassard
ing concepts from the FRAD model and IME ICC
& M. Holdt, (Eds.), UNIMARC and CDS/ISIS:
Statement of International Cataloguing Principles.
Proceedings of the Workshops Held in Budapest,
In International Cataloguing and Bibliographic
21-22 June 1993 and Barcelona, 26 August 1993,
Control, 4(38).
(pp. 19-36). Mnchen, Germany: Saur. The paper
was also presented at the following seminars orga-
nized by IFLA UBCIMP Office: UBC/UNIMARC:
A seminar on Universal bibliographic Control key terms And deFInItIons
and UNIMARC, Lietuvos Nacionalnie Martyno
Mazvydo Biblioteka, Vilnius, 2- 4 June 1994, Access Point: A name (of a person, corporate
Lithuania; UNIMARC Workshop Crimea 95, body, work), term etc., under which a bibliographic
Jevpatoria, Ukraine, 12-16 June 1995; IFLA or authority machine readable record may be
International Seminar Authority Files: Their searched. The word access point may also be
Creation and Use in Cataloguing, St. Petersburg, used in terms such as authorized access point
October 3-7, 1995. For reports see International or variant access point to refer to the status or
Cataloguing and Bibliographic Control. function of the access point in the automated,
online catalogue. See also Heading.
Willer, M. (1999). Formats and cataloguing Authority Control: A mechanism for creat-
rules: developments for cataloguing electronic ing consistency in a library catalogue, i.e. library
resources. In Program, 1(33), 41-55. information system.
Authority Entry/Record: An entry in a card
catalogue for which the organizing element is
a uniform heading for an entity such as person,
corporate body or work. In an automated, online
catalogue it is a record in an authority file for
which the organizing element is the authorized

203
Name Authority Control Paradigm Shift in the Network Environment

access point. There is a change in terminology, but ritory and give it to other agencies for use. The
the function is the same in both types of technical aim is to record all publications worldwide for the
implementations of the catalogue. advancement of human knowledge, understanding
Cataloguing Principles: Objectives that gov- and wellbeing.
ern design of a system, i.e., a library catalogue.
Heading: An initial element of an authority
entry, used as the principal filing element in a endnotes
(card) catalogue, bibliography or index. The word
heading is also be used in terms such as uniform
1
The second part of the Meeting was dedicated
heading or variant heading to refer to the status to the definition of standard bibliographic
or function of the heading in the catalogue. See description, ISBD.
also Access point.
2
National Yugoslav cataloguing code at the
FRAD: Functional Requirements for Author- time, now national Croatian code.
ity Data, a conceptual entity-relational model in
3
Oddy builds her arguments on the example
which each authority data element, its attributes of the cooperative system Washington, later
and relationships are linked to a specified user task. Western-Library Network which provided
FRBR: Functional Requirements for Biblio- automated authority control systems rather
graphic Records, a conceptual entity-relational than card or fiche products (Oddy, 1986,
model in which each bibliographic data element, p. 4).
its attributes and relationships are linked to a
4
For problems of the choice of author head-
specified user task. ings regarding the sources of information
IFLA: International Federation of Library and different types of authorship in finite
Associations and Institutions, a body in charge internet resources, see for example Vrbanc,
of issuing international standards, guidelines and 2007.
rules in the field of librarianship, accepted as a
5
The archival community is introduced here
basis for national practices in the field of wide because the WG on MLAR and ISADN
range of library functions, such as cataloguing. consulted with the representative from
Identification Authority Record: A record International Council on Archives/Com-
that contains authorized form of the entity with mission on Descriptive Standards (ICA/
additional data elements such as qualifiers, notes CDA). Namely, the first edition of ICA/CDA
and references which disambiguate it from other standard parallel to the Guidelines had been
entities within the catalogue making it thus ap- published in 1996: International standard
plicable for re-use in other contexts. archival authority record for corporate bod-
Name Authority Control: Authority control ies, persons and families: ISAAR(CPF).
over names of persons, corporate bodies, fami-
6
The navigation objective could be traced to
lies, titles of works. The term does not include Seymour Lubetzkys concept of the syndetic
the control over topical subjects, for which term structure of the catalogue (Lubetzky, 1979).
subject authority control is used. It implies 100%
7
See Svenoniuss analysis of open-ended
precision and recall in searching an information objectives (Svenonius, 2000, pp. 22-23).
system (catalogue), although not always attained.
8
See FRBR Working Group website at: IFLA
Universal Bibliographic Control (UBC): Cataloguing Section FRBR Working Group
International agreement that each national biblio- at http://www.ifla.org/VII/s13/wgfrbr/
graphic agency create bibliographic and authority
9
The proposal (2008/27) for this new field,
records for the book production within its ter- 003, was prepared for the IFLA Permanent

204
Name Authority Control Paradigm Shift in the Network Environment

UNIMARC Committee by the Comit fran- 10


The identifier corresponds to the new field
ais UNIMARC with the commentary that in the 3rd edition of UNIMARC Manual:
it will allow one to point directly on the Authorities Format, i.e. 003 Persistent
record in the catalogue from any quotation Record Identifier: 003 http://errol.oclc.org/
on the Web; it can be used in bibliographies laf/nb2001-72552.html available from the
and quotations, etc. OCLC LAF: Linked Authority File.

205
Chapter 13
Prevention and Regulation
of Cyber-Crimes in the
Age of Terrorism:
The Legal and Policy Model from India
S.R. Subramanian
Hidayatullah National Law University, India

AbstrAct
India is the 12th nation in the world to have a special system of laws addressed to the information tech-
nology sector. Besides the general criminal law of the country, the Information Technology Act, 2000
incorporates a special legal framework relating to cyber-crimes. Looking differently, India is also a
global hub of information technology and its allied services. Accordingly, the growth and development
of the information technology sector and its contribution to national economy is phenomenal. It is in
this context, the chapter examines and analyses the Indian ICT laws and policies in the backdrop of
cyber-crime prevention and regulation, with the aim of offering a comprehensive model of ICT policy.
It will discuss the extent of legal framework in the light of classification and criminalization of various
cyber-crimes. Also, while examining the policy instruments, it will bring out the public and private initia-
tives on protection of information infrastructures, incident and emergency response and the innovative
institutions and schemes involved.

IntroductIon offences, a number of traditional crimes such as


theft, fraud and conspiracy can also be committed
The unprecedented growth and development of via the internet. In other words, internet can be the
information and communication technology (ICT) subjects of crime, it can be the site of a crime and
along with the open and hitherto unregulated nature it can also be a tool through which crimes can be
of the internet and the anonymous feature of inter- committed (Kamath (2005). With the exponential
net activities acted as the safe heaven for criminal increase in internet-related crimes, both in terms
purposes. Besides a new range of technological of number and sophistication, cyberspace present
new challenges to the security and stability of the
DOI: 10.4018/978-1-61692-012-8.ch013

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

internet and raise serious concerns for policymak- the law was woefully inadequate to deal with the
ers and other stakeholders at all levels. vital issues like cyber-terrorism, not to speak
However, cyber-crime is a new discipline and of the onerous challenges of use of internet for
hence the legal response to these rapidly growing terrorist purposes.
illegal activities is still in the process of emerging. It is in this context, the chapter examines and
The dilemma of cyber-crime regulation is that it is analyses the Indian ICT laws and policies in the
caught between two diametrically opposite legal backdrop of cyber-crime prevention and regula-
approaches (Gelbstein and Kurbalija (2005). The tion, with the aim of offering a comprehensive
real law approach, on the one hand, considers model of ICT policy. It will discuss the extent of
the internet as a natural evolution of existing legal framework in the light of classification and
technologies like telegraph and hence extends the criminalization of various cyber-crimes. Also,
application of prevalent legal rules to the inter- while examining the policy instruments, it will
net. On the other hand, the cyber law approach bring out the public and private initiatives on
treats the internet as sui generis development and protection of information infrastructures, inci-
believes that it can only be regulated by special dent and emergency response and the innovative
laws. Nonetheless, the practice of most govern- institutions and schemes involved.
ment is that the existing law can be applied to
the problems of internet, with varying levels of
modifications. cyber-crImInAl lAw In IndIA
However, the major challenge in regulating the
cyber-crime is not the multiple categories or the India is the 12th nation in the world to have a
magnitude of crimes, but that the law is inadequate special system of laws addressed to the infor-
to deter and prevent further violations. Hence, mation technology sector (Regulatory norms,
the investigation, prosecution and enforcement 2006). Recognizing the potential contributions
of cyber-crime is an enormous challenge for any the information technology sector can make to
criminal justice machinery. Moreover, the global the socio-economic development of the country,
phenomenon of the cyberspace also adds to the ju- the legislation sought to create an environment for
risdictional quagmire of the internet (Rao, (2004). electronic commerce. It also incidentally crimi-
This underlines the significance of the continual nalizes and punishes certain conduct prohibited
update of law and policies to keep pace with the under the law. These provisions are in addition to
latest technological developments to prevent it the general criminal law contained in the Indian
from being obsolete. Penal Code, 1860, itself amended by the Informa-
India is a global IT player and is a pioneer in the tion Technology Act, 2000. Most importantly, a
field of cyber-law, having brought the Information thorough overhaul of cyber-criminal law, inter
Technology Act in the year 2000. However, the alia, has taken place through the Information
Information Technology Act, 2000 was heavily Technology Amendment Act, 20081.
criticized for improper treatment of cyber-crime.
Even as the Statement of Objects and Reasons of contraventions
the enactment claim, the law creates an enabling
environment for electronic commerce and only The law vertically classifies the cyber-crimes
incidentally addresses the issues of cyber-crime. into two types: contraventions and information
Until the passage of Information Technology technology offences. While contraventions will
(Amendment) Act, 2008 (Act No. 10 of 2009), attract financial sanctions in the form of com-

207
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

pensation, information technology offences are offence under Section 65, currently it merely
punishable with the sentence of imprisonment and/ constitutes a Contravention, especially, when
or fine. Chapter IX provides for Contraventions. there is no legal requirement to keep or maintain
Section 43 of the above Chapter stipulates that the computer source code. It is submitted that the
the following acts are contraventions when done current scheme of classification is more in tune
without the permission of the owner or any other with the principle of proportionality of crime.
person who is in charge of a computer, computer
system or computer network: data Protection

1. Accessing or securing access to the computer India is the global hub of information technology
or computer resource outsourcing. Hence, to maintain leadership, it is
2. Downloading, copying or extracting any data an imperative that it offers a system of robust data
or information from the computer network protection to the Indian corporate clients. The
3. Introducing or causing to be introduced any newly-inserted Section 43A provides that where
computer contaminant or computer virus a commercial organization possessing, dealing
into the computer or network or handling any sensitive data or information
4. Damaging or causing to be damaged the in a computer resource which it owns, controls
computer or any other programmes residing or operates, is negligent in implementing and
in that computer maintaining reasonable security practices and
5. Disrupting or causing the disruption of the procedures and thereby causes wrongful loss or
computer wrongful gain to any person, such organization
6. Denying or causing the denial of access to any shall be liable pay compensation to the person
person authorized to access the computer/ so affected.
network by any means It is also clarified in the legislation that for the
7. Providing assistance to any person to facili- purposes of data protection, reasonable security
tate access to the computer in contravention practices and procedures (required to be adopted
of law by the corporate organizations) would mean
8. Charging the services availed of by a person those security practices and procedures designed
to the account of another person by tamper- to protect such information from unauthorized
ing with or manipulating any computer etc. access, damage, use, modification, disclosure
or impairment, as may be specified in the agree-
Prior to the Amendment of 2008, hacking with ment between the parties or any law for the time
computer system was punishable as an offence being in force or in their absence, any reasonable
under Chapter XI, Section 66. However, taking security practices and procedures prescribed by
into account the expert opinion that this provi- the Central Government in consultation with the
sion may be used for unintended purposes, the professional bodies or associations. It is hoped
Amendment has relegated the crime of hacking to that this new protection together with the pro-
the class of Contraventions and listed it as clause visions relating to confidentiality, privacy and
(i) to Section 43 (Duggal, (2005). Similarly, the other cyber-security provisions will mitigate the
Amendment brought another change with refer- problems associated with the data protection and
ence to the tampering of computer source code. will enable India to compete with other leading
Though this crime was earlier punishable as an destinations of outsourcing.

208
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

InFormAtIon tecHnology a term which may extent to three years and


oFFences with fine (Section 66A). The criticism that
in India the cyber-crime is a crime without
Chapter XI deals with the acts which are punish- penalty with reference to a host of crimes
able as information technology offences. While such as cyber-defamation, cyber-stalking,
some of these offences are substantive, others are cyber-nuisance, cyber-fraud and cyber-
procedural in nature. harassment has been addressed through this
new provision.
1. Source code attacks: If any person with the 4. Dishonestly receiving stolen computer
knowledge or intention conceals, destroys or resource: Whoever dishonestly receives or
alters or causes another to conceal, destroy retains any stolen computer resource or com-
or alter any computer source code used for munication device knowing or having reason
a computer, computer programme, computer to believe the same to be stolen computer
system or computer network, when the com- resource or communication device, shall
puter source code is required to be kept or be punished with imprisonment of either
maintained by law for the time being in force, description for a term which may extend to
shall be punishable with imprisonment up to three years or with fine which may extend to
three years, or with fine which may extend rupees one lakh or with both (Section 66B).
up to two lakh Indian rupees, or with both 5. Identity theft: Any person who with fraudu-
(Section 65). lent or dishonest intention makes use of the
2. Computer-related Offences: The contra- electronic signature, password or any other
ventions referred to in Section 43 committed unique identification feature of any other
with dishonest or fraudulent intention are person, shall be punished with imprisonment
punishable with imprisonment for a term for a term which may extend to three years
which may extend to three years or fine up and shall also be liable to fine which may
to five lakhs or both (Section 66). The pre- extend to rupees one lakh (Section 66C).
amendment version of the computer hacking 6. Phising: The stealing of sensitive informa-
is currently categorized as contraventions. tion of the net users by posing as trustworthy
3. Sending offensive messages: Any person websites is popularly known as phising. The
who sends by means of a computer resource Act stipulate that whoever by means of any
or a communication device a) any informa- communication device or computer resource
tion that is grossly offensive or has menac- cheats by personation, shall be punished with
ing character or b) any information which imprisonment of either description for a term
he knows to be false, but for the purpose of which may extend to three years and shall
causing annoyance, inconvenience, danger, also be liable to fine which may extend to
obstruction, insult, injury, criminal intimida- one lakh rupees (Section 66D).
tion, enmity, hatred, or ill-will persistently by 7. Invasion of privacy: Whoever, intention-
making use of such computer resource or a ally or knowingly captures, publishes or
communication device c) any electronic mail transmits the image of a private area of any
or electronic mail message for the purpose person without his or her consent, under
of causing annoyance or inconvenience or circumstances violating the privacy of that
to deceive or to mislead the addressee or person, shall be punished with imprisonment
recipient about the origin of such messages which may extend to three years or with fine
shall be punishable with imprisonment for not exceeding two lakh rupees or with both.

209
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

The striking feature of the provision is that the security of the State, friendly relations
the crime is committed not only when the with foreign States, public order, decency or
image is captured in the form of photograph morality, or in relation to contempt of court,
but it would include videotaping, filming defamation or incitement to an offence, or to
or recording through any other means. The the advantage of any foreign nation, group
expression circumstances violating the pri- of individuals may also committing the of-
vacy is also expansively defined to include fense of cyber-terrorism. It is provided that
not only the circumstances in which a person both the offenses of cyber-terrorism and the
can have a reasonable expectation that he or conspiracy to commit cyber-terrorism are
she could disrobe in privacy, but also when punishable with imprisonment which may
he or she would reasonably expect that his extend to imprisonment for life. The quantum
or her private area would not be visible to of sentence for the offence of cyber-criticism
the public, regardless of whether that person was criticized as being disproportionate to
is in a public or private place (Section 66E). the severity of the crime. However, the draft-
8. Cyber-terrorism: It is alleged that the ers might have considered that the prescrip-
immediate trigger for the passage of tion of death penalty for the crime will be a
Amendment Act was the 26/11 Mumbai at- hindrance to the international cooperation
tacks (Duggal, (2005)2. The Act criminalized such as mutual legal assistance and extradi-
cyber-terrorism with punishment up to life tion. It is submitted that death sentence is a
imprisonment. According to Section 66F, ground for refusal of cooperation in major
cyber-terrorism can be committed in three international frameworks.
ways. It may be due to 1) denial of access 9. Cyber-obscenity: The post-Amendment law
or 2) unauthorized penetration or access of distinguishes between cyber-obscenity and
computer resource or 3) through introduc- cyber-pornography. According to Section
tion of any computer contaminant. The level 67, the publication or transmission of any
of intention that is required to commit any material which is lascivious or appeals to
of the above acts is such as to threaten the the prurient interest or if its effect is such
unity, integrity, security or sovereignty of as to tend to deprave and corrupt persons
India or to strike terror in the people or any who are likely, having regard to all relevant
section of them. However, the offence of circumstances, to read, see or hear the mat-
cyber-terrorism would not be made unless the ter contained or embodied in it. The crime
conduct actually or in any likelihood causes attracts the punishment of imprisonment of
the death or injuries to persons or damage three years and fine which may be up to five
to or destruction of property or disrupts or lakhs on first conviction and in the event
knowing that it is likely to cause damage or of a second or subsequent conviction with
disruption of supplies or services essential imprisonment of five years and fine which
to the life of the community or adversely may extend to ten lakhs rupees.
affect the critical information infrastructure. 10. Cyber-pornography: The publication or
Alternatively, where unauthorized or excess transmission of any material which con-
of authority in the penetration or access of tains sexually explicit act or conduct in
information or data is concerned with the electronic form constitutes the offence of
security of State or friendly or foreign rela- cyber-pornography. It shall be punishable
tions or likely to cause injury to the interests on first conviction with imprisonment of
of the sovereignty and integrity of India, either description which may extend to five

210
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

years and with fine which may extend to ten Powers for enforcement of
lakhs rupees and in the event of second or cyber-security measures
subsequent conviction with imprisonment
of either description for a term which may Besides criminalization of these conducts, the
extend to 7 years and also with fine which Indian law also empowers the appropriate of-
may extend to ten lakh rupees. However, as ficials with the powers to prevent, investigate,
is the case with the obscenity in the physical detect and prosecute the cyber-criminals. It is
world, cyber-pornography excepts certain the conferment of these powers without proper
material, act or conduct from its purview. safeguards, though with enumeration of grounds
They are ranging from literary, to artistic of exercise of power, which have proved to be
to religious purposes (Section 67A). very controversial.
11. Cyber-pornography of children: Whoever,
a) publishes or transmits or causes to be 1. Powers to intercept, monitor and decrypt
published or transmitted material in any (Section 69): The Indian law provides that
electronic form which depicts children the appropriate government or its officers
engaged in sexually explicit act or conduct have the powers to direct, any agency of
or b) creates text or digital images, collects, the government, to intercept, monitor, or de-
seeks, browses, downloads, advertises, crypt any information transmitted, received
promotes, exchanges or distributes material or stored through any computer resource.
in any electronic form depicting children However, having regard to the nature of
in obscene or indecent or sexually explicit serious violations of the civil liberties that
manner or c) cultivates, entices or induces it may cause, this power can be exercised
children to online relationship with one or only when it is necessary in the interest of
more children for and on sexually explicit the sovereignty and security of India, defense
act or in a manner that may offend a rea- of India, security of the State, friendly rela-
sonable adult on the computer resource or tions with foreign states, or public order or
d) facilitates abusing children online or e) for investigation of any offense. Moreover,
records in any electronic form own abuse or the subscriber, or intermediary, or any person
that of others pertaining to sexually explicit in charge of any computer resource legally
act with children commits the offence of bound to provide access or secure access to
cyber-pornography of children. the computer resource generating, transmit-
12. Breach of confidentiality and privacy: ting, receiving or storing such information
The law provides that any person who has or to intercept, monitor or decrypt the infor-
secured access to any electronic record etc., mation or provide information stored in the
with the powers conferred under the law but computer resource.
without the consent of person concerned, 2. Powers to block public access of informa-
discloses such material to any other person tion (Section 69A): The Central govern-
shall be punished with imprisonment for a ment or any of its officers by order direct
term which may extend to two years, or with any agency of the Central government or
fine which may extend to one lakh rupees, intermediary to block access by the public
or with both. or cause to be blocked for access by public,
any information generated, transmitted,

211
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

received, stored, hosted in any computer re- legal measures (Sadowsky, Dempsey, Greenberg,
source. This power can be invoked only when Mack, and Schwartz, (2003).
it is necessary or expedient in the interest of
sovereignty and integrity of India, defense governmental Policies
of India, security of the State, friendly rela-
tions with foreign states, or public order or The government formulates policy not only for the
for preventing incitement of commission of protection its own assets, but it has the obligation
any cognizable offense relating to them. to design the policy for protecting the national
3. Powers to monitor and collect traffic data information infrastructure (Sadowsky et al. (2003):
(Section 69B): The Central government
in order to enhance cyber-security and for Protection of Critical Information
identification, analysis and prevention of Infrastructure: The governmental re-
any intrusion or spread of computer con- sponse to the problems of cyber-security led
taminant in the country, by notification in to the classification of critical information
the Official Gazette, authorize any agency of infrastructure. There are certain computers
the government to monitor and collect traffic and networks, whether in government or
data or information generated, transmitted, with the private enterprises, which are of
received or stored in any computer resource. critical importance to the nation and those
Moreover, the intermediary or the person in systems deserve the top-most attention.
charge of the computer resource when called However, there is no uniform concept of
upon by the agency is under the legal duty to critical information infrastructure through-
provide technical assistance to enable online out the world. The original Information
access, or to secure and provide online ac- Technology Act, 2000 does not define what
cess, to the computer resource generating, a critical information infrastructure is. The
transmitting, receiving or storing such traffic newly-added Explanation to Section 70
data or information. of the Information Technology Act, 2000
meant them to be any computer resource,
cyber-securIty the incapacitation or destruction of which
PolIcIes In IndIA shall have debilitating impact on national
security, economy, public health or safety.
Though criminalization and prescription of de- Protected Systems: Section 70 provides
terrent punishment is an imperative for an effec- that the appropriate government, wheth-
tive system of cyber-crime free world, security er Central or State, by notification in the
in cyberspace can not be brought out by legal Official Gazette, declare any computer re-
measures alone. The laws and regulations need source which directly or indirectly affects
to be supplemented by the policies of govern- the facility of critical information infra-
ment and other stakeholders in the areas of the structure to be a protected system. It will
protection of critical information infrastructure, also specify the persons who can access the
best practices and procedures, incident and emer- protected system. If anyone accesses those
gency responses, data protection etc. While law systems in contravention of the above legal
comes into play only after the irreversible is done, provision, the violator shall be punished
policy has a huge potential for prevention. This with imprisonment for a term which may
emphasizes the right mix of both legal and non- extend to ten years and shall also be liable
to fine. The Central government will also

212
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

prescribe the information security practices corporates have taken a number of significant
and procedures for such protected system. initiatives. NASSCOM, the national association
National nodal agency: The Central gov- of software and services companies, headquartered
ernment will also designate an existing in Mumbai, is the premier trade body and the
organization of the government as the na- chamber of commerce of the IT-Business Process
tional nodal agency for the protection of Outsourcing industries in India (About NASS-
critical information infrastructure. It will COM, 2009). It comprises of not only the Indian
be performing all the functions relating companies but also the multi-national corporations
to the protection of such infrastructure in- having a commercial presence in India (About
cluding research and development. NASSCOM, 2009). NASSCOM is instrumental
Indian Computer Emergency Response in ensuring that the Indian information security
Team (CERT-IN): The Central govern- environment benchmarks with the best across the
ment had notified the Indian Computer globe (Information Security Environment, n.d).
Emergency Response Team as the national Besides creating an information security culture
agency for incident response. It was offi- within the industry, it has also been interacting
cially inaugurated on 19th January, 2004. with the government on the creation of appropriate
It operates under the auspices of, and with regulatory environment which will strengthen the
the authority delegated by the Department initiatives from the industry (Information Security
of Information Technology, Ministry Environment, n.d).
of Communications and Information
Technology, Government of India (CERT- NASSCOMs Security Initiatives:
In, 2009). To ensure cyber-security of com- NASSCOM, in its quest to integrate the
munication and information infrastructure, robust information security environment
it performs the functions of a) collection, within the industrial layers, initiated a di-
analysis and dissemination of cyber-in- verse range of measures (Overview, 2006).
cidents b) forecasts and alerts of cyber- They are: a) Creating awareness with
security incidents c) emergency measures relevant stakeholders i.e., it is popular-
for handling cyber-security incidents d) izing the need, the legal requirement and
coordination of cyber-incidents response the benefits of security practices among
activities and e) issue guidelines, adviso- the information technology and related
ries, vulnerability notes, white papers re- companies b) Setting guidelines: i.e., it
lating to information security practices, advises member-companies in complying
procedures, prevention and response and with the norms of leading security regimes
reporting of cyber-incidents. including the Gramm-Leach-Bliley Act
(GLBA), Health Insurance Portability and
corporate Policies Accountability Act (HIPAA) and Sarbanes-
Oxley Act c) Defining standards: it seeks
However, effective cyber-security can not be to establish high standards of security re-
ensured through legislative and governmental poli- quired by the customers throughout the
cies alone3. True to this, a distinguishing feature world d) Security education: i.e., it cre-
of the Indian environment is that the corporates, ates the model curriculum sensitized to
especially the IT and IT-related companies vol- the requirements of security and will train
untarily consider it as the imperative of the suc- the entire range of personnel including
cess of their businesses. To this end, the Indian IT professionals, support staff, security

213
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

staff and audit and certification officials e) (NASSCOM, 2008). It is conceived out of
Certifications: it tries to introduce certi- the Cyber Safety Week organized jointly
fication procedures f) Shared services: it by the Mumbai Police and the NASSCOM
also offers a set of services for the benefit in 2003. These labs provide the opportu-
of all the members such as, verification of nity for the police officials to receive a
employees background and profiles etc week-long training at the hands of member
(Overview, 2006). companies (NASSCOM, 2008). The areas
According to NASSCOM, the follow- of training, according to the Associations
ing four initiatives and programs merit report, computer operations, digital stor-
special attention: age, forensic techniques, legal provi-
4E Framework: The 4 Es are, namely, sions, crime modus operandi, case stud-
Engagement, Education, Enactment ies and procedural practices. Besides the
and Enforcement. expansion of the concept to major cities
1. Engagement: NASSCOM in India, through outreach and outstation
strives to engage a rage of actors programmes the training was also offered
including government organiza- to other officials of the banking sector, stu-
tions, other industrial organiza- dents, military officers and in other loca-
tions, think tanks and universities. tions (NASSCOM, 2008)
For instance, it partners with National Skills Registry for IT and IT
the Department of Homeland Enabled Services (ITES) profession-
Security, Federal Reserve Board als5: This third major initiative of the
and Carnegie Mellon University Association ensures that the unscrupulous
etc (4E Initiative, 2008). persons are not appointed by the member
2. Education: As mentioned above, companies across the industry. This pro-
it seeks to educate all the relevant gram sees that the individuals employed
stakeholders to achieve a higher by the organizations have their background
level of security. and antecedents verified to avoid the
3. Enactment: It also engages the chances of prevention of fake job resumes
law-makers and policymakers (National Skills Registry, 2007). The ma-
so that they attach due signifi- jor advantages of this unique scheme are:
cance to the cyber-law making a) theft of data by the employees b) en-
and implementation process (4E hances the trust and confidence of the cli-
Initiative, 2008). ents d) when the employee attrition rate is
4. Enforcement: NASSCOM very high due to the size of the industry etc
regularly in touch with the entire it helps to collect the data of who is com-
criminal justice machinery so that ing in and who is going out e) reduction of
the laws and policies made are the cost of the profile verification in view
strictly enforced (4E Initiative, of centralization f) standardization of em-
2008). ployee verification process to deliver con-
India Cyber Lab4: The second major ini- sistent results across the industry (National
tiative of the NASSCOM was the India Skills Registry, 2007).
Cyber Lab, which is hailed as the inno- National Skills Registry (NSR) process:
vative arrangement between the police The scheme allows the employees to access
and the information technology industry the publicly-available national skills regis-

214
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

try website and upload the relevant data of by the partners and clients of NASSCOM, the
personal identification, educational back- major drawback of the initiative is that it is just
ground, employment profile and biometric registered as a not-for-profit institution and lacks
piece of evidence. This information is sub- the legal powers to enforce the security standards.
jected to verification by the Empanelled However, with the adoption of progressive en-
Background Checking Companies (EBC), forcement standard as the guiding principle of the
which is independent from the NASSCOM Data Security Council of India, it is hoped that
and its member companies. These details a binding mechanism will be in place in future7.
are accessible only to the employee and
the subscriber-employer when authorized
by the employee. The NSR website is host- conclusIon
ed and maintained by the NSDL Database
Management Limited (NDML), a subsid- India has taken a number of initiatives to promote
iary of the National Securities Depository electronic commerce and to fight various criminal
Limited (NSDL). NSDL is a high-profile misbehaviors on the internet. The recent Amend-
organization which hosts the securities of ment has also undertaken a thorough overhaul of
investors (National Skills Registry, 2007). the legal provisions dealing with cyber-crimes.
Significantly, it has focused on strengthening the
data security council of India6 existing legal regime with additions of several
new offences. It is hoped that the law and policies
According to NASSCOM, the Data Security and their strict enforcement will ensure that the
Council of India born out of the recognition that cyber-crimes can be effectively tackled by the
the rigid security parameters fixed by the custom- law enforcement officials. At the same time, the
ers can not be met by an individual company and policy instruments of the business organizations
it requires industry-wide solution (Data Security and their apex bodies will allow for the good
Council, 2008). Moreover, the problem can not measure of self-regulation by the private busi-
solved by technology alone and the final solution ness houses and its employees. Though the first
to the issue of security is in the synergy of the three case of cyber-crime conviction was reported in
key resources: technology, people and business India way back in 2003, a substantial revision of
processes (Data Security Council, 2008). Also, the the penal provisions has happened only in 2009.
level of security to be achieved is the highest stan- Moreover, the major chunk of criminal prosecu-
dards as even a single instance of breach will have tions of cyber-crime still rely on the out-dated
the potential to tarnish the reputation of the entire general criminal law of the country, namely, the
industry both inside the country and overseas (Data Indian Penal Code (IPC), 1860, rather than the
Security Council, 2008). However, cost is also a Information Technology Act, 2000.
problem as many smaller companies are looking However, the strengthening of the hands of
for cost-effective solutions (Data Security Council, criminal justice officials is not wholly without
2008). This demonstrated the urgent need for an criticism. The biggest criticism of the Amendment
effective Self Regulatory Organization (SRO) to is the erosion of privacy and other civil liberties
establish, popularize, monitor and enforce data at the altar of national security. The free hand to
protection standards for the IT enabled industry monitor and intercept any information not only
((Data Security Council, 2008). on the grounds of national security but to carry
The Data Security Council of India became out investigation of any offence raises serious
a reality in April 2007. Though it is welcomed concerns of human rights violation. This is an

215
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

issue of enormous challenge and it is expected Indian Computer Emergency Response Team.
that appropriate safeguards will be incorporated (2006). Information Security Policy for Protection
to the mechanism in one way or the other. of Critical Information Infrastructure. New Delhi,
Despite the limitations and shortcomings of the India: Department of Information Technology,
law of cyber-crimes, the model of combination Government of India.
of public and private initiatives, especially the
Information Security Environment in India.
pioneering initiatives of the NASSCOM deserve
NASSCOM Analysis. (n.d). Retrieved March 18,
special attention. These developments highlight
2009, from http://www.nasscom.org/download/
the huge potential of self-regulation and prevention
Indian_Security_Envomt_05_06_Factsheet_Fi-
to combat the menace of cyber-crime. It is hoped
nal1.pdf
that the changes brought out by the Amendment
Act will provide the way for the effective prosecu- Information Technology Act. (2000). As amended
tion of cyber-criminals. Having placed the legal by the Act 10 of 2009.
provisions in place, India can aspire to evolve the
4EInitiative. (2008). Retrieved March 18, 2009,
model cyber-criminal jurisprudence in the country.
from http://www.nasscom.in/Nasscom/templates/
NormalPage.aspx?id=5954
reFerences Kamath, A. (2005). Law Relating to Computers,
Internet and E-Commerce: A Guide to Cyberlaws,
About, N. A. S. S. C. O. M. (2009). Retrieved & the Information Technology Act, 2000 with
March 18, 2009, from http://www.nasscom.in/ Rules and Notifications. Delhi, India: Universal
Nasscom/templates/NormalPage.aspx?id=5365 Law Publishing.
Bantekas, I., & Nash, S. (2007). International NASSCOM. (2008). NASSCOM 2007-08Annual
Criminal Law. Abingdon, UK: Routledge- Report. New Delhi: NASSCOM.
Cavendish.
National Skills Registry for IT/ITES Professional.
Cert-in is the official website of the Indian Com- (2007). Retrieved March 18, 2009, from http://
puter Emergency Response Team. (n.d.). Retrieved www.nasscom.in/Nasscom/templates/Normal-
from http://www.cert-in.org.in/ Page.aspx?id=51441
Data Security Council of India. (2008). Retrieved National Skills Registry for Knowledge Profes-
March 18, 2009, from http://www.nasscom.in/ sionals. (n.d). Retrieved March 18, 2009, from
Nasscom/templates/NormalPage.aspx?id=51973 http://www.nasscom.in/upload/29264/NSR_Ini-
Duggal, P. (2005). Cyber-crime in India: The tiative_Overview.pdf
Legal Approach . In R.G. Broadhurst & P.N. Overview. (2006). Retrieved Mach 18, 2009,
Grabosky, (n.d.), Cyber-crime: The Challenge from http://www.nasscom.in/Nasscom/templates/
in Asia (pp. 183196). Hong Kong: Hong Kong NormalPage.aspx?id=5957.
University Press.
Rao, J. S.V. (2004). Law of Cyber-crimes and Infor-
Gelbstein, E., & Kurbalija, J. (2005). Internet mation Technology Law. New Delhi: Lexis-Nexis.
Governance: Issues, Actors and Divide. Malta:
Diplo Foundation.

216
Prevention and Regulation of Cyber-Crimes in the Age of Terrorism

Regulatory Norms in Indian cyber-space. (2006). the website of www.dsci.in. The Act is yet
Retrieved March 18, 2009, from http://www. to be notified by the Central Government.
nasscom.in/Nasscom/templates/NormalPage. 2.
The Information Technology (Amendment)
aspx?id=6161 Bill, 2006 was pending for a long time with
the Parliament.
Sadowsky, G., Dempsey, J., Greenberg, A., Mack, 3.
Undoubtedly, self-regulation by the high-
B., & Schwartz, A. (2003). Information Technol-
tech industry can play an important role in
ogy Security Handbook. Washington, DC: The
preventing the proliferation of computer and
World Bank.
internet-related crime. (Bantekas, I & Nash
S. (2007). P. 73.
4.
The official website of the India Cyber Lab
key terms And deFInItIons is http://www.indiacyberlab.in. Also, http://
www.nasscom.in/Nasscom/templates/Nor-
Contraventions: The type of crime which are malPage.aspx?id=5952.
punishable only with financial sanctions under the 5.
The official website of the National Skills
Indian Information Technology Act, as against the Registry can be accessed at: https://nation-
other type of crime punishable with imprisonment. alskillsregistry.com/.
Cyber-Security: The protection of computer 6.
www.dsci.in is the official website of the
and its resources against unauthorized access. Data Security Council of India.
Data Protection: The protection of data, per- 7.
While self-regulatory mechanisms to
sonal or business, through legal, administrative, combat the misuse of the new technologies
technical and physical means to ensure that the have many advantages over the external
relevant information is not misused or abused. regulation, to be effective self-regulation
needs to be supported by appropriate national
legislation and international agreements.
endnotes (Bantekas, I & Nash S. (2007). P. 73.
1.
The official version of the Information Tech-
nology Amendment Act, 2008 is available at

217
218

Chapter 14
National Information
and Communication
Technology Policy Process
in Developing Countries
Edwin I. Achugbue
Delta State University, Nigeria

C.E. Akporido
Delta State University, Nigeria

AbstrAct
This chapter discusses national information and communication technology policy process in develop-
ing countries. It describes the need for information and communication technology policy, ICT policy
development process, national ICT policy in developing countries, the role of an ICT policy in the de-
veloping country, factors affecting the formulation of national ICT policies and the future of national
ICT policy was also discussed.

IntroductIon services. Lately, however, this view has given way


to an understanding of ICTs as essential compo-
Information and communication technologies nents of broader efforts to harness the free flow
(ICTs) have critical roles to play in development of information to increase voice, accountability,
efforts around the world. There was a time when and economic development. In recent years, de-
the benefits of applying ICTs in fighting poverty veloping countries have started taking concrete
and promoting economic growth were not widely actions to incorporate ICT into their national
understood. Many in the development community economic policies and development agendas.
questioned how high-tech (and often expensive) Many countries are preparing and implementing
communication technologies could be used to national ICT policies that emphasize the ubiquity
alleviate such dire challenges as starvation, home- of connectivity as well as new applications in ar-
lessness, and lack of basic education and health eas such as e-government and e-business (World
Bank, 2006), Policy makes a great difference
DOI: 10.4018/978-1-61692-012-8.ch014

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
National Information and Communication Technology Policy Process in Developing Countries

regarding how countries are able to take advantage of working, communicating and living but also to
of the technological opportunities available to enhance the productive and human capacities of
them and exploit them for good. Countries with their people and to assist to reduce existing forms
progressive policies are seeing these technologies of economic and social inequality and exclusion.
spread quickly. However, countries that are yet On the other hand, those erring on the side of cau-
to formulate and integrate ICT policy have been tion risk being excluded from the benefits of the
plagued by slow growth of technology and the emerging networked economy. Delays in action
consequent lessening of support for economic in becoming integrated can mean a widening of
and social development (Sarkar De, 2005, cited economic and social development gaps, increased
Adomi & Igun, 2008). marginalization and social exclusion. The social
ICTs cannot substitute for a countrys own and economic losses that come from not effectively
good governance, economic reform or social deploying ICT are also likely to increase progres-
policies. However, ICTs can be applied to support sively (UNDP, 2001). This chapter discusses the
democratic processes, improve the productivity objectives of national information and commu-
and competitiveness of all economic sectors, nication technology policy in developing coun-
create new sources of wealth, and increase the tries,. ICT policy development process, national
efficiency of public services, including healthcare, ICT policy development initiatives, country case
education and disaster assistance. In the era of the studies, the role of an ICT policy in developing
global information economy and society, ICTs countries, factors affecting the formulation of
are an increasingly essential part of development national ICT policies, feature trends of the topic
policies and programs. (Implementation team on and conclusion..
global Policy participation, 2002). Governments
world-wide recognize the crucial role ICTs play
in facilitating and accelerating socio-economic bAckground
development; which has made a number of coun-
tries in the developing world are putting in place Information and communication technology is
policies and strategic plans that will enable them any technology which enables communication and
to transform their economies into information and electronic capture, processing and transmission
knowledge-based economies(Dzidonu, 2002). of information. (Parliament Office of Science and
Developing countries need to proactively Technology, 2006 cited by Adomi, 2008). ICT
evaluate the impact of ICT on existing sectors, has a role to play in any countrys development
identify the potential for ICT to create new eco- (http://wougnet.Org/ICTpolicy/ug/ugictpolicy.
nomic and social opportunities, and address devel- html). All over the world today, governments
opment priorities by designing and implementing are introducing policies aimed at integrating ICT
comprehensive national ICT strategies. By being into the national hub and strategies are evolving
proactive, countries that have put in place national to enable countries exploit ICT for progress and
ICT policies that address all the relevant priority development. ICT is fast becoming a way of life
areas (ICT infrastructure and access, human ca- in Africa and many developing countries.
pacity development, the network and regulatory ICTs can be grouped into three categories
environment, business and entrepreneurship, (Adomi, 2008):
content and applications) are better able to avail
themselves of the opportunities offered by the Information technology uses computers,
global economy. They are in a position not only which have become indispensable in mod-
to learn and creatively transform existing ways

219
National Information and Communication Technology Policy Process in Developing Countries

Figure 1. Relationship between ICT policy and other development policies (Source: UNCSTD, 1997;
adapted from Marcelle 2001)

ern societies to process data and save time policy generally covers three main areas, like
and effort. telecommunications (especially telephone com-
Telecommunications technologies which munications), broadcasting (radio and television),
include telephone (with fax) and the and the internet; it may be national, regional, (and
broadcasting or radio and television often or sub regional), or international; each level may
through satellites. have its own decision making bodies, sometimes
Networking technologies of which the making different and even contradictory policies
most widely known is the internet, but (Adomi & Igun, 2008). According to Marcelle
which has extended to mobile phone tech- (2001) the ICT sector is heterogeneous, extending
nologies; voice over IP telephone (VoIP), beyond traditional classification of industrial or
satellite communications and other forms services sectors and because production and dif-
of communication that are still in their in- fusion of ICTs are of equal importance, national
fancy (p107). policies in the ICT sector intersect with a number
of other areas of policy- making like technology,
The first few years of the century have wit- media, industrial, and telecommunication policy
nessed a number of leaps in technology advance- (Marcelle, 2001).
ment and many of these leaps can be traced to Figure 1 shows these areas of intersection
advances in information and communication among the various areas of policy spheres.
technology (ICT). ICTs have characterized what
has become known as the information age.
A national ICT policy is an integrated set objectIves oF Ict PolIcIes In
of decisions, guidelines, laws, regulation, and develoPIng countrIes
other mechanisms intended to direct and shape
the production, acquisition, and use of ICTs. According to UNESCAP (2009) the ICT evolution
ICT policy as an official statement which spells will occur with or without a systematic, compre-
out the objectives, goals, principles, strategies, hensive and articulated policy; that the lack of
etc intended to guide and regulate the develop- a coherent policy is likely to contribute to the
ment, operation and application of information development (or prolonged existence) of ineffec-
and communication technology (Marcelle, 2001. tive infrastructure and a waste of resources. The
APC, n.d. cited by Adomi & Igun, 2008). ICT

220
National Information and Communication Technology Policy Process in Developing Countries

following are some aspirations that ICT policies There are three levels of ICT policy: infrastruc-
often try to meet (UNESCAP, 2009): tural policy (dealing mostly with communication
side), vertical policy (looking at the role of IT in
Increasing the benefit from information a given sector), and horizontal policy (for which
technology Mozambiques approach which regards ICTs as
Helping people and organizations to adapt facilitators for a wide range of national activities,
to new circumstances and providing tools is an example). Some countries have focused on
and models to respond rationally to chal- developing ICT as an economic sector either to
lenges posed by ICT boost export (Costa Rica and Taiwan) or to build
Providing information and communication domestic capacity (Brazil, India and Korea) while
facilities, services and management at a others are pursuing strategies which seek to use
reasonable or reduced cost ICT as an enabler of wider socio economic de-
Improving the quality of services and velopment process. Countries which use ICT as
products an enabler may be further subdivided into those
Encouraging innovations in technology which have focused primarily on repositioning
development, use of technology and gen- the countrys economy to secure competitive
eral work flows advantage in the global economy (Malaysia,
Promoting information sharing, transpar- Trinidad and Tobago) and those which explicitly
ency and accountability and reducing bu- focus on ICT in pursuit of development goals such
reaucracy within and between organiza- as those set forth in the UN Millennium Summit
tions, and towards the public at large (Estonia and South Africa). (James, 2001, cited
Identifying priority areas for ICT develop- by Rowan, 2003).
ment (areas that will have the greatest posi-
tive impact on programmes, services and
customers) Ict PolIcy develoPment
Providing citizens with a chance to access Process
information technology resources
Attaining a specified minimum level of The African Information Society Initiative (AISI)
information technology resources for sets out important set of policy guidelines for na-
educational institutions and government tional information policy in the African context.
agencies (Marcelle, 2001). Early studies of policymaking
Supporting the concept of lifelong learning in informatics in African countries, within the
Providing individuals and organizations ambit of AISI and its forerunners, have provided
with a minimum level of ICT knowledge, important research and analysis of the readiness of
and the ability to keep it up to date Africa Countries to undertake policy interventions
Helping to understand information tech- in the ICT sector. One such study reviewed infor-
nology, its development and its cross- dis- matics policy in 10 African Countries; Cameroon,
ciplinary impact Congo, Cote dIvoire, Ethiopia, Kenya, Madagas-
car, Nigeria, Senegal, Tanzania, and Zimbabwe
An ICT policy framework is recognized as (Browne, 1996 cited by Marcelle, 2001).
an important step in order to create an enabling The study defined national informatics policy
environment for the development of ICTs and as a plan for the development and optimal utiliza-
their uses to social outcomes (.Njuguna, 2006, tion of information technology (IT) and reported
cited by Adomi and Igun, 2008), that limited financial resources, poor institutional

221
National Information and Communication Technology Policy Process in Developing Countries

capability, and inadequate access to human re- Opposition politicians versus ruling party
sources and technological know-how plague National versus international Organisations
Africas attempts to harness ICTs (Brown 1996). Developed (the North) versus developing
A recent study on national ICT policymaking re- (the South) countries.
vealed only very moderate success in formulating
and implementing ICT policies some developing These actors reflect the nature of public
countries (Marcelle, 2001). interest in ICT policy. The potential of conflict
Policy making process normally involves the between public and private interests demonstrate
expression of conflicting interests. It is convenient the struggle over who should initiate or control
to think of such interest as being represented by ac- the expansion of ICTs. The struggle between na-
tors who engage in debate and decision making tional and international actors reflects increased
in appropriate locations or fora where decisions globalization of ICT infrastructure as service. As
are made (Okado, 2007). The African Information a result national governments may easily find
Society Initiative (AISI) recommended that the themselves at odds with multinationals. The main
ICT policy formulation process should start with fora at which policies are formed are transnational,
the definition of national development priorities national and regional. At the international forum
as contained in the various documents such as the national governments, international ICT organi-
five-year plan and cabinet directions which the ICT zations and development agencies are the likely
policies should support. In practice, the process actors. Examples of these actors are UNESCO or
involves elaborate and prolonged processes that the ITU. At the international level, ICT policy for-
often cover analysis of national priorities, hold- mulation encounters forces of globalization. This
ing sensitization workshops, development of ICT is because the global trend in ICTs and ICT policy
framework, writing policy documents, taking them formulation process is determined by northern
through legislations, establishing action plans and forces, as a result many developing countries do
implementation programmes. It is particularly not obtain fair share of the benefits of globaliza-
important to go through these steps in countries tion and some actually suffer net losses (Khor,
where the ICT policy awareness is low as has 1995, Okado, 2007). The North is in control not
been the case for most countries in Sub-Saharan only on account of strength but also due to lack
Africa (Okado, 2007). of coordination in the South. National technology
Lishan & When (1988) (cited by Okado policies are largely formulated by the work of
(2007) posited that the relevance of ICT policies global institutions and their rules and standards. It
to development can be increased by engaging all is important that developing countries participate
key stakeholders (actors) in national develop- more forcefully and effectively in these institu-
ment plans and implementation of ICT policies. tions. This requires policy coordination among
McQuail (2000), Okado (2007) have accordingly developing countries. Figure 2 shows the various
identified a number of actors and interests respon- actors involved in ICT policy-making.
sible for ICT policy formulation. They are:

These actors reflect the nature of public


interest in ICT PolicyPublic versus private
interests
Owners and employers versus employees
Economic versus social cultural
Organisations

222
National Information and Communication Technology Policy Process in Developing Countries

Figure 2. Key agent in policy-making process


To guarantee that the country benefits
(Source: UNCSTED 1997; adapted from Mar-
maximally, and contributes meaningfully
celle 2005)
by providing the global solutions to the
challenges of the information age.
To empower Nigerians to participate in
software and IT development.
To encourage local production and manu-
facture of IT components in a competitive
manner.
To improve accessibility to public admin-
istration for all citizens, bringing transpar-
ency to government processes.
To establish and develop IT infrastructure
and maximize its use nationwide.
nAtIonAl Ict PolIcy To improve judicial procedures and en-
develoPment InItIAtIves In hance the dispensation of justice.
develoPIng countrIes To improve food production and food
security.
nigeria To promote tourism and Nigerian arts &
culture.
Nigeria began the implementation of its IT policy To improve healthcare delivery systems
April 2001 after the Federal Executive Council nationwide.
approved it by establishing the National Informa- To enhance planning mechanisms and
tion Technology Development Agency (NITDA), forecasting for the development of local
the implementation body. The policy empowers infrastructure.
NITDA to enter into strategic alliances and joint To enhance the effectiveness of environ-
ventures and to collaborate with the private sectors mental monitoring and control systems.
to realize the specifics of the countrys vision of, To re-engineer and improve urban and ru-
making an IT capable country in Africa as well ral development schemes.
as a key player in the information society by To empower children, women and the dis-
the year 2005 through using IT as an engine for abled by providing special programs for
sustainable development and global competitive- the acquisition of IT skills.
ness. However, this vision is yet to be fulfilled To empower the youth with IT skills and
(Agyeman, 2007). prepare them for global competitiveness.
To integrate IT into the mainstream of edu-
Objectives cation and training.
To create IT awareness and ensure univer-
The objectives of Nigerias IT policy are as follows sal access in order to promote IT diffusion
(Federal Republic of Nigeria, 2001): in all sectors of our national life.
To create an enabling environment and fa-
To ensure that Information Technology re- cilitate private sector (national and multi-
sources are readily available to promote ef- national) investment in the IT sector.
ficient national development.

223
National Information and Communication Technology Policy Process in Developing Countries

To stimulate the private sector to become Infrastructure (SII) and Local Information
the driving force for IT creativity and en- Infrastructure (LII) backbone by using
hanced productivity and competitiveness. emerging technologies such as satellite in-
To encourage government and private sec- cluding VSAT, fibre optic networks, high
tor joint venture collaboration. speed gateways and broad band/multime-
To enhance national security and law dia technologies.
enforcement. Providing adequate connectivity to the
To endeavour to bring the defence and law Global Information Infrastructure (GII)
enforcement agencies in line with accepted Addressing open standards for further lib-
best practices in the national interest. eralization and the fiscal measures includ-
To promote legislation (Bills & Acts) for ing including incentives to substantially
the protection of on-line, business transac- improve telephone teledensity and make
tions, privacy and security. IT more affordable to the citizenry.
To establish new multi-faceted IT insti- Establishing IT Parks as incubating centres
tutions as centres of excellence to ensure for the development of software applica-
Nigerias competitiveness in international tions at national, state and local levels.
markets.
To develop human capital with emphasis ghana
on creating and supporting a knowledge-
based society. The Government of Ghana is committed to
To create Special Incentive Programs pursuing an ICT for Accelerated Development
(SIPs) to induce investment in the IT sector. (ICT4AD) Vision intended to improve the qual-
To generate additional foreign exchange ity of life of the people of Ghana by significantly
earnings through expanded indigenous IT enriching their social, economic and cultural
products and services. well-being through the rapid development and
To strengthen National identity and unity. modernization of the economy and society using
To build a mass pool of IT literate man- information and communication technologies as
power using the NYSC, NDE and other the main engine for accelerated and sustainable
platforms as train the trainer Scheme economic and social development (http://www.
(TTT) for capacity building. ict.gov.gh/html/ministerial%20ict%20policy%20
To set up Advisory standards for educa- statements).
tion, working practices and industry. The main mission of the Ghana ICT4AD Vi-
To establish appropriate institutional sion is: to transform Ghana into an information-
framework to achieve the goals stated rich, knowledge-based and technology-driven
above. high-income economy and society. Some of the
key sub-missions of the vision are (http://www.
Policy Strategies ict.gov.gh/html/ministerial%20ict%20policy%20
statements)
Nigeria intends to achieve her ICT policy through
the following strategies: To develop Ghanas information and
knowledge-based society and economy
Establishing a coordinated program for through the widespread development, de-
the development of a National Information ployment, and exploitation of ICTs within
Infrastructure (NII) State Information the society and economy.

224
National Information and Communication Technology Policy Process in Developing Countries

To transform the educational system to The Government as part of this vision acknowl-
provide the requisite and educational and edges the key role that ICTs can play in educational
training services and environment capable delivery and training and the need for ICT training
of producing the right types of skills and and education in schools, colleges and universities.
human resources required for develop- The Government further acknowledges the role
ing and driving Ghanas information and that ICTs can play in literacy education and needs
knowledge-based economy and society. to improve the educational system as a whole.
research and development The ICT Policy Statement is designed to guide
To develop Ghanas (R&D) capacity and the process of the deployment and utilizaation
capabilities with the potential to conduct of ICTs within the Ministries to support its or-
and engage in advanced and cutting-edge ganizational activities and operations within the
R&D work required for supporting the framework of the national ICT4AD vision.
development of a globally competitive in-
formation, knowledge-based and high-tech Ghana is ahead of several West African
export industry and services. countries including Nigeria telephone pen-
etration higher, Internet bandwidth (e.g.
The Government is committed to pursuing NCS BW is bigger than many West African
a number of key strategies geared towards the Telcos 10mb)
achievement of the stated missions of the vision. Telecommunications assets of GT, GBC
Key among them are strategies to: and VRA maybe strategic to development
Private sector is becoming foreign owned
Transform Ghana into an information and e.g. South Africa 30% empowerment,
knowledge-driven ICT literate nation; 49% foreign max investment in Policy
Promote the deployment and exploitation Framework, force alignment (http://www.
of information, knowledge and technol- ict.gov.gh/html/ministerial%20ict%20
ogy within the economy and society as key policy%20statements)
drivers for socio-economic development;
Modernize Ghanas educational system us- The Strategies
ing ICTs to improve and expand access to
education, training and research resources Create the conditions for Government
and facilities, as well as the improve the Ministries, Public Sector Organizations
quality of education, and training and (PSO) and private sector establishments to
make the educational system responsive to train and up-date the skills of their person-
the needs and requirements to the econo- nel through in-house training, provision of
my and society with specific reference to regular refresher courses, study and train-
the development of the information and ing leaves
knowledge-based economy and society Promote basic training in ICTs skills in all
and schools and tertiary institutions
Improve the human resource develop- Ensure the development of a large pool of
ment capacity and the Research and ICT professionals with wide range of state
Development (R&D) capacity of Ghana to of-the-art ICT skills to meet the manpower
meet the demands and requirements for the needs of the country.
nations information and knowledge-based Encourage the private sector, particularly
economy and society. key industries, to establish comprehensive

225
National Information and Communication Technology Policy Process in Developing Countries

training programmes for their own work- Promote world-class standards, to sup-
forces, especially in new technologies port nation-wide professional ICT skills
Support and facilitate the training of wom- accreditation
en in key skills required by the information Promote initiatives targeted at re-training
and knowledge economy and re-skilling of workers within the civil
Encourage life-long learning within the and public services as well as workers in
working population to promote on the job the private sector to provide them with
training, skills update, further and continu- requisite professional skills and expertise
ing education and learning within the pub- to enable them fully and effectively partici-
lic and private sector pate in the development of the information
Ensure that all citizens who qualify to en- and knowledge economy. (http://www.
ter tertiary education in Ghana will benefit google.com.ng/search?hl=en&q=ghana+ic
from such education, irrespective of their t+policy+and+strategy+to+achieve+it&sta
socio-economic background rt=10&sa=N)
Ensure the provision of support to increase
access to technical, vocational educa- Pupua new guinea
tion and training to all categories of per-
sons with disabilities and other vulnerable In October of 1978, the genesis of a process leading
groups to a coherent national policy on Information and
Encourage links between the education Communication Technologies (ICT) commenced
and training systems and the industry in New Guinea. Since then, a structured national
Ensure that traditional apprenticeship sys- ICT policy has begun to emerge, under the mandate
tem is reformed and strengthened to im- of then Secretary to the Department of Information
prove productivity in the informal sector and Communication in November 1992 (www.
Encourage internships, co-opts and work- scrind.com/.../ICT.policy.final-Experts-Report-
study programmes in all levels within vari- Papua-New-Guinea). This resulted in the National
ous institutions. Policy on Information Communication Technol-
Enact laws that provide equal access to ogy, which was tabled in parliament by the then
physically challenged and vulnerable Minister for Information and Communication
groups to ICT training and education. Services, the Hon Martin P Thompson.
Ensure that training systems and mecha- In June 2006, the National Executive Council
nisms are developed to facilitate coordina- (NEC) approved the development of an integrated
tion and linkage between different sectors government information system (IGIS) to govern
of the economy including research institu- the use of information services in New Guinea
tions and industries government departments. This decision is aligned
Promote and enforce high standards in ed- to the focus within the Medium Term Develop-
ucation, vocational training and life-long ment Strategy (2005-2010) on the use of ICTs to
learning to facilitate the development of bridge the digital divide, and improving delivery
a globally competitive quality and profes- of government service.
sional manpower to support the develop- The Draft National Information Communica-
ment of Ghanas information and knowl- tion Technology Policy Frame work was approved
edge-based economy and economy by the NEC in 2005. In response to the draft
framework, an inter-agency ICT Taskforce was
established under National Executive council

226
National Information and Communication Technology Policy Process in Developing Countries

Decision No. 280/2005, to take steps to formulate the existing environment to competitive
a national ICT policy. In the light of the above, markets.
the governments ICT policy focuses on the fol- The government sleeks improved in-
lowing areas (www.scrind.com/.../ICT.policy. ternational capacity and connectivity
final-Experts-Report-Papua-New-Guinea) to help PGN to truly become part of
the international community.
It is the overarching objective of govern- Finally, the government aims to secure
ment to secure the social and economic the benefits that can flow from increased
benefits of an efficient ICT sector. These availability and use of the Internet (www.
benefits can be obtained in such areas as scribd.com/.../ICT.Policy.Final-Experts-
education, health, national security, justice, Report-Pupua-New-Guinea).
agriculture, government administration
and commerce. Increased access to infor- bangladesh
mation and communication technology has
transformed many parts of the world and In October 2002, the government of Bangladish
helped many developing economies. issued its national information and communication
Pupua New Guinea must have an efficient Technology (ICT) policy stating the importance of
ICT infrastructure as the backbone of ICT this sector and referring to the designation granted
Policy with the use of technology appro- by the Prime Minister as a thrust sector. (ww.usaid.
priate to circumstances of PNG (Pupua gov/bd/files/afe_review). With this document, the
New Guinea). This will require substan- government voiced the intention to utilize the ICT
tial investment to refurbish the existing sector as a tool to increase the socio-economic
network, extend its availability across the development of the country. As a follow up on
country and increase technical capabilities the ICT policy, necessary organizational structure
to support high-speed broadband. will be created exclusively for ICT industry to
The government aims to substantially in- consolidate the various aspects of ICT now being
crease access to basic telecommunications handled by ministries of science and technology,
services across PNG with service to be commerce, industries, cultural affairs, law, post
available at affordable prices. By reform- and telecommunications and others.
ing the ICT sector, the government intends The countrys ICT policy focuses on the fol-
to make telecommunications services lowing thematic areas:
available to ever more PNG.
It is crucial to have a transformed and ef- ICT Infrastructure
ficient Telikom PNG (Pupua New Guinea). Human Resource Development
The governments stage introduction of Industry
open competition is aimed at achieving Export Market Development
this transformation, in combination with Fiscal
other efforts to improve Telikom PNGs Legal and Regulatory
operational capabilities. Electronic Commerce
PGN will enjoy effective and sustainable E-governance
competition to deliver market discipline Bangla Standard and Practices
and economic benefits. This competition Others (www.fbeci-bd.org/ictp.pdf)
will be built upon a clear ad achievable
ICT policy with a part to take PGN from

227
National Information and Communication Technology Policy Process in Developing Countries

trinidad and tobago FActors AFFectIng


tHe FormulAtIon oF
The creation of a viable strategy for the effective nAtIonAl Ict PolIcy In
deployment of information and communication develoPIng countrIes
technology (ICT) for national development con-
tinues to be a major challenge faced by many of The importance of ICT policies is understood at
the countries in the Commonwealth, especially the highest political level in many developing
the less developed countries and small Island countries, and some countries have already ad-
States(Ramarine and Wilson, nd).Trinidad and opted their own policies. The effectiveness of an
Tobago is in a prominent position in the global ICT policy in one country does not guarantee that
information society through real and lasting the same recipe would work in another and many
improvement in social, economic and cultural developing countries face similar constraints that
development as a result of ICT deployment and need to be taken into account when ICT policies
usage. Amongst their admirable National policy are formulated (UNESCAP, 2009) The following
objectives and strategies are: are factors affecting ICT policies in developing
countries (UNESCAP, 2009; Maclean, Souter,
Providing all citizens in the country with Deane Lilley, 2002; Wohler, Correa & Almeida,
affordable internet access. nd.) ):
Focusing on the development of our chil-
dren and adult skills to ensure a sustainable Weak ICT infrastructure: Lack of com-
solution and a vibrant feature. puter and telecommunications infrastruc-
Promoting citizen trust, access and interac- ture is a key problem in many developing
tion through good governance. countries. Therefore, National ICT policies
Maximizing the potential within all our need to be very strong in this area. A mas-
citizens, and acceleration of innovation to ter infrastructure development plan can be
develop knowledge based society (www. supported by detailed policies for adminis-
fastforward.it). trative sectors, geographic areas, types of
service, types of educational institute, etc.
Notwithstanding the strength and dominance Government involvement is very essential
of the country in other areas like oil and gas, the in the construction of the infrastructure in
government decided in 2002 to take the bold step the foreseeable future in rural areas and
of exploiting ICT for national development. This remote locations. Only large cities are, at
action was expected to drive the development of the present time, sufficiently attractive for
a vibrant knowledge based society as a major most private developers, such as mobile
facet of the national development agenda. As a phone and Internet service providers.
result, the National ICT (NICT) plan was crafted ICT-related goods and services are
during 2003, launched in December of that year made available on suppliers terms and
and accelerated into rapid implementation mode low per capita purchasing power does
(www.fastforward.it). not allow markets to mature: Basic in-
formation technology, such as personal
computers, their peripherals and software
are available in major cities of developing
countries. Low purchasing power, how-
ever, keeps the number of vendors down.

228
National Information and Communication Technology Policy Process in Developing Countries

Government ICT policies can help the de- neity is to develop and test pilot applica-
velopment of ICT markets by reducing red tions in the more advanced departments
tape, reducing import taxes and creating a before these are released for wider use
favorable entrepreneurial environment. within the government.
Continued existence of telecommunica- Public sector is a dominant employer:
tions monopolies: Developing countries The computerization of routine functions
in the Asian and Pacific and other regions allows governments to reduce staff and
are mulling over the possibilities for re- simultaneously to improve the quality of
forming their telecommunications sectors, their services. The effectiveness of such
which are to a great extent, in the hands of moves is often moderated by inflexibili-
government monopolies. A fair degree of ties in employment contracts that limit the
liberalization has been achieved in several scope for staff retrenchments.
domestic telecommunications markets, Unconducive management structures
and private Internet service providers have and styles: Most failures in ICT applica-
become commonplace. Consequently, tion development are caused by poor plan-
more countries are succeeding in eradicat- ning and management, and not by the lack
ing waiting lists for telephone services. of resources or wrong technology choices.
However, the liberalization of interna- Management of ICT projects is often made
tional telecommunications is taking place more difficult by overly hierarchical orga-
painstakingly slowly, and retail prices have nizational structures which are not condu-
practically nothing to do with transmission cive to innovative ideas. This can create a
costs. Governments are protecting their problem if the management is not aware,
rights to collect tax-like revenue through or resists becoming aware, of the benefits
monopolies, and attempts to change the in- that could be achieved through the applica-
ternational accounting rate settlement sys- tion of ICT. National policies should em-
tem (which is an additional reason for the phasize the importance of involving senior
high price of international telephone calls) executives in ICT development and mak-
have not been very successful. National ing them accountable for their organiza-
ICT policies cannot afford to ignore the tions ICT-related performance
fact that the need for low-cost telecommu- Governments are struggling to find mon-
nications services in developing countries ey for basic public services: Government
is higher than ever. The policies also need budgets tend to be tight, especially in de-
adjustments because the existing market veloping countries, and this can create
mechanism is being taken over by new problems for rational ICT development
modes of operation. and obstruct the ability to react quickly to
Significant variation of ICT readiness new requirements or to buy the latest tech-
between government departments: nology. In order to get value for money,
Departments and agencies operating in a ICT policies should require that the specifi-
naturally ICT-intensive field are likely to cations of systems developed or purchased
be more advanced than others. A govern- are reconfirmed by third-party experts be-
ment can assist by identifying a coordina- fore the order is placed
tor agency to maintain information about The penetration and influence of the
government ICT development ventures. Internet are still minimal: The Internet
Another way to benefit from the heteroge- is changing the way in which data and in-

229
National Information and Communication Technology Policy Process in Developing Countries

formation are collected and disseminated include lack of political leadership, ab-
and how services are provided to clients. sence of national ICT strategy, ineffective
Therefore, most new systems should be coordination between different govern-
developed with either immediate or future ment departments and agencies with ICT
Internet connectivity in mind. responsibilities, and the absence of ICT
Governments find it difficult to recruit policies processes posses a great problem.
and retain qualified ICT staff: A key
problem for the effective application of
ICT in developing countries is the inad- Future trends
equacy of human resources Apart from a
lack of qualified ICT-system personnel, The last few years have witnessed steady growth
there is often high turnover of such per- in the number of developing counties that have
sonnel which can seriously hamper sys- formulated and integrated ICT policies. This is
tems development or daily operations. In due to growing level or awareness of the role of
addition, the ICT skills of other related policy framework in facilitating deployment of
personnel are not very developed. These ICTs for the development of different facets of the
constraints can lead to delayed and unco- society. It is hoped that, before long, all develop-
ordinated ICT development and contribute ing countries will adopt ICT policies.
to inadequate data security. ICT policies
need to address human resource develop-
ment needs in a broad educational context conclusIon
(www.unescap.org/stat/gc/box-ch8.asp)
Problem of lack of awareness on the im- This chapter has focused on national ICT policy
portance of ICT decisions for national processes in developing countries. It examined the
policies and regulations: There is the need for information and communication technol-
problem of lack of awareness on the impor- ogy policy, ICT policy development process; the
tance of ICT decisions for national policies role of an ICT policy, case study of ICT policies
and regulations. In a research conducted by in some developing countries as well as factors
Maclean, Souter, Deane & Lilley (2002) it affecting national ICT policies. Efforts should be
was reported that was lack of awareness of made by developing countries yet to formulate
the role that ICT policies can play in sup- ICT policies in order to devise and implement
porting economic and social development.. them to give proper direction to ICT deployment.
Lack of technical and policy capacity on
ICT issues: especially on emerging issues
in such areas as the migration to IP based reFerences
networks, the implementation of feature
generation mobile communication sys- A study by the commonwealth Telecommunica-
tems, ecommerce applications, and pro- tions Organization and Panos London. (n.d.).
tection of intellectual property rights are Retrieved February 17, 2009 from http://www.
viewed as fundamental obstacles to effec- cto.int/publications/Loudervoicesfinalreport.pdf
tive participation by developing countries. Adomi, E. E. (2008). Library and information
Weaknesses in ICT policy processes: are service policies. Benin City, Nigeria: Ethiope
also a barrier to effective ICT policy for- Publishing Corporation.
mulation and implementation. The barriers

230
National Information and Communication Technology Policy Process in Developing Countries

Adomi, E. E., & Igun, S. E. (2008). ICT polices ICT Policy for Lesotho. Final 4. (March 2005).
in Africa . In Cartelli, A., & Palma, M. (Eds.), Retrieved April 10 2009 from www.Lesotho.gov.
Encyclopedia of information communication tech- is/documents/lesotho-ICT-Policy-Final.p
nology (pp. 384389). Hershey, PA: Information
ICT sub sector in Bangladesh. (n.d.). Retrieved
Science Reference.
on the 9th of November, 2000 from www.usaid.
Agyeman, O. T. (2007). Survey of ICT and Educa- gov/bd/files/afe-review
tion in Africa: Nigeria Country Report. Retrieved
Implementation team on global Policy participa-
on the 18th of August, 2009 from www.infodev.
tion. (2002).Global policymaking for information
org/en/Document.422. Pdf
And communications technologies: Enabling
Browne, P. (1996). Study of the effectiveness of meaningful participation by Developing-nation
Informatics policy instruments in Africa. Addis stakeholders. Retrieved October 1, 2009 from
Ababa, Ethiopia: ECA. Retrieved on the 20th of http://www.markle.org/downloadable_assets/
July 2009 from www.belanet.org/partners/aisi/ roadmap_report.pdf
policy/infopol/sumbrown.htm
James, T. (Ed.). (2001). An Information Policy
Building Local Capacity for ICT Policy and Regu- Handbook for southern African, A Knowledge
lation. A needs Assessment and Gap Analysis for Base for Decision-Makers. International Develop-
Africa, the Carribean, and the Pacific. Retrieved ment Research Centre.
March 21, 2009 from www.infuder.org/en.project
Khor, M. (1995). Globalisation and the Need for
Considerations for ICT policy formulation in coordinated Southern policy Response, Coopera-
developing countries. (n.d.). Retrieved on of tion South. New York: UNDP.
June 20th, 2009 papers.ssrn.com/sol3/.../SSRN_
Marcelle, G. N. (2001). Getting Gender into
ID983944_code733084.pdf?
African ICT Policy: A Strategic View. Retrieved
Dzidonu, C. (2002). A blueprint for developing July 17th 2009 from http://www.idrc.ca/en/ev-
national ICT policy in Africa. Retrieved October 9409-201-1-DO_TOPIC.htIm
1, 2009 from http://www.atpsnet.org/pubs/spe-
McQuail, D. (2000). McQuails Mass Communi-
cialpaper/Dzidon.pdf
cation Theory. London: Sage Publications.
Federal Republic of Nigeria. (2001) Nigerian
Njuguna, E. (2006). ICT policy in developing
National Policy for Information Technology (IT).
countries; Understanding the Bottlenecks. Re-
Retrieved April 14, 2009 from www.nita.gov.ng/
trieved March 11. 2008.from http://www.ptc.
document/nigeriaitpolicy.pdf
org/events/ptc06/program/public/Proceedings/
Government of Mozambique. Information and Emmanuel%20Njuguna_pa-per_w143.pdf
Communication Technology Policy Implementa-
Okado, G. (2007). Formulation of a National
tion Strategy: Towards the Global Information
ICT Policy: African Technology Policy Studies
Society. Mozambique, June. 2002. http://www.
Network. Retrieved on the7th of July 2009 from
idrc.ca/en/ev-90304-201-1-DO_TOPIC.htm,
www.atpsnet.org./pubs/brief/Technopolicy%20
Retrieved on the 7th of July 2009
Brief%.pdf
http://wougnet.Org/ICTpolicy/ug/ugictpolicy.
html. (n.d.). Retrieved on the 20th of June, 2009.

231
National Information and Communication Technology Policy Process in Developing Countries

Ramuarine, D., & Wilson, J. (n.d.). Developing Weama, T. M. (2005). Brief history of the de-
National ICT Strategies for Small Island States: velopment of an ICT Policy in Kenya. Retrieved
Case Study Trinidad and Tobago. Retrieved on from www.scridb.com/.../ict-policy-final-expert-
the 11th November 2009 from www.fastforward.it report-pupua-new-guinea
Republic of Ghana. National ICT policy and World Bank. (2006). 2006 information and com-
Plan Development committee: Ministerial ICT munications for development: Global trends and
policy statements. (n.d.). Retrieved on the 18th of policies. Retrieved October 1, 2009 from http://
August 2009 from http://www.ict.gov.gh/html/ www-wds.worldbank.org/external/default/WD-
ministerial%20ict%20policy%20statements.htm SContentServer/WDSP/IB/2006/04/20/0000120
09_20060420105118/Rendered/PDF/359240PAP
Rowan, M. (2003). Lesson Learned from Mozam-
ER0In101OFFICIAL0USE0ONLY1.pdf
biques ICT Policy Process. Retrieved on the 7th
of July 2009 from www.idrc.ca/en/ev-46223-201-
1-DO_TOPIC.html
key terms And deFInItIons
The National ICT policy in Bolivia. (n.d.). Re-
trieved on the 10th of November, 2009 from http:// Economic Development: The attaining of
www.ucd.org/articles/the-national-ict-policy-in- economic power by a country.
bolivia/? Governance: The act of exercising authority.
UNDP. (2001). Role of UNDP in information and Informatics: The application of computers
communication technology For development. and statistics to the management of information.
Retrieved October 1, 2009 from http://www.undp. Information and Communication Technol-
org/execbrd/pdf/DP2001CRP8.PD ogy (ICT): Is an electronic device for collecting,
storing, processing, and disseminating informa-
UNESCAP. (2009). Considerations for ICT policy tion.
formulation in developing countries. Retrieved Public Service: A service that is performed
October 1, 2009 from tat/gc/box-ch8.asp http:// for the benefit of the public or its institutions.
www.unescap.org/S Satellite: Man-made equipment that orbits
around the earth or the moon.
Telecommunication: Systems used in trans-
mitting messages over a distance electronically.

232
233

Chapter 15
Regulation of Internet Content
Esharenana E. Adomi
Delta State University, Nigeria

AbstrAct
This chapter focuses on regulation of Internet content. It presents the arguments for and against Internet
content regulation, approaches to content regulation on the Net, how Internet content is regulated in dif-
ferent parts of the world, issues inherent in content regulation, choice of content regulation mechanism
as well as future trends.

IntroductIon save laissez-faire. What may need to be governed


are specific pieces, since there is no whole. From
The growth of communications and telecommu- another perspective, however, the elements of the
nication technology has spurred the growth in Internet constitute a conceptual whole, the ulti-
regulation of new industries. As the technologies mate commons, where no part can function well
advance and cultural and social mores change, without all other parts operating well. From this
new regulation has been needed. (Song, 2001) The perspective, some form of overall governance is
Internet today has reached a level of political im- essential, which without a whole, there will be no
portance where some form of regulatory policy is parts(Mathiason & Kuhlman, n.d.)
needed. The problem is to determine which policies There has been increasing concern in the
to govern which aspects of the Internet. From one last ten years about damaging Internet content
perspective, the Internet does not exist: it is just including violence and sexual content, bomb
a conglomeration of linked individual networks making instructions, terrorist activity, and child
which has no formal corporeal existence. From pornography. Consequently, many governments
this perspective, there is no need for any policy around the world have sought to address the
problem posed by material on the Net that are il-
DOI: 10.4018/978-1-61692-012-8.ch015 legal under the offline laws, and those considered

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Regulation of Internet Content

harmful to or unsuitable for minors. The nature As far as content regulation is concerned, it
of content of principal concern has varied greatly is necessary to distinguish between illegal and
from political speeches to material promoting or harmful content these two types of content need
inciting to racial hatred, to pornographic material to be treated differently. The former is criminal-
(Wikibooks, 2008). ized by national laws while the latter is regarded
Essentially, to regulate means to monitor or as offensive or disgusting by some people but is
control certain product, process or set of behav- generally not criminalized by national laws. For
iours according to certain requirements, standards, instance, child pornography falls under the illegal
or protocols. It would however seem that at least content category while adult pornography falls
two different senses of regulation have been used under the harmful content category. There are
in discussion involving the Internet. Sometimes also some grey areas such as hate speech and defa-
regulatory discussions have focused on the content mation, which in some countries are considered as
of the Internet, as in the case of whether online por- criminal offences and in others not (Akdeniz, n.d.)
nography and hate speech should be censored on The purpose of this chapter is to describe
the Net. And sometimes the regulatory discussion regulation of Internet content. It presents the argu-
have centered on questions pertaining to which ments for and against Internet content regulation,
kinds of processes rules and policies should approaches to content regulation on the Net, how
be implemented and enforced in commercial Internet content is regulated in different parts of
transactions in cyberspace. In physical space, both the world, issues inherent in content regulation,
kinds of regulations also occur (Tavani, 2007). In choice of Internet content regulation mechanism
this chapter, regulation of the Net is used in the as well as future trends.
sense of the former content control/regulation.
Internet users appear puzzled by governments
intention to regulate content of the Net. Often users Arguments For And AgAInst
say the Internet is a powerful medium that will Internet content regulAtIon
be stifled by regulation. However, the power of
the Internet is the reason that governments want Several individuals have expressed views for and
to regulate it.(Ang, 1997). against control of Internet content. The following
The concept of content in cyberspace encom- arguments have been advanced in favour of some
passes anything that is created and would apply, form of regulation of Net content (Darlington,
from ordinary e-mail to websites and weblogs. 2009):
The wide scope of the word content provides a
difficulty for governments when considering con- 1. The Internet is fundamentally just another
tent regulation on the Net. The issue of regulating communications network. According to this
Internet content is part of ongoing debate between argument we should regulate the Internet
those who believe that the state has a role to ensure as we regulate radio, television, and tele-
that harmful content is prohibited and those who communications networks.. This argument
believe that the individual must have the right to suggests that, not only is the Internet in a
choose. The gulf between community rights and sense, just another network, as a result of
individual rights divides the debate over Internet convergence it is essentially becoming the
content regulation. Governments across the globe, network so that, if we do not regulate the it
seek to regulate access to speech on the Net so as at all, effectively over time we are going to
to establish local control (Papadopoulos, Kafeza abandon the notion of content regulation.
& Lessig, 2006).

234
Regulation of Internet Content

2. There is a range of problematic content on at the consumer, such as conventional radio


the Internet. There is illegal content such and television broadcasting, but suggests that
as child abuse images; there is harmful it is unnecessary or inappropriate to regulate
content such as advice on how to commit content which the consumer pulls to him
suicide; and there is offensive content such or her such as by surfing or searching on the
as pornography. The argument goes that Net.
we cannot regulate these different forms of 3. The Internet is a global network that can-
problematic content in the same way, but not simply be regulated. Almost all content
equally we cannot simply ignore it. regulation is based on national laws and
3. There is criminal activity on the Internet. conventions and of course the Net is a
This includes spam, scams, viruses, hacking, worldwide phenomenon, so it is argued that,
phishing, money laundering, identification even if one wanted to do so, any regulation
theft, grooming of children. Almost all of Net content could not be effective.
criminal activity in the physical world has 4. The Internet is a technically complex and
its online analogue and again, the argument evolving network that can never be regulated.
goes, we cannot simply ignore this. Effectively the Web only became a mass
4. The Internet now has users in every country media in the mid 1990s and, since then,
totaling about 1.5 billion. This argument developments - like Google and blogging
implicitly accepts that the origins of the - have been so rapid that, it is argued, any
Internet involved a philosophy of free ex- attempt to regulate the medium is doomed.
pression but insists that the user base and 5. Any form of regulation is flawed and imper-
the range of activities of the Interet are now fect. This argument rests on the experience
so fundamentally different that it is a mass that techniques such as blocking of content
media and needs regulation like other media. by filters have often been less than perfect
5. Most users want some form of content - for example, sometimes offensive material
regulation or control. still gets through and other times educational
material is blocked.
However, some people argue that it would be
wrong to regulate the content of the Internet be-
cause of the following reasons (Darlington, 2009): content regulAtIon In
dIFFerent PArts oF tHe world
1. The Internet was created as a totally different
kind of network and should be a free space. There have been variour efforts to regulate con-
This argument essentially refers back to the tent of the Internet in different parts of the world.
origins of the Internet, when it was first used Countries regulate different content differently,
by the military as an open network which was using various laws and regulations (Mosteshar,
designed to ensure that the communication 1996). These regulatory efforts have been widely
always got through, and then by academics documented by scholars and organizations,
who largely knew and trusted each other and (Mosteshar, 1996; Electronic Frontiers Austra-
put a high value on freedom of expression. lia, 2002;Sytnyk, 2005; The OpenNet Initiative
2. The Internet is a pull not a push commu- (ONI); 2007; Wikipedia, 2009) and are presented
nications network. This argument implicitly as follows.
accepts that it is acceptable, even essential,
to regulate content which is simply pushed

235
Regulation of Internet Content

Asia ish cartoon images of the Prophet Muhammad


widely condemned as blasphemous, while India
It is natural that Asia, a region with extraordinary also blocked a limited number of sites provid-
cultural, social, and political diversity, is home to ing more extreme viewpoints on religion. South
a broad and range of approaches, policies, and Korea and Thailand filtered a small selection of
practices toward Internet censorship. Many Asian gambling sites.
and Middle Eastern countries use any number of Conflict and security blocking was carried out
combinations of code-based regulation to block by Myanmar, China, South Korea, India, Pakistan,
material that their governments have deemed and Thailand most frequently in regard to groups
inappropriate for their citizens to view. China or movements implicated in secessionist or pro-
and Saudi Arabia are two good examples of na- independence activities, or in regard to disputed
tions that have achieved high degrees of success territories and border conflicts.
in regulating their citizens access to the internet Myanmar, China, Vietnam, Thailand, and
(ONI, 2007; Wikipedia, 2009). Singapore filtered Internet tools, including free
Malaysia, and Nepal do not use technical fil- Web-based e-mail providers, blog hosting services,
tering to implement their policies on information and more frequently proxies and other circumven-
control, but China, Myanmar, and Vietnam heavily tion tools. South Korea blocked pirated software
rely on pervasive filtering as a central platform on a nominal basis.
for shaping public knowledge, participation, and Each of the countries that practice extensive
expression. The filtering practices of Thailand filtering in the region have issued ambitious
and Pakistan are more targeted, as they blocked regulations that aim to bring Internet users under
a substantial number of sites across categories of government supervision and control, even if the
content considered sensitive or illicit. The remain- feasibility of such oversight remains in doubt.
ing countries in Asia tested by ONI filtered on a Myanmar, China, and Vietnam engage in constant,
selective basis and on targeted topics, including unremitting supervision of and interference in
India (ethnic and religious conflict), South Korea other forms of media. Well-established strategies
(sites containing North Korean propaganda or include the shuttering of reformist newspapers and
promoting the reunification of North and South Web sites, the institutionalized supervision over
Korea), and Singapore (pornography). content, and the intimidation and harassment of
Of countries filtering political content, China, dissidents, journalists, and human rights activists.
Myanmar, and Vietnam blocked with the greatest In the regulation of Internet, the correspond-
breadth and depth, spanning human rights issues, ing phenomenon is the delegation of policing and
reform and opposition activities, independent monitoring responsibilities to Internet Service
media and news, and discrimination against ethnic Providers (ISPs), content providers, private corpo-
and religious minorities. Thailand and Pakistan rations, and users themselves. These frameworks
blocked political content to a much more limited are not structured to accommodate only voluntary
degree than China, Myanmar, or Vietnam. self-regulation along industry lines, but rather they
A narrower range of social content was blocked exact compliance with state-imposed requirements
in Asian countries. Many countries, including through the looming threat of shutdowns, loss of
Vietnam, cited obscene content as a major justifica- license, fines, job dismissals, and even criminal
tion for engaging in technical filtering. Singapore, liability. Vietnam and China also apply a more
Thailand, China, Pakistan, and Myanmar actually direct form of censorship through the detention of
blocked pornographic content to varying degrees. cyber dissidents, while in Pakistan the Supreme
Pakistan filtered a number of sites posting Dan- Court authorized the police to register criminal

236
Regulation of Internet Content

cases against publishers of blasphemous content offense, as the constitution does not afford that
against the Prophet Muhammad, even though no power to the national government.(Electronic
one was apprehended. Frontiers Australia, 2006, ONI, 2007)
China can point to a series of regulations which The Australian government also promotes and
systematically proscribe nine to eleven types of finances an opt-in filtering program, in which
illegal content, and this number is growing. With Internet users voluntarily accept filtering software
the aid of a legal framework where even unem- which blocks offensive content hosted outside of
ployment rates and family planning statistics are the country. There are no plans for a countrywide
state secrets, the central propaganda organ issues Internet service provider (ISP)-level filtering
instructions throughout the government hierarchy regime at present, though Australias handling of
to media organizations, hosts such as BBS and hate speech, copyright, defamation, and security
blog platforms, and other content providers to signal the governments desire to increase the
suppress discussion of an ever-expanding list of scope of its Internet regulation.
proscribed topics. By contrast, New Zealand is less strict in its
Whether or not a legal basis for filtering is Internet regulation. The government maintains a
implicit in content regulations, in many Asian more limited definition of offensive content that
countries filtering has proceeded despite the lack can be investigated by a designated government
of clear authority to do so. This includes countries entity, althoughunlike in Australiathe defini-
with established democratic systems and protec- tion includes hate speech (despite it being illegal
tions for the press and other forms of speech. For in both countries). Furthermore, the government
instance, while India is in the process of central- has not passed legislation to permit issuance of
izing its filtering at the international gateway level take-down notices for such content and its enforce-
and therefore improving its efficacy, many still ment of Internet content regulation by prosecu-
question whether its primary legal authorization tion almost solely focuses on child pornography.
for filtering, the 2000 Information Technology Act, Although New Zealand Internet copyright policies
is valid in light of constitutional requirements for have not yet been formalized, its defamation and
limits to the freedom of expression (ONI, 2007). security policies are fairly similar to Australia.
Overall, however, Australia maintains a stricter
Australia and new Zealand regime of Internet censorship and regulation than
New Zealand and much of the Western world,
Australia maintains some of the most restrictive though not at the level of the more repressive
Internet policies of any Western nation, while its governments that ONI has studied.
neighbor, New Zealand, is less rigorous in its In-
ternet regulation. Without any explicit protection commonwealth of
of free speech in the constitution,(Jordan, 2002, Independent states
cited by ONI, 2007) the Australian government
has used its communications power delineated As a former superpowerwith a tradition of
in the constitution to regulate the availability authoritarianism, poorly developed independent
of offensive content, endowing a government media, and lack of private rightsthe Com-
entity with the power to issue take-down notices monwealth of Independent States (CIS) would
for Internet content hosted within the country. A seem to be a typical setting for substantive and
number of state and territorial governments in pervasive Internet controls. (The CIS consists of
Australia have also passed legislation making eleven countries: Armenia, Azerbaijan, Belarus,
the distribution of offensive material a criminal Georgia, Kazakhstan, Kyrgyzstan, Moldova,

237
Regulation of Internet Content

Russia, Tajikistan, Ukraine, and Uzbekistan. and without control. Many now see the Internet
Turkmenistan has been an associated member and other communications channels in national
since 2005. With a strong political and economic strategic terms, and these countries have increas-
influence over its neighboring countries, Russia ingly turned to security-based argumentssuch
remains the predominant political actor and stra- as the need to secure national informational
tegic economic power in the group.) However, spaceto justify regulation of the sector.
the reality is variegated and complex. While the ONI, in 2006, tested for the presence of
CIS region is home to some of the worlds most filtering in eight of the eleven CIS countries:
repressive measures and advanced techniques for Azerbaijan, Belarus, Kazakhstan, Kyrgyzstan,
subtly shaping Internet access, it also showcases Moldova, Tajikistan, Ukraine, and Uzbekistan.
examples of just how profoundly the Internet can Background and baseline testing was also car-
affect social and political life. ried out in a further two countries: the Russian
The states within this region have a conflicted Federation and Turkmenistan, although in these
relationship with the Internet. Most of them have two cases limitations on the testing methodology
adopted national development strategies that em- do not allow us to claim comprehensive results.
phasize information technology (IT) as a means Of the eight countries in which ONI tested,
for economic growth, with some even declaring results did not yield significant patterns of sub-
their intent to become regional IT powerhouses. stantive or pervasive filtering. Only Uzbekistan
IT development is favored because it is seen to pursued pervasive filtering of the kind found in
leverage the comparative advantage of the ex- China, Iran, or some parts of the Middle East. In
Soviet educational system with its emphasis on almost all countries some degree of filtering was
mathematics and engineering, and the strong present, but this filtering occurred mostly on cor-
tradition of innovation in the computing and tech- porate networks (such as educational and research
nology sector. Until its demise in 1991, the Union networks) where accepted usage policies (AUPs)
of Soviet Socialist Republics (USSR) was one of dictated that inappropriate content was not permit-
the few countries with a homegrown capacity in ted, or in edge locations, such as Internet cafs
supercomputing, cryptography/ crypto-analysis, where the reasons for filtering were more benign
and worldwide signals intelligence gathering. (conserving bandwidth) or left to the discretion
Currently many former Soviet citizens are among of the Internet caf owners themselves.
the leaders of the global IT industry. ONI observed that in all eight countries, au-
CIS governments, at the same time, are wary thorities had taken steps of one kind or another
of the civil networking and resistance activities to restrict or regulate their national informational
that these technologies make possible. In recent space. These measures include:
years, Ukraine, Georgia, and Kyrgyzstan have
experienced color revolutions, where networked expanded use of defamation and slander
opposition movements (albeit movements that are laws to selectively prosecute and prevent
more reliant on cell phones than on the Internet) bloggers and independent media from
have effectively challenged and overturned the posting material critical of the government
results of unpopular (or allegedly fraudulent) or specific government officials (however
elections. Neighboring governments fear that benignly, including, as was the case in
these challenges were made possible by opposition Belarus, through the use of humor);
groups leveraging IT to organize domestic protest strict criteria pertaining to what is ac-
(often with the help of foreign-funded NGOs), and ceptable within the national media space,
are therefore wary of leaving the sector unregulated

238
Regulation of Internet Content

leading to the deregistration of sites that cooperation with state authorities will prevent
did not comply (Kazakhstan); further legislation on the matter.
efforts to compel Internet sites to register The scope of illegal content that is filtered in
as mass media, with noncompliance then Europe pertains largely to child pornography, rac-
being used as grounds for filtering illegal ism, and material that fosters hatred and terrorism,
content; although more recently there have been proposals
national security issues (Ukraine); and, and revisions of laws in some countries that deal
in some cases, government officials have with filtering in other areas such as copyright and
asked ISPs formally or informally gambling. Filtering also takes place on account
to temporarily suspend sites detrimental to of defamation laws, and this practice has been
public order (Tajikistan). criticized, particularly in the UK, for curtailing
lawful online behavior and promoting an overly
These sanctions (legal and quasi-legal) are aggressive notice and takedown policy, where ISPs
intended to create overall environments that en- comply by removing content immediately because
courage varying degrees of self-censorship among of fear of legal action. ISPs in Europe do not have
ISPs, who are afraid of jeopardizing their licenses, any general obligation to monitor Internet use and
and among individuals for whom prosecution or are protected from liability for illegal content by
imprisonment is too high a price to pay for voicing regulations at the European Union (EU) level,
criticism, which at times amounts to little more but must filter such content once it is brought to
than a form of digital graffiti (ONI, 2007). their notice. Therefore the degree of filtering in
member states depends on the efforts of govern-
europe ments, police, advocacy groups, and the general
public in identifying and reporting illegal content.
The Internet in Europe, in less than a decade, has There have been moves over the past decade
evolved from a virtually unfettered environment to to create a set of common policies and practices at
one in which filtering in most countries, particu- the EU-level on Internet regulation. This is viewed
larly within the European Union (EU), is the norm as necessary to encourage regional competitive-
rather than the exception. Compared with many of ness and commerce, to counter Internet crime and
the countries in other regions which block Internet terrorism, and to serve as a platform to share best
content, the rise of filtering in Europe is notable practices amongst nations. Notable advancements
because of its departure from a strong tradition of in regulation at the EU levelalthough not directly
democratic processes and a commitment to free in the area of filtering are the definition of ISP
expression. Filtering takes place in various ways, liability toward illegal content and obligations
including the state-ordered takedown of illegal toward data retention (ONI, 2007).
content on domestically hosted Web sites; the
blocking of illegal content hosted abroad; and the latin America
filtering of results by search engines pertaining
to illegal content. As in most countries around With the exception of Cuba, systematic technical
the world that engage in filtering, the distinction filtering of the Internet has yet to take hold in
between voluntary and state-mandated filtering is Latin America. The regulation of Internet content
somewhat not clear in Europe. In many instances largely addresses the same concerns and strategies
filtering by ISPs, search engines, and content seen in North America and Europe, focusing on
providers in Europe is regarded voluntary, but combating the spread of child pornography and
is carried out with the implicit understanding that restricting child access to age-inappropriate mate-

239
Regulation of Internet Content

rial. As Internet usage in Latin America grows, only extensively filter political content but also
so have defamation, hate speech, copyright, and pervasively block content that is perceived to be
privacy issues. religiously, culturally, or socially inappropriate.
The judiciary in Latin America has played an Regional and internal political conflicts are
important role in shaping and tempering filtering also reasons for content blocking. For instance,
activity, a development common to North America Syria and the United Arab Emirates block all
and Europe. At the same time, there has been a wide Web sites within the Israeli domain. Morocco
range of legal and practical responses to regulating blocks Web sites arguing for the independence
Internet activity. Latin American countries have of Western Sahara.
relied primarily upon existing law to craft remedies Internet censorship in the Middle East and
to these challenges, though a growing number North Africa is multilayered, relying on a number
of Internet-specific laws have been debated and of complementary strategies in addition to techni-
implemented in recent years. These issues have cal filtering; arrest, intimidation, and a variety of
been addressed primarily through the application legal measures are used to regulate the posting
of cease and desist orders in conjunction with and viewing of Internet content.
requests to have materials removed from search
engine results. sub-saharan Africa
The level of openness of the media environment
in Latin America is reputed to be subject to con- Internet penetration in sub-Saharan Africa lags
siderable self-censorship, particularly in Brazil, behind that of much of the rest of the world due to
Colombia, Mexico, and Venezuela (ONI, 2007). a variety of economic, political, and infrastructural
reasons. In spite of these hurdles, most countries
middle east and north Africa in the region view their future success as inextri-
cably linked to harnessing the Internets promise
ONI (2007) conducted in-country testing for In- for economic development. Internet regulation
ternet filtering in sixteen countries in the North in Africa, as a result, primarily focuses on infra-
Africa and Middle East region. It was discovered structure and access-related issues rather than on
that eight of these countries broadly filter on- content regulation, though countries are making
line content: Iran, Oman, Saudi Arabia, Sudan, moves to broaden the scope of regulation as the
Syria, Tunisia, United Arab Emirates, and Yemen. Internet spreads.
Another fourBahrain, Jordan, Libya, and Mo- Given the current restrictions on the freedoms
roccocarry out selective filtering of a smaller of expression and the press in sub-Saharan Africa,
number of Web sites. ONI found no evidence of one would expect similar restrictions on Internet
consistent technical filtering used to deny access freedom. A number of countries in Africa have
to online content in Algiers, Egypt, Iraq, or Israel. sought to limit the use of Voice-over Internet
Most of the sites that are targeted for blocking Protocol (VoIP) to protect incumbent telecommu-
are selected because of cultural and religious con- nications companies. However, ONI discovered
cerns about morality. Political filtering, however, evidence of systematic blocking of Internet content
is the common denominator in the region. Bahrain, in only one country, Ethiopia.. Also, Uganda is
Jordan, Libya, and Syria focus their filtering ef- alreported, by other sources, to have engaged in
forts primarily on political content. Iran, Oman, one temporary incidence of filtration during the
Saudi Arabia, Sudan, Tunisia, the United Arab past year ()NI, 2007).
Emirates, and Yemen, on the other hand, not

240
Regulation of Internet Content

united states and canada strategies in the United States and Canada than
those described elsewhere in this volume. In the
Though neither the United States nor Canada prac- United States, many government-mandated at-
tices widespread technical Internet filtering at the tempts to regulate content have been barred on
state level, the Internet is far from unregulated First Amendment grounds. In the wake of these
in either state. Restrictions of Internet content take restrictions, though, fertile ground has been left
the form of extensive legal regulation, as well as for private-sector initiatives. The government
technical regulation of content in specific con- has been able to exert pressure indirectly where
texts, such as libraries and schools in the United it cannot directly censor. In Canada, the focus
States. While there is some United States law that has been on government-facilitated industry
does control access to materials on the internet, self-regulation. With the exception of child por-
it does not truly filter the internet. In the wake of nography, Canadian and U.S. content restrictions
the United States Telecommunications Act 1996 tend to rely more on the removal of content than
and the Bill introduced to overturn its decency blocking; most often these controls rely upon
provisions, it will be clear that legislators have the involvement of private parties, backed by
the power to regulate the content of Internet sites. state encouragement or the threat of legal action
Such control was in fact effectively exercised by (see Palfrey and Rogoyski, 2006; cited by ONI,
the German Government to ban access to certain 2007). In contrast to those regimes where the state
Web sites through CompuServe because of de- mandates ISP action through legal or technical
cency concerns. The pressure to regulate specific control, most content-regulatory moves in both
online content has been expressed in concerns the United States and Canada are directed through
related to four problems: child-protection and private action (ONI, 2007)..
morality, national security, intellectual property,
and computer security. In the name of protecting
the children, the United States has moved to step APProAcHes to Internet
up enforcement of child pornography legislation content regulAtIon
and to pass new legislation that would restrict
childrens access to material deemed harmful. Because the Net is a global medium with no central
Legislators invoke national security in calls to control, it is not possible to monitor and remove
make Internet connections more traceable and objectionable content completely. However, it
easier to tap. Copyright holders have had the most is possible to make it more difficult to access,
success in this regard by pressing their claims and for barriers to be placed in the way of busi-
that Internet intermediaries should bear more nesses and Individuals providing such content.
responsibilityand more liabilitythan they (Parliamentary Office of Science and Technology,
have in the past. Those concerned about computer 2001). Various governments of countries that are
security issues, such as adware and spam, have concerned about the harm some Internet materi-
also prompted certain regulations of the flow of als can cause are taking certain steps to regulate
Internet content. Also, in Canada, although not in access to the Internet. Policies concerning control
the United States, there is restriction in publish- of Internet content may be grouped into four cat-
ing of hate speech (Mosteshar, 1996; ONI, 2007; egories (Wikibooks, 2008; Electronic Frontiers
Wikipedia, 2009). Australia, 2002):
There is heated debate on each of these re-
strictions. Public dialogue, legislative debate, 1. Government policy to encourage Internet in-
and judicial review have led to different filtering dustry self-regulation and end-user voluntary

241
Regulation of Internet Content

use of filtering/blocking technologies. This is registered/licensed by a government author-


the approach taken in the United Kingdom, ity before permitting them restricted access.
Canada, and many Western European
countries. It also appears to be the current
approach in New Zealand where applicabil- Internet content
ity of offline classification/censorship laws regulAtIon Issues
to Internet content seems less than clear. In
these countries, laws of general application There are some issues inherent in Internet content
apply to illegal Internet content such as child regulation .which legislators and others concerned
pornography and incitement to racial hatred. with regulatory frameworks have to considered..
It is not illegal to make content unsuitable These are as follow (EURIM, 1997):
for minors available on the Internet, nor
is access to the same controlled by a re- The application of existing law: The
stricted access system. Some governments Internet does not exist in a legal vacuum.
encourage the voluntary use and ongoing All those involved (authors, content pro-
development of technologies that enable viders, host service providers who actually
Internet users to control their own, and their store the documents and make them avail-
childrens, access to content on the Internet. able, network operators, access providers
2. Criminal law penalties (fines or jail terms) and end users) are subject to their respec-
applicable to content providers who make tive national laws. Those who unwittingly
content unsuitable for minors available and despite reasonable precaution convey
online. This is the approach taken in some illegal material should have their position
Australian State jurisdictions and has been under the law clarified beyond reasonable
attempted in the USA. In these countries, in doubt. The issue involves clarification of
addition, laws of general application apply existing law and of enforcement, not of
to content that is illegal for reasons other new legislation.
than its unsuitability for children, such as Illegal content: It is important to differen-
child pornography. tiate between content which is illegal and
3. Government-mandated blocking of access other harmful content. These different cat-
to content deemed unsuitable for adults. egories pose radically different issues of
This approach is taken in Australian principle and call for very different legal
Commonwealth law (although it has not and technological responses. Priority must
been enforced in this manner to date) and in be given to the application of resources to
China, Saudi Arabia, Singapore, the United combat criminal content - such as clamp-
Arab Emirates and Vietnam, among others. ing down on child pornography or on use
Some countries require Internet access pro- of the Internet as a new technology for
viders to block material while others allow criminals. The task is however not easy,
only restricted access to the Internet through because the definition of what constitutes
a government-controlled access point. an offence varies from country to country.
4. Government prohibition of public access Moreover, where certain acts are punish-
to the Internet. A number of countries, like able under the criminal law of one country,
China, either prohibit general public access but not in another, practical difficulties of
to the Internet, or require Internet users to be enforcing the law may arise.

242
Regulation of Internet Content

Harmful content: Various types of mate- Trade Bodies and Regulatory Models: In
rial may offend the values and feelings of the United Kingdom, a Code of Conduct
other people (for example, content express- has been developed and agreed within the
ing political opinions, religious beliefs or trade association body (Internet Service
views on racial matters). What is regarded Providers Association - ISPA), with the
harmful depends in part on cultural differ- support of the Department of Trade and
ences and countries differ on what is per- Industry. But ISPA membership does not
missible or not permissible. International cover all major providers and although
initiatives must therefore take such dif- the Code is mandatory for members, the
ferences into consideration when explor- range of sanctions is limited. ISPA needs
ing co-operation to protect against offen- enhanced government support and encour-
sive material whilst ensuring freedom of agement if it is to achieve recognition as
expression. the authoritative voice of the industry. The
Detection of breaches of the law: While primary issue, however, is not how the in-
detecting breaches of the law in public dustry itself is organized, but whether reg-
applications of the Internet (for instance, ulation of content on the Internet should be
the WWW) is straightforward, detection voluntary (that is, self-regulation within
is not easy in private applications (for existing law) or imposed (by the State or
instance,. e-mail). Also, while enforce- by some other recognized authority), and
ment of the law is relatively easy within how such a regulatory regime should relate
national boundaries, it is much more dif- to the industry. In a number of Member
ficult in an international context. There are States, information service providers have
technical problems which mean that con- already set up systems of self-regulation:
trol is most practical at the entry and exit indeed, the Commission welcomes this
points to the Network (the terminal used to general movement and is encouraging
read or download the information plus the a European network of associations of
server through which the user gains access ISPs. INCORE (Internet Content Rating
to the Internet and the server on which the for Europe), a loose association of indus-
document is published). Therefore, inter- try, government, police and user interests,
national co-operation is required to avoid is evidence of the sort of co-operation
safe havens for content that is generally which could further be extended to the
agreed to be illegal. wider international level, but it lacks for-
Chain of responsibility: ISPs play signifi- mal recognition and public funding. The
cant role in giving users access to Internet UK Government supports INCORE but is
content. It should not however be forgot- not itself a partner in the project. Industry
ten that the prime responsibility for content self regulating bodies, which face common
lies with authors and content providers. It problems, could usefully co-ordinate their
is therefore essential to identify accurate- approach, in particular regarding technical
ly the chain of responsibilities in order to solutions. The voluntary regulatory body
place the liability for illegal content on in the UK is the Internet Watch Foundation
those who create it. The widespread use of (IWF) which is funded by a number of pro-
filtering devices at points of access should viders and has parallels with ICSTIS. The
act as a powerful incentive to content pro- IWF is not independent from the provid-
viders to rate their content. ers (as is ICSTIS from the Premium Rate

243
Regulation of Internet Content

Telephone Service industry) and lacks the hybrid between a government-regulated regime
credibility and influence which formal rec- and an industry-regulated regime may be the
ognition and legal status could give. The right combination when dealing with censorship
IWF is an attempt at voluntary regulation in cyberspace.(Wikibooks, 2008)
and deserves to be afforded recognition Because the Internet is universal, there is great
and status similar to that of ICSTIS. The need for an international network of hotlines
ICSTIS model is at Appendix I. It is beyond governed by a framework agreement containing
the remit of this paper to consider whether minimum standards on the handling of content
ICSTIS and the IWF should exist as sepa- concerns and stipulating mutual notification be-
rate bodies in future, or, indeed, whether tween hotlines. The hotline in the country where
their natural home might be within a re- the content is located is asked to evaluate it and to
structured ITC. Suitably strengthened, the take action. This mechanism will result in content
ISPA-IWF model is one which other coun- providers being acted against only if the material
tries could be encouraged to adopt as the is illegal in the host country. The mechanism
foundation for a network of international also overcomes impediments in the complex
regulatory regimes, offering co-operation diplomatic procedures necessary for cross-border
between the authorities and providers to cooperation of law enforcement authorities.
ensure that control measures are effective Essentially, no regulatory mechanism can work
and not excessive. independently of an education and awareness
Methodology and Technology: There campaign. The Internet industry should have a
is the issue of how the universal applica- continuous online and offline program to develop
tion of codes such as Platform for Internet general awareness of self-regulatory mechanisms
Content Selection (PICS) (http://www. such as filtering systems and hotlines. Schools
w3.org/PICS/) content classifications are should provide the necessary skills for children
to be defined and applied. International co- to understand the benefits and limitations of on-
operation is required if such problems are line information and to exercise self-control over
to be overcome. problematic Internet content. The Internet is itself
Convergence Issues: Whatever action is a process, an enormous system for change and
taken to regulate content on the Internet, response, feedback and transformation. Like the
the convergence of media and means of Internet, the legal system and regulatory mecha-
presentation will require a convergence of nisms around it must incorporate similar practices
regulatory regimes. The control of audio- of learning and changing (Wikibook, 2008).
visual content on television, for instance,
should be compatible with that of content
on the Internet if the regimes are to be Future trends
even-handed.
It is now well recognized that the Internet as we
know it today, defies total traditional content
cHoosIng Internet content regulatory practices. The main reasons are associ-
regulAtIon mecHAnIsm ated with the blurring of the concepts of territory
and sectors. But as we consider the future of the
Whatever the approach to content regulation, Internet, we see even greater challenges ahead,
the important consideration is that regulation with many questions related to privacy, security
must not inhibit innovation. It would seem that a and regulation of the Internet. It is also the mo-

244
Regulation of Internet Content

ment to initiate a global reflection on an improved, Darlington, R. (2009). How the Internet could
more effective and inclusive Internet.(Reding, be regulated. Retrieved May 8, 2009 from http://
2009). The debate on the legitimacy or otherwise www.rogerdarlington.co.uk/Internetregulation.
of internet content regulation will still continue html
in the future. Governments and other bodies will
Electronic Frontiers Australia. (2002). Internet
continue the efforts to apply regulatory measures.
Censorship:Law & policy around the world. Re-
Illegal, offensive and harmful content will not
trieved May 12, 2009 from http://www.efa.org.
disappear from the Net. However, the number of
au/Issues/Censor/cens3.html
countries controlling Net content will increase.
There is need for studies on how regulation of Electronic Frontiers Australia. (2006). Internet
Internet content can be made more effective and censorship laws in Australia. Retrieved May 11,
widespread. 2009 from http://www.efa.org.au/Issues/Censor/
cens1.html
Jordan, R. (2002). Free speech and the constitu-
conclusIon
tion. Retrieved May 11, 2009 from http://www.
aph.gov.au/LIBRARY/Pubs/RN/2001-02/02rn42.
The Internet as a mass medium of communication
htm
not only contains content considered beneficial
but objectionable content. Different measures have Mathiason, J. R., & Kuhlman, C. R. (n.d.). An In-
been adopted in different countries to regulates ternational Communication Policy: The Internet,
content considered illegal, offensive and harm- international regulation & new policy structures.
ful. However, these efforts have not resulted in Retrieved November 4, 2009 from http://www.
total control of such content. This could be due un.org/esa/socdev/enable/access2000/ITSpaper.
to absence of international laws and measures to html
regulate Internet content, failure of regulation
Mosteshar, S. (1996). Some legal aspects of in-
technique (such as blocking of content by filters)
ternet regulation. Retrieved November 15, 2009
to black access to harmful content among oth-
form http://www.mosteshar.com/sig.html
ers. There is need for developing and adopting
international framework for regulation of Internet OpenNet Initiative. (2007) Global Internet Fil-
content for it to be effective. tering. Retrieved May 8, 2009 from http://map.
opennet.net/filtering-pol.html
Palfrey, J., & Rogoyski, R. (2006). The move to
reFerences
the Middle: The enduring threat of harmful speech
Akdeniz, Y. (n.d.). Speech 3: Controlling internet to the end-to-end principle. Washington University
content: Implications for cyber-speech. Retrieved Journal of Law and Policy, 21, 3165.
November 4, 2009 from http://portal.unesco.org/ Papadopoulous, M., Kafeza, I., & Lessig, L.
ci/en/files/18278/11086401441statement_ak- (2006). Legal considerations for regulating con-
deniz.doc/statement_akdeniz.doc tent on the Internet. Retrieved from http://www.
Ang, P. H. (1997). How countries are regulating marinos.com.gr/bbpdf/pdfs/msg52.pdf
Internet content. Retrieved April 30, 2009 from
http://www.isoc.org/INET97/proceedings/B1/
B1_3.HTM

245
Regulation of Internet Content

Parliamentary Office of Science & Technology. Wikipedia. (2009). Cyberlaw. Retrieved Novem-
(2001). Regulating Internet content. Retrieved ber 15, 2009 from http://en.wikipedia.org/wiki/
May 8, 2009 from http://www.parliament.uk/ Cyberlaw
post/pn159.pdf
Reding, V. (2009). Internet of the future: Europe
must be a key player. Retrieved May 12, 2009 from key terms And deFInItIon
http://ec.europa.eu/commission_barroso/reding/
docs/speeches/2009/brussels-20090202.pdf Breaches of the Law: Refer to violations or
infractions, transgression of the law.
Song, B. K. (2001). Content regulation on the Internet Content Censorship: Is the sup-
Internet. Retrieved May 1, 2009 http://iml.jou. pression of speech or removal of material which
ufl.edu/projects/fall01/song/page5.html is considered illegal, objectionable, harmful,
Sytnyk, O. (2005). Control of internet content: sensitive, or inconvenient to the government on
Purposes, methods, legislative bases. Retrieved the Internet.
November 4, 2009 from http://www.personal.ceu. Local Control: Is the exertion of regulatory
hu/students/04/Oleksandra_Sytnyk/testfile.pdf measures by a government of a country over
Internet content.
Tavani, H. T. (2007). Regulating cyberspace: Offline Laws: Refers to laws not connected to
Concepts and controversies. Library Hi Tech, a computer or computer network or the Internet
25(1), 3746. doi:10.1108/07378830710735849 Problematic Content: Refers to material on
URIM. (1997). EURIM briefing no 19: The regula- the internet considered harmful, illegal, and of-
tion of content on the Internet. http://www.eurim. fensive to users. Examples include pornography,
org/briefings/brief19.htm content that promote racism, etc.
Regulatory Mechanism: Has to do with the
Wikibooks. (2008). Legal and Regulatory Is- approach or measure adopted to control Internet
sues in the Information Economy/Censorship or content.
Content Regulation. Retrieved May 8, 2009 from Restricted Access: Is denied access to material
http://en.wikibooks.org/wiki/Legal_and_Regu- on the Internet. It also refers to Internet content
latory_Issues_in_the_Information_Economy/ to which access has been denied.
Censorship_or_Content_Regulation

246
247

Chapter 16
The New Zealand Response to
Internet Child Pornography
David Wilson
Researcher, New Zealand

AbstrAct
New Zealands approach to regulating illegal material on the Internet varies from other comparable
countries. A single law governs the legal classification of Internet content, commercial films, printed
material and a wide variety of other media and covers legal and illegal content. A Crown agency rather
than the judiciary determines the legality of material. A specialist, non-police, enforcement agency deals
those who possess or distribute illegal material, particularly child pornography. This agency actively
seeks out child pornographers and has a high success rate in prosecuting them. This chapter describes
the history, development and operation of the New Zealand censorship system, as it applies to Internet
content. It is likely to be of interest to policy-makers, law enforcement officers and media regulators in
other countries.

country ProFIle (15 percent), and later immigrants from the Pacific
Islands and Asia. A former British colony, New
New Zealand is a parliamentary democracy located Zealand is a member of the Commonwealth. New
in the South Pacific Ocean, some 2000 kilometres Zealand ranks highly on the Human Development
east of Australia. It is composed of two main Index (Human Development Report Office, 2008)
islands and has a similar land size to the United and consistently is measured as having the lowest
Kingdom or Italy. New Zealands population of levels of perceived corruption in the world (Trans-
four million people is primarily descended from parency International, 2008). New Zealand has a
mid-19th century British and Irish settlers, though high rate of Internet use with 3.36 million users
there are significant numbers of indigenous Maori (79 percent of the total population) and a high rate
of Internet connectivity being ranked 31st in the
DOI: 10.4018/978-1-61692-012-8.ch016 world despite being ranked 122nd for population

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The New Zealand Response to Internet Child Pornography

size. Young New Zealand adults have one of the overseAs APProAcHes
highest Internet usage rates in the world, on a par to cHIld PornogrAPHy
with Canada, Sweden, Netherlands, Norway and
Barbados (UNICEF, 2008). New Zealands approach to the detection and legal
This high level of Internet use brings with it classification of objectionable material differs
New Zealands share of online criminals. One from other comparable countries. In Australia state
area in which the nation has been innovative laws prohibit making, possessing or distributing
in responding to changing technology is in ad- material that describes or depicts a person who is,
dressing the distribution of child pornography or appears to be, under 16 years of age in a man-
on the Internet. This chapter examines how New ner that would offend a reasonable adult (Krone,
Zealands censorship laws have responded to the 2005). Fictitious depictions of the sexual abuse of
challenges of the Internet and identifies particular children or young people are covered, in addition
features of the New Zealand system likely to be to depictions of real people and the laws apply
of interest to policy makers, academics and law to a wide variety of media, including electronic
enforcement officials in other countries. material. The state and federal police investigate
child pornography offences and the courts de-
termine the legal status of material alleged to be
new ZeAlAnds APProAcH child pornography. Material may be submitted for
to cHIld PornogrAPHy classification to the Office of Film and Literature
Classification and the Offices decision may be
The creation, possession, distribution, importation used in evidence (Office of Film and Literature
and provision of access to child pornography are Classification, 2006). The legislation governing
illegal in New Zealand. Child pornography is child pornography and other illegal material is
broadly defined as material that promotes or sup- the federal Classification (Publications, Films
ports the sexual exploitation of children or young and Computer Games) Act 1995 and censorship
people or that exploits their nudity. A child or young or general criminal law in the eight states and
person is considered to be someone 16 years of age territories.
or less. Decisions about the legal status of mate- In England and Wales the law relating to child
rial alleged to be child pornography are made by pornography is spread across five statutes (Gil-
a specialist, non-judicial classification body, the lispie, 2005). It is illegal to make, distribute or
Office of Film and Literature Classification. The possess an indecent image of a child less than 18
Censorship Compliance Unit of the Department years of age. The police investigate and prosecute
of Internal Affairs (an organisation separate from cases involving obscene material and the courts
the New Zealand Police) is primarily responsible determine whether material meets the obscenity
for investigating and prosecuting offenders within test (Andrews, 2003). The British Board of Film
New Zealand. Classification may classify obscene films and
The New Zealand approach to child pornogra- DVDs but it does so in consultation with the Crown
phy will be detailed in this chapter. But before it Prosecution Service and the police (Perkins, 2009).
does so, it is useful to consider approaches taken In Germany it is illegal to offer, transmit,
in other developed nations. procure or possess child pornography under the
Strafgesetzbuch (German Penal Code). The penal
code defines child pornography as pornographic
publications that deal with the sexual abuse of chil-
dren less than 18 years of age. The criminal courts

248
The New Zealand Response to Internet Child Pornography

determine whether material is child pornography. In the Republic of Ireland the production,
The police of each state, many of which have dissemination, handling or possession of child
developed specialist online investigative units, pornography is illegal under the Child Trafficking
carry out enforcement of the law. The criminal and Pornography Act 1998. Child pornography
investigation department of the federal police is defined as a representation of a person who
works closely with the state police and co-ordinates is, or is depicted as being, under 17 years of age
nationwide investigations (Heuck, 2005). Differ- involved in sexual activity. Irish law also outlaws
ent specialists undertake investigation, forensic depictions, for sexual purposes, of the genitals of
analysis and prosecution of offenders. a child (ODonnell & Milner, 2007). The Gardai,
The law on child pornography and associ- the police force, enforce the law and the courts
ated enforcement activity in the United States decide, in the course of a prosecution, whether the
of America has been the subject of a large body material constitutes child pornography.
of writing and research. Currently, U.S. law de- The paragraphs above outline five jurisdictions
fines child pornography as a visual depiction of with different legal systems and different laws
a minor engaged in sexually explicit activity and governing child pornography. However, each
a visual depiction of an actual minor engaging country has in common that images that record
in sexually explicit conduct (Loftus, 2008). The the sexual abuse of children are illegal, the courts
U.S. Constitution protects free speech to an ex- generally determine the legal status of alleged
tent unrivalled in most developed countries. The child pornography and the police in each country
Supreme Court has stated that it has long held enforce that law. Although Australia, England,
that obscene speechsexually explicit material Germany and the United States of America are
that violates fundamental notions of decency much larger countries than New Zealand they have
is not protected by the First Amendment.1 A in common that they are developed democratic
2008 decision of the Supreme Court confirmed nations with high levels of Internet use. They are
that virtual child pornography is illegal only if also countries with which New Zealand frequently
the person in seeking to obtain it believes it to co-operates in international efforts to combat child
depict real children (United States v Williams, pornography. Ireland has a similar population size
2008). The decision upheld current law that has to New Zealand and is a developed democratic
been the subject of considerable amendment after nation with a high level of Internet use.
earlier provisions had been struck down as un-
constitutional. Material such as a work of fiction
is protected by the First Amendment. Simulated A sIngle non-judIcIAl
child pornography is generally not illegal, unless decIsIon-mAkIng body
offered as if real children were involved, or if the
material is deemed to be obscene (Cohen, 2003). The overseas jurisdictions outlined above leave
The test of obscenity is complex and involves, in it to the courts to determine the legal status of
part, applying contemporary community standards alleged child pornography. In 1993 New Zealand
to determine if material appeals to the prurient took a different approach in creating the Office of
interest in sex (Ferraro & Casey, 2005). American Film and Literature Classification (Classification
child pornography laws apply across a range of Office) as the sole body permitted to determine
media, including the Internet. The law is enforced the legal status of a wide variety of media. It was
by local and state police as well as the F.B.I., U.S. given jurisdiction over the films, videos and lit-
Customs and the Postal Inspection Service at the erature previously regulated by the three different
federal level. censorship bodies. Provision was also made for

249
The New Zealand Response to Internet Child Pornography

the classification of a wide range of other material, expression enshrined in the New Zealand Bill of
collectively called publications. This included Rights Act 1990 with protecting the public good
any word, image or representation recorded in any from harm. Central to the classification regime is
way that makes it capable of being reproduced. whether or not a publication is injurious to the
The Classification Office was to have been part public good, an issue that is determined by statu-
of a government department but the parliamentary tory criteria. The focus on injury is a deliberate
committee that scrutinised the legislation prior to departure form earlier statutes that used terms such
its enactment recommended that it be established as offence, indecency or obscenity as the test
as a Crown entity, a state sector organisation that for classification. This was the overt intention of
would operate independently of the government of the legislation when it was introduced (Bather,
the day to prevent political censorship. The Crown 2002). A publication that is not injurious is not
Entities Act 2004 classed the Classification Office subject to any legal restriction. If a publication is
as an independent Crown entity, a body with found to be injurious then the Classification Of-
legal protection from government influence that fice must consider how to remedy the injury. The
is able to operate without regard to government most common injury is the likely harm caused
policy in discharging its duties. by exposing children to graphic violent or sexual
One of the notable features of New Zealands material that may adversely effect their develop-
censorship law is the way it combines a wide ment. The injury is addressed by restricting the
variety of media into one law. The Films, Videos, publication to people of an age where they are
and Publications Classification Act 1993 provides able to process the content and put it in context
that it applies to any publication. The Act defines without being adversely effected by it.
publication broadly to include: Where a publication is found to be injurious
to such an extent that an age restriction is not
films, books, sound recordings, newspaper, able to remedy the harm it will cause then the
photograph, print or writing; and publication is classified as objectionable and
any thing that has images, representa- is banned. Certain publications are automati-
tions, signs, statements or words printed, cally objectionable under the Films, Videos, and
impressed, recorded or stored on it. Publications Classification Act 1993 and must be
banned. These automatically banned publications
Since 1995 the courts had recognised com- include those that promote or support the sexual
puter files as publications, within the meaning exploitation of children, sexual violence, necro-
of the Act (Manch and Wilson, 2003). To avoid philia, bestiality and torture. The legislation also
any future doubt, the law was amended in 2005 governs the classification of material that degrades
to make specific reference to computer files as or demeans people, promotes discrimination, or
publications. Electronic files comprised 82 per depicts self-harm, though such material is not
cent of all the publications found to be illegal by automatically banned.
the Office of Film and Literature Classification The wide purview of the Films, Videos, and
in the 2008 (Office of Film and Literature Clas- Publications Classification Act 1993 allows the
sification, 2008). Classification Office to deal with any publication
Concern in the early years of censorship cen- from an animated childrens film to a graphic
tred on addressing the danger to moral health horror film to child pornography images under
posed by films (Christoffel, 1989). New Zealands the same legal criteria. This allows remarkable
censorship system has evolved considerably since consistency in decision-making. While the Clas-
that time and now aims to balance the right to free sification Office is obliged only to provide written

250
The New Zealand Response to Internet Child Pornography

reasons for its decisions to ban publications, its training to investigators to assist them in identify-
practice of producing written reasons for all clas- ing objectionable material. They also speak to a
sification decisions enables considerable public wide variety of audiences as part of a community
scrutiny of its activities. Anyone who is dissatis- education programme that the Classification Of-
fied with a classification decision is able to have fice is required by law to provide.2 In addition to
it reviewed by the Film and Literature Board receiving training from the Classification Office,
of Review, composed of nine expert members law enforcement agencies may submit publica-
of the public. The Classification Office has 30 tions to it for classification at any stage in an
staff located in the nations capital, Wellington. investigation. This means that an investigator can
In 2008, the Classification Office deemed 300 have legal certainty that material is illegal before
publications to be objectionable and half of these obtaining a search warrant or before laying charges
banned publications were child pornography. Most against an offender.
objectionable material is submitted for classifica- New Zealands censorship system focuses
tion by law enforcement agencies (Office of Film primarily on classifying material intended for
and Literature Classification, 2008). Most of the public consumption. It does not concern itself
publications received by the Classification Office with the private viewing choices of adults, except
are DVDs intended for commercial release but in relation to objectionable material. As a result,
anyone can submit a publication for classifica- there is no mandatory filtering of Internet access
tion so the Classification Office deals with a wide in New Zealand. However, those who choose to
variety of material. download or distribute objectionable material
Consistent decision-making is also aided by face the risk of detection, prosecution and im-
the fact that all classification decisions in New prisonment. This approach contrasts with that of
Zealand are made by the same professional Australia, which has a similar media classification
body. The courts have no jurisdiction to classify scheme but prohibits sexually explicit content on
a publication. If the question of the legality of a the Internet including X18 (legal, sexually explicit
publication arises in the course of a prosecution, content) and RC (refused classification because
the courts must refer the matter to the Classifica- it contain sexual violence, child abuse, criminal
tion Office. The Classification Office applies the instruction or extreme violence). Such content,
legislation to classification decisions on a daily if hosted in Australia, is subject to take-down
basis. It made almost 3,000 decisions in 2008, notices issued by the Australian Communica-
across a wide variety of media and classifica- tions and Media Authority and to prosecution
tions. The courts deal with approximately 100 for failure to comply with the notice (Brown and
objectionable material cases each year, meaning Price, 2006). Australia is currently trialling ISP-
that many judges would preside over no more level mandatory filtering of the same prohibited
than a single case of that type each year. If they Internet content. At the same time New Zealand
were responsible for classifying material, judges has commenced voluntary ISP-level blocking of
would have little experience on which to base known child pornography sites.
their decisions.
The Classification Office carries out its own
research and gathers external research to better A dedIcAted
inform its classification decisions. It also provides enForcement body
a service to law enforcement agencies that no
court could offer training in application of the Censorship law in New Zealand is primarily en-
law. Staff from the Classification Office provide forced by the Inspectors of Publications from the

251
The New Zealand Response to Internet Child Pornography

Censorship Compliance Unit of the Department of enforcement agents involved in investigating child
Internal Affairs. This is notable for the fact that the pornography offences in other countries will often
Inspectors are not police officers and is the other be divided into those who detect offenders, those
major way in which New Zealands approach to who carry out search and seizure and those who
censorship varies from many other nations. The analyse seized computers. The Inspectors work
Department had been responsible for inspecting closely with the New Zealand Police and are
cinemas for many decades and had also carried accompanied by police officers on every search
out inspections of video stores to ensure they warrant they execute on offenders physical ad-
complied with classification decisions. When the dresses. Co-operation with the Police is important
Films, Videos, and Publications Classification Act because of the likelihood of child pornography
1993 was passed, the Department continued to offenders also carrying out physical sexual of-
hold the primary responsibility for investigation fending against children and because only the
of crimes involving objectionable material. The Police have the power to arrest. The Censorship
Department established a Censorship Compliance Compliance Unit also works closely with the New
Unit to carry out this function. Inspectors from Zealand Customs Service that, the border protec-
the Unit have the power to prosecute offenders tion agency that investigates the importation of
and to carry out search and seizure, under a search objectionable material. The three agencies work
warrant. While such powers are commonplace together under a formal agreement. The Police,
amongst law enforcement officers, the Censorship although they have the powers of Inspectors to
Compliance Units operational model is unusual investigate censorship offences, do not duplicate
in that the investigators also carry out the forensic that work but, instead, focus on investigating other
analysis of seized computers and appear as pros- online crimes such as adults grooming children
ecution witnesses in Court. One of the strengths for sexual offending (Van Der Stoep, 2009).
of the model is that the officers who carry out the The Censorship Compliance Unit has devel-
field-work (detection, investigation and seizure) oped working relationships with overseas law
also carry out the lab-work (forensic analysis). enforcement agencies, particularly in Canada, the
This makes them very knowledgeable witnesses United States of America, Norway, Germany, the
for the prosecution. Their technical knowledge also United Kingdom and Australia. Since 2007, 30 per
helps when interviewing suspects because they are cent of the Units prosecutions have arisen from
aware of the details of alleged offences and the intelligence on New Zealand offenders provided
exact nature of the electronic evidence they have by overseas law enforcement agencies. Almost all
obtained. Another strength of this unified model other cases are detected through the Units online
is the fact that the chain of custody for evidence covert surveillance of offenders, though some
is much easier to maintain when the same officers (13 per cent) have arisen from public complaints,
are involved at every stage of the investigation including complaints from computer repair stores
(Carr 2006). The high quality of their investiga- (correspondence with the Department of Internal
tions, knowledge as prosecution witnesses and Affairs, 2009). This situation contrasts with some
reliable chain of custody of evidence has resulted other countries. A United States study found that
in a conviction rate of more than 99 percent. Only only 3 per cent of child pornography cases came
two people charged by the Censorship Compli- to light because of online investigations, while
ance Unit have ever escaped conviction. This is the vast majority (87 per cent) became known
an enviable record by any measure. as a result of conventional child sexual abuse
Investigators capable of carrying out all stages cases (Wolak, et. al, 2005). This difference may
of an online investigation are uncommon. Law reflect the different approaches taken to investi-

252
The New Zealand Response to Internet Child Pornography

gations by the Censorship Compliance Unit in online investigations were into computer bulletin
New Zealand, which has a mandate focussed on boards being used to exchange objectionable
child pornography, and police departments in the images in 1995. The Censorship Compliance
United States, with a much wider mandate, includ- Unit was established in 1996 to focus on Internet
ing child pornography but focussed on physical offenders and, at that time, more than half of its
sexual offences. Because the New Zealand Police prosecutions involved online child pornography
do not aim to replicate the work of the Censor- (Department of Internal Affairs, 1997). In the years
ship Compliance Unit, and, instead focus on child since 1996, the majority of the units investigative
sexual abuse investigations, the majority of child effort has come to be spent on such cases.
pornography cases prosecuted by the Police stem While some early online offending involved
from such investigations. downloading material from child pornography pay
websites, most offending occurred in dedicated
child pornography chat rooms (Department of
lAws reFlect cHAngIng Internal Affairs 1998). In these chat rooms, of-
tecHnology fenders would openly solicit child pornography
and offer it to other offenders in return for new
The Censorship Compliance Unit has focussed material. Investigators from the Censorship Com-
on investigating two offences primarily the pliance Unit would join the chat rooms, pose as
possession of child pornography and the mak- offenders seeking new material, and engage New
ing and distribution of child pornography. While Zealand offenders. When those offenders sent
its mandate is to investigate and prosecute all objectionable images to the investigators their
types of censorship offending including mate- unique Internet Protocol (IP) address would be
rial promoting sexual violence, necrophilia and captured. A search warrant executed on the of-
bestiality, child pornography is its focus because fenders ISP would identify the person to whom
the making of such material often involves the the IP address was allocated and this information
sexual abuse of children. Online child pornog- would provide the vital connection between the
raphy offenders are able to socialise through a online identity and the real-life offender. A second
virtual community with thousands of members. search warrant executed on the physical address
Some researchers suggest that this can normalise supplied by the ISP would enable the Censorship
deviant behaviour and encourage the avoidance of Compliance Unit to interview the offender and
individual responsibility by providing behavioural seize computer equipment for subsequent forensic
reinforcement and anonymity (Taylor et al. 2001, analysis. Confronted with a search by officers
Lanning 1992, Quayle et al. 2000, Shelley 1998, who held detailed information about the offend-
OConnell 2001). ing and were likely to obtain damning evidence
The way that objectionable material is obtained from the seized computer, a large proportion of
and exchanged has changed significantly in the suspects (86 per cent) simply confessed to the
past two decades. When the Department of In- their offending (Carr 2004).
ternal Affairs began its investigations most child The Censorship Compliance Unit found that,
pornography and other illegal material was con- between 2004 and 2005, there was a distinct move-
tained on videotapes, magazines and photographs. ment away from chat rooms towards peer-to-peer
A relatively small amount of this material was applications (Wilson and Andrews, 2004; Sullivan,
in circulation due to New Zealands geographic 2005). A smaller number of offenders continued
isolation and the work of the Customs Service in to post images or links to images in newsgroups,
detecting it at the border (Wilson, 2002). The first participated in chat rooms or operated websites

253
The New Zealand Response to Internet Child Pornography

from which people could download material. But clearly inadequate and fail to reflect the fact that
the majority operated passive distribution systems the production of child pornography involves the
such as file-servers or peer-to-peer networks where actual abuse of children. The new penalties were
other people could open folders on computers and to be a maximum of 10 years imprisonment for
download material without the need for the pos- supply and distribution of child pornography and a
sessor of the material to actively transmit it. This maximum of two years imprisonment for posses-
development was consistent with overseas trends sion of child pornography (Goff, 2003). Anti-child
noted in contemporary international research (Fer- abuse organisations Stop Demand Foundation and
raro & Casey, 2005; Koontz, 2003). The use of ECPAT advocated a higher penalty for possession
peer-to-peer networks for offending made it easier offences. These groups argued that the possession
for investigators to seek out objectionable mate- offence should be treated as seriously as the supply
rial since it could be searched for in the network offence since the demand for child pornography
through the use of key words with out the need to led to child abuse. The result was a revision of
engage with offenders. However, the huge amount the maximum penalty for possession offences to
of material discovered made it difficult to identify five years imprisonment.
New Zealand offenders, without manually check- Important definitional changes were made in
ing their IP addresses. To address this problem the parallel to the increased penalties. The focus of
Censorship Compliance Unit developed its own these amendments to the Films, Videos and Publi-
software to automatically search peer-to-peer net- cations Classification Act 1993 was on the sections
works and locate New Zealand-based offenders. of the Act that defined the offence of distribution
The use of this software allows investigators to of objectionable material. The law originally had
better focus their efforts on local offenders, rather required elements of monetary or material gain
than those located overseas over which they have in order to prove a distribution charge. However,
no jurisdiction. When they do locate overseas of- New Zealand experience showed that very few
fenders, the details are passed on to the relevant traders in objectionable material aimed to do
law enforcement agency through Interpol. anything other than increase the size or range
In parallel with these changes in investigative of their collection of objectionable material by
technique came changes to the law to ensure it exchanges with other traders. The Act was
took account of developments in technology and amended in 2005 so that distribution included
patterns of offending. Historically, penalties for delivering, giving, offering or providing access
censorship offending had been low. The maximum to a publication. The passive distribution of
penalty for possession of objectionable material objectionable material by providing access to it
was a $2,000 fine. The penalty for distributing or but not actively transmitting it was caught by the
supplying objectionable material, knowing that it broader definition of distribution.
was objectionable (the most serious offence under When the amendments to the legislation were
the Act), was a maximum of one years imprison- before a parliamentary committee some groups,
ment. There had been calls for change, to toughen including ISPs and the Internet Society of New
penalties and align them with overseas jurisdic- Zealand, expressed concern that providing access
tions (ECPAT 2003, Department of Internal Affairs to objectionable material could be taken to apply
2002a), in a climate of international concern about to businesses that provide the networks through
online child abuse and growing public and political which material is distributed such as ISPs and
dissatisfaction with the sentences given to child postal services. The legislation was amended to
pornographers in New Zealand. In March 2003 the specifically exclude such services. This has an
Minister of Justice stated that the penalties were important implication for libraries, universities

254
The New Zealand Response to Internet Child Pornography

and other organisations that provide Internet ac- a publication was objectionable to be prosecuted
cess to the public. In order to be held liable for the for possession, but did need to be aware of the
use of its computers to download illegal material, presence of the publication and have the ability
the organisation would have to know of the nature to exercise control over it (for example, by sav-
of the material and that it was being downloaded ing or deleting it).4 This confirmed Censorship
rather than simply provide the facilities that could Compliance Unit prosecution decisions and earlier
be used to commit an offence (Wilson, 2008). court judgments over what constituted possession
A recent High Court decision in an appeal (Manch and Wilson, 2003). The real weakness of
against convictions for distributing child por- the possession offence was the very low penalty - a
nography showed that the law changes had had maximum $2,000 fine. Under the same legislation,
the intended effect. The judge hearing the case the maximum penalty for selling a DVD that was
dismissed the appeal that was based on the argu- not correctly labelled was a fine of $3,000. There
ment that downloading objectionable material had been calls to toughen penalties, and align them
and saving it into a shared folder accessible to with overseas jurisdictions. In 2005 a new, related
others on a peer-to-peer network did not constitute possession offence was created which carried a
distribution of the material. The judge noted maximum sentence of five years imprisonment.
that the offender could have saved the images in However, the new offence requires proof that the
a personal folder that others could not access if offender knew that the material in their possession
distribution was not intended. was objectionable. This is a reasonable safeguard
in light of the severity of the penalty. The material
Instead, [he] elected to download them onto files that is the subject of prosecutions for possession
which, as the [trial] Judge pointed out, are net- is so clearly objectionable that proving that the
works which exist for the very purpose of trading person in possession of it knew it was illegal is
objectionable material The statute expressly not a significant barrier to conviction. This con-
provides that a person distributes by providing clusion is supported by the fact that 90 per cent
access to an objectionable publication. That is of prosecutions in the last two years have involve
the act that Parliament has expressly proscribed convictions for the new offence of possession of
within measures taken to prohibit the use of com- child pornography, knowing it to be objectionable
puter technology as a means of disseminating (correspondence with the Department of Internal
child pornography.3 Affairs, 2009).
An important contribution to case law about
Clarity around the parameters of the offence the possession of child pornography occurred in
provisions was important given that the maximum 2004 when a school teacher was convicted after
penalty for distribution of objectionable material opening objectionable images, viewing them and
was increased to 10 years imprisonment in 2005. then closing them. Although he did not save the
Possession of objectionable material is an of- images, they were cached on the school computers
fence under the Films, Videos, and Publications hard drive. The judge in the case found that the
Classification Act 1993. When the law was initially defendant sought out and came into possession
enacted, possession of objectionable material was of the material knowingly and exercised control
made a strict liability offence, meaning that it over the material, albeit for a short period of time.
did not have to be established that an offenders The judge held that any reasonable interpretation
knew that material was objectionable in order to of the law that inhibited the use of material that
be convicted of possessing it. In 2002, the High sexually exploits children was to be preferred.5
Court found that a defendant did not need to know The decision made it clear that even the briefest

255
The New Zealand Response to Internet Child Pornography

period of possession of objectionable material the appellant undertook certain steps to display
was an offence. or make available the images on his website.6

The court also pointed to section 7 of the


APPlIcAtIon oF tHe lAw to Crimes Act 1961 which provides that where any
new ZeAlAnders overseAs element of an offence occurs in New Zealand, the
offence shall be deemed to be committed in New
The Internet has changed the way that governments Zealand. The decision was significant because it
should think about their borders. The Internet largely eliminated a legal defence available to New
belongs to no one country. It is possible for a Zealanders who based their child pornography
company in the United States to operate a server operations oveseas to avoid prosecution.
from Jamaica that contains images or information
accessible to people in almost any country in the
world. Furthermore, material that may be perfectly sentencIng sInce tHe
legal in the country in which it was created, or 2005 lAw cHAnges
from which the server storing it operates, may be
prohibited elsewhere. This issue was addressed in In the two years following the enactment of the
New Zealand in 2005 when a man was convicted 2005 law changes the proportion of offenders
on charges of making available objectionable receiving a custodial sentence remained low,
publications as a result of a Censorship Compli- compared to other countries, at 40 per cent. This
ance Unit investigation. The offender had hosted was because the courts were still sentencing for
the pictures on an overseas server but controlled some offences committed before the law change
the content of the server from New Zealand. He and were only able to sentence in accordance with
appealed his convictions. One of the grounds of the law at the time of offending.7 Since 2007, 60
appeal was that the objectionable computer im- per cent of convicted offenders have received a
ages in question were not made available in New custodial sentence. The average prison sentence
Zealand, since they were hosted on a server in the imposed is increasing. In the two years imme-
United States and were intended for an overseas diately following the law change, the average
audience. He argued that making the images avail- sentence was 13 months. Since 2007, the aver-
able in New Zealand should require the person to age prison sentence has increased to 18 months
direct the activity towards New Zealand. The High (correspondence with the Department of Internal
Court did not accept the appellants submission Affairs, 2009).
and noted that the files were placed on a website
server so that they would be available world-wide,
including to people in New Zealand. The fact that new ZeAlAnds lAw In tHe
an Inspector was able to access the files in New InternAtIonAl context
Zealand was accepted by the Court as evidence
of the availability of the files in that country. The Amendments to the censorship offence provisions
Court found that: in 2005 significantly strengthened New Zealands
efforts to combat child pornography and other
It is irrelevant that the appellant may have believed objectionable material. The maximum penalties
his primary market to lie elsewhere. It is likewise for offences involving this material are similar to
irrelevant that the server utilised by the appellant those in the United Kingdom, Australia, Canada,
was situated in the USA. While in New Zealand, Ireland and the United States.

256
The New Zealand Response to Internet Child Pornography

It is difficult to establish objective criteria by a normal feature of New Zealand criminal law.
which to analyse the effectiveness of a law, particu- However, New Zealands privacy laws permit
larly in an international context. The International a person to breach anothers privacy in order to
Centre for Missing and Exploited Children (2008) report a crime.
has established some criteria against which to New Zealands laws against child pornography
assess the responses to child pornography of the have some significant advantages over many other
187 Interpol member nations. The 10 criteria are: jurisdictions. They enable a wide variety of mate-
rial that promotes or supports child sexual abuse
1. Defining child for the purposes of child to be classified as objectionable, whether or not
pornography as anyone under the age of 18, a real child was victimised in the production of
regardless of the age of sexual consent; the publication. This includes works of fiction,
2. Defining child pornography, and ensuring cartoons, computer-generated (morphed or
that the definition includes computer and pseudo) images and images depicting sexualised
Internet specific terminology; nudity. The New Zealand definition of child por-
3. Creating offences specific to child pornog- nography is broader than that used by the United
raphy in the national penal code, includ- Nations which defines it as any representation,
ing criminalizing the possession of child by whatever means, of a child engaged in real
pornography, regardless of ones intent to or simulated explicit sexual activities or any
distribute, and including provisions specific representation of the sexual parts of a child for
to downloading or viewing images on the primarily sexual purposes.8
Internet;
4. Ensuring criminal penalties for parents or
legal guardians who acquiesce to their childs ProFIlIng oF oFFenders
participation in child pornography;
5. Penalizing those who make known to others In 2000 the Censorship Compliance Unit iden-
where to find child pornography; tified a lack of knowledge about the common
6. Including grooming provisions; characteristics of offenders who distributed ob-
7. Punishing attempt crimes; jectionable material on the Internet. It initiated
8. Establishing mandatory reporting require- a research project aimed at better understanding
ments for workers likely to come into contact the nature and offending behaviour of censorship
with child pornography; offenders. The research was based on a question-
9. Addressing the criminal liability of children naire completed by the Censorship Compliance
involved in pornography; and Unit, based on its observations and interviews
10. Enhancing penalties for repeat offenders, of offenders. The questionnaire collected social,
organized crime participants, and other ag- demographic and behavioural information about
gravated factors considered upon sentencing. offenders (Carr, 2004).
In the study, the offenders were overwhelm-
New Zealands law meets nine of the 10 criteria, ingly male (only one was a woman); mostly white,
because it does not require mandatory reporting likely to be middle class and adept at using the
of offences. Only five countries in the world Internet. The offenders ages, at the time they
have this requirement and thereby meet all of the were investigated, ranged from 14 to 67 with the
standards set by the reports authors (International average age being 30. But almost a quarter of
Centre for Missing & Exploited Children, 2008). the offenders were aged less than 20 years. The
A mandatory requirement to report crime is not most common occupations among offenders were

257
The New Zealand Response to Internet Child Pornography

student or information technology professional. Future trends


Of greatest interest were the 13 per cent of offend-
ers who had been convicted for physical sexual Child pornographers will continue to change their
offences in addition to their child pornography methods of offending as information and com-
offending. Two similar studies found that 12 per munication technology changes. New Zealand
cent of American offenders (Wolak et, al., 2005) has witnessed these changes as hard copy photo-
and 5.1 per cent of Irish offenders (ODonnell graphs and video tapes largely have been replaced
and Milner, 2007) had previous convictions for by digital media. There has been a progression
sexual offences. The results of these studies do from bulletin boards to chat rooms and then to
not, by themselves, prove that collectors of child peer-to-peer networks. Offenders have adopted
pornography necessarily go on to commit child new technology to avoid detection and better ac-
sex offences but it appears that they are signifi- cess objectionable material. But their changes in
cantly more likely to do so than the rest of the method are not necessarily linear or exclusive of
population. All three studies found that most child other methods. It would be a mistake to assume
pornography offenders had never been in trouble that because many offenders use peer-to-peer
with the law previously. This result supports the networks to collect child pornography, that they
approach taken by the Censorship Compliance no longer use chatrooms, for example. It would
Unit in searching out child pornography offend- also be a mistake to think that offenders will not
ers on the Internet, since most will not come to use other methods, employing technology not yet
the attention of law enforcement authorities for available or reverting to previous methods. The
any other reason or until they have carried out point is well illustrated by a group of New Zealand
physical sexual offending. offenders who downloaded child pornography
The New Zealand research also examined the images from the Internet but circulated them by
extent to which online offenders had access to handing a hard drive from one person to the next.
the subjects of their image collections. It found Technology for storing data continues to
that 40 per cent had frequent access to children in decrease in size and increase in capacity. This
their daily lives. Most offenders used no security development bring its own challenges to those
mechanisms to protect their collections of objec- charged with searching for evidence of offend-
tionable images from discovery and only five per ing. Offenders will always balance their desire to
cent encrypted them. Offenders valued ease of avoid detection with a wish to easily access and
access to their collection more highly than pro- disseminate child pornography. Thus, encryption
tecting it from unwanted scrutiny. This profiling of material or hiding storage devices is weighed
research provided valuable insights into offender against accessibility. The dissemination of child
behaviour, contributing to increased efficiency in pornography to others involves offenders mak-
investigation, prosecution and treatment as well ing themselves visible, in varying degrees, to
as providing a sound empirical base on which to law enforcement agencies. Those agencies must
develop censorship policy. Similar research has continue to adapt to the changes in the uses of
since been undertaken in other countries. The technology, in the pursuit of offenders. The key
Censorship Compliance Unit publishes updates to keeping pace with methods of online offending
on key offender statistics each year. is in gathering intelligence about offenders and
sharing it globally. But effective enforcement also
requires the support of effective and fair legal and
administrative frameworks.

258
The New Zealand Response to Internet Child Pornography

conclusIon part in shaping that response I hope I have done it


justice without being overly effusive in my praise.
It is always challenging for legislation to keep I do not advocate that other jurisdictions simply
pace with emerging technology. New Zealands attempt to replicate the New Zealand system
approach to date has not been to legislate for within their own settings but I hope that the ap-
a wide variety of new Internet-based offences. proach described in this chapter may highlight that
Rather, policy-makers have generally viewed there are different ways of approaching a global
new technology as a different means to carry out problem. A national classification organisation to
already-existing offences. It has also approached adjudicate all illegal material works effectively in
new information technology as beneficial, but a country with a small population. It would not
with the potential to be used for criminal activity. work well in a populous country, if we assume
Child pornography was made and exchanged in a similar level of offending and enforcement
New Zealand prior to the widespread availability activity, without significant financial and human
of Internet access. It is not possible to accurately resources. Similarly, a single investigative body
state what effect, if any, Internet availability has may be problematic in nations with strong state
had on rates of offending. However, New Zealands government. However, the most recent study of
censorship law is well-placed to deal with cur- child pornography laws by the International Centre
rent and future offending. Its offence provisions for Missing and Exploited Children (2008) found
are expressed in broad and permissive terms to that only 29 of the 187 Interpol member countries
cover existing technology and technology not yet have legislation sufficient to combat child pornog-
available. The classification provisions keep the raphy offences while 93 have no legislation at all
law tightly focussed on banning harmful material that addresses child pornography. The approach
while allowing unfettered access by adults to legal outlined in this chapter may be of most interest
material. A single law to deal with legal and il- to those policy makers and law enforcement of-
legal publications of all types leads to a consistent ficials in countries wishing to start tackling child
decision-making regime. pornography.
New Zealands censorship laws are able to
be effective because of the agencies that operate
under them. The Censorship Compliance Unit of reFerences
the Department of Internal Affairs is an effective
law enforcement agency with a firm focus on Andrews, C. (2003). The problem of child por-
detecting and prosecuting child pornographers. nography on the Internet and the ability of the
The Office of Film and Literature Classification British Police to regulate it. Unpublished MA
is an expert classification body that makes deci- thesis, University of Hull, Hull, UK.
sions based on research, precedent and experience Brown, R., & Price, S. (2006). The Future of
in classifying tens of thousands of publications. Media Regulation in New Zealand: Is There One?
These agencies and the government will need to Retrieved March 19, 2009, from http://www.bsa.
remain vigilant to ensure that their processes and govt.nz/publications/BSA-FutureOfMediaRegu-
legislation are not eclipsed by technology. Based lation.pdf
on experience to date, this is a challenge they are
well equipped to face. Burrows, J., & Cheer, U. (2005). Media Law in
The New Zealand response to Internet child New Zealand (5th ed.). Melbourne, Australia:
pornography works well in the New Zealand Oxford University Press.
context. As a New Zealander who has played a

259
The New Zealand Response to Internet Child Pornography

Carr, A. (2004). Internet Traders of Child Por- International Centre for Missing & Exploited
nography and other Censorship Offenders in New Children. (2008). Child Pornography: Model
Zealand. Wellington, New Zealand: Department Legislation & Global Review. Retrieved on Febru-
of Internal Affairs. ary 15, 2009, from http://www.icmec.org/en_X1/
pdf/ModelLegislationFINAL.pdf
Carr, A. (2006). Internet censorship offending: a
preliminary analysis of the social and behavioural Koontz, L. (2003). File-Sharing Programs: Child
patterns of offenders. Unpublished PhD thesis, Pornography is Readily Accessible over Peer-to-
Bond University, Queensland. Peer Networks . In Holliday, W. (Ed.), Governmen-
tal Principles and Statutes on Child Pornography.
Cohen, H. (2003). Child Pornography Produced
New York: Nova Science Publishers.
without an Actual Child: Constitutionality of
Congress Legislation. In W. Holliday (Ed.), Gov- Lanning, K. (1992). Child Molesters: A Behav-
ernmental Principles and Statutes on Child Por- ioural Analysis. Washington, DC: National Centre
nography. New York: Nova Science Publishers. for Missing and Exploited Children.
Department of Internal Affairs. (1997). Report of Loftus, R. A. (2008). Disconnecting Child Por-
the Department of Internal Affairs for the year nography on the Internet: Barriers and Policy
ended 30 June 1997. Wellington, New Zealand: Considerations. Forum on Public Policy Online,
Author. Spring. Retrieved on 15 June 2009 from http://
www.forumonpublicpolicy.com/archivespring08/
Department of Internal Affairs. (1998). New Zea-
loftus.pdf
land Censorship Compliance Unit. Unpublished
paper presented at the Australian Institute of Manch, K., & Wilson, D. (2003). Objectionable
Criminology conference, Internet Crime, Mel- material on the Internet: Developments in enforce-
bourne University, 16-17 February. ment. Retrieved February 18, 2009, from www.
netsafe.org.nz/Doc_Library/netsafepapers_man-
Department of Internal Affairs. (2002a). Briefing
chwilson_objectionable.pdf.
to the Incoming Minister of Internal Affairs. Wel-
lington, New Zealand: Author. Morris, J., Haines, H., & Shallcrass, J. (1989).
Report of the Ministerial Inquiry into Pornog-
Ferraro, M., & Casey, E. (2005). Investigating
raphy. Wellington, New Zealand: New Zealand
Child Exploitation and Pornography. San Diego,
Government.
CA: Elsevier.
ECPAT New Zealand. (2003). Williamsons Child
Heuck, J. (2005). Comparative Report on Child
Pornography Sentence Too Light. media release,
Pornography on the Internet in Germany and New
31 July.
Zealand. Auckland/Freiburg. ECPAT Deutschland
e. V and ECPAT New Zealand. OConnell, R. (2001). The Structural and Social
Organisation of Paedophile Activity in Cyber-
Human Development Report Office. (2008).
space: Implications for Investigative Strategies.
Human development indices. Retrieved Febru-
Accessed October 21, 2002, from http://www.
ary 11, 2009, from http://hdr.undp.org/en/media/
uclan.ac.uk/facs/science/gcrf/crime1.htm
HDI_2008_EN_Tables.pdf
ODonnell, I., & Milner, C. (2007). Child Pornog-
raphy Crime, Computers and Society. Portland,
OR: Willan Publishing.

260
The New Zealand Response to Internet Child Pornography

Office of Film and Literature Classification. United States v Williams. No. 06694. (2008).
(2007). Publication of Objectionable Computer Retrieved 26 June 2009 from http://www.suprem-
Files. Retrived February 18, 2009, from http:// ecourtus.gov/opinions/07pdf/06-694.pdf
www.censorship.govt.nz/thelaw-occasional-
Van Der Stoep, L. (2009). Police target web
objectionable-computerfiles.html
predators. Sunday Star Times, 22 February 2009.
Office of Film and Literature Classification. Retrieved March 3, 2009, from http://www.stuff.
(2008). Report of the Office of Film and Literature co.nz/stuff/thepress/4856032a26834.html
Classification for the year ended 30 June 2008.
Watson, C., & Shuker, R. (1998). In the Public
Wellington, New Zealand: Office of Film and
Good? Censorship in New Zealand. Palmerston
Literature Classification.
North, New Zealand: Dunmore Press.
Office of Film and Literature Classification
Wilson, D. (2002). Censorship in New Zealand:
[Australia]. (2006). Enforcement Package. Re-
the policy challenges of new technology. Social
trieved 16 June 2009 from http://www.oflc.gov.
Policy Journal of New Zealand, 19, 113.
au/www/cob/rwpattach.nsf/VAP/(084A3429F-
D57AC0744737F8EA134BACB)~896. Wilson, D. (2007). Responding to the Challenges:
pdf/$file/896.pdf Recent Developments in Censorship Policy in New
Zealand. Social Policy Journal of New Zealand,
Perkins,M.(2009).PrimeCuts.IndexonCensorship,
30, 6578.
38(1), 129139. doi:10.1080/03064220802712258
Wilson, D. (2008). Censorship, new technology
Quayle, E., Holland, G., Lineham, C., & Taylor,
and libraries. The Electronic Library, 26(5).
M. (2000). The Internet and offending behaviour:
doi:10.1108/02640470810910710
a case study. Journal of Sexual Aggression, 6(1/2).
Wilson, D., & Andrews, C. (2004). Internet
Shelley, L. (1998). Crime and corruption in the
Traders of Child Pornography and Other Cen-
digital age. Journal of International Affairs, 51(2).
sorship Offenders in New Zealand. Retrieved
Sullivan, C. (2005). Internet Traders of Child February 24, 2009, from http://www.dia.govt.
Pornography: Profiling Research. Retrieved nz/pubforms.nsf/URL/profilingupdate.pdf/$file/
February 24, 2006, from http://www.dia.govt.nz/ profilingupdate.pdf
pubforms.nsf/URL/Profilingupdate2.pdf/$file/
Wolak, J., Finkelhor, D., & Mitchell, K. (2005).
Profilingupdate2.pdf
The Varieties of Child Pornography Production .
Taylor, M., Quayle, E., & Holland, G. (2001). Child In Quayle, E., & Taylor, M. (Eds.), Viewing Child
pornography, the Internet and offending. ISUMA, Pornography on the Internet. Lyme Regis. Dorset,
2(2). Retrieved May 27, 2002, from http://www. UK: Russell House Publishing.
isuma.net/v02n02/taylor/taylor_e.shtml
Transparency International. (2008). 2008 Cor-
ruption Perceptions Index. Retrieved February key terms And deFInItIons
5, 2009, from http://www.transparency.org/news_
room/in_focus/2008/cpi2008/cpi_2008_table Objectionable Material: Material that is
illegal under New Zealand law, generally for
UNICEF. (2008). The State of the Worlds Children promoting sexual or violent crimes.
2009. New York: United Nations Childrens Fund.

261
The New Zealand Response to Internet Child Pornography

Child Pornography: In New Zealand the work that utilises the Internet for communica-
term refers to any publication that promotes child tion. It is expressed in a string of numbers such
sexual abuse or exploits child nudity. as 121.72.27.60. Each IP number is unique and
Peer-to-Peer Networks: A network of comput- relates to one Internet connection.
ers that connect directly to each other (as peers)
rather than through a central server. Commonly
used to share music and image files. endnotes
Chat Room: A website where live, real-time
keyboard conversations with other people occur,
1
Miller v California 314 U.S. 15 (1972).
usually on a specific topic.
2
See section 88 of the Films, Videos and
Publication: Under New Zealand law, any Publications Classification Act 1993.
thing that has words, statements, signs, represen-
3
Espinosa v Department of Internal Affairs
tations or images impressed or stored on it and [2008] CRI 2008-404-233.
capable of being reproduced identically. Includes
4
Goodin v Department of Internal Affairs
films, DVDs, digital image files, still images and [2002] unreported, AP11/01.
text files.
5
Department of Internal Affairs v Young
Possession (of Objectionable Material): [2004] DCR 231, 234.
Under New Zealand law, an offence committed
6
Batty v Department of Internal Affairs [2005]
by knowingly possessing and controlling objec- CRI 2005-404-313
tionable publications.
7
s. 6(1), Sentencing Act 2002.
Distribution (of Objectionable Publica-
8
Optional Protocol to the Convention on the
tions): Under New Zealand law, an offence com- Rights of the Child on the Sale of Children,
mitted by delivering, giving, offering or providing Child Prostitution, and Child Pornography,
access to an objectionable publication. G.A. Res. 54/263, Annex II, U.N. Doc.
IP Address: A numerical identification that A/54/49, Vol. III, art. 2, para. c, entered into
is assigned to computers participating in a net- force Jan. 18, 2002.

262
263

Chapter 17
Towards Electronic Records
Management Strategies
Basil Enemute Iwhiwhu
Delta State University, Nigeria

AbstrAct
Records are a vital business resource and are key to the effective functioning and accountability of the
organization. Efficient management of records is essential in order to support organizations core busi-
ness activities, to comply with legal and regulatory obligations, and to provide a high quality service
to individuals. Electronic records management programme ensures that the organizational business
activities are well documented, organized and managed, accessible, protected from unauthorized ac-
cess and disposed off (either destroyed or archived). Credible and dependable information systems are
desired to achieve this. Also, adequate skills sets are required by personnel working with and managing
electronic records. The relevance of all these are articulated in this chapter.

IntroductIon decision-making. Many record keeping functions


have been automated or streamlined so they are
Records are documentary evidence of transactions not as labour intensive (and therefore costly)
made or received in pursuance of legal obligations as they were in the traditional record keeping
regardless of the physical form or characteristics environment. The advent of automated records,
of the media. They are a class of information often called electronic records or e-records, has
identified by the particular functions they perform dominated most offices today.
in support of business, accountability and cultural Electronic records (e-records) are information
heritage. They substantiate who did what, where, generated electronically and stored by means
and when. It is an essential business function of computer technology. Electronic records are
with responsibility cascading to every level of fragile in nature due to change in hardware and
software used for their storage, processing and
DOI: 10.4018/978-1-61692-012-8.ch017 use, making them prone to high risks. If damaged

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Towards Electronic Records Management Strategies

or deteriorated, restoration is a difficult task, if bAckground


not impossible. Electronic records have short life
expectancy dependent on the average service life As the volume of records produced began to grow
of the hardware and software required to read in earnest during the 20th century, specialised
and process them. As a result, creating, using and facilities for the storage of records (in records
managing e-records in a digitized and globalize repositories) grew in number and in the quality of
world are a challenging venture that must be well environmental and security controls to ensure the
thought-out, planned and implemented. This can availability as well as integrity of these primary
only be achieved with a well articulated records media-centric (paper or films) records. Records
management programme in place. Though, with historical or permanent value are therefore,
there seems to be an international standard for disposed, which included destruction and transfer
the management of e-records as prepared by the of discrete sets of records to an archival facility
International Records Management Trust (IRMT) and administered under careful document and
and the World Bank for Commonwealth Countries audit procedures. With most of todays business
(National Archives of Australia, 2002), records information created in digital format, the rules
management activities generally and e-records of the records management game have changed
management in particular are still issues to contend dramatically. Research suggests there has been
with. Most governments today have their records 30% increase in the amount of stored information
in electronic form. Moore (2000) stated that as (includes four types of physical media: paper, film,
much as two-thirds of the worlds information was magnetic and optical) each year, from 1999-2002,
born digital in the late 1990s and 2000, mean- with 92% of new information stored on magnetic
ing that its original occurrence was in a digital media primarily hard disks (Lyman & Varian,
format generated from computers. While this is 2003). As a result, organisations need efficient
true for most developed countries, developing and suitable ways to capture and protect their
countries are still behind with attendant problems electronic records, as well as efficient and veritable
of infrastructure, policy, technical-know-how, means to dispose of or destroy information and
electricity generation and sustenance, hardware medium when there are no longer requirements
and software availability among others. As a to keep them.
result, most developing nations adopt the hybrid The risks associated with poor or non formal
nature, where records are created and managed records management programme have been well
both in the paper and in electronic formats. Keep- documented in the mainstream media in recent
ing records in this hybrid nature has implication years in terms of legal and regulatory compliance
for the management of e-records, as accessing risks and costs, as well as the overall effective-
and using readily available records may not be ness of business operations (The Association
easily realized (Mazikana, 1999). This chapter of Information and Image Management, 1991;
will examine the electronic record management Cohasset Associates, 2005). The discipline of
programmes from creation, use and maintenance, records management has not been particularly
preservation and storage, distribution and disposi- exciting despite all the sensational media atten-
tion, e-recordkeeping systems requirements, the tion in recent years. Guided by laws, regulations
basics of good electronic records management, and the organisations culture and structure,
strategic considerations and appropriate skills corporate records management programme has
sets among records staff. traditionally been responsible for establishing
proper recordkeeping guidelines, policies and
procedures. For decades, the protection of sig-

264
Towards Electronic Records Management Strategies

nificant documents, files, contracts and physical the organizations records management
objects has been performed by clerks relying on program.
trial and error methods and tools such as filing More than two-thirds (71%) reported that
cabinets, file folders, imaging, indices and secure IS/IT had primary responsibility for the
storage facilities to meet the organisations basic day-to-day management of their organiza-
recordkeeping requirements. Many organisations tions electronic records.
often consider records management as a back- An overwhelming majority (93%) believed
office cost centre with little business benefits the process by which electronic records
(Cohasset, 2005). Records managers have had to will be managed will be important in fu-
rely on the creators and users of business records ture litigation, but by a ratio of nearly 2:1,
and their administrative support staff to comply a majority (62%) were less than confident
with retention rules for hard copy documents that the organization could demonstrate
and hoped that drafts and other non-records were its electronic records are accurate, reliable
systematically destroyed (Cohasset, 2005). The and trustworthy many years after they
records management function served a custodial were created.
role for vast stores of inactive records.
Citizens and workers do not treat records with The above is associated with the poor manage-
some sanity in the past because there were no ad- ment of records; and the situation can better be
equate policies, technical-know-how, infrastruc- imagined in developing countries like Nigeria.
ture and the public-will. Records managers were Studies have revealed several problems associ-
preoccupied with managing the records in central ated with the management of records in Africa
filling systems or records store while archivists (Mnjama (2005); Kemoni et al. (2003); Khamis
were used to defining their function within the (1999). Thurston and Smith (1986) in their study
walls of archives. Access and retrieval of records identified the following:
were difficult. The Association of Information
and Image Management (1991) stated that in the inability by researchers to use archival
United States: information;
inadequate finding aids;
office staff spent almost 2.5 hours per day lack of recognition by national govern-
retrieving and putting away paper files; ments of the role played by archival
50 minutes a day was spent searching for institutions;
missing or misfiled papers; outdated archival legislation which impacts
17 per cent of files needed were not readily negatively on access to the collections;
accessible; and inadequate number of professional
one to six information searches were archivists;
impeded. lack of adequate archival training schools;
poor systems of archival arrangement and
In the same vein, the 2003 Electronic Records description;
Management survey conducted by Cohasset As- understaffing of archival services;
sociates (2005) on the management of electronic poor storage facilities for records; and
records revealed that: inadequate retrieval tools.

41% of records managers responded that Meeting the unique challenges associated with
electronic records were not included in electronic records management require new ways

265
Towards Electronic Records Management Strategies

of thinking and a renewed spirit of collaboration is in the best interest of organizations to address
to work across domains and disciplines. Accord- e-records management issues as soon as pos-
ing to the International Council on Archives, the sible. This is in order to assist the organization to
users of electronic records, over the long-term, achieve economy and efficiency in creation, use
are necessarily speculative and can be diverse and maintenance and disposal of records. The ISO
and differing in their needs (ICA, 2005). Users standard provides the following three principles
may include: for records management programmes:

government and municipal administrations Records are created, received and used in
needing records for reasons of corporate the conduct of business activity. To sup-
memory or accountability; port the continuing conduct of business,
prosecuting authorities and lawyers who comply with the regulatory environment,
need records as evidence for their clients and provide necessary accountability, or-
and cases; ganisations should create and maintain
scholars carrying out research based on authentic, reliable, and usable records, and
historical sources; protect the integrity of those records for as
teachers using historical sources in their long as required;
teaching; Rules for creating and capturing records
students; and metadata should be incorporated into
those who are working on cultural proj- the procedures governing all business pro-
ects including employees of cultural cesses for which there is a requirement for
institutions; evidence of that activity; and
journalists; Business continuity planning and contin-
genealogists; gency measures should ensure that records
people who need records as evidence of that are vital to the continued functioning
their rights, or to document events which of the organisation are identified as part of
have a direct bearing on them personally. risk analysis and are protected and recov-
erable when needed.

electronIc records Developing a records management programme


mAnAgement ProgrAmme (RMP) therefore, will ensure that:

The inclusion of records management programme High value information is trustworthy and
(RMP) in daily organisational business operations protected;
is of extreme importance. Most organizations face Low value information is routinely purged
the problem of what to do with the multifarious and appropriately destroyed;
volumes of records/files in their disposal, storage Information system technology invest-
space, as well as decisions on which records to ments are aligned to business priorities and
retain or which to discard. Instituting RMP in that gaols and meet corresponding information
organisation can assist offices and departments to and record life cycle management require-
take decision and overcome the problems. One of ments; and
the primary roles of RMP is to provide services Employees have the support and tools they
that support the organisations ability to meet need to comply with retention and disposi-
their information needs (Cruickshank, 2006). It

266
Towards Electronic Records Management Strategies

tion rules for managing the e-records that ated. This is important because the capture of ap-
they create and receive (ICA, 2005). propriate content, creation of metadata, declaration
of record type, etc. are best addressed at the record
Records management programme (RMP) creation stage. E-records management procedures
is needed in organisations in order to ascertain are most effective when carried out at the point of
economy, efficiency, legal protection, meeting creation or very shortly thereafter. In other words,
statutory requirements, etc. Achieving all these records should be created when there is need to
require a top management team commitment, set- have evidence that is credible and authoritative
ting up RMP committee, defining the objectives of to protect the rights of the organization, its staff
the RMP, communicating staff and management, and anyone else affected by its activity. Records
describing file location, specifying data to be col- should be created when there is a requirement:
lected, preparation of inventory form, establish-
ment of work schedule and selection of personnel To provide evidence of a transaction;
to conduct the survey. The records management To prove that policies, procedures, rules
programme consist of different phases as follows; are followed in arriving at a decision or
outcome;
electronic records creation To defend against possible claims or future
legal actions, for example workers com-
Records used in organisational activities can pensation, breach of contract; or
either be born (created in the office) or received For others to know what action occurred,
from other department or organisation offices. By what was decided, when it occurred, who
this, the record is created or the act is referred to was involved and the sequence of actions.
as records creation. Electronic records could be
born digital or made digital. Those records cre- Generally, records are created as part of the or-
ated directly with a computer system are born ganizations business activities. However, records
digital. while those converted from paper format may be created indiscriminately when there is no
to electronic format are made digital. At this stage need for evidence that something has been done, a
the physical form which may be paper, electronic record duplicates evidence or information in one
media, magnetic tape or disc, photographic media, or more other records, and a redundant duplicate
etc. and information contents are established in of a record is created (for example via a multipart
terms of value. Hence, the need to be more care- form such as a receipt). Also, the hardware and
ful in creating records in the organisation. Taking software environment will affect the capture of
the right decision at this point of creation with e-records in the organisation. Records could be
regard to the medium and classification enhance captured through:
the management of the records through its life and
improves its effectiveness. Adequate records must The user interface layer;
be created where there is need to be accountable Modification of the applications software;
for decisions, actions, outcomes or processes. The operating system;
Records should be created and maintained in a The application programme interface
manner that ensures they are clearly identifiable, (API), or
accessible and retrievable. The creation of records The front end to a corporate filling system.
is a fundamental aspect of the management of any
business operation. As such, organisations should The organizational environment will also in-
determine how and why e-records are being cre- fluence the point at which records are captured.

267
Towards Electronic Records Management Strategies

This include perceptions about what constitutes a RKS maintain linkages to the activities they
record, assignment of responsibility, organisation document and preserve the content, structure, and
requirements to create records, and staff under- context of the records, which make them differ
standing of the technology involved. It must be from generic information system. They often ac-
able to identify specific information objects (e.g. commodate records that exist in more than one
documents, e-mail messages, database entries) as format and should be able to identify all records,
records and somehow distinguish between the active and inactive, and the version of the com-
types of records to which different business and puter software that supports access. They should
retention requirements must be applied (ICA, be able to identify records stored off-line and
2005) off-site and all media. RKS should document all
successful outcomes that can be sustained within
records use and maintenance the organisation overtime and accurately reported.
The systems should meet their accountability re-
After creation/capture or receipt, records would quirements without detracting from the benefits
be used and their maintenance is paramount provided by modern technology and organisational
for the preservation of the records for poster- change (ICA, 2005).
ity. Different kinds of electronic office systems The longer it takes before records are main-
are used in records creation and management. tained, the more difficult it becomes to fully
They can focus on information retrieval (e.g. maintain their content, structure and context. To
document management systems) or on support- maintain record content, systems should be in
ing the business process of an organisation (e.g. place to ensure that:
workflow systems). Electronic systems can also
include stand-alone, non networked systems. In a The identity of a records creator is verified
modern office context, however, they are usually (through the use of a password and possi-
embedded in distributed networked environments bly encryption);
on different levels. In order to provide evidence, Permission to both read and write file is ap-
tools are needed to preserve records and make propriately restricted;
them available for use. A recordkeeping system Periodic system audits are conducted;
should be an instrument that governs records Data transmission includes data error
management functions through the entire life checking and correction;
cycle/records continuum (ICA, 2005). Data are regularly backed up, and
A recordkeeping system (RKS) is an infor- Data on off-line media such as magnet-
mation system that has been developed for the ic tape are regularly refreshed to avoid
purpose of storing and retrieving records, and is catastrophic loss of data due to medium
organised to control the specific functions of cre- degradation.
ating, storing, and accessing records to safeguard
their authenticity and reliability (ICA, 1997). They Data should also be encoded in such a way that
are the systems that capture, manage and provide the bits will continue to be readable overtime. The
access to records overtime. RKS guarantees the records of business processes may span different
maintenance and preservation of authentic, reli- media and multiple systems. Records creation
able, and accessible records overtime. Records are may be restricted to certain media, which should
kept to provide evidence of functions, activities be clearly articulated and communicated to staff.
and transactions. RKS should be designed to enable access to the
complete record without hindrance. Where mul-

268
Towards Electronic Records Management Strategies

tiple recordkeeping systems are in place, links Active data dictionary - lists of all files in a data-
should be provided for records that span these base management system, the number of records
multiple systems. in each file, and the names and types of each
RKS need to capture and maintain information field - and computer-aided software engineering
about the structure of records as an integral part (CASE) tools - software that provides a com-
of the metadata associated with the records in mon development environment for programming
separate formal documentations. Since structure teams - automate much of the process of keeping
is more difficult to maintain than content, it is metadata authentic. Maintaining the context of
often neglected. The simpler the record structure, records created and managed outside of systems
the easier it is to preserve it overtime. It is also developed by information technology profession-
nice for records structure to be based on open als is more difficult. The ubiquity of personal
standards such as Standard Generalised Markup computers allows records to be created, modified,
Language (SGML) and eXtensible Markup Lan- copied, transmitted and deleted, often with little
guage (XLM). regard for business and legal records manage-
The value of a record is severely diminished or ment requirements. Even if records are managed
lost if its content is separated from key informa- appropriately on an individual workstation, their
tion about the agency and person(s) who made it, existence may not be known to other users, and
place, the time and reasons for its creation, and its the contextual information may be inadequate for
relationship to other records. Though the content future retrieval. Considerations need to be given
of a record may still be of interest, it will have no to assigning and preserving meaningful document
value as evidence if not placed in context. This names, author, work groups and organisational
is best achieved when records are filed. Once identifiers designating whether records are draft
record quantities pass a critical mass, they can- or final versions and linking them to other docu-
not be found efficiently if they are kept in a big ments or information objects. Off-the-shelf soft-
heap or saved electronically into a single folder. ware exists to address these problems. Contextual
Contextual information, therefore, is information information needs to be collected, structured,
about the records and the administrative environ- and maintained from the time records are cre-
ment in which they were created and maintained. ated. This involves identifying and labelling (or
It can range from high-level information such as tagging) records and linking them to contextual
the name and location of the organisation that information (i.e. keeping records about records).
created the record to more detailed information In some cases, this can be achieved by embedding
such as the date it was made. The ideal in the key contextual information into the metadata or
electronic environment is to link to records the e-records themselves. The more e-records can be
metadata and contextual information necessary made self-describing, the less need there is for
to read and understand them (National Archives mounting separate information. While contextual
of Australia, 2002). information is absolutely necessary for long-term
RKS need to maintain and provide access to retention of e-records, it can also improve the qual-
information about the business and administrative ity of records in active use, support information
context in which records were created and used. sharing, and enhance their quality as evidence.
For computer systems developed by information ISO Standard 15489 contains an extensive list
technology professionals, system design docu- of policy issues and suggested requirements that
mentation, data dictionaries and related business archivists can use as basis for cooperation with
documentation are fundamental to providing records managers in promoting good records
context for records that are held in those systems. management as for the basis for creation and

269
Towards Electronic Records Management Strategies

preservation of sound archival records. Some life records activity must b e weighed against factors
cycle/continuum issues to be addressed include: of urgency, multi-user access and geographic dis-
persion. Generally, highly active records require
The development of new systems so that a medium that facilitates ease of irretrievability.
they can identify those which will create
records of archival value and ensure that electronic recordkeeping systems
those systems will support their preserva-
tion and continued accessibility; Since effective management of e-records depends
The operation of systems in which archi- so heavily on the information systems involved,
vists need to monitor systems management identifying recordkeeping requirements when new
to ensure that all parts of the archival re- systems are designed or when existing systems are
cord (e.g. the records themselves, related upgraded is of paramount importance. If record-
metadata, and documentation of how the keeping requirements are identified during process
system operated) are properly maintained analysis, effective procedures and automated
and so that no changes are made to the sys- routines can be built into the revised processes to
tem that would affect the archival quality handle records more effectively. Several aspects
of the records; of recordkeeping should be considered during the
Decisions concerning modification, up- system design and procurement process. If the
grading, migration, and other changes to system is expected to support electronic record-
the system (e.g. changing hardware or soft- keeping, then some customisation of commonly
ware platform) could affect the authentic- available software may be needed. It may be
ity and integrity of the records, the ability necessary to establish special permissions which
of the system to preserve the records, and give different individuals authority to create, alter,
the ability of the archives or the creating and view records based on their authority and
organisation to provide for long-term ac- responsibility within a business or administrative
cessibility to the records, and process, for instance. Recordkeeping requirements
Decisions to discontinue with systems should be considered when information system
containing archival records or to remove are being replaced or upgraded. The recordkeep-
archival records from those systems. ing aspects of the system that is being phased
out should be reviewed by analysts and use the
electronic records disposition analysis to identify opportunities for improvement.
Also, important is whether any of the electronic
Effective record keeping systems require good records stored in the old system need to be retained
information management and retention schedules and migrated into the new system and if they are
in order to be able to find the requested informa- readily identifiable and well described (National
tion and to ensure the information is kept for the Archives of Australia, 2002).
appropriate period (Cruickshank, 2006). Records The complexity of todays information systems
can be stored for a period of few days to several environments makes it difficult for employees to
years. However, the type of record and its intended control or direct the movement, storage, access/
use determine the length of time a record should retrieval, preservation or deletion of many of the
be kept. Users may reference the record frequently business records they produce or receive from
and need quick access to it, requiring the records internal or external sources. As a result, infor-
to be maintained in the office area (Cruickshank, mation is widely dispersed on desktops, laptops,
2006). Cruickshank (2006) further stated that applications, shared servers, backup tapes, etc.

270
Towards Electronic Records Management Strategies

Dependence on technology, which has created Preliminary investigation: basic informa-


such enormous challenges in the management tion concerning the legal, administrative,
of e-records, is also a key part of proactive and and economic environment generated,
sustainable solutions. Capabilities that enable as- gives a general view of the strengths and
sured levels of recordkeeping performance must weaknesses of the records.
be demonstrably trustworthy in the chain of Analysis of business activity: the hierar-
preservation, the systems of controls that extend chical structured view and description of
over the entire life cycle of records and ensure the the functions, activities and transactions
identity and integrity of the records as they are of an organisation is provided at this stage.
maintained in storage repositories and whenever Analysis needs to go as deep as is neces-
they are retrieved or reproduced. In this manner, sary to show the stages in the business pro-
information systems/technology (IS/IT) provides cess when records are regularly created or
critical support to the creators and users of busi- received in the normal course of business.
ness records to meet the organisations mission This step provides a useful framework for
and comply with its information governance organising records.
guidelines (ICA, 2005). Identification of a recordkeeping require-
Key characteristics of information systems ments: this stage reflect which records to
which create, transmit, archive and dispose of e- be captured and maintained, reason for
records include (National Archives of Australia, capturing the records, the length of time
2002): the records will be maintained, and other
characteristics of records required, which
Reliability over time and in the normal should be implemented.
course of business; Assessment of existing systems;
Control measures to monitor, verify, autho- Identification of a recordkeeping strategy;
rise and secure access Designing of recordkeeping system(s);
Compliance with changing business, regu- Implementation of recordkeeping
latory and legal requirements; system(s), and
Ability to manage media-centric and con- Ongoing management and review
tent-centric records produced by the com-
plete range of business activities for the the basics of good electronic
organisation; records management
Organisations should imbed into its poli-
cies, procedures and tasks as rules, sys- Electronic records are the products of computers
tematic creation, maintenance and man- and applications software; by definition, they do
agement through the design and operation, not include the software used in creating them
distribution, protection and disposition re- and in the recordkeeping process. E-records are
quirements for the organisations e-records distinct from digitised images as they are created
and applied across all technical and busi- as electronic documents and not converted from
ness systems and processes. another form of a digitised picture (Oregon State
University, 2003). E-records are always machine
Developing and maintaining a recordkeeping, dependent formats; thus they are accessible and
system requires (National Archives of Australia, readable only with the assistance of digital pro-
2002): cessors. Electronic records or files exist in dif-
ferent forms and formats. Some distinct types of

271
Towards Electronic Records Management Strategies

e-records, which their disposition can be easily software that link remote and networked
determined, are as follows (OSU, 2003): personal computer workstations to a cen-
tral file server and through that to similar
Text Format: Text documents are now of- file servers located elsewhere.
ten created for use only in machine read- Graphic Format: There are software
able form, though they had been used packages that allow users to create graph-
traditionally to prepare hard copy records ics ranging from simple figures and tables
through word processing and desktop pub- to extremely complex images. Digitizing
lishing software. Textual records consist of scanners and video conversion hardware
drafts and copies of correspondence, mem- also allow for the direct conversion of vi-
oranda, reports, and publications distrib- sual images into digital format for elec-
uted in hard copy form. Also, spreadsheets tronic manipulation and storage.
and database management programmes
can be used to create text documents. According to Cruickshank (2006), good elec-
Database Formats: Databases contain tronic records management (ERM) requires:
large amounts of information organised in
data fields which may contain text, num- Understanding: The need to have a clear
bers, graphics, or mixed character ele- understanding of both the nature of e-re-
ments. These data elements are organised cords and the information that the organisa-
and stored so that they can be manipulated tion captures as e-records is of importance
or extracted to serve diverse applications. to the management of that organisation.
However, the database as a whole is man- Hence, the need to appoint an experienced
aged electronically and independently of record manager to provide the necessary
the special application. expertise, to develop and maintain strategy
E-mail Format: Electronic mail (e-mail) and procedures, and to monitor compli-
consists of any memo, letter, note, report, ance with them.
or communication between individuals Policy: There should be a corporate policy
and groups that is stored and/or transmit- formally endorsed by top management for
ted in a format that requires an electronic maintaining electronic evidence as corpo-
device to capture and access (OSU, 2003). rate records. This provides a framework,
E-mail is perhaps the most common elec- which ERM procedures and practices are
tronic record format found in most offices developed and maintained, together with
in organisations. an authentic basis for the Record Manager
Voice Mail Format: This consists of to exercise powers and perform duties, re-
messages recorded on the organisations sponsibilities and functions.
computerised telephone message system. Strategy: Developing an ERM strategy
Voice mail allows the recipient to hear and ensures that government-wide standards
respond to telephone messages at a later are adhered to and that corporate e-records
time. remain both accessible and usable for as
Electronic Publications Format: Public long as they are needed (including during
access servers provide access to electron- prolonged computer system failure).
ic files to anyone, worldwide, who has Procedure: This provides means of rou-
compatible systems and appropriate con- tinely capturing intimation, which should
nections. These servers usually consist of be designed into the electronic system that

272
Towards Electronic Records Management Strategies

generates e-records. They should be easy and the flexibility to adjust to changing
to understand and used. priorities and customer needs;
ERM System: This should be designed To succeed, archivists must be opportunis-
to manage authentic records and to ensure tic and interventionist;
that their authenticity can be confirmed Archivists must add value and provide ser-
easily if necessary. A process control re- vices to their customers;
cords should be considered in the design Neither archival nor records management
of the system. concerns will stand well on their own as
Maintenance Capability: maintaining separate business priorities. Instead, they
records of value requires that policies and should be understood and promoted as es-
procedures will spell out appropriate ap- sential if organisations are to attain their
praisal, scheduling and disposal actions to wider gaols.
e-records.
Culture and Training: Training is of im- Developing a strategic vision for electronic
portance in other to promote a culture of records must take into account the archival vision
good recordkeeping practices in the organ- of what it hopes to accomplish and the reality of
isation. This will make the requirements organisational context.
stated above to be easily realised.
Monitoring Compliance: This is a vital
component of the requirement of a good develoPIng APProPrIAte
electronic record management. It ensures skIlls sets
that organisation adheres to its own and
to externally imposed recordkeeping re- Adequately managing electronic records requires
quirements. Monitoring compliance by some skills sets - archival electronic records,
individuals and business units is essential technical, and soft. The first three sets of skills
to provide confidence that the organisa- are necessary to give the programme credibility;
tion as a whole complies. Equally, there the final is needed to be effective in influencing
is little point in establishing internal pol- governmental partners and customers and in pro-
icy and standards if there are no way of moting the archival agenda (ICA, 2005).
knowing if - and to what extent - they
are observed. In either case, the Records Archival Skills: The knowledge of basic
Manager should function as an auditor and archival and records management prin-
provide the Board with periodic assurance ciples and techniques is vital to all work
of compliance. with electronic records. Archivists and re-
cord managers should have these skills and
strAtegIc consIderAtIons can also apply them to the questions and
problems the organisation faces. Some of
To ensure the success of electronic records man- the challenges are; what constitutes suf-
agement, four basic issues must be considered. ficient documentation of business activi-
These are (ICA, 2005): ties, how can that documentation be cre-
ated and maintained most effectively and
The key to a successful programme is hav- efficiently, when can records be destroyed,
ing a clear strategic vision, a realistic un- and what needs to be preserved?
derstanding of the programmes abilities,

273
Towards Electronic Records Management Strategies

Electronic Records Skills: The funda- Creating new records


mental archival principles and practices Organising records in a logical order
and how those principles are changed, re- Actively managing the records (where the
formatted, and/or expanded to deal with period of active management can be sev-
electronic records must be understood. The eral years)
personnel should posses the ability to: Inactively managing records that are not
Understand and articulate what it means to frequently used
undertake electronic recordkeeping; Appraising old records and either destroy-
Understand and articulate what it means to ing those no longer required, or perma-
preserve electronic records overtime, in- nently storing those of legal or historical
cluding preserving each of the components value.
of electronic records (e.g. data, software,
documentation), and successfully migrat- Essentially, systems should be incorporated
ing records to new platform; with record keeping processes such as:
To determine system requirements for
electronic recordkeeping and preservation Records creation and capture
of electronic records; and Registration
To walk programme staff through the pro- Classification
cess of determining what is and should be Storage and handling
an archival record in an electronic context. Access and use
Tracking
These skills are best acquired or developed disposal
in-house.
According to Cruickshank (2006), these
Technical Skills: technical skills are re- processes occur at varying stages of a records
quired in the aspect systems design, data lifecycle and require consistently applied policies
management and software development. and procedures to operationalise or bring to life
They need to know the software that would an organisations records management programme.
be best for meeting recordkeeping require-
ments. There is need therefore, to train sys-
tems developers in records management Future trends
principles so that they are able to develop
effective recordkeeping solutions for their At this point let me reiterate the fact that records
clients. are intrinsically linked to the day-to-day business
activities and fundamental to business viability,
and everybody has a role to play in recordkeep-
PolIcy suggestIons ing. Records management programme when fully
integrated with electronic recordkeeping systems
For organizations to effectively and efficiently in place, organizations will engage in;
provide information to users, they need to estab-
lish a systematic record keeping systems that will Creating electronic records and captur-
address the issue of: ing them into electronic recordkeeping
systems

274
Towards Electronic Records Management Strategies

Designing, building and using electronic Heslop, H., Davis, S., & Wilson, A. (2002). An
systems that keep records Approach to the preservation of digital records
Maintaining and managing electronic re- (pp. 110). Australia: Commonwealth of Australia
cords over time and National Archives of Australia.
Making electronic records accessible
International Council on Archives (ICA). (1997
February). guide for managing electronic records
from an archival perspective. ICA Committee on
conclusIon
Electronic Records. Retrieved October 10, 2006
from http://www.ica.org/biblio/cer/guide_eng.
Records keeping are the life wire of any meaning-
html
ful organisation. Without reliable records nobody
believes you, work has to be redone and things can International Council on Archives (ICA). (April
go wrong. A consistent approach across the whole 2005). Electronic records: a workbook for Ar-
of a records life cycle is fundamental to providing chivists. Committee on Current Records in an
transparent and reliable records. If an effective Electronic Environment. ICA Study 16.
records management programme is consistently
International Records Management Trust (IRMT).
applied, transactions will be transparent, officials
(2004). The e-records readiness tool. Retrieved
will be accountable and issues regarding informa-
October 15, 2006, from www.irmt.org
tion loss are less likely to arise, and are less likely
to be viewed with suspicion by stakeholders. This Kemoni, H. N., Wamukoya, J., & Kpilangat, J.
will no doubt, bring about reputation to Africa in (2003). Obstacles to utilization of information
the eyes of the world. held archival institutions: a review of literature.
Records Management Journal, 13(1), 4041.
doi:10.1108/09565690310465722
reFerences
Khamis, K. (1999). Making the transition: from
Association for Information and Image Manage- backlog accumulation to a new order. Paper pre-
ment (AIIM). (1991). Public records survey in sented at XV Bi-annual Eastern and Southern Af-
USA. Records Management Bulletin, 45, 45. rican Regional Branch of the International Council
on Archives (ESARBICA) General Conference,
Australian Standard for Records Management. Zanzibar, 26-30 July.
(2002, July). AS ISO 15489. National Archives
of Australia, Commonwealth Recordkeeping Mazikana, P. C. (1999). Editorial. ESARBICA
Publication. Retrieved May 26, 2007 from www. Journal, 18, 46.
naa.gov.au Mnjama, N. (2005). Archival landscape in Eastern
Cohasset Associates. (February, 2005). Assured and Southern Africa.
records management: establishing and maintain- Moore, F. (2000, October). Digital datas future:
ing a new level of performance. White paper. you aint seen nothin yet. Computer Technology
Retrieved June 13, 2008 from www.cohasset.com Review.
Cruickshank, J. (2006). Good practice guidelines
for records and record keeping: a report prepared
within the SAFEGROUNDS Project, Draft 3.1.
18 October.

275
Towards Electronic Records Management Strategies

National Archive of Australia. (2001). ISO tionalwhich justify the indefinite or permanent
15489-1 Information and Documentation-Records retention of government records.
Management, Part 1: General, 1, 3. Amsterdam: Corporate Records: Are records of an or-
International Standards Organization. Retrieved ganization showing the daily activities of the
July 10, 2008 from www.naa.gov.au organization, which is peculiar to them.
Electronic Records: Are records generated
National Archives of Australian. (2002). A new
electronically and stored by means of computer
approach to recordkeeping. Commonwealth of
technology.
Australia. Retrieved May 25, 2007 from www.
Electronic Records Keeping Practices: Is
naa.gov.au
the act of creating and maintaining complete,
Oregon State University. (2003). Archives & accurate and reliable records as evidence of busi-
records management handbook. Oregon: OSU ness transactions.
Library. Retrieved April 2, 2007 from http:// Life Cycle: Is a records life span, from its
osulibrary.oregonstate.edu/archives/handbook/ creation to its final disposition.
chapter2/electronic.html Permanent Records: Are records appraised
as having sufficient historical or other values to
World Bank. (February, 2005). Fostering trust
warrant their continued preservation or retention.
and transparency through information systems.
Recordkeeping System: Is the framework to
PREM notes, 97.
capture, maintain, and provide access to evidence
over time.
Retention Period: Is the length of time that
key terms And deFInItIons a record must be kept before it can be destroyed.

Archival Values: Those valuesadminis-


trative, fiscal, legal, evidential and/or informa-

276
277

Chapter 18
Ugandas Rural ICT
Policy Framework:
Strengths and Disparities in
Reaching the Last Mile
Carol Azungi Dralega
Western Norway Research Institute, Norway

AbstrAct
This chapter investigates the Ugandan ICT policy approach to promoting access to and the empowerment
of the poor majority, remote and under-accessed communities in Uganda. The chapter highlights the
strengths of the policy framework while at the same time draws attention to its weaknesses. For instance,
while the chapter acknowledges the fact that the ICT policy framework recognises and has pursued
strategic approaches to expanding access to remote areas, a closer scrutiny indicates disparities that
may delimit its pragmatism. These disparities, it is argued, mainly emanate from the fact that the policy
framework is not entirely holistic nor forwardlooking in its outlook, not only because the processes (of
policy making) left out the rural users, it also fails to address the gender dynamics and most urgently,
the media convergencies notably between broadcasting and telecommunication. In addition to divorcing
itself from political and democratic aspects imperative for development, the policy framework seems
shorthanded on sustainability fundamentals that are conjectured to restrict its propitiousness at the
grassroots.

IntroductIon (ICT) policy framework that can leap frog Uganda


into the information economy (ICT policy 2003).
Since the beginning of the 1990s, Uganda has The Ugandan ICT policy has development at
joined global trends towards liberalisation. In the centre of its framework as it recognises the
consonance with liberalizing the economy, the role of information, particularly ICTs, in enhanc-
country has undertaken strategic steps to develop ing economic development. The national ICT
an Information and Communication Technology Policy framework also recognises that, although
Uganda as a whole is underdeveloped with a high
DOI: 10.4018/978-1-61692-012-8.ch018 demand for ICT propagation, some parts (70%)

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Ugandas Rural ICT Policy Framework

are more underdeveloped than others. As a result, gives to the development of National ICT policies
a specific policy framework has been developed: and strategies through its National Information and
the Rural Communications Development Policy Communication Infrastructure (NICI) plan, which
(RCDP) supported by the Rural Communications helps nations link to national, regional and global
Development Fund (RCDF) to target underserved development goals including MDGs (Chiumbu,
rural areas. The aim of this chapter is to outline 2008; Sesan, 2004).
and interrogate the strengths and weaknesses of Although today, most African nations have
the RCDP/Fund and to make suggestions that can developed a NICI informed ICT policy with
engender a more pragmatic policy framework by national specific considerations, the AISI/NICI
and for the people its meant for - rural, impecu- continental policy framework has come under
nious and the marginalized special groups within heavy criticism for being driven more by foreign
these communities such as women and youth. actors and ideas to the detriment of an local and
grassroots participation and pragmatism (Chi-
umbu 2008; Dralega 2008). With an exception of a
bAckground few countries (like Uganda and Kenya), who have
adopted grassroots policies, several countries are
Africa, Ict Policy and development still struggling to come to terms with the market
driven strategies that tend to exclude marginalized
With the physical boundaries that separated and peripheral communities (Gillwald & Stork,
nations melting off due to the emergence of a 2008; Etta & Elder, 2005; Ogbo 2003) a matter I
boundryless Information Society, any people- take up in this chapter.
group, nation or region that does not line up with
the expectations of the New Economy which is national Ict Policy Ambitions
primarily driven by Information and Commu- and Advancements
nication Technologies will experience lonely
moments on the island of insignificance Dr. In line with its policy of liberalisation, beginning
Phillip Emeagwali1 in the early 1990s, the Ugandan government
embarked on the liberalisation of its telecommu-
nications sector and the pursuit of an ICT policy
Africas active participation in the Information that would catalyze the role of information in
Society started with the establishment of the strengthening the national development planning
African Information Society Initiative (AISI) process (ICT Policy, 2003). Within this policy
later adopted by the United Nations Economic framework, ICTs were seen to support specific
Commission for Africa (ECA) in Addis Ababa national development initiatives, including Vi-
1996 and the subsequent endorsement by high sion 20254, a project that describes its national
level Ministerial and Organizational of the then aspirations, and the 1997 Poverty Eradication
Organization of African Union (OAU), Heads of Action Plan (PEAP, 2000)5, revised in 2000 and
States and Governments meeting including the which became Ugandas Comprehensive Devel-
1997 G8 Summit. The role of AISI was to serve opment Framework. That is to say it is a national
as a mechanism for achieving the Millennium framework to guide detailed medium term sector
Development Goals2 in the AISI framework docu- plans, district plans and the budget process. Other
ment3 which also recommends the mainstreaming similar frameworks embedded in the ICT policy
of Information and Communication Technologies. ambition include: The Uganda Information Infra-
This informed the strong support that the AISI structure Agenda, the Plan for the Modernization

278
Ugandas Rural ICT Policy Framework

of Agriculture6, the National Agricultural Advisor was to increase penetration of telecommunications


Services (NAADS) 7; the Rural Electrification services through private sector investment (a mar-
and Transformation Project8, Universal Primary ket forces approach that hinges on competition)
Education and Health Improvement and Delivery instead of government intervention. It was from
(Health policy, 19999). These national planning this act that the ICT Policy (and subsequently
initiatives, in varying stages of completion, show the Rural Communications Development Policy)
poverty eradication as an overarching and funda- emerged. The Act has since been criticised for aim-
mental goal for the government which recognises ing more at increasing investment in the telecom
and promotes the role of ICT in achieving this. sector than providing access to communication
In recognising the relation between ICT and facilities (Ofir, 2003).
development, the National ICT Policy focuses on The Ugandan ICT policy framework operates
three mutually inclusive areas: information as a as a partnership between government, private in-
resource for development, ICT as a mechanism vestors and development partners10. The mandate
for accessing information for development, and to oversee media and information management
ICT as an industry including e-business, soft- falls under the Directorate of Information in the
ware development and manufacturing (National Presidents office, and that of overseeing telecom-
ICT Policy. 2003). Here, ICTs are recognised as munications from 2006, shifted from the Ministry
economic drivers that can propel Uganda into of Works, Housing and Communications to the
the global economy. The contention within the newly created Ministry of ICT.
policy framework is that, although the majority As mentioned above, the steps towards lib-
of the population is still dependent on traditional eralisation and deregulation of its public sector,
information delivery systems, especially radio, including the communications and telecom-
new ICTs can enhance the efficiency of these munications sector, signalled an important shift
systems in delivering development information away from government monopolies and towards
(ICT Policy, 2003). the private sector, who have been entrusted to
It all started in 1997 when parliament passed a transform the low levels of ICT in the country
significant bill - The Communications Act (Uganda through competition within three areas: voice and
1997, Section 3). The main objective of the Act data network operators; Internet service provision

Figure 1. One of many middlemen selling call cards on a mobile payphone in Kampala (Source: Litho
(2006))

279
Ugandas Rural ICT Policy Framework

Figure 2. Telephone subscriptions March 2008


and the development of value-added service
to March 2009
providers, the middlemen like those in Figure 1.
The process began with the licensing of the
first mobile cellular service Celtel in 1993. A
second cellular service provider, the South African
Mobile Telephone Networks (MTN) started op-
eration in 1998, while the third, the government
owned Uganda Post and Telecommunication,
which had a monopoly over all telecoms, was
broken down into two and privatised (ICT Policy,
2004). In December 2007, the Saudi Arabian
Warid Telecom was launched as the fourth telecom
company. Since then, Orange Uganda Limited
majority owned by France telecoms was launched
in 2008 and others are expected to join the scene.
As a result, Ugandas earnings have been en-
hanced as manifested in the estimated 240UGX
billion investment in telecommunications in 2007
By early 2008, Uganda had 5.7 million mobile
alone, and in the sectors contribution to gross
phone subscribers, a number that had almost
national product, reportedly up to 9%, generating
reached 10, million by March 2009 as shown in
300,000 jobs directly or indirectly, compared to
Figure 2 (Uganda, Communications Commission
3,000 in 1998 (The New Vision Supplement, 26
2009):
February, 2008).
The Internet was introduced in Uganda in 1993,
This framework has seen an increase in the
although limited - commercial e-mail services did
number of Internet subscription, fixed telephone
not become available until 1994. By 2000 there
lines subscribers, with the largest increase com-
were an estimated 60,000 Internet users in
ing in mobile telephony, as explained further and
Uganda, although actual subscribers were less
shown in the tables below:
than 10,000 (Mwesige, 2004). By mid 2007, In-
ternet subscribers had grown by 30% with 11,000

Table 1. Telecommunication status by 2006

Telecommunication status between 1999-2006 1996 2006


National Telecommunication Operators 1 2
Mobile Cellular Operators 1 3
Internet Service providers 2 17
Fixed Telephone Lines 45,145 108,140
Mobile Cellular Subscribers 3000 2,008,818
Payphones - 11,082
Private FM Radio Stations 14 145
Private Television Station 4 34
National Postal Operators 1 1
Source: Ministry of Works, Housing and Communications 2003, Uganda Communications Commission (2006)

280
Ugandas Rural ICT Policy Framework

to 15,500 subscribers between 2006-2007 (Ma- the rural communications


sambu 2007). The biggest challenge to Internet development Policy
penetration in Uganda, as in the rest of Sub-Sa-
haran Africa, has been the very low telecommu- The aim of the Rural Communications Develop-
nication infrastructure. By 2004 less than 2% of ment policy (2001) was to address the imbalances
the population had a telephone line and the vast within the national ICT policy that led to the con-
majority of these remain in the capital Kampala centration of more than 70% of communication
and a few other major towns and urban centres services in urban areas, leaving rural areas, with
(Mwesige, 2004). An even smaller percentage of bigger populations, who are after all contributors
people own a personal computer. The cost of of a significant portion of the countrys wealth,
computers remains high, while private Internet with the least access to these vital communica-
access has been exorbitant (Masambu, 2007). tion services. The policy required all operators to
For instance, available statistics in 2007 extend services to the 930 sub-counties around the
monthly fees for dial-up Internet access were country. However, citing political conflict in the
about US$30, while Internet Protocol (IP) address north and the high degree of remoteness and pov-
access connection annual fees were US$ 1500 erty in rural areas, the operators (MTN, Celtel and
or a monthly fees of US$250 (Masambu, 2007). Uganda Telecom) could only serve 154 of the 930.
However, there is optimism that this scenario will To address this gap the Uganda Communications
drastically change after the launch of the Seacom Commission (a Ugandan government regulatory
broadband project11 in July 2009 linking East body) encouraged bids for licenses that would go
Africa to Europe and Asia. to underserved sub-counties. It was from this that
However, despite these national developments the Rural Communications Development Fund
in the telecom sector, 70% of communication was established (National ICT policy 2001; Ofir
services are still concentrated in elitist urban 2003; UCC 2001).
areas12, leaving rural areas with the least access
to the vital communication services (National The Rural Communication
ICT Policy, 2004; also see endnote ix on extent Development Fund
of Seacom reach by end of 2009). The informa-
tion and communication systems and services One of the outcomes of the RCDP is that since
have remained to a large extent urban-centred, 2003, when the RCDF was officially inaugurated,
top-down and elitist in nature, leaving the largest subsidies and grants have been competitively
percentage of the population (the labour force) awarded to service providers to facilitate the provi-
uninformed, illiterate and with no effective media sion of communications services in rural areas in
for accessing relevant information.13. The desire accordance with the 2006 policy ambitions and
for their participation in the Ugandan development disbursement ratios shown in the tables below:
process has been taken up in the countrys ICT The Fund, run on a 1% levy on telecommuni-
Policy, (2004) through the Rural Communications cation companies, grants from donors and govern-
Policy with the aimed to extend that much needed ment funds, offers subsidies and grants to private
access to remote areas. Now, let have a closer look investors who set up communication services in
at the policy in question. rural areas, thus serving as an incentive to serve
the total of 154 underserved sub-counties identi-
fied. By February 2008 (New Vision Supplement,
February, 2008), the Fund is reported to have
established Internet Points of Presence in 54

281
Ugandas Rural ICT Policy Framework

Table 2. Rural Communications Policy on distribution of communication services throughout the country

Number Activity
20 Internet Points of Presence, one per district
14

52 Internet Cafes, one per district


54 ICT Training Centres
56 District Information Portals
316 Payphones
154 Telephone networked sub counties
20 Multipurpose Community Telecentres
Source: Uganda Communication Commission (2006)

districts of Uganda including the 24 newly cre- information with local communities, development
ated districts. Kampala, Jinja, Mukono and Ma- partners and the outside world. These information
saka had already been served by private investors. portals ascribe domain names for each district, e.g.
In terms of its universal access to telephony figures www.[district name].go.ug provide information
from the November, 2004 mid-term review note on health, agriculture, education and commerce
that the World Bank agreed to provide additional and are also linked to the national portal (www.
funds to enable the Government to meet its new ugandaweb.net). Other activities of the RCDP
objective of having one public access point for are the installation of public payphones in 316
2,500 inhabitants, as opposed to the original tar- selected sub-counties and the establishment of
get of 5,000 indicating an improvement in out- 25 rural post offices under the Expansion of the
reach. Postal Network Project.
In addition, the Fund subsidised the establish-
ment of 54 ICT training centres and 50 Internet
cafes all over the county. The supplement also
states that the fund also helped create information
portals for all the districts, enabling them to share

Table 3. General Disbursement Ratios

Item RCDF Investment (%)


Public telephony infrastructure 40
User rural packages 3
Internet Point of Presence and wireless access 12
Internet Exchange Point (IXP) initiative 1
Vanguard Institutions/organisation ICT projects (one per district) 10
ICT start-ups and training (including in schools) 20
Rural post franchise support costs 8
ICT training capacity investment 3
ICT awareness and content creation projects 3
Total 100
Source: UCC (2001)

282
Ugandas Rural ICT Policy Framework

so just How Pragmatic is ties, such as women and youths (Dralega, 2007;
the Policy Framework? Dralega, 2008; Dralega, 2009). Both the National
and Rural Development Communication Policy
While the policy efforts mentioned above suggest a frameworks make passing statements without
positive trend in the inclusion of the rural majority specifying or giving guidelines on how to go
of Uganda into ICT discourses, several issues of about empowering them. In addition, basing
concern are apparent. In reference to the policy on the comprehensive evaluative report on the
priorities in the above table, the policy thrust seems processes of ICT policy making in Uganda, that
to be towards access to meet customer demand was commissioned by IDRC, women, youth,
rather than providing an integrated approach that disabled and other minorities within rural areas
fosters sufficient and meaningful access, participa- did not participate in the policy-making processes,
tion and people-centred communication. which consisted of mainly the private sector, the
The preoccupation with promoting access as government, donor communities (See: Ofir, 2003).
shown by the biggest percentages, for example the As mentioned before, the RCDF derives its
40% aimed at increasing public telephony, 12% at funding from a 1% percentage levy on service
increasing Internet points of presence and the 20% providers and grants from multilateral partners
at setting up Vanguard Institutions and ICT start and UCC, which is arguably too little for the task
ups, is at the expense of the preferred integrated at hand: i.e. that of rapidly expanding access and
approaches that promote processes for meaningful effective use for the majority of the countrys
ICT assimilation for development, as shown by population, which is also the portion at the least
the 3% allocated for such as important aspect as developed levels. In addition, for those commu-
awareness and content creation projects. Not to nities that are impecunious, the market approach
mention that the new Seacom project mentioned currently dominating the policy agenda is fraught
above, which is not yet accounted for in the policy with sustainability issues, something that has to
frames aims at infrastructural expansion (see be addressed if the policy is to be effective. This
website under endnote vii). Proponents of ICT is compounded by the poor government commit-
for development point out the limited role of ICTs ment to ICT if one were to consider that the ICT
if they do not socially constructed to integrate Ministry accounts for a meagre 1% share of the
and involve users in the technological processes national budget (see endnote ix).
(Hughs 2003; Jacobson and Servaes 1999; Melkote Although, influenced by the more traditional
and Steeves 2001). Rural communities, it is argued policy frameworks such as The Press and Jour-
are embedded in local cultures and indigenous nalist Statute (1995) 15 and The Electronic Media
knowledge, and have needs and capacities that Status (1996)16, the ICT policies seem to work in
must be channelled in technological developments. parallel with these traditional media policies,
Contemporary development (communication) which may perhaps explain why the ICT policies
theory insists on the recognition, participation and focus on access issues rather than usability aspects.
integration of these endogenous dimensions of This regulatory omission provides loophole when
local communities in any development initiative it comes to practicalities and disjunctures in the
including policy (Dralega, 2008; Hughs, 2003; access and utilisation of old and new ICTs
Servaes & Jacobson, 1999; Melkote & Steeves, which in reality work together in rural setting see
2001; Nicol, 2001). for example the current trends in the convergence
Within the context of every developing coun- between telecoms and broadcasting in Dralega
try, it is imperative to recognize the marginalised (2009) in which community media practitioners
within the already marginalised rural communi- in the small village of Nakaseke are experiment-

283
Ugandas Rural ICT Policy Framework

ing new technologies such as mobile telephony, and not the network. A new policy should adopt
internet and the radio to reach a diverse group of measures that promote affordable, widespread
people. In this case the policy framework needs access to a full range of services.
to catch up be synchronised to suit the chang- Since national operator-commercial-interests
ing times and the budding media convergences driven models are fraught with efficacy and
and experiments on the ground a good reason sustainability issues, it is imperative for local
too to involve non-conventional grassroots communities to take the initiative to extend the
stakeholders. fibre to communities from the bottom-up (Mure-
It is also important to note that ICT policy ithi, 2009; Ingjerd; Grtte Strand, forthcoming).
emphasises the role of ICTs for development, and These counter networks (Mosse 2005) forged by
although a worthy ambition, it fails to acknowledge communities should develop must take up the
the role of ICTs for democratic engagement. The reigns by exploring their own community needs,
development of district portals as governance determine appropriate ownership models that
resources is not sufficient in promoting active encourages partnerships and develop innovative
civic engagement (they provide mainly district services for their respective local communities.
administrative information in addition to economic A private-public sector synergy to combine
information). Democracy is an integral part of utilities such as power, water and transport utili-
development and should be given equal foot- ties with fibre and the implementation of Internet
ing in rural-aimed initiatives, including policies Points of Presence (PoPs) along the fibre would
(Dralega, 200917). be a forward looking synchronized rural develop-
ment approach. While local communities have a
central role to play in this, so does civil society
Future trends organizations who must create awareness of
the opportunities and feasibility of community
It is not a clich to conjecture that the new in- fibre networks for local development, establish
formation and communication technologies are forums for community networks to share ideas
not just here to stay, they are evolving and fast. and experiences of community based networks
Any policy move especially aimed at achieving as well as create advocacy forums to lobby for
distributive justice, must look to the past, pres- enabling environment for community fibre net-
ent but most importantly to the future in order works (Ingjerd et al, forthcoming).
to strategically position itself so as to capture its There is a significant role for research and
full potential. In this brief section on future trends academia in terms of developing the appropri-
I will focus on the potential of the fibre optic ate knowledge base and engaging the issues. In
projects yet in their budding stages. The Seacom this matrix, development partners also play a
project has been instituted (while the TEAMS significant role in lending support to community
and Eassy projects are not yet launched) and as fibre initiatives as demonstrated by SIDA pilots
mentioned earlier Uganda has initiated a four in Kenya and Tanzania (Mureithi, 2009) but most
phased nationwide expansion starting with the importantly the development of grassroots policy
main capitols. Broadband expansion should not be for and by the people it is meant to serve is of a
seen merely as more bandwidth and in technical crucial importance more on this in the conclu-
terms, it should be perceived as a paradigm shift sions below.
in the use of ICTs to propel the intelligence and
ingenuity of the networks because according to
Mureithi (2009) The limitation is your capacity

284
Ugandas Rural ICT Policy Framework

conclusIon flect the needs of their constituencies18. A good


example would be the Community Multi Media
The information provided above shows that the Centre model that requires the establishment of
Ugandan ICT policy has development concerns community representatives (i.e. farmers, women,
at the centre of its framework as it recognises the youth, religious leaders, people with disabilities,
role of information, particularly ICTs, in enhancing teachers etc) in locally owned and sustained ICT
development. It is also recognised that, although initiatives19
Uganda as a country is underdeveloped with a The chapter argues that the policy is gender
high demand for ICT propagation, the policy and youth insensitive. Something of a grave situ-
framework acknowledges that some parts are ation in any countrys development where women
more rural that others. This has been exacerbated make up large rural populations and work force
because the initial operations by the licensed while youths also represent current and future
operators have created geographical pockets that stakeholders both groups formidable within the
are unreachable. As a result, a specific policy development agenda. Through the sort of repre-
framework has been developed: the Rural Com- sentational participation mentioned above, these
munications Development Policy supported by groups can be instrumental in the development of
the Rural Communications Development Fund more pragmatic policy development and effective
to target underserved rural areas. and sustainable practices.
However, it is argued that although noble, To deal with high cost of implementation, there
the ICT policy initiatives concern with widen- is a need to encourage investments in hardware and
ing access to include rural areas are driven by user-generated software as a policy prerequisite.
market forces and are largely technologically The challenges of lowering internet costs seem to
deterministic as policy completely ignores the have been covered by the newly launched Seacom
fundamental issues of how this access should broadband project, however, this new development
be used to effectively promote the development calls for the revisitation of the policy framework
proclaimed. In essence, the policy omits to specify to stipulate guidelines that reflect the needs and
local content development or people-centred and limitations of the under-served rural areas in ad-
participatory processes in ICT use that have been dition to keeping up with new developments. A
attributed to effective ICT for development results policy move regarding the Seacom project could
(Hughs, 2003). provide a condusive environment for local and
The issue of participation, it has been argued regional institutions to actively participate in the
also arises when considering that the policy-mak- expansion of the broadband infrastructure.
ing process omitted rural users but instead featured I also argue that the policys thrust towards
the private sector, the government, development development is a worthy ambition, although the
partners and academics (Ofir 2003). This is in view fact that it does not mention the democratic role of
of conventional prerequisites in policy-making for ICTs is somewhat disconcerting. For a developing
the inclusion of beneficiary populations in any country with large poor communities, develop-
policy-making activities (Nicol, 2001; Chiumbu, ment issues must be subject to a market place of
2008) In order to ensure rural participation, lo- ideas, a democratic prerequisite that must not be
cal stakeholders such as local councillors, local divorced from development concerns. However, it
leaders, and target group representatives such as must be acknowledged that the policy framework
women, youth, religious leaders, teachers, farmers started off with noble ambitions and strategies,
from the grassroots should be included in policy but the more propitious policy framework will
making and review processes so it can better re- largely depend on the ability of policy makers to

285
Ugandas Rural ICT Policy Framework

consider and to include the different grassroots Elder, L., & Etta, F. (2005). At the Crossroads:
realities in a holistic way with intended users ICT Policy making in East Africa. Nairobi, Kenya:
at the forefront, actively promoting content de- East African Educational Publishers.
velopment that engenders the said development
Gillwald, A., & Stork, C. (2008). Towards the
more than just focusing on access. Such a holistic
African e-Index: ICT access and usage in 16
approach, driven from below, would include the
African Countries. Johannesburg, South Africa:
nuances embedded in a multidimensional ap-
The Link Centre. Retrieved September 03, 2008
proach for instance improving ICT access and
from http://www.researchictafrica.net/images/
capacity development within the rural education
upload/Cairo.pdf
system which currently reflects a geographical
digital divide with urban schools which have Hughs, S. (2003). Community Multimedia
better access to computers and training services, Centres: Creating Digital Opportunities for all .
tackling corruption within the frameworks of the In Girard, B. (Ed.), The One to Watch Radio,
grassroots ICT projects; developing software that New ICTs and Interactivity. Bonn, Germany: The
suites the needs and capacities of local people Friedrich Ebert Stiftung.
(Adomi et al. 2005; Dralega, 2007) are just a few
Ingjerd, S., & Grtte, I. P. (in press). [Rural
approaches that ought to be considered within
Infrastructural development as a Stages model:
holistic grassroots targeted ICT policies.
a roadmap to new rural infrastructure.]. Strand.
Jacobson, T., & Servaes, J. (Eds.). (1999).
reFerences Theoretical Approaches to Participatory Com-
munication. Geneva, New Jersey: International
Adomi, E. E., Adogbeji, B. O., & Oduwole, A. A. Association for Media Communication Research.
(2005). The use of internet service providers by cyber-
cafes in Nigeria: an update . The Electronic Library, Litho, P. (2005). ICTs, Empowerment and Women
23(5), 567576. doi:10.1108/02640470510631281 in Rural Uganda: A Scott Perspective. A paper
presented at the To think is to experiment
Chiumbu, H. S. (2008). Understanding the Role SSMA, Centre for Narrative Research, UEL,
and Influence of External Actors and Ideas in Afri- 22nd April 2005.
can Information, Communication and Technology
Policies. Oslo, Norway: UNIPUB. Masambu, P. (2007). A Review of the Postal and
Telecommunicatios Sector: June 2006-June 2007.
Dralega, C. A. (2007). Rural Womens ICT Use Kampala, Uganda: Communications Commission.
in Uganda: Collective Action for Development
in ICTs, Women Take a Byte. Durban Agenda Melkote, S. R., & Steeves, H. L. (2001). Com-
Journal, (71). munication for Development in the Third World:
Theory and Practice for Empowerment (4th ed.).
Dralega, C. A. (2008). ICT Based Development of London: Sage.
marginal Communities: Participatory Approaches
to Communication, Empowerment and Engage- Minges, M. (2001). The Internet in an African
ment in Uganda. Oslo, Norway: UNIPUB. LDC: Uganda Case study. International Telecom-
munication Union Study.
Dralega, C. A. (2009) Multimedia Experiments
and Disjunctures in Community Media in Uganda. Mwesige, P. (2004). Cyber Elites: A Survey of
Equid Novi, 1(30). Internet Cafes in Uganda. Telecommunications:
Development in Africa, 21(1), 83101.

286
Ugandas Rural ICT Policy Framework

New Vision Supplement. (2006, 26 th Feb- host to the destination host solely based on their
ruary). Retrieved from Http://newvision. addresses.
co.ug/D/8/12/613650 Marginalization: Is the social process of
becoming relegated or confined to a lower social
Nicol, C. (2003). ICT Policy: A Beginners Hand-
standing or outer limit or edge, as of social stand-
book. Johannesburg, South Africa: Association
ing. Material deprivation is the most common
for Progressive Communication.
result of marginalization when looking at how
Ofir, Z. M. (2003). Information and Communica- unfairly material resources (such as food and
tion Technologies for Development (ACACIA) shelter, technologies) are dispersed in society.
The Case of Uganda: Final Evaluation Report Along with material deprivation, marginalized
prepared for IDRC Evaluation Unit. individuals are also excluded from services,
programs, and policies (Young, 2000).
Ogbo, O. (2003). Strengthening National ICT
Participation: Is a term associated with the
Policies in Africa: Governance, Equity and In-
importance of involving wider groups of people
stitutional Issues. Acacia II. IDRC.
in decisions and decision making processes, ser-
PEAP. (2000). Poverty Eradication Action Plan. vices and design.
Point of Presence (PoP): Is an artificial de-
Policy, I. C. T. (2003) The National Information
marcation point or interface point between com-
and Communication Policy. Retrieved from http://
munications entities. POPs, as understood in this
ucc.co.ug/nationalIctPolicyFramework.doc
study, are also located at Internet exchange points
Ssewanyana, K. J. (2007). ICT Access and Poverty and colocation centres.
in Uganda. International Journal of Computing Social Construction of Technology (SCOT):
and ICT Research, 1(2), 10 - 19. Retrieved from Is a theory within the field of Science and Technol-
http:www.ijcir.org/volume1-number2/article ogy Studies. Advocates of SCOT that is, social
2.pdf constructivists argue that technology does not
determine human action, but that rather, human
UCC. (2006). Uganda Communication Commis-
action shapes technology. They also argue that
sion. Retrieved from www.ucc.co.ug
the ways in which a technology is used cannot
be understood without understanding how that
technology is embedded in its social context.
key terms And deFInItIons SCOT is a response to technological determin-
ism and is sometimes known as technological
Empowerment: There are several meanings constructivism.
to this term, here, it is meant to address members Technological Determinism: Is a reductionist
of groups that social discrimination processes theory that presumes that a societys technology
have excluded from decision-making processes drives the development of its social structure and
through - for example - discrimination based on cultural values.
disability, race, ethnicity, religion, or gender,
geographic location.
Internet Protocol (IP): Is the primary proto- endnotes
col in the Internet Layer of the Internet Protocol
Suite and has the task of delivering distinguished 1
Philip Emeagwali is an Igbo Nigerian-born
protocol datagrams (packets) from the source engineer and computer scientist/geologist
who was one of two winners of the 1989

287
Ugandas Rural ICT Policy Framework

Gordon Bell Prize, a prize from the IEEE, 10


The main development partners include:
for his use of the Connection Machine International Development Research
supercomputer a machine featuring over Centre (IDRC); UNESCO, International
65,000 parallel processors to help analyze Telecommunication Union (ITU), Uganda
petroleum fields. The quote was from Sesan Government -
G. (2004) Africa, ICT policy and the Mil- 11
http://www.seacom.mu/index2.asp
lenium Development Goals. 12
Mwesiges 2004 study of Internet access in
2
http://www.un.org/millenniumgoals/ Uganda also indicates this trend, pointing
3
E-Strategies: National. Sectoral and Re- out that most of the users, whom he calls
gional ICT Policies, Plans and Strategies. cyber Elites, are educated, young and
UNECA, 2003. middle-class (Mwesige 2004).
4
For more, see: Government of Uganda 13
Even the newly launched Seacom broadband
(1998), Vision 2025: A Strategic Framework project has been marred by corruption as only
for National Development: Vol. 1: Main one of four phases has been unsatisfactorily
Document, Ministry of Finance, Planning completed connecting just 4 towns in the
and Economic Development, Kampala central region see details here: Broadband the
and Government of Uganda (1998), Vision Inside story (The Independent): http://www.
2025: A Strategic Framework for National independent.co.ug/index.php/business/
Development: Vol. 2: Background Papers, business-news/54-business-news/1424-
Ministry of Finance, Planning and Economic broadband-for-uganda-the-inside-story.
Development, Kampala. Accessed: 2.12.2009.
5
Also see: Ugandas Progress in Attaining the 14
IPP Internet Points of presence are meant
PEAP Targets in the context of the Mil- to establish internet connectivity in all the
lennium Development Goals. Background 80 districts of Uganda.
paper for the Consultative Group Meeting, 15
Press and Journalist Statute is an extension of
Kampala, 14-16 May 2003. Prepared by the Article 29(1) of the Constitution on Freedom
Ministry of Finance, Planning and Economic of Expression in print media. It also crated
Development. the Media Council, the National Institute
6
Details can be obtained here: http://www. of Journalists of Uganda and Disciplinary
pma.go.ug/ Committee within the media Council which
7
NAADS recognizes the role of ICTs in the is responsible for regulating eligibility for
promotion of sustainable agriculture. This media ownership...
has been followed up through the targeted 16
The Electronic Media Statute created a
delivery of information packages to Com- licensing system under the broadcast-
munity Multimedia Centres of Nabweru, ing Council for radio, television stations,
Buwama and Nakaseke among other cinemas and video businesses. Under the
ICT centres. However, this arrangement Uganda Broadcasting Corporation (UBC)
(NAADS) has recently been riddled with Act of 2005, there was provision of free
corruption and inefficiency putting to ques- spectrum coverage for community radio up
tion the effectiveness and continuity of this to 10kilometres.
important collaboration. 17
Dralega, C. A. (2009) ICTs, Youth and the
8
Funded by the World Bank (2001-2009). Politics of Participation in rural Uganda in
9
Ministry of Health (1999) Uganda Health Mudhai, O.; Tettey W. & Banda, F. (Eds.)
Policy, 1999.

288
Ugandas Rural ICT Policy Framework

African Media and the Digital Public Sphere. 19


Dralega, C.A. (2009) Bridging the digital
Palgrave Macmillan, NY. divide: exploring the principles of the Com-
18
For examples see Dralega, C. A (2009) munity Multimedia Centre Model in Uganda
Bridging the Digital Divide: Exploring the in Ronning, H. & Orgeret K, S. (Eds.) The
principles of the Community Multimedia Power of Communication: Changes and
Centre model in Uganda in Ronning H. and challenges. Unipub, Oslo.
Orgeret, S. (2009) The power of Communi-
cation: Changes and Challenges in African
Media. Unipub, Oslo.

289
290

Compilation of References

Aalberts., B.P., & Van der Hof, S. (1999). Digital Signature Adomi, E. E. (2008). Library and information service poli-
Blindness Analysis of Legislative Approaches to Electronic cies. Benin City, Nigeria: Ethiope Publishing Corporation.
Authentication, (pp. 32). Retrieved on Nov.29, 2008 from;
Adomi, E. E., Adogbeji, B. O., & Oduwole, A. A. (2005).
http://www.buscalegis.ufsc.br/arquivos/Digsigbl.pdf
The use of internet service providers by cybercafes in Ni-
Abichandani, R. K. (2004). Controvertial Copyright Is- geria: an update . The Electronic Library, 23(5), 567576.
sues, National Judicial Academy, Bhopal, Retrieved on doi:10.1108/02640470510631281
August, 21, 2009, from http://gujarathighcourt.nic.in/
Adomi, E. E., & Igun, S. E. (2008). ICT polices in Africa
Articles/roundtable.htm.
. In Cartelli, A., & Palma, M. (Eds.), Encyclopedia of
About, N. A. S. S. C. O. M. (2009). Retrieved March 18, information communication technology (pp. 384389).
2009, from http://www.nasscom.in/Nasscom/templates/ Hershey, PA: Information Science Reference.
NormalPage.aspx?id=5365
Adomi, E. E. (2007), Overnight Internet browsing among
Abu-Musa, A. A. (2007). Evaluating the security controls cybercaf users in Abraka, Nigeria. Journal of Commu-
of CAIS in developing countries: An examination of nity Informatics, 3(2). Retrieved October 30, 2009 from
current research. Information Management & Computer http://ci-journal.net/index.php/ciej/article/viewPDFIn-
Security, 15(1), 4663. doi:10.1108/09685220710738778 terstitial/322/351

Adedibu, L. A. (2005/2006). Collection Development Afele, J. S. (2003). Digital bridges: developing countries
Policy: The Case of University of Illorin Library. Nigerian in the knowledge economy. Hershey, PA: Idea Group.
Libraries, 39, 7991.
Africa Policy Monitor, A. P. C. (2009). Retrieved
Adewopo, A. (2009, June 9). Pay subscription broadcast- on March 27 2009 from http://africa.rights.apc.
ing: rights acquisition and infringement. The Guardian, org/?apc=he_1&w=s&t=21873
(p.96).
African Business. (2009, Thursday, January 1). Retrieved
Adeyeye, M., & Iwela, C. C. (2005). Towards an Effective on March 27, 2009 from http://www.allbusiness.com/
National Information and Communication Technologies media-telecommunications/11745598-1.html retrieved
in Nigeria. Information Development, 21(3), 202208. on 27/03/2009
doi:10.1177/0266666905057337
Aghatise, E. J. (2006). Cybercrime Definition. Computer
Adomi, E. E., & Igun, S. E. (2008). Combating cyber- Crime Research Center. June 28, 2006. Available online
crime in Nigeria. The Electronic Library, 26(5), 16725. at www.crime-research.org
doi:10.1108/02640470810910738
Agyeman, O. T. (2007). Survey of ICT and Education
Adomi, E. E. (2009). Library and information resources. in Africa: Nigeria Country Report. Retrieved on the
Benin City, Nigeria: Ethiope Publishing Corporation. 18th of August, 2009 from www.infodev.org/en/Docu-
ment.422. Pdf

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Compilation of References

Akdeniz, Y. (n.d.). Speech 3: Controlling internet content: Andrews, C. (2003). The problem of child pornography on
Implications for cyber-speech. Retrieved November 4, the Internet and the ability of the British Police to regulate
2009 from http://portal.unesco.org/ci/en/files/18278/110 it. Unpublished MA thesis, University of Hull, Hull, UK.
86401441statement_akdeniz.doc/statement_akdeniz.doc
Ang, P. H. (1997). How countries are regulating Internet
Alampay, E. A. (2006a). Beyond access to ICTs: measur- content. Retrieved April 30, 2009 from http://www.isoc.
ing capabilities in the information society. International org/INET97/proceedings/B1/B1_3.HTM
Journal of Education and Development Using Information
Ani, O. E. (2005). Evolution of Virtual Libraries in Nigeria:
and Communications Technology, 2(3), 422.
Myth or Reality? Journal of Information Science, 31(1),
Alampay, E. A. (2006b). The capability approach and ac- 6770. doi:10.1177/0165551505049262
cess to information and communications technologies . In
Ani, O. E. (2007). Information and Communication
Minogue, M., & Cario, L. (Eds.), Regulatory governance
Technology (ICT) Revolution in African Librarianship:
in developing countries (pp. 183205). Cheltenham, UK:
Problems and Prospects. Gateway Library Journal,
Edward Elgar.
10(2), 111118.
Alexander, B. (2004). Going nomadic: Mobile learning
Ani, O. E., & Ahiauzu, B. (2008). Towards Effective
in higher education. EDUCAUSE Review, 39(5), 2935.
Development of Electronic Information Resources in
Aljifri, H. A., Pons, A., & Collins, D. (2003). Global e-com- Nigerian University Libraries. Library Management,
merce: A framework for understanding and overcoming 29(6/7), 504514. doi:10.1108/01435120810894527
the trust barrier. Information Management & Computer Se-
Ani, O. E., & Biao, E. P. (2005). Globalization: Its
curity, 11(3), 130138. doi:10.1108/09685220310480417
Impact on Scientific Research in Nigeria. Journal of
Alkire, S. (2005). Why the capability approach? Librarianship and Information Science, 37(3), 153160.
Journal of Human Development, 6(1), 115133. doi:10.1177/0961000605057482
doi:10.1080/146498805200034275
Ani, O. E., Esin, J. E., & Edem, N. (2005). Adoption of
American Bar Association. (1996). Digital signature Information and Communication Technology (ICT) in
guidelines: Legal Infrastructure For certification Authori- Academic Libraries: A Strategy for Library Network-
ties and Secure Electronic Commerce, (2nd Ed.). Chicago: ing in Nigeria. The Electronic Library, 23(6), 701708.
Author. Retrieved on Oct. 30, 2008, from American Bar doi:10.1108/02640470510635782
Association website; http://www.abanet.org/scitech/ec/
Anyaegbunam, C., Mefalopulos, P., & Moetsabi, T. (1999).
isc/dsg.pdf
Participatory rural communication appraisal (PRCA)
Anand, P. B. (2007). Capability, sustainability, and methodology, the first mile of connectivity. Rome: FAO.
collective action: an examination of a river water dis- Retrieved May 29, 2006, from http://www.fao.org/sd/
pute . Journal of Human Development, 8(1), 109132. CDdirect/CDan0024.htm
doi:10.1080/14649880601101465
APC WNSP. (2005). New gender and policy monitor
Anderson, D. (1974). Universal Bibliographic Control: A help women make ICT policy a priority. Retrieved 2nd
long term policy, a plan for action. Mnchen, Germany: November 2009. from: http://www.genderit.org/ en/index.
Verlag Dokumentation. shtml?w=9&x=91258

Andrew, T. N., & Petkov, D. (2003). The need for a systems Arnold, J., Guermazi, B., & Mattoo, A. (2007). Telecom-
thinking approach to the planning of rural telecommunica- munications: the persistence of monopoly . In Mattoo, A.,
tions infrastructure. Telecommunications Policy, 27(1-2), & Payton, L. (Eds.), Services, trade and development: the
7593. doi:10.1016/S0308-5961(02)00095-2 experience of Zambia (pp. 101153). Washington, DC:
The International Bank for Reconstruction and Develop-
ment/World Bank.

291
Compilation of References

Arnstein, S. R. (1969). A ladder of citizen participa- Bantekas, I., & Nash, S. (2007). International Criminal
tion. Journal of the American Planning Association. Law. Abingdon, UK: Routledge-Cavendish.
American Planning Association, 35(4), 216224.
Barja, G., & Gigler, B.-S. (2005). The concept of informa-
doi:10.1080/01944366908977225
tion poverty and how to measure it in the Latin American
Association for Information and Image Management context . In Galperin, H., & Mariscal, J. (Eds.), Digital
(AIIM). (1991). Public records survey in USA. Records poverty: perspectives from Latin America and the Carib-
Management Bulletin, 45, 45. bean. Ottawa: IDRC.

Atkinson, R. D. (2001). The New Growth Economics: Barrett, S., & Fudge, C. (Eds.). (1981). Policy and Action.
How to Boost Living Standards through Technology, London: Methuen.
Skills, Innovation, and Competition. Blueprint Magazine.
Basu, S., & Jones, R. P. (2002). Legal Issues Affecting
Retrieved on 22 Feb 2009 from http://www.dlc.org/ndol_ci
E-Commerce A Review of the Indian Information and
.cfm?contentid=2992&kaid=107&subid=123
Technology Act 2000, 17th Annual BILETA Conference,
Aubeelack, P. (2004). Mauritius. Proceedings of workshop Amsterdam. Retrieved on Oct. 22, 2008; from http://
of the regional consultation on national e-government works.bepress.com/subhajitbasu/33
readiness in Gaborone, Botswana. From 14-16 April 2004.
Batchelor, S., & Norrish, P. (2004). Framework for the
Retrieved July 16, 2005, from http://www.comnet-it.org/
assessment of ICT pilot projects: beyond monitoring
news/CESPAM-Botswana.pdf
and evaluation to applied research. Washington, DC:
Australian Standard for Records Management. (2002, InfoDev. Retrieved July 21, 2006, from http://infodev.
July). AS ISO 15489. National Archives of Australia, org/en/Publication.4.html.
Commonwealth Recordkeeping Publication. Retrieved
Batchelor, S., & Sugden, S. (2003). An analysis of InfoDev
May 26, 2007 from www.naa.gov.au
case studies: lessons learned. Washington, DC: InfoDev.
Avram, H. D. (1984). Authority control and its place. Retrieved May 26, 2006, from http://www.sustainableicts.
Journal of Academic Librarianship, 6(9), 331335. org/infodev/infodevreport.pdf

Awe, J. (n.d.). Fighting cybercrime in Nigeria. Retrieved Batuk lal. (2006). The Law of Evidence, Allahabad, India:
October 30, 2009 from http://www.jidaw.com/itsolutions/ Central Law Agency.
security7.html
Beaudiquez, M., & Bourdon, F. (1991). Management and
Bae, K. S. (2001). Koreas e-commerce: Present and use of name authority files (personal names, corporate
future. Asia-Pacific Review, 8(1), 77. bodies and uniform titles): evaluation and prospects.
Mnchen, Germany: Saur.
Baeza-Yates, R., & Ribeiro-Neto, B. (1999). Human-
computer interaction. Retrieved September 15, 2006, Bebbington,A. (2004). Social capital and development stud-
from http://www.ischool.berkeley.edu/~hearst/irbook/10/ ies 1: critique, debate, progress? Progress in Development
node3.html Studies, 4(4), 343349. doi:10.1191/1464993404ps094pr

Ball, K. S. (2001). Situating workplace surveil- Bellah, R. N., Madsen, R., Sullivan, W. M., Swidler, A.,
lance: ethics and computer based performance & Tipton, S. M. (1985). Habits of the heart. Berkeley,
monitoring. Ethics and Information Technology, 3(3). CA: University of California Press.
doi:10.1023/A:1012291900363
Biggeri, M., Libanora, R., Mariani, S., & Menchini, L.
Banou, C., Kostagiolas, P., & Olenoglou, A. (2008). (2006). Children conceptualizing their capabilities: results
The Reading Behavioural Patterns of the Ionian Uni- of a survey conducted during the first Childrens World
versity Graduate Students: Reading Policy of the Aca- Congress on Child Labour. Journal of Human Develop-
demic Libraries. Library Management, 29(6/7), 489503. ment, 7(1), 5983. doi:10.1080/14649880500501179
doi:10.1108/01435120810894518

292
Compilation of References

BITPIPE. COM. (2008). Retrieved on August 15, 2007 Browne, P. (1996). Study of the effectiveness of Informatics
from http:/www.bitpie.com. policy instruments in Africa. Addis Ababa, Ethiopia: ECA.
Retrieved on the 20th of July 2009 from www.belanet.org/
Bojanc, R., & Jerman-Blaic, B. (2008). Towards a standard
partners/aisi/policy/infopol/sumbrown.htm
approach for quantifying an ICT security investment.
Computer Standards & Interfaces, 30(4), 216222. Buchinski, E. J., Newman, W. L., & Dunn, M. J. (1976).
doi:10.1016/j.csi.2007.10.013 The automated authority subsystem at the National Library
of Canada. Journal of Library Automation, 4(9), 279298.
Bonder, G. (2002). From access to appropriation: women
and ICT policies in Latin America and the Caribbean. Building Local Capacity for ICT Policy and Regulation.
A Report from the United Nations Division for the Ad- A needs Assessment and Gap Analysis for Africa, the
vancement of Women (DAW) Seoul Republic of Korea Carribean, and the Pacific. Retrieved March 21, 2009
II to IV November 2002. Retrieved December 23, 2009 from www.infuder.org/en.project
from http://www.un.org/womenwatch/daw/egm/ict2002/
Burch, S. (1997). Latin American women take on the Inter-
reports/Paper-GBonder.PDF
net. Retrieved 2nd November, 2009. Retrieved from http://
Bonsor, K. (2000). How DNA Computers Will Work. Re- www. apcwomen.org/netsupport/articles/art.01.html
trieved on July 6, 2010 from HowStuffWorks.com. <http://
Burrows, J., & Cheer, U. (2005). Media Law in New
computer.howstuffworks.com/dna-computer.htm>
Zealand (5th ed.). Melbourne, Australia: Oxford Uni-
Botswana, Ministry of Communications, Science and versity Press.
Technology (2008). Maitlamo: National Information
Buyya, R. (2001). Parallel processing: architecture and
and Communications Technology Policy. Gaborone,
system overview. Retrieved on March 27 2009 from
Botswana: Government Printer.
http://www.cs.mu.oz.au/678/ParCom.ppt#352,1,Parallel
Bouguettaya, A., Ouzzani, M., Medjahead, B. & Cameron, Processing: Architecture and System Overview.
J. (2001). Helping citizens of Indiana: Ontological ap-
Bynum, T. W. (2009). Ethics in the information age,
proach to managing state and local government databases.
(Tech.Rep.). New Haven, CT: Southern Connecticut
IEEE Computer, February.
State University.
Bourdon, F. (1993). International cooperation in the field
Bynum, T. W., & Rogerson, S. (Eds.). (1996). Global
of authority data: an analytical study with recommenda-
information ethics. USA: Opragon press.
tions. Mnchen, Germany: Saur.
Byrne, E., & Sahay, S. (2007). Participatory design for
Bourne, R. (Ed.). (1992). Seminar on Bibliographic
social development: a South African case study on com-
Records: proceedings of the Seminar held in Stockholm,
munity-based health information systems. Information
15-16 August 1990. Mnchen, Germany: Saur.
Technology for Development, 13(1), 7194. doi:10.1002/
Bozimo, D. O. (2005/2006). ICT and the Ahmadu Bello itdj.20052
University Libraries. Nigerian Libraries, 39, 120.
Cantoni & C. McLoughlin (Ed.). Proceedings of World
Bridges.org. (2001). Comparison of E-readiness Assess- Conference on Educational Multimedia, Hypermedia and
ment Models: Final Draft. Retrieved July 16, 2003, from Telecommunications2004, (pp. 4729-4736).
http://www.bridges.org/eredainess/tools.html
Capuro, R. (2006). Towards an ontological foundation of
Brown, R., & Price, S. (2006). The Future of Media information ethics. Ethics and Information Technology,
Regulation in New Zealand: Is There One? Retrieved 8(2), 175186. doi:10.1007/s10676-006-9108-0
March 19, 2009, from http://www.bsa.govt.nz/publica-
Carbo, T. (2007). Information rights: trust and human
tions/BSA-FutureOfMediaRegulation.pdf
dignity in e-government. [from http://www.i-r-i-e.net].
International Review of Information Ethics, 7(9), 17.
Retrieved December 8, 2008.

293
Compilation of References

Carbo, T. (2006). Understanding information ethics and Chawki, M. (2009) Nigeria Tackles Advance Fee Fraud.
policy: integrating ethical reflection and critical thinking Journal of Information, Law and Technology. Retrieved
into policy development. Retrieved February 28, 2009, May 21st, 2009. From: http://www2.warwick.ac.uk/fac /
from http:/www.ethicspolicy.pitt.edu soc/law/elj/jilt/ 2009 _1 /chawki/chawki.pdf

Carlisle, A. & Lloyd. (2002). Understanding PKI: Con- Chetty, M. (2005). Information and Communications
cepts, Standards, and Deployment Considerations, (pp. Technologies (ICTs) and Africas development. Retrieved
11-17). London: Addison-Wesley. on March 5, 2009 from http://www.nepad.org/2005/files/
documents/124.pdf.
Carr, A. (2004). Internet Traders of Child Pornography
and other Censorship Offenders in New Zealand. Wel- Chiumbu, H. S. (2008). Understanding the Role and
lington, New Zealand: Department of Internal Affairs. Influence of External Actors and Ideas in African Infor-
mation, Communication and Technology Policies. Oslo,
Carr, A. (2006). Internet censorship offending: a pre-
Norway: UNIPUB.
liminary analysis of the social and behavioural patterns
of offenders. Unpublished PhD thesis, Bond University, Chukwuemerie, A. (2006). Nigerias Money Laun-
Queensland. dering (Prohibition) Act 2004: A Tighter Noose.
Journal of Money Laundering Control, 9(2).
Caruso, J. B. (2003). Information technology security
doi:10.1108/13685200610660989
policy keys to success. Center for Application Research
Bulletin, 2003(23). Retrieved January 2009 from http:// Chwee Kin Keong and Others v. Digilandmall.com Pvt.
www.educause.edu//library//ERB0323.pdf Ltd, (2004) 2 SLR 594.

Cerina, P. (1998). The New Italian Law on Digital Sig- Clement, E. A. H. (1980). The automated authority file at
natures. 6 CTLR, 193. the National Library of Canada. International Catalogu-
ing, 4(9), 4548.
Cert-in is the official website of the Indian Computer
Emergency Response Team. (n.d.). Retrieved from http:// Cloud Corp. v. Hasbro Inc, 314 F.3d 289 (7th Cri. 2002).
www.cert-in.org.in/
Cohasset Associates. (February, 2005). Assured records
Chan, A. H., & Gligor, V. (2002). Information Security, management: establishing and maintaining a new level
(LNCS). Berlin: Springer. doi:10.1007/3-540-45811-5 of performance. White paper. Retrieved June 13, 2008
from www.cohasset.com
Chang, S. E., & Chin-Shien, L. (2007). Exploring orga-
nizational culture for information security management. Cohen, H. (2003). Child Pornography Produced without
Industrial Management & Data Systems, 107(3), 438458. an Actual Child: Constitutionality of Congress Legisla-
doi:10.1108/02635570710734316 tion. In W. Holliday (Ed.), Governmental Principles
and Statutes on Child Pornography. New York: Nova
Chawki, M. (2006). Anonymity in Cyberspace: Finding
Science Publishers.
the Balance between Privacy and Security. Revista da
Faculdade de Direito Milton Campos. Comin, F. (2001 June). Operationalising Sens capabil-
ity approach. Paper prepared for the conference Justice
Chawki, M. (2006). Le Droit Penal lEpreuve de la
and Poverty, examining Sens capability approach,
Cybercriminalit. Lyon, France: University of Lyon III.
Cambridge, UK. Retrieved August 20, 2006 from http://
Chawki, M. (2008). Combattre la Cybercriminalit. www.st-edmunds.cam.ac.uk/vhi/sen/papers/comim.pdf.
Perpignan, France: Editions de Saint Amans.

Chawki, M. & Wahab, M. (2006). Identity Theft in Cy-


berspace: Issues and Solutions. LexElectronica, 11(1).

Chawki, M. (2005). A Critical Look at the Regulation


of Cybercrime. The ICFAI Journal of Cyberlaw, 4(4).

294
Compilation of References

Common Market for Eastern and Southern Africa, Associa- Dabeesing, T. (2006). National ICT Strategic Plan Emerg-
tion of Regulators of Information And Communications ing Technologies and Standards Working Group. Retrieved
for Eastern and Southern Africa. (2004). Policy Guidelines on September 22, 2009 from http://www.gov.mu/portal/
on Universal Service/Access. Retrieved on September goc/ncb/file/Presentation_NWGET.pdf.
22, 2009 from http://programmes.comesa.int/attach-
Daniel, J., & West, P. (2006). E-learning and free open
ments/118_Policy_Guidelines_Universal_Service.pdf.
source software: The key to global mass higher educa-
Common Market for Eastern and Southern Africa. (2009). tion? International Seminar on Distance, Collaborative
COMESA Regional e-Government Framework. Retrieved and eLearning: Providing Learning Opportunities in the
on September 23, 2009 from http://programmes.comesa. New Millennium via Innovative Approaches, Universiti
int/attachments/144_COMESA%20e-GOV%20Frame- Teknologi Malaysia Kuala Lumpur, Malaysia, 4-5 Janu-
work%20PresentationKampala.pdf. ary 2006.

Community Research and Development Information Darlington, R. (2009). How the Internet could be regulated.
service. (CORDIS, 2009). ICT - Future and emerging Retrieved May 8, 2009 from http://www.rogerdarlington.
technologies: a continuing well established successful co.uk/Internetregulation.html
ICT scheme. Retrieved on September 22, 2009 from
Dart, J., & Davies, R. (2003). A dialogical, story-based
http://cordis.europa.eu/fp7/ict/programme/fet_en.html
evaluation tool: the most significant change technique.
Conklin, W. A. (2007). Barriers to adoption of e-govern- The American Journal of Evaluation, 24(2), 137155.
ment. In Proceedings of the 40th Annual Hawaii Interna-
Data Security Council of India. (2008). Retrieved March
tional Conference on System Sciences. Washington, DC:
18, 2009, from http://www.nasscom.in/Nasscom/tem-
IEEE Computer Society.
plates/NormalPage.aspx?id=51973
Considerations for ICT policy formulation in developing
Davies, P. B. (2002). Information systems: an introduc-
countries. (n.d.). Retrieved on of June 20th, 2009 papers.
tion to Informatics in organizations. New York: Palgrave.
ssrn.com/sol3/.../SSRN_ID983944_code733084.pdf?
Davis, F. D. (1989). Perceived usefulness, perceived ease
Corbridge, S. (2002). Development as freedom: the spaces
of use, and user acceptance of information technology.
of Amartya Sen. Progress in Development Studies, 2(3),
Management Information Systems Quarterly, 13(3),
183217. doi:10.1191/1464993402ps037ra
319340. doi:10.2307/249008
Corea, S. (2007). Promoting development through infor-
Delone, W. H., & Mclean, E. R. (1992). Information system
mation technology innovation: The IT artifact, artfulness,
success: The quest for the dependent variable. Information
and articulation. Information Technology for Development,
Systems Research, 3(1), 6195. doi:10.1287/isre.3.1.60
13(1), 4969. doi:10.1002/itdj.20036
Delsey, T. (1980). IFLA Working Group on an Interna-
Cruickshank, J. (2006). Good practice guidelines for
tional Authority System: A progress report. International
records and record keeping: a report prepared within the
Cataloguing, 9(January/March), 1012.
SAFEGROUNDS Project, Draft 3.1. 18 October.
Delsey, T. (1989). Authority control in an international
Csete, J., Wong, Y., & Vogel, D. (2004). Mobile devices
context. Cataloging & Classification Quarterly, 3(9),
in and out of the classroom. In L.
1328. doi:10.1300/J104v09n03_02
Cullen, R. (2002). Addressing the digital divide.
Delsey, T. (2004). Authority records in a networked en-
Online Information Review, 25(5), 311320.
vironment. International Cataloguing and Bibliographic
doi:10.1108/14684520110410517
Control, 4(33), 7174.

295
Compilation of References

Department for International Development (DFID). DIT & NCAER (Department of Information Technology
(2006). Financing ICT for Development: the EU approach. & National Council of Applied Economic Research).
Retrieved on March 27, 2009 from http://www.dfid.gov. (2006). India: e-readiness assessment report 2006 - for
uk/pubs/files/eu-financ-wsis-english.pdf. States/Union Territories.

Department for International Development (DFID). Divjak, S. (2008). Mobile phones in the classroom. In-
(2008). Millennium Development Goals. Retrieved on ternational Journal on Hands-on Science, 1(2), 9294.
March 27, 2009 from http://www.dfid.gov.uk/mdg/
DOC. (2009). Launch of the National e-Skills Dialogue
Department of Internal Affairs. (1997). Report of the - From Agrarian, Industrial to Information Society. Re-
Department of Internal Affairs for the year ended 30 June trieved July 2009, from http://www.doc.gov.za/index.
1997. Wellington, New Zealand: Author. php?option=com_content&task=view&id=309&Item
id=457.
Department of Internal Affairs. (2002a). Briefing to the
Incoming Minister of Internal Affairs. Wellington, New Dong, L., Neufeld, D., & Higgins, C. (2009). Top
Zealand: Author. management support of enterprise systems implementa-
tions. Journal of Information Technology, 24(1), 5580.
Department of Internal Affairs. (1998). New Zealand Cen-
doi:10.1057/jit.2008.21
sorship Compliance Unit. Unpublished paper presented
at the Australian Institute of Criminology conference, Dralega, C. A. (2008). ICT Based Development of marginal
Internet Crime, Melbourne University, 16-17 February. Communities: Participatory Approaches to Communica-
tion, Empowerment and Engagement in Uganda. Oslo,
Department of IT eTechnology Group (India). (2003).
Norway: UNIPUB.
Assessment of central ministries and departments: e-
governance readiness assessment 2003: Draft Report 48. Dralega, C. A. (2007). Rural Womens ICT Use in Uganda:
Collective Action for Development in ICTs, Women Take
Department of Public Service and Administration. (1996).
a Byte. Durban Agenda Journal, (71).
Green paper transforming public service delivery. Preto-
ria, South Africa: GCIS. Dralega, C. A. (2009) Multimedia Experiments and
Disjunctures in Community Media in Uganda. Equid
Dhillon, G., & Torkzadeh, G. (2006). Value-focused
Novi, 1(30).
assessment of information system security in organi-
zations. Information Systems Journal, 16, 293314. Drevin, L., Kruger, H. A., & Steyn, T. (2006). Value-
doi:10.1111/j.1365-2575.2006.00219.x focused assessment of ICT security awareness in an aca-
demic environment. In S. Fischer-Hubner, K. Ranneberg,
Dholakia, R. R., Miao, Z., Dholakia, N., & Fortin, D. R.
L. Yngstrom, & S. Lindskog (Eds.), IFIP International
(2000). Interactivity and revisits to websites: a theoretical
Federation for Information Processing. Volume 201,
framework. RITIM Working paper. Retrieved December
Security and Privacy in Dynamic Environments, (pp.
15, 2008, from http://ritim.cba.uri.edu/wp/.
448-453). Boston: Springer.
Diebold Systems Pvt. Ltd. v. The Commissioner of Com-
Duggal, P. (2005). Cyber-crime in India: The Legal Ap-
mercial Taxes, (2006). 144STC59(Kar).
proach . In R.G. Broadhurst & P.N. Grabosky, (n.d.),
Diffie, W., & Hellman, M. E. (1976). New Directions in Cyber-crime: The Challenge in Asia (pp. 183196). Hong
Cryptography. IEEE Transactions on Information Theory, Kong: Hong Kong University Press.
IT-22(6), 644654. doi:10.1109/TIT.1976.1055638
Duncombe, R. (2006). Using the livelihoods frame-
Dirks, K. T., & Ferrin, D. L. (2002). Trust in leadership: work to analyse ICT applications for poverty reduction
meta-analytic findings and implications for research through microenterprise. Information Technologies and
and practice. The Journal of Applied Psychology, 87(4), International Development, 3(3), 81100. doi:10.1162/
611628. doi:10.1037/0021-9010.87.4.611 itid.2007.3.3.81

296
Compilation of References

Dunsire, G. (2009). The Semantic Web and expert meta- Encyclopaedia Britannica. (2009). Very large-scale inte-
data: Pull apart then bring together: Presented at Archives, gration. Retrieved on March 27, 2009, from Encyclop-
Libraries, Museums 12 (AKM12), Pore, Croatia, 2008. dia Britannica Online from http://www.britannica.com/
Retrieved March 25, 2009, from http://cdlr.strath.ac.uk/ EBchecked/topic/626791/very-large-scale-integration
pubs/dunsireg/akm2008semanticweb.pdf
Erikson, E. H. (1963). Childhood and society (2nd ed.).
Durance, C. J. (1978). Whats in the name? Summary of New York: W.W. Norton.
the workshop . In Whats in a name? Control of catalogue
Ernest, H., & Shetty, R. (2005). Impact of Nanotechnology
records through automated authority files (pp. 225227).
on Biomedical Sciences: Review of Current Concepts on
Vancouver, Toronto: University of Toronto Library Au-
Convergence of Nanotechnology With Biology. Journal
tomation System.
of Nanotechology online. Retrieved on July 6, 2010 from
Dzidonu, C. (2002). A blueprint for developing national http://www.azonano.com/details.asp?ArticleID=1242
ICT policy in Africa. Retrieved October 1, 2009 from
Erwin, G. J., & Taylor, W. (2006). Assimilation by Com-
http://www.atpsnet.org/pubs/specialpaper/Dzidon.pdf
munities of Internet Technologies: Initiatives at Cape
Earl, S., Carden, F., & Smutylo, T. (2001). Outcome map- Peninsula University of Technology, Cape Town . In
ping: building learning and reflection into development Marshall, S., Taylor, W., & Yu, X. (Eds.), Encyclopedia
programs. Ottawa, Canada: IDRC. of Developing Regional Communities with Information
and Communication Technology (pp. 4046). Hershey,
Easton, D. (1965). A systems analysis of political life.
PA: Idea Group Publishing.
New York: John Wiley.
Etim, F. (2006). Resource Sharing in the Digital Age:
Economic and Financial Crimes Commission (Es-
Prospects and Problems in African Universities. Library
tablishment) Act. (2004). Retrieved 10th May, 2009.
Philosophy and Practice, 9(1), 1219.
From http://efccnigeria.org/index.php?option=com_
docman&task=doc_download&gid=5 European Commission. (2002). eEurope 2005 action
plan: e-Inclusion. Retrieved December 20, 2008, from
ECPAT New Zealand. (2003). Williamsons Child Por-
http://europa.eu.int/information_society/eeurope/2005/
nography Sentence Too Light. media release, 31 July.
all_about/einclusion/index_en.htm
Edewor, N. (2008). Freedom of Information Bill: issues,
European Commission. (2005). Transforming public ser-
imperatives and implications for Nigerian libraries. Ozoro
vices. Report of the Ministerial eGovernment Conference,
Journal of General Studies, 1(1), 3440.
Manchester, UK. Retrieved December 12, 2008, from
Editorial, (2008). The ranking of our Universities. ThisDay http://www.egov2005conference.gov.uk/documents/pdfs/
Newspapers (Tuesday 9, December). eGovConference05_ Summary.pdf

Elder, L., & Etta, F. (2005). At the Crossroads: ICT Policy Evans, J., & Ninole, M. (2004). Minding the informa-
making in East Africa. Nairobi, Kenya: East African tion gap in Papua New Guinea: a view from Wewak. In
Educational Publishers. R.F. Garcia, R.F. (Ed.), Divide and connect: perils and
potentials of information and communication technology
Electronic Frontiers Australia. (2002). Internet in Asia and the Pacific. (pp. 49-60). Mumbai: Asian South
Censorship:Law & policy around the world. Retrieved Pacific, Bureau of Adult Education (ASPBAE).
May 12, 2009 from http://www.efa.org.au/Issues/Censor/
cens3.html Falch, M., & Anyimadub, A. (2003). Tele-centres as a
way of achieving universal access: the case of Ghana.
Electronic Frontiers Australia. (2006). Internet censorship Telecommunications Policy, 27(1-2), 2139. doi:10.1016/
laws in Australia. Retrieved May 11, 2009 from http:// S0308-5961(02)00092-7
www.efa.org.au/Issues/Censor/cens1.html

297
Compilation of References

Fallis, D. (2007). Information ethics for the twenty first Forrester, E. C. (2003). A Life-Cycle Approach to Tech-
century library professionals. Library Hi Tech, 25(1), nology Transition. Retrieved on June 15 2008 from
2336. doi:10.1108/07378830710735830 http://www.sei.cmu.edu/news-at-sei/features/2003/3q03/
feature-4-3q03.htm
Farelo, M., & Morris, C. (2006). The working group
on e-government in the developing world: Roadmap Foster, I. (2005). Internet computing and the emerging
for e-government in the developing world, 10 questions grid. Retrieved on October 9, 2007 from http://www.
e-government leaders should ask themselves. Retrieved nature.com/nature/webmatters/grid/grid.html
December 24, 2008, from http://researchspace.csir.co.za/
Foster, K., Heppenstal, R., Lazarz, C., & Broug, E. (2008).
dspace/bitstream/10204/1060/1/Morris_2006_D.pdf
Emerald Academy 2008 Authorship in Africa. Retrieved
Farrier, J. (2010, January 11). Wet Computer Will Mimic March 20, 2009 from http://info.emeraldinsight.com/
A Biological Brain. Retrieved on July 7, 2010 from http:// pdf/report.pdf/
www.neatorama.com/2010/01/11/wet-computer-will-
Froehlich, T. J. (1992). Ethical consideration of informa-
mimic-a-biological-brain/
tion professionals. Annual Review of Information Science
Federal Republic of Nigeria. (2001) Nigerian National & Technology, 27, 29132.
Policy for Information Technology (IT). Retrieved April
Frost & Sullivan. (2007). Cited in ZAMNET gains global
14, 2009 from www.nita.gov.ng/document/nigeriaitpolicy.
recognition as market leader. Retrieved on December
pdf
8, 2007 from http://www.zamnet.zm/newsys/news/
Fellenstein, C., & Wood, R. (2000). Exploring e-com- viewnews.cgi?category=30&id=1197109256
merce, global e-business, and societies, 30. Upper Saddle
Fulford, H., & Doherty, N. F. (2003). The application
River, NJ: Prentice Hall.
of information security policies in large UK-based or-
Ferraro, M., & Casey, E. (2005). Investigating Child ganizations: An exploratory investigation. Information
Exploitation and Pornography. San Diego, CA: Elsevier. Management & Computer Security, 11(2/3), 106114.
doi:10.1108/09685220310480381
Fillip, B., & Foote, D. (2007). Making the connection:
scaling telecenters for development. Washington, DC: Functional requirements for authority data: A conceptual
Information Technology Applications Center of the model. (2009). G. Patton, (Ed.). IFLA Working Group
Academy for Education Development. Retrived July 10, on Functional Requirements and Numbering of Author-
2008, from http://connection.aed.org/pages/MakingCon- ity Records (FRANAR). Final Report, December 2008.
nections.pdf Approved by the Standing Committees of the IFLA
Cataloguing Section and IFLA Classification and Indexing
Finocchiaro, G. (2002). Digital Signature and Electronic
Section, March 2009. Mnchen, Germany: Saur.
Signatures: The Italian Regulatory Framework After The
d.lgs 10/2002. Electronic Communication Law Review, Functional requirements for bibliographic records: Final
(9), 127. report. (1998). IFLA Study Group on the Functional
Requirements for Bibliographic Records. Mnchen, Ger-
Foresight Nanotech Institute. (2008). Retrieved on Octo-
many: Saur. Retrieved March 25, 2009, from http://www.
ber 10, 2007 from http://www.foresight.org/nano/
ifla.org/VII/s13/frbr/frbr.pdf
Forestier, E., Grace, J., & Kenny, C. (2002). Can informa-
Gagliardone, I. (2005). Virtual enclaves or global net-
tion and communication technologies be pro-poor? Tele-
works? The Role of information and communication
communications Policy, 26(11), 623646. doi:10.1016/
technologies in development cooperation. PsychNology
S0308-5961(02)00061-7
Journal, 3(3), 228242.

298
Compilation of References

Garnham, N. (1999). Amartya Sens capabilities approach Gerhan, D., & Mutula, S. M. (2005). Bandwidth Bottle-
to the evaluation of welfare: its application to commu- necks at the University of Botswana: Complications for
nications . In Calabrese, A., & Burgelman, J.-C. (Eds.), Library, Campus, and National Development. Library Hi
Communication, citizenship and social policy: rethinking Tech, 23(1), 102117. doi:10.1108/07378830510586748
the limits of the welfare state (pp. 281302). Oxford, UK:
Gigler, B.-S. (2004 September). Including the excluded
Rowan and Littlefield.
can ICTs empower poor communities? Towards an
Gasper, D. (1997). Sens capability approach and alternative evaluation framework based on the capabil-
Nussbaums capabilities ethics. Journal of Interna- ity approach. Paper for the 4th International Conference
tional Development, 9(2). doi:10.1002/(SICI)1099- on the capability approach, University of Pavia, Pavia.
1328(199703)9:2<281::AID-JID438>3.0.CO;2-K Retrieved May 26, 2006, from http://www.its.caltech.
edu/~e105/readings/ICT-poor.pdf
Gasper, D. (2002). Is Sens capability approach
an adequate basis for considering human develop- Gillwald, A., & Stork, C. (2008). Towards the African
ment? Review of Political Economy, 14(4), 435461. e-Index: ICT access and usage in 16 African Countries.
doi:10.1080/0953825022000009898 Johannesburg, South Africa: The Link Centre. Retrieved
September 03, 2008 from http://www.researchictafrica.
Gavaghan, T. (2010). DNA computing. Retrieved on July
net/images/upload/Cairo.pdf
6, 2010 from http://EzineArticles.com/?expert=Thomas_
Gavaghan Gorman, M. (1978). The Anglo-American cataloguing
rules, second edition. Library Resources & Technical
Gaved, M., & Anderson, B. (2006). The impact of local
Services, 3(22), 209225.
ICT initiatives on social capital and quality of life. Chimera
Working Paper 2006-6, University of Essex, Colchester, Gorman, M. (1998). The future of cataloguing and cata-
UK. Retrieved October 30, 2006, from http://www.essex. loguers. International Cataloguing and Bibliographic
ac.uk/chimera/content/pubs/wps/CWP-2006-06-Local- Control, 27(4), 6871.
ICT-Social-Capital.pdf
Gorman, M. ([1979] 1982). Authority control in the
Gbaje, E. S. (2007). Provision of Online Information prospective catalog. In M. W. Ghikas (Ed.), Authority
Services in Nigerian Academic Libraries. Nigerian Li- control: The key to tomorrows catalog: Proceedings of
braries, 40, 114. the 1979 Library and Information Technology Institutes
(pp. 166-180). Phoenix, AZ: Oryx Press.
Gelbstein, E., & Kurbalija, J. (2005). Internet Governance:
Issues, Actors and Divide. Malta: Diplo Foundation. Gorniack, K. (1996). The computer revolution and the
problem of global ethics. In Bynum & Rogerson (Eds.),
Genderit.org. (n.d). Why gender in ICT policy? Retrieved
Global information ethics, (pp.177-190). USA: Opragon
November 25, 2009 from http://www.genderit.org/en/
press.
beginners/whygender.htm
Government of Canada. (2006). On-line forms and ser-
Geness, S. (2004). E-government, the South African
vices. Retrieved May 13, 2007, from http://canada.gc.ca/
experience. In Proceedings of workshop of the regional
form/e-services_e.html
consultation on national e-govt readiness in Gaborone,
Botswana. From 14-16 April 2004. Retrieved July 16, Government of Mozambique. Information and Com-
2004 from http://www.comnet-it.org/news/CESPAM- munication Technology Policy Implementation Strategy:
Botswana.pdf Towards the Global Information Society. Mozambique,
June. 2002. http://www.idrc.ca/en/ev-90304-201-1-
Genoud, P., & Pauletto, G. (2004). The e-society reposi-
DO_TOPIC.htm, Retrieved on the 7th of July 2009
tory: Transforming e-government strategy into action.
Paper Presented at the 4th European Conference on E- Government of Singapore. (2004). E-citizen: Your gateway
government, Dublin Castle, Ireland, 17-18 June 2004. to all government services. Retrieved May 14, 2007, from
http://www.ecitizen.gov.sg/

299
Compilation of References

Grace, J., Kenny, C., & Qiang, C. Z. (2004). Information Gurstein, M. (2003). Effective use: a community informat-
and Communication Technologies and Broad-Based De- ics strategy beyond the digital divide. First Monday, 8(12).
velopment: A Partial Review of the Evidence. Washington,
Gurstein, M. (1999). Flexible networking, information
DC: The World Bank.
and communications technology and local economic
Granqvist, M. (2005). Looking critically at ICT4Dev: development, First Monday 4 (2). Retrieved March 15,
the case of Lincos. Journal of Community Informatics, 2003, from http://www.firstmonday.org/issues/issue4_2/
2(1), 2134. gurstein/index.html.

Greene, S. (2006). Security Policies and Procedures: Gurstein, M. (2003, December). Effective use: a com-
Principles and Practices. Upper Saddle River, NJ: munity informatics strategy beyond the digital divide,
Prentice Hall. First Monday, 8(12). Retrieved June 18, 2004, from http://
firstmonday.org/issues/issue8_12/gurstein/index.html.
Grossenbacher, K. (2000). Implementing the District
Health System in KwaZulu-Natal: A Systemic Inquiry Gurstein. M. (2007). What is Community Informatics
into the Dynamics at the Policy/Practice Interface. (and Why Does It Matter)? Retrieved February 2008,
Unpublished masters dissertation, University of Natal, from http://eprints.rclis.org/archive/00012372/01/What
Durban, South Africa. is Community Informatics reading.pdf.

Grunfeld, H. (2007). Framework for evaluating contribu- Gustaniene, A. (2005). Gender focused ICT policy mak-
tions of ICT to capabilities, empowerment and sustain- ing. Retrieved 2nd November 2009. From: http://www.
ability in disadvantaged communities. Paper presented genderit.org/en/indexshtml?w=a&x=91489
at the CPRSouth2 (Communication Policy Research)
Hafkin, N. (2002). Gender issues in ICT policy in develop-
Conference, Empowering rural communities through ICT
ing countries: An overview. Retrieved 9th January 2009,
policy and research, Chennai, India, 15-17 December.
from http://www.un.org/womenwatch/daw/egm/ ict2002/
Guba, E. G., & Lincoln, Y. S. (1981). Effective Evalua- reports/paper--NHafkin.pdf
tion. San Francisco: Jossey-Bass.
Hagiya, M. (2000). Theory and Construction of Molecular
Guidelines for authority and reference entries (1984). Computers. Retrieved on July 6, 2010 from http://hagi.
Recommended by the Working Group on an International is.s.u-tokyo.ac.jp/MCP/.
Authority System, approved by the Standing Committees
Hansche, S. (2001). Designing a security awareness pro-
of the IFLA Section on Cataloguing and the IFLA Section
gram: Part 1. Information System Security, 9(6), 1422.
on Information Technology. London: IFLA International
Programme for UBC. Harper, T. (2003). What is Nanotechnology? 2003
Nanotechnology 14. doi:10.1088/0957-4484/14/1/001.
Guidelines for authority records and references (2001).
Retrieved on October 10, 2007 from http://www.iop.org/
Revised by the Working Group on GARE (Rev., 2nd ed.).
EJ/abstract/0957-4484/14/1/001
Mnchen, Germany: Saur.
Harris, R., & Rajora, R. (2006). Empowering the poor.
Guislain, P., Qiang, C., Lanvin, B., Minges, M., &
Information and communications technology for gover-
Swanson, E. (2006). Overview . In Information and
nance and poverty reduction: a study of rural develop-
Communications for Development: Global Trends and
ment projects in India. UNDP Asia-Pacific Development
Policies. Washington, DC: World Bank.
Information Programme.
Gull, C. D. (1969). The impact of electronics upon cata-
loguing rules. International Conference on Cataloguing
Principles, Paris, 9th-18th October, 1961 (1969). Report
(pp. 281-290). London: Clive Bingley.

300
Compilation of References

Harris, R. W. (2001). A place of hope, connecting people Hoppe, H. U., Joiner, R., Milrad, M., & Sharples, M.
and organisations for rural development, through mul- (2003). Guest editorial: Wireless and mobile technology
tipurpose community telecentres (MCTs) in selected in education. Journal of Computer Assisted Learning,
Philippine Barangays; a learning evaluation. Report for 19(3), 255259. doi:10.1046/j.0266-4909.2003.00027.x
International Development Research Centre (IDRC), Ot-
Howard, I. (2008). Unbounded possibilities: observa-
tawa. Retrieved October 5, 2006, from http://www.idrc.
tions on sustaining rural information and communication
ca/IMAGES/ICT4D/PanAsia/HarrisPhilippineReport.pdf
technology (ICT) in Africa. Retrieved on October 29,
Hart-Teeter. (2003). The new e-Government equation: 2008, from http://www.apc.org/en/system/files/Sustain-
Ease, engagement, privacy and protection. A Report ingRuralICTs_0.pdf
prepared for the Council for Excellence in Government.
Hsu, J. (2010, January 11). Wet Computer Literally
Retrieved February 10, 2009 from http://www.cio.gov//
Simulates Brain Cells. Retrieved on July 7, 2010 from
egovpoll2003.pdf
http://www.popsci.com/technology/article/2010-01/wet-
Hawker, S. (Ed.). (2002). Oxford dictionary thesaurus: computer-literally-simultes-brain-cells
wordpower guide. New York: Oxford University Press.
http://wougnet.Org/ICTpolicy/ug/ugictpolicy.html. (n.d.).
Heeks, R. (2002). E-government in Africa: Promise and Retrieved on the 20th of June, 2009.
practice. Manchester, UK: Institute for Development
Hudson, H. E. (2006). From rural village to global village:
Policy and Management University of Manchester.
telecommunications for development in the information
Heeks, R. (2006). Theorizing ICT4D research. Informa- age. Mahwah, NJ: Lawrence Erlbaum Associates.
tion Technologies and International Development, 3(3),
Hughs, S. (2003). Community Multimedia Centres: Creat-
14. doi:10.1162/itid.2007.3.3.1
ing Digital Opportunities for all . In Girard, B. (Ed.), The
Heeks, R. (1999). Information and communication tech- One to Watch Radio, New ICTs and Interactivity. Bonn,
nologies, poverty and development. Retrieved 9th January Germany: The Friedrich Ebert Stiftung.
2009, from http://idpm.man.ac.ik/ idpm/diwpf5.htm
Human Development Report Office. (2008). Human
Heslop, H., Davis, S., & Wilson, A. (2002). An Approach development indices. Retrieved February 11, 2009, from
to the preservation of digital records (pp. 110). Austra- http://hdr.undp.org/en/media/HDI_2008_EN_Tables.pdf
lia: Commonwealth of Australia and National Archives
Human Development Report. (2001). Making New
of Australia.
Technologies Work for Human Development. New York:
Heuck, J. (2005). Comparative Report on Child Por- Oxford University Press.
nography on the Internet in Germany and New Zealand.
ICT Policy for Lesotho. Final 4. (March 2005). Retrieved
Auckland/Freiburg. ECPAT Deutschland e. V and ECPAT
April 10 2009 from www.Lesotho.gov.is/documents/
New Zealand.
lesotho-ICT-Policy-Final.p
Hjern, B., & Hull, Ch. (1982). Implementation Re-
ICT sub sector in Bangladesh. (n.d.). Retrieved on the 9th of
search as Empirical Constitutionalism. European
November, 2000 from www.usaid.gov/bd/files/afe-review
Journal of Political Research, 10(June), 105115.
doi:10.1111/j.1475-6765.1982.tb00011.x Idowu, B., Ogunbodede, E., & Idowu, B. (2003). Infor-
mation and communication in Nigeria. The health sector
Hone, K., & Eloff, J. H. P. (2002). Information secu-
experience. Journal of Information Technology Impact,
rity policy - What do international information security
3(2), 6976.
standards say? Computers & Security, 21(5), 402409.
doi:10.1016/S0167-4048(02)00504-7

301
Compilation of References

Ifidon, S. E. (2002). Policy Issues in the Funding of Ingjerd, S., & Grtte, I. P. (in press). [Rural Infrastructural
Nigerian University Libraries . In Lawal, O. O. (Ed.), development as a Stages model: a roadmap to new rural
Modern Librarianship in Nigeria: A Festschrift to mark infrastructure.]. Strand.
the Retirement of Chief Nduntuei Otu Ita, University Li-
Initiative. (2008). Retrieved March 18, 2009, from http://
brarian, University of Calabar, 1977-1997 (pp. 4954).
www.nasscom.in/Nasscom/templates/NormalPage.
Calabar, Nigeria: University of Calabar Press.
aspx?id=5954
Ifidon, S.E. (2006, March). Planning without informa-
Intellon. (2007). What is powerline communications?
tion: the bane of national development. Inaugural lecture
Retrieved on March 5, 2009 from http://www.intellon.
delivered at Ambrose Alli University, Ekpoma, Edo
com/technology/powerlinecommunications.php
State, Nigeria.
International Centre for Missing & Exploited Children.
IFLA Cataloguing Section FRBR Working Group. (n.d.).
(2008). Child Pornography: Model Legislation & Global
Retrieved March 25, 2009, from http://www.ifla.org/VII/
Review. Retrieved on February 15, 2009, from http://
s13/wgfrbr/
www.icmec.org/en_X1/pdf/ModelLegislationFINAL.pdf
IFLA Meetings of Experts on an International Catalogu-
International Conference on Cataloguing Principles, Paris,
ing Code. (2009). Retrieved March 25, 2009, from http://
9th-18th October, 1961. (1963). Report. London: Inter-
www.ifla.org/VII/s13/icc/
national Federation of Library Associations. Reprinted
Implementation team on global Policy participation. in: International Conference on Cataloguing Principles,
(2002).Global policymaking for information And commu- Paris, 9th-18th October, 1961 (1969). Report. London:
nications technologies: Enabling meaningful participation Clive Bingley.
by Developing-nation stakeholders. Retrieved October 1,
International Conference on National Bibliographies,
2009 from http://www.markle.org/downloadable_assets/
Paris, 1977 (1978). Final report. Paris: UNESCO.
roadmap_report.pdf
International Council on Archives (ICA). (1997 February).
Indian Computer Emergency Response Team. (2006).
guide for managing electronic records from an archival
Information Security Policy for Protection of Critical
perspective. ICA Committee on Electronic Records. Re-
Information Infrastructure. New Delhi, India: Depart-
trieved October 10, 2006 from http://www.ica.org/biblio/
ment of Information Technology, Government of India.
cer/guide_eng.html
Indian Petrochemicals Corporation Ltd. v. Union of India,
International Council on Archives (ICA). (April 2005).
(Decided on: Sept.19, 2006). (2006). MANU/GJ/8490.
Electronic records: a workbook for Archivists. Commit-
Indira, C., & Stone, P. (2005). International Trade Law. tee on Current Records in an Electronic Environment.
London: Routledge Cavendish. ICA Study 16.

Information Development News. (2006).. . Information De- International Institute for Communication and Develop-
velopment, 22(1), 721. doi:10.1177/0266666906062685 ment (IICD). (2008). Introducing Zambia. Retrieved on
September 21, 2009 from http://www.iicd.org/countries/
Information Security Environment in India. NASSCOM
zambia.
Analysis. (n.d). Retrieved March 18, 2009, from http://
www.nasscom.org/download/ Indian_Security_En- International Meeting of Cataloguing Experts, Copenha-
vomt_05_06_Factsheet_Final1.pdf gen, 1969: Report (1969). IFLA Annual. Also published
in: Report of the International Meeting of Cataloguing
Information Technology Act. (2000). As amended by the
Experts, Copenhagen, 1969 (1970). Libri, 1(20), 105-132.
Act 10 of 2009.
International Records Management Trust (IRMT). (2004).
Information Technology Security Procedure Rules. (2004).
The e-records readiness tool. Retrieved October 15, 2006,
from www.irmt.org

302
Compilation of References

International standard archival authority record for cor- Jacobs, S. J., & Herselman, M. E. (2006). Information
porate bodies, persons and families: ISAAR(CPF). (1996). Access for Development: A Case Study at a Rural Com-
Ottawa, Canada: Secretariat of the ICA Commission on munity Centre in South Africa. Issues in Informing Science
Descriptive Standards. and Information Technology, 3, 295306.

International Telecommunication Union Task Force on Jacobson, T., & Servaes, J. (Eds.). (1999). Theoretical
Gender Issues. (2001). Gender-aware guidelines for Approaches to Participatory Communication. Geneva,
policy-making and regulatory agencies. Retrieved De- New Jersey: International Association for Media Com-
cember 23, 2009 from http://www.itu.int/ITU-D/gender/ munication Research.
projects/FinalGendAwrnGuidelns.pdf
Jahankani, H., Antonijevic, B., & Walcott, T. H. (2008).
International Telecommunication Union. (2009). Special Tools protecting stakeholders against hackers and crackers:
initiatives: Gender. Retrieved December 23, 2009 from An insight review. International Journal of Electronic Se-
http://www.itu.int/ITU-D/sis/Gender/ curity and Digital Forensics, 1(4), 423442. doi:10.1504/
IJESDF.2008.021459
International Telecommunications Union. (2005). Whats
the state of ICT access around the world? Retrieved on Jain, R., & Raghuram, G. (2005). Study on accelerated
February 22, 2009 from http://www.itu.int/wsis/tunis/ provisions of rural telecommunication services (ARTS).
newsroom/stats/ Ahmedabad, India: Indian Institute of Management.
Retrieved December 22, 2006, from http://www.iimahd.
Internet World statistics. (2007). Internet Usage Statistics:
ernet.in/ctps/pdf/Final%20Report%20Edited.pdf
World Internet Users and Population Stats. Retrieved
September 12, 2007, from http://www.internetworldstats. James, J. (2006). The Internet and poverty in developing
com/stats.htm countries: welfare economics versus a functionings-
based approach. Futures, 38(3), 337349. doi:10.1016/j.
Interoperable Delivery of European E-government Ser-
futures.2005.07.005
vices to Public Administration. Businesses and Citizens-
IDABC. (2005). Retrieved July 19, 2005, from http:// James, T. (Ed.). (2001). An Information Policy Handbook
europa.eu.int/idabc/en/chapter/383 for southern African, A Knowledge Base for Decision-
Makers. International Development Research Centre.
ISO/IEC 27000. (2007). The ISO/IEC 27K Toolkit
Implementation guidance and metrics. Retrieved Jensen, M. (2002). Information and Communication Tech-
January 20, 2009 from http://www.iso27001security.com/ nology (ICTs) in Africa a status report. UN ICT Task
html/k_toolkit.html Force Bridging the Digital Divide in the 21st Century
Presented to the Third Task Force Meeting United Nations
IT Governance Institute. (2005). Aligning COBIT, ITIL
Headquarters 30 September 1 Oct 2002. Retrieved on
and ISO 17799 for business benefit. A management brief-
January 27, 2009 from http://www.unicttaskforce.org/
ing from ITGI and OGC. Retrieved February 4, 2009, from
thirdmeeting/documents/jensen%20v6.htm
http://www.nysforum.org/documents//itil-6-6-06/.pdf
Jhunjhunwala, A., Ramachandran, A., & Bandyopadhyay,
ITU. (2006). Measuring ICT for Social and Economic
A. (2004). n-Logue: the story of a rural service provider
Development. World Telecommunication/Ict Develop-
in India. Journal of Community Informatics, 1(1), 3038.
ment Report. Retrieved January 2007, from http://www.
itu.int/publications. Jidaw Systems Limited. (2007). The Nigerian National
Information Technology Policy. Retrieved on August 22,
ITWeb. (2009). Meraka boosts e-skills. Retrieved
2009 from http://www.jidaw.com/itsolutions/ict4dre-
July 2009, from http://www.itweb.co.za/sections/
view2007.html
business/2009/0903241046.asp?S=IT%20in%20
Government&A=ITG&O=google, 24 March 2009 Jordan, R. (2002). Free speech and the constitution.
Retrieved May 11, 2009 from http://www.aph.gov.au/
LIBRARY/Pubs/RN/2001-02/02rn42.htm

303
Compilation of References

Jueneman., R R. & Robertson, Jr., R. J. (1998). Biomet- Kukulska-Hulme, A. (2008). Mobile Usability in Edu-
rics and Digital Signatures in Electronic Commerce 38 cational Contexts: What have we learnt? International
Jurimetrics 427. Review of Research in Open and Distance Learning,
8(2), 115.
Juraske, I. (2007). Some success tips for deploying ICTs
in Africa. Retrieved on January 10, 2008 from http:// Kukulska-Hulme, A., Sharples, M., Milrad, M., Arnedillo-
communications-online.blogspot.com/2007/06/some- Snchez, I., & Vavoula, G. (2009). Innovation in mobile
success-tips-for-deploying-icts-in.html learning: A European perspective. International Journal
of Mobile and Blended Learning, 1(1), 1335.
Kallman, E. A., & Grillo, J. P. (1996). Ethical decision
making and information technology: an introduction with Kumar, R., & Best, M. (2006). Social impact and diffusion
cases. New York: McGrawHill. of telecenter use: a study from the sustainable access in ru-
ral India project. Journal of Community Informatics, 2(3).
Kamath, A. (2005). Law Relating to Computers, Internet
and E-Commerce: A Guide to Cyberlaws, & the Informa- Kuttan, A., & Peer, L. (2003). From digital divide to
tion Technology Act, 2000 with Rules and Notifications. digital opportunity. Lanham, MD: Scarecrow.
Delhi, India: Universal Law Publishing.
Lanning, K. (1992). Child Molesters: A Behavioural
Kemoni, H. N., Wamukoya, J., & Kpilangat, J. (2003). Analysis. Washington, DC: National Centre for Missing
Obstacles to utilization of information held archival and Exploited Children.
institutions: a review of literature. Records Management
Laudon, K., & Laudon, C. (2006). Management Informa-
Journal, 13(1), 4041. doi:10.1108/09565690310465722
tion Systems: managing the digital firm, (9thed.). New
Khamis, K. (1999). Making the transition: from backlog Delhi, India: Pearson Education.
accumulation to a new order. Paper presented at XV Bi-
Lawal, O. O. (2004). Libraries as Tools for Educational
annual Eastern and Southern African Regional Branch
Development. A Paper presented at NLA 42nd National
of the International Council on Archives (ESARBICA)
Conference and AGM at Solton International Hotel &
General Conference, Zanzibar, 26-30 July.
Resort, Akure.
Khor, M. (1995). Globalisation and the Need for coor-
Lee, T. M. (2005). The impact of perceptions of interactiv-
dinated Southern policy Response, Cooperation South.
ity on customer trust and transaction intentions in mobile
New York: UNDP.
commerce. Journal of Electronic Commerce Research,
KNET (Keewaywin Local Government and Economic 6(3), 165180.
Day). (2001). Retrieved on November 15, 2008 from
Lenhart, A., Horrigan, J., Rainie, L., Allen, K., Boyce,
http://smart.knet.ca/keewaywin/governance.html
A., Madden, M., & OGrady, E. (2003). The evershifting
Knight, W. (2007). IBM creates worlds most powerful internet population: A new look at internet access and
computer. New scientist.com news service, June 2007. the digital Divide. Retrieved May 11, 2003, from http://
Retrieved on January 15, 2008 from http://technology. www.Pewinternet.org/
newscientist.com/article/dn12145-ibm-creates-worlds-
Lesame, Z. (2005). Bridging the digital divide in South
most-powerful-computer.html
Africa. In N. C. Lesame (Ed), New Media. Technology
Kosovic, L. (2006). Gender and ICT policy in Bosnia and policy in developing countries (pp. 17-29). Hatfield,
and Herzegovina: Rethinking ICT development through Pretoria, South Africa: Van Schaik Publishers.
gender. Retrieved November 2, 2009, from: http://www.
Lindquist, D., Denning, T., Kelly, M., Malani, R.,
gednerit.org/en/index.shtml?w=a&x=95059
Griswold, W. G., & Simon, B. (2007). Exploring the
Krishna, A. (2002). Active Social Capital, Tracing the potential of mobile phones for active learning in the
Roots of Development and Democracy. New York: Co- classroom. ACM SIGCSE Bulletin, 39(1), 384388.
lumbia University Press. doi:10.1145/1227504.1227445

304
Compilation of References

Litho, P. (2005). ICTs, Empowerment and Women in Rural Lubetzky, S. (1979). The traditional ideals of cataloging
Uganda: A Scott Perspective. A paper presented at the and the new revision . In Freedman, M. J., & Malinconico,
To think is to experiment SSMA, Centre for Narrative S. M. (Eds.), The nature and future of the catalog: proceed-
Research, UEL, 22nd April 2005. ings of the ALAs Information Science and Automation
Divisions 1975 and 1977 Institute on Cataloging (pp.
Liu, T. C. (2007). Teaching in a wireless learning environ-
153169). Phoenix, AZ: Oryx Press.
ment: A case study. Journal of Educational Technology
& Society, 10(1), 107123. Lummen, M., & Ruiter, E. (2008). Product report: Edai-
kazhinadu project. Dissertation, Saxion University of Ap-
Liu, T. C., Wang, H., Liang, T., Chan, T., Ko, W., &
plied Sciences, Hospitality Business School, Education:
Yang, J. (2003). Wireless and mobile technologies to
Tourism Management, Retrieved on November 11, 2008
enhance teaching and learning. Journal of Computer
from: http://dms01.saxion.nl/C12574DB0035EDCF/Al
Assisted Learning, 19(3), 371382. doi:10.1046/j.0266-
l+documents/52C462DA81331CA4C12574DB006303
4909.2003.00038.x
12/$File/Afstudeerscriptie%20E.%20Ruiter%20en%20
Livingston, P. (2004). Laptops Unleashed: A Middle M.%20Lummen.pdf
School Experience. Learning and Leading with Technol-
Lupe Cristn, A. (2008). Virtual International Authority
ogy, 31(7), 12-15. Retrieved June 15, 2009 from www.
File: Update 2008. SCATNews: Newsletter of the Stand-
usq.edu.au/material/edu5472
ing Committee of the IFLA Cataloguing Section, 30, 23.
Loftus, R. A. (2008). Disconnecting Child Pornography
Lyman, M., & Potter, G. (1998). Organized Crime. Upper
on the Internet: Barriers and Policy Considerations. Fo-
Saddle River, NJ: Prentice Hall.
rum on Public Policy Online, Spring. Retrieved on 15
June 2009 from http://www.forumonpublicpolicy.com/ M.K. Razdan v. The State and Shri Indukant Dixit, Crl.
archivespring08/loftus.pdf Rev.P. No. 861-62/2005, (Decided on March.03, 2008),
Delhi.
Longe, O. B., & Longe, F. A. (2005). The Nigerian Web
Content: Combating the Pornographic Malaise Using Madon, S. (2004). Evaluating the development impact of
Content Filters. Journal of Information Technology e-governance initiatives: an exploratory framework. The
Impact, 5(2), 5964. Electronic Journal on Information Systems in Developing
Countries, 20(5), 113.
Longe, O. B., & Chiemeke, S. C. (2006). The Design and
Implementation of An E-Mail Encryptor for Combating Mahrer, H., & Krimmer, R. (2005). Towards the en-
Internet Spam. In Proceedings of the Ist International hancement of e-democracy: Identifying the notion of
Conference of the International Institute of Mathemat- the middleman paradox. Journal of Information Systems,
ics and Computer Sciences, (pp. 1 7). Ota, Nigeria: 15(1), 2742. doi:10.1111/j.1365-2575.2005.00184.x
Covenant University.
Malama, F. (2007, April 17). Lets take advantage of
Longe, O. B., & Chiemeke, S. C. (2008). Cybercrime and VoIP. The Post.
Criminality in Nigeria What Roles are Internet Access
Malhotra, Y. (2002). Why knowledge management
Points in Playing? Retrieved May 21st, 2009. From: http://
systems fail? Enablers and constraints of knowledge
www.eurojournals.com/ejes_6_4_12.pdf
management in human enterprises . In Holsapple, C. W.
Longe, O.B. (2006). Web Journalism In Nigeria: New (Ed.), Handbook on knowledge management 1: Knowl-
Paradigms, New Challenges. Journal of Society and edge matters (pp. 577599). Heidelberg, Germany:
Social Policy. Springer-Verlag.

Loygren, S. (2003). Computer Made from DNA and Malinconico, S. M., & Rizzolo, J. A. (1973). The New
Enzymes. Retrievd on 6 July 2010 from http://news. York Public Library automated book catalog subsystem.
nationalgeographic.com/news/2003/02/0224_030224_ Journal of Library Automation, 1(6), 336.
DNAcomputer_2.html

305
Compilation of References

Malinconico, S. M. (1975).The role of a machine based Masango, D. (2005). Partnership to bring IT to MPCCs
authority file in an automated bibliographic system. In countrywide. Compiled by the Government Com-
Automation in Libraries: Papers presented at the CACUL munication and Information System, 3 Oct. Retrieved
Workshop on Library Automation, Winnipeg, June 22-23, September 22, 2008, from http://www.buanews.gov.za/
1974. Ottawa, Canada: Canadian Library Association. news/05/05100316451001.
Cited according to: Carpenter, M. & Svenonius, E. (Eds).
Masango, D. (2007). ICT Key for Economic Growth,
(1985). Foundations in cataloging: A sourcebook (pp.
development. Compiled by the Government Commu-
211-233). Littleton, Co.: Libraries Unlimited.
nication and Information System, 23 Oct. Retrieved
Manch, K., & Wilson, D. (2003). Objectionable material September 22, 2008, from http://www.buanews.gov.za/
on the Internet: Developments in enforcement. Retrieved news/07/07102316151004.
February 18, 2009, from www.netsafe.org.nz/Doc_Li-
Mason, R. O. (1986). Four ethical issues of the informa-
brary/netsafepapers_manchwilson_objectionable.pdf.
tion age. Management Information Systems Quarterly,
Mandatory data elements for internationally shared 10(1), 512. doi:10.2307/248873
resource authority records: Report of the IFLA UBCIM
Massey, A. P., Ramesh, V., & Khatri, V. (2006). Design,
Working Group on Minimal Level Authority Records
development and assessment of mobile applications: The
and ISADN. (1998). Frunkfurt/Main, Germany: IFLA
case for Problem-based Learning. IEEE Transactions on
Universal Bibliographic Control and International MARC
Education, 49(2), 183192. doi:10.1109/TE.2006.875700
Programme. RetrievedMarch25, 2009, fromhttp://www.
ifla.org/VI/3/p1996-2/mlar.htm Mathiason, J. R., & Kuhlman, C. R. (n.d.). An Interna-
tional Communication Policy: The Internet, international
Mansell, R. (2006). Ambiguous connections: entitlements
regulation & new policy structures. Retrieved November
and responsibilities of global networking. Journal of In-
4, 2009 from http://www.un.org/esa/socdev/enable/ac-
ternational Development, 18(6), 901913. doi:10.1002/
cess2000/ITSpaper.html
jid.1310
Mauritius, Ministry of Information Technology and
Manual, U. N. I. M. A. R. C. Authorities Format. (2001).
Telecommunications. (2007). National ICT policy 2007-
(2nd rev. & enlarged ed.). Mnchen, Germany: Saur.
11. Retrieved on September 21, 2009 from http://www.
Marcelle, G. (1998). Strategies for including a gender gov.mu/portal/goc/telecomit/file/ICT%20Policy%20
perspective in African information and communications 2007-2011.pdf
technologies (ICTs). Retrieved 9th January 2009, from
Mazikana, P. C. (1999). Editorial. ESARBICA Journal,
http://www.un-instraw.org/des/martines.doc
18, 46.
Marcelle, G. (2000). Gender and information revolution
Mcconatha, D., Praul, M., & Lynch, M.J. (2008). Mobile
in Africa. Retrieved November 2 2009, from http://www.
learning in higher education: An empirical assessment of
genderit.org/en/index.shtml?w=98x=91489
a new educational tool. The Turkish Online Journal of
Marcelle, G. (2002). Gender equality and ICT policy. Educational Technology (TOJET), 7(3).
Retrieved January 9 2009, from http://www.worldbankorg/
Mcconnell International. (2000). Cybercrime and
gender/digitaldivide/worldbankspresentation.ppt
Punishment?Archaic Laws Threaten Global Information.
Marcelle, G. N. (2001). Getting Gender into African ICT
McNamara, K. (Ed.). (2008). Enhancing the rural liveli-
Policy: A Strategic View. Retrieved July 17th 2009 from
hoods of the poor: recommendations on the use of ICT
http://www.idrc.ca/en/ev-9409-201-1-DO_TOPIC.htIm
in enhancing the livelihoods of the rural poor. Infodev.
Masambu, P. (2007). A Review of the Postal and Tele- Retrieved on April 1, 2009, from http://www.infodev.org/
communicatios Sector: June 2006-June 2007. Kampala, en/Publication.510.html
Uganda: Communications Commission.

306
Compilation of References

McQuail, D. (2000). McQuails Mass Communication Mnjama, N. (2005). Archival landscape in Eastern and
Theory. London: Sage Publications. Southern Africa.

Meera, S. N., Jhamtani, A., & Rao, D. U. M. (2004). In- Moll, P. (1983). Should the Third World have Infor-
formation and communication technology in agricultural mation Technology? IFLA Journal, 9(4), 296308.
development: a comparative analysis of three projects from doi:10.1177/034003528300900406
India. Agriculture Research and Extension Network, ODI
Money Laundering (Prohibition) Act, of the Federal
Paper No.135. London: Overseas Development Institute.
Republic of Nigeria. (2004).
Retrieved August 1, 2006, from http://www.odi.org.uk/
agren/papers/agrenpaper_135.pdf Montero, F., Crcoles, J. E., & Calero, C. (2006).
Handhelds and mobile phones to manage students and
Melkote, S. R., & Steeves, H. L. (2001). Communication
resources in classroom: A new handicap to the teacher?
for Development in the Third World: Theory and Practice
(pp.876-880).
for Empowerment (4th ed.). London: Sage.
Moore, F. (2000, October). Digital datas future: you aint
Metcalf, D. (2005). mLearning: Mobile learning and
seen nothin yet. Computer Technology Review.
performance in the palm of your hand. Amherst, MA:
HRD Press. Morris, J., Haines, H., & Shallcrass, J. (1989). Report of
the Ministerial Inquiry into Pornography. Wellington,
Michael, D. (2002), Globalization Of The World Economy:
New Zealand: New Zealand Government.
Potential Benefits And The Cost And A Net Assessment.
Governing Stability Across the Mediterranean Sea: A Mosteshar, S. (1996). Some legal aspects of internet
Transatlantic Perspective, Columbia International Af- regulation. Retrieved November 15, 2009 form http://
fairs Online. Retrieved on Dec.3,2008 from http://www. www.mosteshar.com/sig.html
ciaonet.org/coursepack/cp09/cp09c.pdf
Muchanga, A. M. (2004). Statement by Albert M.
Microsoft Corporation. (2009). What is a model. Retrieved Muchanga SADC Deputy Executive Secretary Delivered
September 19, 2009, from http://msdn.microsoft.com/ at the Opening of The SADC Regional Seminar on Website
en-us/library/dd129503 (VS.85, printer).aspx Policy Development Held at President Hotel Gaborone.
Retrieved on September 23, 2009 from http://www.sadc.
Mingat, A., Tan, J., & Sosale, S. (2003). Tools for Educa-
int/archives/read/news/56.
tion Policy. Washington, DC: World Bank.
Murtomaa, E., & Greig, E. (Eds.). (1994). Problems
Minges, M. (2001). The Internet in an African LDC:
and prospects of linking various single-language and/or
Uganda Case study. International Telecommunication
multi-language name authority files: Notes. International
Union Study.
Cataloguing and Bibliographic Control, 3(23), 55- 58.
Ministry of Corporate Affairs. (n.d.). MCA21 Stakeholder
Musa, P. F. (2006). Making a case for modifying the
Handbook. New Delhi, India: Tata Consultancy. Retrieved
technology acceptance model to account for limited acces-
on July. 12, 2009, from, http://www.mca.gov.in/Minis-
sibility in developing countries. Information Technology
tryWebsite/dca/help/ProcessHandbook.pdf
for Development, 12(3), 213224. doi:10.1002/itdj.20043
Mitra, R. (2000). Emerging state-level ICT development
Mutula, S. M. (2009). Digital Economies, SMES and
strategies . In Bhatnagar, S., & Schware, R. (Eds.), Infor-
E-readiness. New York: Business Science Reference.
mation and communication technology in development
(pp. 195205). New Delhi: Sage Publications. Mutula, S. M., & Wamukoya, J. (2009). Public sector
information management in east and southern Africa:
Mitrovic, Z. (2006). ICT and small business development:
implications for FOI, democracy and integrity in govern-
the importance of government support and community
ment. International Journal of Information Management,
involvement. Unpublished working paper.
29(5), 333341. doi:10.1016/j.ijinfomgt.2009.04.004

307
Compilation of References

Mutula, S. M., & Wamukoya, J. M. (2007). Web Informa- National Skills Registry for Knowledge Professionals.
tion management: a cross-disciplinary textbook. Oxford, (n.d). Retrieved March 18, 2009, from http://www.
UK: Chandos Publishing. nasscom.in/upload/29264/NSR_Initiative_Overview.pdf

Mutula, S. M. (2008). Digital Divide in Africa: Its Causes, Navas-Sabater, N., Dymond, A., & Juntunen, N. (2002).
Amelioration and Strategies . In Aina, L. O., Mutula, S. Telecommunications and Information Services for the
M., & Tiamiyu, M. A. (Eds.), Information and Knowledge Poor: Toward a Strategy for Universal Access (World
Management in the Digital Age: Concepts, Technologies Bank Discussion Paper No. 432). Washington, DC: The
and African Perspectives (pp. 205228). Ibadan, Nigeria: World Bank.
Third World Information Services Limited.
Neumayer, E. (2006). Self-interest, foreign need and good
Mutula, S. M & Ocholla, D. (2009). Trust, Attitudes and governance: Are bilateral investment treaty programmes
Behaviours in E-Government. Paper Presented at the similar to aid allocation? Foreign Policy Analysis, 2(3),
African Information Ethics and e-Government Work- 245268. doi:10.1111/j.1743-8594.2006.00029.x
shop, Held from 23-27 February 2009 at Mount Resort
New Vision Supplement. (2006, 26th February). Retrieved
Magaliesburg, South Africa
from Http://newvision.co.ug/D/8/12/613650
Mutume, G. (2005). Africa takes on the digital divide:
Ngulube, P. (2007). The nature and accessibility of e-
new information technologies change the lives of those
government in sub Saharan Africa. International Review
in reach. Retrieved on November 16, 2007 from http/
of Information Ethics, 7(09/2007). Retrieved November
www.africarecovery.org
25, 2007, from http://www.i-r-i-e.net/inhalt/007/16-ngu-
Mwesige, P. (2004). Cyber Elites: A Survey of Internet lube.pdf
Cafes in Uganda. Telecommunications: Development in
Nicol, C. (2003). ICT Policy: A Beginners Handbook.
Africa, 21(1), 83101.
Johannesburg, South Africa: Association for Progressive
Naismith, L., et al. (2005). Report 11: Literature review Communication.
in mobile technologies and learning. Future lab series.
Nielsen, L., & Heffernan, C. (2006). New tools to connect
Bristol, U.K.
people and places: the impact of ICTs on learning among
NASSCOM. (2008). NASSCOM 2007-08Annual Report. resource poor farmers in Bolivia. Journal of International
New Delhi: NASSCOM. Development, 18(6), 889900. doi:10.1002/jid.1321

National Archive of Australia. (2001). ISO 15489-1 Infor- Nigerian National Policy for Information Technology (IT).
mation and Documentation-Records Management, Part 1: (2001). Retrieved March 18, 2009 from http://nitda.gov.
General, 1, 3. Amsterdam: International Standards Orga- ng/document/nigeriaitpolicy.pdf/
nization. Retrieved July 10, 2008 from www.naa.gov.au
Niles, S., & Hanson, S. (2003). A new era of accessibility.
National Archives of Australian. (2002). A new approach URISA Journal, 15, I.
to recordkeeping. Commonwealth of Australia. Retrieved
Njuguna, E. (2006). ICT policy in developing countries;
May 25, 2007 from www.naa.gov.au
Understanding the Bottlenecks. Retrieved March 11. 2008.
National Council on Disability. (2007). Over the hori- from http://www.ptc.org/events/ptc06/program/public/
zon: potential impact of emerging trends in information Proceedings/Emmanuel%20Njuguna_pa-per_w143.pdf
and communication technology on disability policy and
Norris, C., & Soloway, E. (2004). Envisioning the
practice. Retrieved on May 22, 2007from http://www.
handheld-centric classroom. Journal of Educational
disabilityinfo.gov/
Computing Research, 30(4), 281294. doi:10.2190/
National Skills Registry for IT/ITES Professional. (2007). MBPJ-L35D-C4K6-AQB8
Retrieved March 18, 2009, from http://www.nasscom.in/
Nasscom/templates/NormalPage.aspx?id=51441

308
Compilation of References

Norris, C., Sullivan, T., Poirot, T., & Soloway, E. (2003). OECD. (2002). Guidelines for the security of informa-
No Access, No Use, No Impact: Snapshot of Surveys of tion systems and networks: Towards a culture of security.
Educational Technology in K-12. Journal of Research on OECD Information Privacy and Security. Retrieved
Technology in Education, 36(1), 15-27. Retrieved June February 10, 2009 from http://www.oecd.org/dataoecd/
15, 2009 from http://search.epnet.com/direct.asp; http:// /22/15582260.pdf
ez/noxy.us.edu
Office of Film and Literature Classification. (2008). Report
Nortel., Shashi Kiran., Lareau P., & Lloyd., S. (2002). of the Office of Film and Literature Classification for the
PKI Basics - A Technical Perspective. Retrieved on year ended 30 June 2008. Wellington, New Zealand: Of-
Nov.19,2008.from http://www.oasis-pki.org/pdfs/ fice of Film and Literature Classification.
PKI_Basics A_technical_perspective.pdf
Office of Film and Literature Classification [Aus-
Nussbaum, M. (2000). Women and Human Development: tralia]. (2006). Enforcement Package. Retrieved 16
The Capabilities Approach. Cambridge, UK: Cambridge June 2009 from http://www.oflc.gov.au/www/cob/
University Press. rwpattach.nsf/VAP/(084A3429FD57AC0744737F8EA-
134BACB)~896.pdf/$file/896.pdf
Nussbaum, M. (2006). Capabilities as fundamental entitle-
ment . In Kaufman, A. (Ed.), Capabilities equality: basic Office of Film and Literature Classification. (2007).
issues and problems (pp. 4470). New York: Routledge. Publication of Objectionable Computer Files. Retrived
February 18, 2009, from http://www.censorship.govt.
Nyasato, R., & Kathuri, B. (2007). High Phone Charges
nz/thelaw-occasional-objectionable-computerfiles.html
Hamper Regions Growth, Says W Bank. The Standard.
Retrieved April 10, 2007, from http://www.eastandard. Ofir, Z. M. (2003). Information and Communication
net/hm_news/news.php?articleid=1143967136 Technologies for Development (ACACIA) The Case
of Uganda: Final Evaluation Report prepared for IDRC
OBrien, J. A. (2006). Introduction to information systems:
Evaluation Unit.
essentials for the e-business enterprises, (9thed.). New
York: McGraw-Hill. Ogbo, O. (2003). Strengthening National ICT Policies
in Africa: Governance, Equity and Institutional Issues.
OConnell, R. (2001). The Structural and Social Organisa-
Acacia II. IDRC.
tion of Paedophile Activity in Cyberspace: Implications for
Investigative Strategies. Accessed October 21, 2002, from Ojebode, F. I. (2007). Library Funding and Book Collec-
http://www.uclan.ac.uk/facs/science/gcrf/crime1.htm tion Development: A Case Study of Oyo State College of
Education and Federal College of Education (SP), Oyo.
ODonnell, I., & Milner, C. (2007). Child Pornography
Gateway Library Journal, 10(2), 119126.
Crime, Computers and Society. Portland, OR: Willan
Publishing. Okado, G. (2007). Formulation of a National ICT Policy:
African Technology Policy Studies Network. Retrieved on
ONeil, D. (2002). Assessing community informatics:
the7th of July 2009 from www.atpsnet.org./pubs/brief/
a review of methodological approaches for evaluating
Technopolicy%20Brief%.pdf
community networks and community technology centres.
Internet research: electronic networking applications and Okot-Uma, R. W. (2002). The challenge of the digital
policy, 12(1), 76-102. divide . In Murelli, E. (Ed.), Breaking the digital divide:
implications for developing countries (pp. ixxi). London:
Obileye, O. (2001). Combating counterfeit drugs: the
Commonwealth Secretariat.
way forward. Paper presented at the public hearing of
the health and social services committee, Federal House Omoba, O.R. & Omoba, F. A. (2009). Copyright law:
of Representative, National Assembly, Abuja, Nigeria. influence on the use of information resources in Nigeria.
Library philosophy and practice.
Oddy, P. (1986). Name authority files. Catalogue & Index,
82(Autumn), 1 & 3-4.

309
Compilation of References

ONeil, D. (2002). Assessing community informatics: Pais, A. (2006). Bridging the digital divide by bringing
a review of methodological approaches for evaluating connectivity to underserved areas of the world. Retrieved
community networks and community technology centres. October 2, 2009 from http://www.itu.int/osg/spu/young-
Internet research: electronic networking applications and minds/2006/essays/essay-adrian-pais.pdf
policy 12 (1), 76-102.
Palfrey, J., & Rogoyski, R. (2006). The move to the
OpenNet Initiative. (2007) Global Internet Filtering. Middle: The enduring threat of harmful speech to the
Retrieved May 8, 2009 from http://map.opennet.net/ end-to-end principle. Washington University Journal of
filtering-pol.html Law and Policy, 21, 3165.

Oregon State University. (2003). Archives & records Palmer, J. (2010, January 11). Chemical computer that
management handbook. Oregon: OSU Library. Retrieved mimics neurons to be created. BBC News. Retrieved on
April 2, 2007 from http://osulibrary.oregonstate.edu/ July 6, 2010 from http://news.bbc.co.uk/2/hi/8452196.stm
archives/handbook/chapter2/electronic.html
PanAfrL10n. (2009). Egypt. Retrieved on September
Oriola, T. (2005). Advance Fee Fraud on the Internet: 21, 2009 from http://www.panafril10n.org/pmwiki.php/
Nigerias Regulatory Response. Computer Law & Security PanAfrLoc/Egypt
Review, 21(3).
Panagariya, A. (2000). E-Commerce, WTO and De-
Orlikowski, W. J., & Baroudi, J. J. (2002). Studying infor- veloping Countries. World Economy, 23(8), 959978.
mation technology in organizations: research approaches doi:10.1111/1467-9701.00313
and assumptions. (2002. In M.D Myers. & D. Avison,
Papadopoulous, M., Kafeza, I., & Lessig, L. (2006). Legal
(Eds.), Qualitative research in information systems, (pp.
considerations for regulating content on the Internet.
51-77). London: Sage Publications.
Retrieved from http://www.marinos.com.gr/bbpdf/pdfs/
Otuteye., E. (2008), A Systematic Approach to E- Business msg52.pdf
Security: Ninth Australian World Wide Web Conference.
Paper delivered at Financial Lecture Series in Lagos,
Retrieved on August. 21, 2009, from http://ausweb.scu.
August 10, 2006.
edu.au/aw03/papers/otuteye/
Parfitt, T. (2004). The ambiguity of participa-
Over, R. (2006). Networks, distance and trust: telecom-
tion: a qualified defence of participatory develop-
munications development and changing trading prac-
ment. Third World Quarterly, 25(3), 537555.
tices in Ghana. World Development, 34(7), 13011315.
doi:10.1080/0143659042000191429
doi:10.1016/j.worlddev.2005.11.015
Parker, D. B. (1998). Fighting Computer Crime: A New
Overview. (2006). Retrieved Mach 18, 2009, from http://
Framework for Protecting Information. Chichester, UK:
www.nasscom.in/Nasscom/templates/NormalPage.
Wiley Computer Publishing.
aspx?id=5957.
Parliamentary Office of Science & Technology. (2001).
Oyedemi, T., & Lesame, Z. (2005). South Africa: an
Regulating Internet content. Retrieved May 8, 2009 from
information Society? In N. C. Lesame (Ed) New Media.
http://www.parliament.uk/post/pn159.pdf
Technology and policy in developing countries (pp. 75-
97). Hatfield, Pretoria: Van Schaik Publishers. Patton, G. (2004). FRANAR: A conceptual model for
authority data. In Taylor, A.G. & Tillett, B. B. (Eds),
Oyomno, G. Z. (2003). Towards a framework for as-
Authority control in organizing and accessing informa-
sessing the maturity of government capabilities for e-
tion: Definition and international experience (pp. 91-
government. Retrieved July 20, 2005, from http://link.
104). Binghamton, NY: Haworth Information Press. DOI
wits.ac.za/journal/j0401-oyomno-e-govt.pdf
10.1300/J104v38n03_09

PEAP. (2000). Poverty Eradication Action Plan.

310
Compilation of References

Pearson, J. (2004). Current policy priorities in informa- Ramilo, G., & Villanueva, P. (2001). Issues, policies and
tion and communication technologies in education . In outcome: Are ICT policies addressing gender equality?
Trinidad, S., & Pearson, J. (Eds.), Using information and Retrieved December 27, 2009 from http://www.gen-
communication technologies in education. Singapore: derit.org/upload/ad6d215b74e2a8613f0cf5416c9f3865/
Pearson Prentice Hall. UNESCAP_Gender_and_ICT_Policy_Research_Re-
port_Feb02.doc
Perkins, M. (2009). Prime Cuts. Index on Censorship,
38(1), 129139. doi:10.1080/03064220802712258 Ramirez, R. (2001). A model for rural and remote infor-
mation and communication technologies: A Canadian
Pinder, P. (2006). Preparing information security for legal
exploration. Telecommunications Policy, 25(5), 315330.
and regulatory compliance (Sarbanes-Oxley and Basel
doi:10.1016/S0308-5961(01)00007-6
II). Information Security Technical Report, 11(1), 3238.
doi:10.1016/j.istr.2005.12.003 Ramirez, R. (2003). Bridging disciplines: the natural
resource management kaleidoscope for understanding
Plassard, M.-F., & McLean Brooking, D. (Eds.). (1993).
ICTs. The Journal of Development Communication,
UNIMARC/CCF: proceedings of the Workshop held in
1(14), 5164.
Florence, 5-7 June 1991. Mnchen, Germany: Saur.
Ramirez, R. (2007). Appreciating the contribution of broad-
Plou, D. S. (2005). Gender and ICT policies: how do we
band ICT with rural and remote communities: stepping
start this discussion? Retrieved November 2, 2009. from
stones toward an alternative paradigm. The Information
http://www.gender.org/en/index.shtml?w=a&x=90862
Society, 23(2), 8594. doi:10.1080/01972240701224044
Policy, I. C. T. (2003) The National Information and
Ramirez, R., & Richardson, D. (2005). Measuring the
Communication Policy. Retrieved from http://ucc.co.ug/
impact of telecommunication services on rural and re-
nationalIctPolicyFramework.doc
mote communities. Telecommunications Policy, 29(4),
Portable Mass Storage Device With Virtual Machine 297319. doi:10.1016/j.telpol.2004.05.015
Activation, U. S. Patent No. WO/2008/021682, PCT/
Ramuarine, D., & Wilson, J. (n.d.). Developing National
US2007/074399 (2008, Nov. 26). fig.6 Retrieved on
ICT Strategies for Small Island States: Case Study
Oct. 29, 2008, from http://www.wipo.int/pctdb/en/wo.j
Trinidad and Tobago. Retrieved on the 11th November
sp?IA=US2007074399andwo=2008021682andDISPL
2009 from www.fastforward.it
AY=CLAIMS
Rao, S. S. (2004). Role of ICTs in Indias rural com-
Professional Horizon. (2006). Important Messages For
munity information systems. Info, 6(4), 261269.
e-Filing Under MCA21, The Chartered Accountant (p.
doi:10.1108/14636690410555663
1806). ICAI.
Rao, J. S.V. (2004). Law of Cyber-crimes and Information
Public Works and Government Services Canada. (2004).
Technology Law. New Delhi: Lexis-Nexis.
Government online history. Retrieved July 19, 2005, from
http://www.communication.gc.ca/gol_ged/gol_history. Reddy, R., Arunachalam, V. S., Tongia, R., Subrahmanian,
html E., & Balakrishnan, N. (2004). Sustainable ICT for emerg-
ing economies: mythology and reality of the digital divide
Quayle, E., Holland, G., Lineham, C., & Taylor, M.
problem a discussion note. Retrieved on December 30,
(2000). The Internet and offending behaviour: a case
2008 from http://www.rr.cs.cmu.edu/ITSD.doc
study. Journal of Sexual Aggression, 6(1/2).
Reding, V. (2009). Internet of the future: Europe must be a
Radloff, J. (2005). Whats gender got to do with IT? Re-
key player. Retrieved May 12, 2009 from http://ec.europa.
trieved November 30, 2009 from http://www.apcwomen.
eu/commission_barroso/reding/docs/speeches/2009/
org/node/273
brussels-20090202.pdf
Rajesh Saini v. State of Himachal Pradesh, (2008). Cr.
LJ 3712

311
Compilation of References

Reed, C. (2007). Taking a side on Technology Neutrality Roschelle, J., & Pea, R. (2002). A walk on the wild side:
. SCRIPTed, 4(3), 263. doi:10.2966/scrip.040307.263 How wireless handhelds may change computer-support
collaborative learning. International Journal of Cognitive
Regulatory Norms in Indian cyber-space. (2006). Re-
Technology, 1(1), 145168. doi:10.1075/ijct.1.1.09ros
trieved March 18, 2009, from http://www.nasscom.in/
Nasscom/templates/NormalPage.aspx?id=6161 Rotberg, R. (2007). The Ibrahim index on African gover-
nance: how we achieved our rankings. African Business,
Relyea, H. C., & Hogue, H. B. (2003). A brief history of
November (336), 20.
the emergency of digital government in the United States.
In Pavlichev & Garson (Eds.), Digital Government, (pp. Rowan, M. (2003). Lesson Learned from Mozambiques
16-33). Hershey, PA: IGI Global. ICT Policy Process. Retrieved on the 7th of July 2009
from www.idrc.ca/en/ev-46223-201-1-DO_TOPIC.html
Report of Standing Committee on Information Technol-
ogy. Raja Sabha Parliamentary Bulletin. (n.d.). Retrieved Russell, I. (2008, Nov.27). Sale of digital signature double
on 22 Oct 2008 http://164.100.47.5/Bullitensessions/ in 18 months. Business Standard. Retrieved on 27 Jan
sessionno/214/221008.pdf 2009.Business-standard http://www.businessstandard.
com/india/storypage.php?autono=297405.
Report of the International Meeting of Cataloguing Ex-
perts, Copenhagen, 1969 (1970). Libri, 1(20), 105-132. Sabatier, P., & Mazmanian, D. (1979). The Conditions
of Effective Implementation. Policy Analysis, 5(Fall),
Republic of Ghana. National ICT policy and Plan De-
481504.
velopment committee: Ministerial ICT policy statements.
(n.d.). Retrieved on the 18th of August 2009 from http:// Sabatier, P., & Mazmanian, D. (1980). The Implementation
www.ict.gov.gh/html/ministerial%20ict%20policy%20 of Public Policy: A framework of Analysis. Policy Studies
statements.htm Journal: the Journal of the Policy Studies Organization,
8, 538560. doi:10.1111/j.1541-0072.1980.tb01266.x
Reserve Bank of India. (2002). Information Systems Se-
curity Guidelines for the Banking and Financial Sector. SADC E-readiness Task Force. (2002). SADC e-readiness
Retrieved on Feb 22, 2009, from http://www.prsindia.org/ review and strategy. Johannesburg, South Africa: SADC,
docs/bills/1168510210/bill93_2007112393_Press_Re- 1060.
lease_for_IT_Act_Amendment.pdf
Sadowsky, G., Dempsey, J., Greenberg, A., Mack, B., &
Ribadu, N. (2006). Money laundry in Emerging econo- Schwartz, A. (2003). Information Technology Security
mies: Nigeria as a case study. A Handbook. Washington, DC: The World Bank.

Robeyns, I. (2001). Understanding Sens capability ap- SAE International Emerging Technologies Advisory
proach. Cambridge, UK: Wolfson College. Retrieved Board. (2009). Retrieved October 2, 2009 from http://
on August 20, 2006, from http://www.ingridrobeyns.nl/ www.sae.org/about/board/committees/etab.htm
Downloads/Under_sen.pdf.
Saint-Germain, R. (2005). Information security manage-
Roco, M. C. (2003). Nanotechnology: convergence with ment best practice based on ISO/IEC 17799. Information
modern biology and medicine. Current Opinion in Bio- Management Journal, 3(4), 6066.
technology. Volume 14, Issue 3, June 2003. Retrieved on
Saipunidzam, M., Mohammad, N. I., Mohamad, I. A. M.
July 7, 2010 from http://www.sciencedirect.com/science/
F., & Shakirah, M. T. (2008). Open source implementa-
journal/09581669 346
tion of M-learning for primary school in Malaysia. In
Rogerson, S. & Bynum, T.W. (1995, June 9). Cyberspace: Proceedings Of World Academy Of Science, Engineering
the ethical frontier. London times. And Technology (pp.752-756). 34.

Rogerson, S. (1998). The ethics of information and com- Sathish Babu, B., & Venkataram, P. (2009). A dynamic
munication Technologies: ICT in business. IMIS journal, authentication scheme for mobile transactions. Interna-
8(2), 1-2. tional Journal of Network Security, 8(1), 5974.

312
Compilation of References

Sawe, D.J.A. (2005). Regional e-governance programme: Sen, A. (1985b). Commodities and capabilities. Amster-
Progress from Tanzania. 2nd EAC Regional Consultative dam: North-Holland.
Workshop held in Nairobi, Grand Regency Hotel from
Sen, A. (2000). A decade of human development.
28-29 June 2005.
Journal of Human Development, 1(1), 1723.
Sawhney, H. (1996). Information superhighway: meta- doi:10.1080/14649880050008746
phors as midwives. Media Culture & Society, 18, 291314.
Sen, A. (2001). Development as freedom. London: Oxford
doi:10.1177/016344396018002007
University Press.
Schilderman, T. (2002). Strengthening the Knowledge and
Sen, A. (2005). Human rights and capabilities.
Information Systems of the Urban Poor. London: DFID.
Journal of Human Development, 6(2), 151161.
Schischka, J., Dalziel, P., & Saunders, C. (2008). Applying doi:10.1080/14649880500120491
Sens capability approach to poverty alleviation programs:
Sesan, G. (2004). Africa, ICT policy and the millennium
two case Studies. Journal of Human Development, 9(2),
development goals. Retrieved on August 22, 2009 from
229246. doi:10.1080/14649880802078777
http://wsispapers.choike.org/africa_ict_mdg.pdf
Schlienger, T., & Teufel, S. (2005). Tool supported man-
Sey, A., & Fellows, M. (2009). Literature review on the
agement of information security culture: Application in
impact of public access to information and communication
a private bank. In Sasaki, R., Okamoto, E. & Yoshiura,
technologies. CIS Working Paper No. 6. Seattle: Univer-
H. (Eds.) IFIP International Federation for Information
sity of Washington Center for Information & Society.
Processing. Volume 181, Security and Privacy in the Age
Retrieved on May 9, 2009, from http://cis.washington.
of Ubiquitous Computing, (pp. 65-77). Boston: Springer
edu/depository/publications/CIS-WorkingPaperNo6.pdf
Schware, R. (Ed.). (2005). E-Development: From Ex-
Shalhoub, Z. K. (2006). Trust, privacy, and security in
citement to Effectiveness. Washington, DC: World Bank
electronic business: The case of the GCC countries.
Group.
Information Management & Computer Security, 14(3),
Sciadas, G. (Ed.). (2005). The digital guide to digital 270283. doi:10.1108/09685220610670413
opportunities: measuring infostates for development.
Shao, B., Ma, G., & Meng, X. (2005). The influence to
Montral: Claude-Yves Charron.
online consumer trust: an empirical research on B2C ecom-
Seebaluck, R. (2006). Improving Your Business Environ- merce in China. In Proceedings of the fifth International
ment Through Public and Private Partnerships: Strategies Conference on Computer and Information Technology,
that Work. Retrieved on September 22, 2009 from http:// (pp. 961-965). Washington, DC: IEEE Computer Society.
idisc.infodev.org/proxy/Document.48.aspx
Sharma, B. R. (2005). Bank Frauds Prevention and
Sehlabaka, C. (2004). The Lesotho government. In Pro- Detection, 61. New Delhi: Universal Law Publication.
ceedings of workshop of the regional consultation on
Shelley, L. (1998). Crime and corruption in the digital
national e-govt readiness in Gaborone, Botswana, 14-16
age. Journal of International Affairs, 51(2).
April 2004. Retrieved July 16, 2005, from http://www.
comnet-it.org/news/CESPAM-Botswana.pdf. Sheridan, W., & Riley, T. B. (2006). Comparing e-govern-
ment and e-governance. Retrieved December 12, 2006,
Selaimen, G. (2006) Gender issue at all levels From
from http://www.electronicgov.net/pubs/research_papers/
policy formulation to implementation. Retrieved Novem-
SheridanRileyComparEgov.d
ber 2, 2009. From: http://www.genderit.org/ en/index.
shtml?w=a&x=93423. Sherratt, D., Rogerson, S., & Fair-weather, N. B. (2005).
The challenge of raising ethical awareness: a case based
Sen, A. (1985a). Well-being, agency and freedom: the
aiding system for use by computing and ICT students. Sci-
Dewey Lectures: 1984. The Journal of Philosophy, 82,
ence and Engineering Ethics, 11(2), 29931. doi:10.1007/
169221. doi:10.2307/2026184
s11948-005-0047-7

313
Compilation of References

Shih, H. P. (2004). An empirical study on predicting South Africa (2005). South Africa Millennium Goals.
user acceptance of e-shopping on the web. Information Country Report 2005.
& Management, 41(93), 351368. doi:10.1016/S0378-
Sribhadung, P. (2006). Mobile devices in elearning. In
7206(03)00079-X
Proceedings of the Third International Conference on
Sierra, K. (2006) Foreword. In The World Bank, (Ed.), In- eLearning for Knowledge-Based Society (pp.35.1-35.4),
formation and Communications for Development: Global Bangkok, Thailand.
Trends and Policies. Washington, DC: The World Bank.
Ssewanyana, K. J. (2007). ICT Access and Poverty in
Singh, D., & Zaitun, A. B. (2006). Mobile learning in Uganda. International Journal of Computing and ICT
wireless classrooms. [MOJIT]. Malaysian Online Journal Research, 1(2), 10 - 19. Retrieved from http:www.ijcir.
of Instructional Technology, 3(2), 2642. org/volume1-number2/article 2.pdf

Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review State of Punjab and Ors. v. Amritsar Beverages Ltd. and
of information security issues and respective research Ors., AIR 2006 SC 2820. (2006). (Paragraph 7 & 17,
contributions. ACM SIGMIS Database, 38(1), 6080. pp. 3488-89).
doi:10.1145/1216218.1216224
Statement of international cataloguing principles. (2009,
Small, B. (2007). Sustainable development and technol- February). Retrieved March 25, 2009, from http://www.
ogy: Genetic engineering, social sustainability and empiri- ifla.org/VII/s13/icp/
cal ethics. International Journal of Sustainable Develop-
Statement of Principles adopted at the International Con-
ment, 10(4), 402435. doi:10.1504/IJSD.2007.017912
ference on Cataloguing Principles Paris, October, 1961.
Smith, A. D., & Rupp, W. T. (2002). Issues in cybersecurity: (1971). Annotated ed. with commentary and examples
understanding the potential risks associated with hackers/ by Eva Verona assisted by Franz Georg Kaltwasser,
crackers. Information Management & Computer Security, P.R. Lewis, Roger Pierrot. London: IFLA Committee
10(4), 178183. doi:10.1108/09685220210436976 on Cataloguing.

Snyman, M., & Snyman, R. (2003). Getting information Stewart, F. (2005). Groups and capabilities. Jour-
to disadvantaged rural communities: the centre approach. nal of Human Development, 6(2), 185204.
South African Journal of Library and Information Sci- doi:10.1080/14649880500120517
ence, 69(2), 95107.
Stewart, F., & Deneulin, S. (2002). Amartya Sens contri-
Sofyan, D. (2007). ICT policy in Indonesia . In Obi, bution to development thinking. Studies in Comparative
T. (Ed.), E-governance: A global perspective on a new International Development, 37(2), 6170. doi:10.1007/
paradigm (pp. 4850). Amsterdam: IOS Press. BF02686262

Song, B. K. (2001). Content regulation on the Internet. Stovekraft Private Limited, rep. by its Managing Direc-
Retrieved May 1, 2009 http://iml.jou.ufl.edu/projects/ tor Rajendra Gandhi v The Joint Director, Directorate of
fall01/song/page5.html Revenue Intelligence and Ors. (2007). 214 ELT179(Kar)

Souter, D., Scott, N., Garforth, C., Jain, R., Mascarenhas, Subramanian,M., & Saxena, A. (2008). Gender main-
O., & McKemey, K. (2005). The economic impact of streaming of information and communication tech-
telecommunications on rural livelihoods and poverty nologies (ICT) policies and programs. A case study of
reduction: a study of rural communities in India (Gu- Ghattisgarth State of India, Project Report Submitted by
jarat), Mozambique and Tanzania. Commonwealth WSIS-2 Awarder.
Telecommunications Organisation for UK Department
Sullivan, C. (2005). Internet Traders of Child Pornogra-
for International Development. Report of DFID KaR
phy: Profiling Research. Retrieved February 24, 2006,
Project 8347. London.
from http://www.dia.govt.nz/pubforms.nsf/URL/Profilin-
gupdate2.pdf/$file/Profilingupdate2.pdf

314
Compilation of References

Sundaram Brake Linings Ltd v. Kotak Mahindra Bank Taylor, M., Quayle, E., & Holland, G. (2001). Child
Ltd., A. No. 8078 of 2007 in C.S. No. 1072 of 2007, High pornography, the Internet and offending. ISUMA, 2(2).
court of Madras. (2008). MANU/TN/0938. Retrieved May 27, 2002, from http://www.isuma.net/
v02n02/taylor/taylor_e.shtml
Sung, M., Gips, J., Eagle, N., Madan, A., Caneel, R., &
DeVaul, R. (2005). Mobile-IT education (MIT.EDU): M- Taylor, W. (2004). Community Informatics: The basis
learning applications for classroom settings. Blackwell for an emerging social contract for governance, research
Publishing Limited. Journal of Computer Assisted Learn- and teaching. Building & Bridging Community Networks:
ing, 21, 229237. doi:10.1111/j.1365-2729.2005.00130.x Knowledge, Innovation & Diversity through Communica-
tion. Brighton, UK, 31 March and 1-2 April.
Svenonius, E. (2000). The intellectual foundation of in-
formation organization. Cambridge, MA: The MIT Press. Taylor, W. J., Erwin, G. J., & Wesso, H. (2006). New public
policies for the emerging information society in South
Swindells, C., & Henderson, K. (1998) Legal regulation
Africa - a strategic view. Governments and Communi-
of Electronic Commerce, 3. The Journal of Information,
ties in Partnership conference, Centre for Public Policy,
Law and Technology, 3. Retrieved on Oct. 29, 2008 from
University of Melbourne, 25-27 September. Retrieved
http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1998_3/
September 2007, from http://www.public-policy.unimelb.
swindells/#a3
edu.au/conference 06/Taylor W.pdf.
Sylvester, L. (2001). The Importance of Victimology in
The Communication Initiative Network. (2008). Mozam-
Criminal Profiling. Retrieved May 21st, 2009, from: http://
bique ICT4D National Policy. Retrieved on September 22,
isuisse.ifrance.com/ emmaf/base/ impvic.html
2009 from http://www.comminit.com/en/node/148306.
Sytnyk, O. (2005). Control of internet content: Purposes,
The Communication Initiative Network. (2009). Ethio-
methods, legislative bases. Retrieved November 4, 2009
pia ICT4D National Policy [Draft]. Retrieved on Sep-
from http://www.personal.ceu.hu/students/04/Oleksan-
tember 22, 2009 from http://www.comminit.com/en/
dra_Sytnyk/testfile.pdf
node/148306.
Talyarkhan, S., Grimshaw, D. J., & Lowe, L. (2005).
The National ICT policy in Bolivia. (n.d.). Retrieved on
Connecting the first mile: investigating best practices for
the 10th of November, 2009 from http://www.ucd.org/
ICTs and information sharing for development. Rugby,
articles/the-national-ict-policy-in-bolivia/?
UK: ITDG Publishing.
The World Bank. (2002). Telecommunications and in-
Tanzania, United Republic of, Ministry of Communica-
formation services for the poor: Towards a strategy for
tions and Transport (2002). National ICT Policy of Tan-
universal access. Washington, DC: The World Bank.
zania. Retrieved on August 22, 2009 from http://www.
ethinktanktz.org/esecretariat/DocArchive/zerothorder. Thomas, J. J., & Parayil, G. (2008). Bridging the social
pdf. and digital divides in Andhra Pradesh and Kerala: a
capabilities approach. Development and Change, 49(3),
Tavani, H. T. (2007). Regulating cyberspace: Concepts
409435. doi:10.1111/j.1467-7660.2008.00486.x
and controversies. Library Hi Tech, 25(1), 3746.
doi:10.1108/07378830710735849 Thomas, D., & Loader, B. D. (2000). Introduction - Cy-
bercrime: Law Enforcement, Security and Surveillance in
Taylor, A. G. (1984). Authority files in online catalogs:
the Information Age. In Cybercrime: Law Enforcement,
an investigation of their value. Cataloging & Classifica-
Security and Surveillance in the Information Age. New
tion Quarterly, 3(4), 117. doi:10.1300/J104v04n03_01
York: Taylor & Francis Group.
Taylor, A. G. (1989). Research and theoretical consider-
ations in authority control. Cataloging & Classification
Quarterly, 3(9), 2956. doi:10.1300/J104v09n03_03

315
Compilation of References

Thomas, J. (2006). Cybercrime: A revolution in ter- UN United Nations. (2008). e-Government Survey 2008:
rorism and criminal behaviour creates change in the From e-government to connected governance. New York:
criminal justice system. Retrieved November 1, 2009 United Nations.
from http://www.associatedcontent.com/article/44605/
UNDP United Nations Development Programme.
cybercrime_a_revolution_in_terrorism_pg12_pg12.
(2003). Human Development Report 2003: Millennium
html?cat=37
Development Goals: a compact among nations to end
Thomas, P. (2007).Telecom musings: public service issues human poverty. New York: Oxford University Press.
in India. info, 9(2/3), 97-107.
UNDP. (2001). Role of UNDP in information and com-
Tillett, B. B. (2004). Authority Control: State of the Art munication technology For development. Retrieved
and New Perspectives. In A.G. Taylor & B. B. Tillett, October 1, 2009 from http://www.undp.org/execbrd/pdf/
(Eds.), Authority control in organizing and accessing DP2001CRP8.PD
information: Definition and international experience (pp.
UNDP. (2003). Transforming the Mainstream: Gender
23-57). Binghamton, NY: Haworth Information Press.
Mainstreaming Past, Present and future. Retrieved Dec.
DOI 10.1300/J104v38n03_04
29, 2009 from www.undp.org/gender/policy/htm
Tillett, B. B. (2008). A Review of the Feasibility of an
UNESCAP. (2009). Considerations for ICT policy for-
International Standard Authority Data Number (ISADN).
mulation in developing countries. Retrieved October 1,
Prepared for the IFLA Working Group on Functional
2009 from tat/gc/box-ch8.asp http://www.unescap.org/S
Requirements and Numbering of Authority Records,
edited by Glenn E. Patton, 1 July 2008. Approved by the UNICEF. (2008). The State of the Worlds Children 2009.
Standing Committee of the IFLA Cataloguing Section, New York: United Nations Childrens Fund.
15 September 2008. Retrieved March 25, 2009, from
http://www.ifla.org/VII/d4/franar-numbering-paper.pdf UNIMARC/Authorities. Universal format for authorities.
(1991). Recommended by the IFLA Steering Group on
Torero, M., & von Braun, J. (Eds.). (2006). Information a UNIMARC Format for Authorities, approved by the
and communication technologies for development and Standing Committees of the IFLA Section on Cataloguing
poverty reduction: the potential of telecommunications. and Information Technology. Mnchen: Saur.
Baltimore: Johns Hopkins University Press.
United Nation. (2002). 56th Sess. General Assembly
Transparency International. (2008). 2008 Corruption Resolution. A/RES/56/80. Model Law on Electronic
Perceptions Index. Retrieved February 5, 2009, from Signatures of the United Nations Commission on Inter-
http://www.transparency.org/news_room/in_focus/2008/ national Trade Law.
cpi2008/cpi_2008_table
United Nations Conference on Trade and Development.
Tulsian, P. C. (2006). Business Law. New Delhi, India: (2000). A Positive Agenda for Developing Countries:
Tata McGraw-Hill. Issues for Future Trade Negotiations, (pp. 474). New
York: UN Publication.
Twist, J. (2005). UN debut for $100 laptop for poor.
Retrieved on November 15, 2007 from http://news.bbc. United Nations Department pf Economic and Social
co.uk/2/hi/technology/4445060.stm Affairs (2006). E-government readiness assessment
methodology. Retrieved December 12, 2006, from http://
UCC. (2006). Uganda Communication Commission.
www.unpan.org/dpepa-kmb-eg-egovranda-ready.asp
Retrieved from www.ucc.co.ug
United Nations Economic Commission for Africa. (2008).
Uhegbu, A. N. (2007). The Information User: Issues and
Burkina Faso: NICI Policy. Retrieved on August 25, 2009
Themes. Okigwe, Nigeria: Whytem Publishers.
from http://www.uneca.org/aisi/nici/country_profiles/
Burkina%20Faso/burkinapol.htm

316
Compilation of References

United Nations Economic Commission for Africa. (2008). Verona, E. (1983). Pravilnik i prirunik za izradbu abeced-
Rwanda National ICT Policy. Retrieved on August 17, nih kataloga. 2. dio: Kataloni opis. Zagreb, Croatia:
2009 from http://www.comminit.com/en/node/148446. Hrvatsko bibliotekarsko drutvo.

United Nations. (2002). UNCITRAL Model Law on Elec- VIAF. Virtual International Authority File. (n.d.). Re-
tronic Signatures with Guide to Enactment. New York: trieved June 16, 2009, from http://www.oclc.org/research/
United Nations Publication. Retrieved on Jan.02, 2009, projects/viaf/
from UNICITRAL website http://www.uncitral.org/pdf/
Vogel, D., Kennedy, D. M., Kuan, K., Kwok, R., & La,
english/texts/electcom/ml-elecsig-e.pdf
J. (2007). Do mobile device applications affect learning?
United Nations. (2005). Gender equality and empower- In Proceedings of the 40TH Annual Hawaii Conference on
ment of women through ICT. Retrieved December 23, Systems Sciences, 1-4.
2009 from http://www.un.org/womenwatch/daw/public/
Von Solms, B. (2006). Information security - The
w2000-09.05-ict-e.pdf
fourth wave. Computers & Security, 25(3), 165168.
United Nations. (2008). UN e-government survey 2008: doi:10.1016/j.cose.2006.03.004
From e-government to connected government. Retrieved
Vrbanc, T. (2007). Choice of author headings for finite
January 28, 2008, from http://unpan1.un.org/intradoc/
internet resources. In M. Willer & A. Barbari (Eds.),
groups/public/documents/UN/UNPAN028607.pdf
Meunarodni skup u ast 100-te godinjice roenja Eve
United States v Williams. No. 06694. (2008). Retrieved Verona, Zagreb, 17.-18. studenoga 2005. = International
26 June 2009 from http://www.supremecourtus.gov/ Conference in Honour of the 100th Anniversary of Eva
opinions/07pdf/06-694.pdf Veronas Birth, Zagreb, November 17-18, 2005 (pp. 459-
475). Zagreb, Croatia: Hrvatsko knjiniarsko drutvo =
UnitedNations (UN). (2003). Tools for Development -
Croatian Library Association.
Using Information and Communications Technology to
Achieve the Millennium Development Goals. Working Wagner, E. D. (2005). Enabling mobile learning. EDU-
Paper, United Nations ICT Task Force, August. CAUSE Review, 40(3), 4053.

URIM. (1997). EURIM briefing no 19: The regulation of Walker, D. W. (2002). Emerging distributed computing
content on the Internet. http://www.eurim.org/briefings/ technologies. Retrieved on August 10, 2007 from http://
brief19.htm www.cs.cf.ac.uk/User/David.W.Walker

Van Der Stoep, L. (2009). Police target web preda- Walsham, G., & Sahay, S. (2006). Research on information
tors. Sunday Star Times, 22 February 2009. Retrieved systems in developing countries: current landscape and
March 3, 2009, from http://www.stuff.co.nz/stuff/ future prospects. Information Technology for Develop-
thepress/4856032a26834.html ment, 12(1), 724. doi:10.1002/itdj.20020

van Dijk, J., & Hacker, K. (2003). The digital divide as Wang, Z. L. (2008). What is Nanotechnology? Retrieved
a complex and dynamic phenomenon. The Information on February 22, 2008 from http://www.nanoscience.
Society, 19(4), 315326. doi:10.1080/01972240309487 gatech.edu/zlwang/research/nano.html

Vavoula, G. N., & Sharples, M. (2002). KleOS: A personal, Warren, M. (2007). The digital vicious cycle: links be-
mobile, knowledge and learning organisation system. In tween social disadvantage and digital exclusion in rural
M Milrad, HU Hoppe & Kinshuk (Eds), IEEE Interna- areas. Telecommunications Policy, 31(6-7), 374388.
tional Workshop on Wireless and Mobile Technologies doi:10.1016/j.telpol.2007.04.001
in Education (pp.152156). Los Alamitos, CA: IEEE
Warschauer, M. (2003). Demystifying the digital divide.
Computer Society.
Scientific American, 289(2), 4248. doi:10.1038/scien-
Ved Ram and Sons Pvt. Ltd v. Director, (2) AWC 2053 tificamerican0803-42
(UP), (2008).

317
Compilation of References

Waters, D. (2007). Africa waiting for net revolution. Wikibooks. (2008). Legal and Regulatory Issues in the
BBC. Retrieved on March 10, 2009 from http://news. Information Economy/Censorship or Content Regulation.
bbc.co.uk/1/hi/technology/7063682.stm Retrieved May 8, 2009 from http://en.wikibooks.org/
wiki/Legal_and_Regulatory_Issues_in_the_Informa-
Watson, C., & Shuker, R. (1998). In the Public Good?
tion_Economy/Censorship_or_Content_Regulation
Censorship in New Zealand. Palmerston North, New
Zealand: Dunmore Press. Wikipedia. (2009). Cyberlaw. Retrieved November 15,
2009 from http://en.wikipedia.org/wiki/Cyberlaw
Weama, T. M. (2005). Brief history of the development
of an ICT Policy in Kenya. Retrieved from www.scridb. Wikipedia. (2009). Very-large-scale integration. Retrieved
com/.../ict-policy-final-expert-report-pupua-new-guinea on July 28, 2009 from http://en.wikipedia.org/wiki/Very-
large-scale_integration.
Webopedia. (2008) Retrieved on January 15, 2008 from
http://inews.webopedia.com/TERM/d/digital_divide. Willer, M. (1994). UNIMARC/Authorities: A new tool
html towards standardization. In M.-F. Plassard & M. Holdt,
(Eds.), UNIMARC and CDS/ISIS: Proceedings of the
Wei, J., & Lin, B. (2008). Development of a value in-
Workshops Held in Budapest, 21-22 June 1993 and Bar-
creasing model for mobile learning. In Proceedings of the
celona, 26 August 1993, (pp. 19-36). Mnchen, Germany:
39th Annual Meeting of the Decision Sciences Institute
Saur. The paper was also presented at the following
(pp. 5251-5256).
seminars organized by IFLA UBCIMP Office: UBC/
Wescott, C. G., Pizarro, M., & Schiavo-Campo, S. (2001). UNIMARC: A seminar on Universal bibliographic Control
The role of information and communication technology, and UNIMARC, Lietuvos Nacionalnie Martyno Mazvydo
in improving public administration. Retrieved July 21, Biblioteka, Vilnius, 2- 4 June 1994, Lithuania; UNIMARC
2005, from http://www.adb.org/documents/ manuals/ Workshop Crimea 95, Jevpatoria, Ukraine, 12-16 June
serve_and_preserve/default.asp 1995; IFLA International Seminar Authority Files: Their
Creation and Use in Cataloguing, St. Petersburg, October
Whatis.com. (2009). Framework. Retrieved Sep- 3-7, 1995. For reports see International Cataloguing and
tember 18, 2009, from http://whatis.techtarget.com/ Bibliographic Control.
definition/0,sid9_gci1103696,00.html
Willer, M. (1999). Formats and cataloguing rules: develop-
White, B. (2008). Business management skills-trust build- ments for cataloguing electronic resources. In Program,
ing tips for managers. Retrieved December 24, 2008, 1(33), 41-55.
from http://ezinearticles.com/?Business-Management-
Skills--Trust-Building-Tips-for-Managers&id=679140 Willer, M. (2004). UNIMARC format for authority
records: Its scope and issues for authority control. In
Whitman, M. E., & Mattord, H. J. (2009). Principles of A.G. Taylor, & B. B. Tillett, (Eds.), Authority control in
Information Security (3rd ed.). Boston: Thomson Course organizing and accessing information: Definition and
Technology. international experience, (pp. 153-184). Binghamton, NY:
Whyte, G., & Bytheway, A. (1996). Factors affecting Haworth Information Press. DOI 10.1300/J104v38n03_14
information systems success. International Journal of Willer, M. (2007). IFLA UBCIM Working Group on
Information Management, 7(1), 7493. FRANAR recommendations for potential changes in the
Whyte, A. & Macintosh, A. (2002). Analysis and evalu- UNIMARC Authorities format. In Plassard, M.-F. UNI-
ation of e-Consultations. e-Service Journal, 2(1), 9-34. MARC & friends: Charting the new landscape of library
standards: Proceedings of the International Conference
Wiander, T. Savola, R. Karppinen, K. & Rapeli, M. held in Lisbon, 20-21 March 2006 (pp. 61-68). Mnchen,
(2006). Holistic information security management in Germany: Saur.
multi-organization environment. In Proceedings of the
International Symposium of Industrial Electronics, (pp.
2942-2947). Montreal, Canada: IEEE.

318
Compilation of References

Willer, M. (2009, in press). Third edition of UNIMARC World Bank. (2006). 2006 information and communica-
Manual: Authorities Format: Implementing concepts from tions for development: Global trends and policies. Re-
the FRAD model and IME ICC Statement of International trieved October 1, 2009 from http://www-wds.worldbank.
Cataloguing Principles. In International Cataloguing and org/external/default/WDSContentServer/WDSP/IB/2006
Bibliographic Control, 4(38). /04/20/000012009_20060420105118/Rendered/PDF/359
240PAPER0In101OFFICIAL0USE0ONLY1.pdf
Williamson, O. E. (1981). Calculativeness, trust and
economic organisation. The Journal of Law & Econom- World Bank. (February, 2005). Fostering trust and trans-
ics, 26, 453486. parency through information systems. PREM notes, 97.

Wilson, C. (2000). Holding Management Accountable: World Information Society Report. (2006). Digital op-
A New Policy for Protection Against Computer Crime. portunity index 2005. Retrieved February 13, 2007, from
In National Aerospace and Electronics Conference . http://www.itu.int/osg/spu/publications/worldinforma-
Proceedings of the IEEE, 2000, 272281. tionsociety/2006/World.pdf

Wilson, D. (2002). Censorship in New Zealand: the policy WSIS (World Summit on the Information Society). (2008).
challenges of new technology. Social Policy Journal of WSIS follow up Report 2008. Advanced unedited draft
New Zealand, 19, 113. (for comment). Note by the Secretariat. Retrieved on
August 12, 2008, from http://www.unctad.org/en/docs/
Wilson, D. (2007). Responding to the Challenges: Recent
none20081_en.pdf
Developments in Censorship Policy in New Zealand.
Social Policy Journal of New Zealand, 30, 6578. Xiong, J. A. (2006). Current status and needs of Chinese
e-government users. Carbondale, IL: Southern Illinois
Wilson, D. (2008). Censorship, new technolo-
University.
gy and libraries. The Electronic Library, 26(5).
doi:10.1108/02640470810910710 Zeithaml, V. A., Parasuraman, A., & Berry, L. L. (1999).
Delivering quality service: Balancing customer percep-
Wilson, D., & Andrews, C. (2004). Internet Traders of
tions and expectations. New York: The Free Press.
Child Pornography and Other Censorship Offenders in
New Zealand. Retrieved February 24, 2009, from http:// Zhao, X., & Okamoto, T. (2008). A personalized mobile
www.dia.govt.nz/pubforms.nsf/URL/profilingupdate. mathematics tutoring system for primary education. The
pdf/$file/profilingupdate.pdf Journal of the Research Center for Educational Technol-
ogy, 4(1), 6167.
Winn, J. K. (1998). Open Systems, Free Markets, and
Regulation of Internet Commerce. Tulane Law Review, Zheng, Y., & Walsham, G. (2008). Inequality of what?
1177, 72. Social exclusion in the e-society as capability depriva-
tion. Information Technology & People, 21(3), 222243.
Wolak, J., Finkelhor, D., & Mitchell, K. (2005). The
doi:10.1108/09593840810896000
Varieties of Child Pornography Production . In Quayle,
E., & Taylor, M. (Eds.), Viewing Child Pornography on Zhu, H. (2002). The interplay of web aggregation and
the Internet. Lyme Regis. Dorset, UK: Russell House regulations. (Tech.Rep.). Cambridge, MA: MIT Sloan
Publishing. School of Management.

World Bank. (2008). The Little Data Book on Informa- Zulu, S. F. C. (1994). Africas survival plan for meeting the
tion and Communication Technology. Washington, DC: challenges of information technology in the 1990s and be-
The World Bank. yond. Libri, 44(1), 7794. doi:10.1515/libr.1994.44.1.77

319
Compilation of References

Zulu, S. F. C. (2008). Intellectual Property Rights in the Zurita, G., & Nussbaum, M. (2004). A constructivist
digital Age . In Aina, L. O., Mutula, S. M., & Tiamiyu, mobile learning environment supported by a wireless hand-
M. A. (Eds.), Information and Knowledge Management held network. Journal of Computer Assisted Learning,
in the Digital Age: Concepts, Technologies and African 20(4), 235243. doi:10.1111/j.1365-2729.2004.00089.x
Perspectives (pp. 335354). Ibadan, Nigeria: Third World
Information Services Limited.

320
321

About the Contributors

Esharenana E. Adomi holds BEd, MEd. MLS and PhD degrees. He attended University of Ibadan,
Ibadan and Delta State University, Abraka both in Nigeria. He was secretary of Nigerian Library
Association(NLA) 2000 2004 and currently the chairman, NLA, Delta State Chapter. He was Acting
Head, Department of Library and Information Science, delta State University, Nigeria. January 2008
February 2009. He received the 2004 Award for Excellence of the Most Outstanding Paper published
in The Electronic Library, 2003 volume with an article entitled: A survey of cybercafs in Delta State,
Nigeria co-authored with two other colleagues. He is a member of Editorial Advisory Board, The Elec-
tronic Library, previously contributing Editor, Library Hi-Tech News and currently the editor of Delta
Library Journal. He has published over 45 articles in reputable national and international journals, chapters
in books and two textbooks. He is also the editor of Security Software for Cybercafes and Handbook of
Research on Information Communication Technology: Trends, Issues and Advancements published
2008 and 2010 respectively by IGI Global, Hershey, PA. His interests lie in ICT policies, community
informatics, information/internet security, Internet/web technology and services, and application of ICTs
in different settings.

***

Edwin I. Achugbue is a lecturer in the Department of Library and Information Science, Delta State
University Abraka, Nigeria. He holds a Diploma in Library science, B.Sc (Ed) in Library Science, M.Sc
in Library and Information Science. He is currently a PhD student in the Department of Library and
Information Science, Delta State University, Abraka, Nigeria.

C. E. Akporido is the Librarian of the College of Health Sciences, Delta State University, Abraka,
Nigeria. She holds an MLS from University of Ibadan, Nigeria. Her research interests are in information
needs, resources and seeking behaviour

C. Annamalai is an Indian working as an Information & Communication Technology (ICT) Specialist


in SEAMEO RECSAM, Penang, Malaysia. He has published articles on ICT in the national and inter-
national journals. He is a peer reviewer of International Journal on Education using ICT (IJEDICT) and
Journal of Information Systems Education (JISE). He is having a total of twenty years of experience in
Information Communication Technology teaching at the University level as well as worked as Projects
Manager, Systems Manager in the software industry. He is currently pursuing a PhD in Technology
Management focusing on Enterprise Resource Planning (ERP) systems.

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
About the Contributors

Okon E. Ani is academic librarian, currently, the Head of Systems Development, University of Cala-
bar Library, Calabar, Nigeria. He holds, B.Sc.(Hons) and M.Sc. degrees in Physics from University of
Calabar, Calabar, Nigeria, and M.Inf.Sc. (Masters in Information Science) from University of Ibadan,
Ibadan, Nigeria. He has published widely in both local and international journals. He has research inter-
est in Information and Communication Technology and its applications in libraries, IT use, and digital/
virtual libraries.

Udo Averweg is employed as an Information Technology (IT) Research Analyst at eThekwini Mu-
nicipality, Durban, South Africa. He entered the IT industry during 1979 and holds a Masters Technology
degree in Information Technology (cum laude), a second Masters degree in Science from the University
of Natal and a third Masters degree inCommerce from the University of KwaZulu-Natal, South Africa.
As an IT practitioner, he isa professional member of the Computer Society of South Africa. He has
published more than100 research outputs: some of them have been delivered at local conferences, some
haveappeared as chapters in textbook and some research findings have been presented atinternational
conferences on all five continents. Udo has recently been appointed as anHonorary Research Fellow
at the University of KwaZulu-Natal. South Africa. DuringJanuary 2000 Udo climbed to the summit of
Africas highest peak, Mount Kilimanjaro(5,895 metres), in Tanzania.

Sandra Babatope Ihuoma holds a Bachelors degree in Library Science from Delta state University,
Abraka Nigeria and Masters Degree in Library and Information Science from Delta State University,
Abraka Nigeria. She is an Associate member of Chartered Institute of Library and Information Profession-
als (CILIP) United Kingdom. She has worked in special libraries such as the Nigerian Navy Engineering
College (NNEC) Library and Nigerian Stored Products and Research Institute (NSPRI ).Her interest
is in library automation, cyber security, library consortium, database management system, application
development, surveillance system technology, networking, knowledge management, information and
communication technology (ICT) and its application to the library and modern society.

Carol Azungi Dralega is a Senior Researcher with Western Norway Research Institute. She obtained
her PhD and Master of Philosophy degrees from the department of Media and Communication, University
of Oslo in Norway and a B.A. Arts (Hons.) in Mass Communication from Makerere University, Uganda.
She has previously worked as a journalist, sub-editor, lecturer and research consultant.

Margaret B. Edem is currently Senior Librarian and Head of Resource Development, University
of Calabar Library, Calabar, Nigeria.

Nelson Edewor is a practicing librarian with Delta State Polytechnic, Ozoro, Delta State, Nigeria.
He had his university education at Delta State University, Abraka, Nigeria, where he earned a B.Ls in
library science and an M.Sc in library and Information Science. His research interest covers library and
Information science policies; knowlege management; database administration; information needs; virtual
learning; corporate governance; strategic information management and information handling and seeking
behaviour. Nelson Edewor has published various scholarly articles in reputable national and international
journals.He had served in various capacities, ranging from; e-library manager; reader services librarian,
knowledge manager and and reference services librarian. He is currently the Technical services Librar-
ian at the Delta State Polytechnic Library, Ozoro, Delta State, Nigeria. He is a Consultant to the Local
Government on Library and Information Sevices.He is a member of the Nigerian Library Association
as well as Associate of the Institute of Strategic Management, Nigeria. Edewor was the Immediate past

322
About the Contributors

assistant secretary of the Nigerian library Association,Delta State Chapter,Nigeria

Geoff Erwin is currently a Director of The Information Society Institute (TISl), based in Cape Town,
South Africa. He has worked for and with government, Universities and corporates in Australia, UK, Eu-
rope, United States of America and Africa. He has been in many roles related to lCT and socio-economic
development, including programmer, systems analyst, system integrator, project manager, software
developer, regional manager for an international computer services company, Dean of a University
Faculty and Director of a Research Centre. He has written several lCT textbooks, many refereed journal
and conference papers and book chapters. His current research interests are the social appropriation of
ICT for local benefit and the development of e-skills for an inclusive Information Society. He has never
climbed Mount Kilimanjaro.

Swapneshwar Goutam is final year law scholar at Hidayatullah National Law University, India,
expected BA LLB. Hons. 2010. He holds D.C.A., Diploma in Computer Applications from Rashtriya
Computer Saksharta Mission, (Visakhapatnam, A.P) He is a member of the International Human Rights
Defense Organization, Norway. He won fifth position in an international essay competition conducted
on Human rights, by International Human Rights Defence organization, Norway july/2008. He par-
ticipated in international conferences organized by WTO, WHO International Social Security Associa-
tion, Kosha and other repute law related forums.He has contributed to round table forum on, How to
prevent and identify the needs and solutions? , by European Affairs Delegate, Accor Services and also
being consulted to review manuscripts for reputed, The African Journal of Business Management.
He is an author of sixteen articles on the legal issues published in national and internationally repute
peer reviewed journals and also authored a chapter entitled Unregistered Trademark and Practices, to be
published in an ensuing book entitled Burden of proof. Mr. Goutam received a letter of appreciation
for real contribution to the important topic of constitution and cyber law from eminent Jurist MR. K K
Venugopal, Padma Bhushan, Senior Council, Supreme Court of India.

Helena Grunfeld has over 30 years experience in the ICT sector in Australia, working for the in-
cumbent telecommunications operator Telstra, and participating in the establishment of a new carrier,
Uecomm. She has also completed numerous consulting assignments for various organisations, including
co-authoring a book on number portability with Ovum and working on project related to costing and pric-
ing through the International Telecommunication Union for the regulatory authority, ARCOM in Timor
Leste. Helena has an undergraduate degree from the School for Social Work and Public Administration
in Lund, Sweden and completed a Master of Business Administration at the Royal Melbourne Institute
of Technology in 1989. She is now a research scholar and PhD candidate at the Centre for Strategic
Economic Studies at Victoria University, Melbourne, Australia. The conceptual framework presented
in this chapter forms the core of her thesis.

Sriram Guddireddigari is currently pursuing a PhD around the development of a framework for
understanding the nexus between information and communications technologies and the social networks
of Indian migrants in France. This follows a Masters in Electrical Engineering specialising in wireless
and mobile communications from Columbia University and a Bachelors in Electrical Engineering from
the University of Melbourne. Professionally, he has been involved with Infoxchange Australia as proj-
ects officer where he developed the sustainability of initiated social enterprises, assisted in the design
and development of a mesh wireless community network, and organised a community technology con-
ference. Before that, he was involved with Engineers Without Borders Australia in coordinating their

323
About the Contributors

international Information for Development projects and in spearheading a computer training program
assisting refugees. He has also worked with Midas Communication Technologies first in their business
development division and then as product manager on an end user Internet access device

Basil Enemute Iwhiwhu is a lecturer in the Department of Library and Information Science, Delta
State University, Abraka, Nigeria. He holds a B. Sc Ed honours (Chemistry) and a Master degree in
Library, Archival and Information Studies from the University of Ibadan, Ibadan, Nigeria. He also holds
a Diploma in Computer Science. His area of research interests are Archives and Records Management,
Information Management, Knowledge Management, ICT Application to Information Resources and
Services. He is a member of the Nigerian Library Association (NLA) and the current Public Relations
Officer of the Delta State Chapter of this professional body.

Vijay Kumar has a Diploma Computer Engineering from the Institute of Jeevana Jhothi, Chennai,
and a Diploma of Advanced Systems Hardware and Networking from the Institute of SISI, Pondicherry.
He is currently working with The East West Foundation of India as a systems administrator, conducting
computer classes and maintaining systems hardware, networking and is also monitoring the educational
software for children in the community. Vijay is currently pursuing a Bachelor of Computer Science at
Madras University through distance learning.

Benita Marian is an Honorary Consultant for the East West Foundation of India (TEWFI) and has
been actively involved in coordinating the activities in the community through the Post Tsunami Health
Care and Research Project from 2005-2009. She is also an Honorary Advisory Committee Member
for the Uluru Childrens Home. Her involvement in the current research is because of her interest in
the development of marginalised communities and in the role of ICT education in the empowerment
of the rural community. Benita Marian has a doctorate in Social Work and is at the faculty in Social
Work in Stella Maris College at Chennai, India. She is a Member, Board of Studies in Social Work at
the University of Madras. She is an external examiner for Pre Doctoral and Doctoral theses. She also
coordinates a project Towards a More Connected World - Piloting an Innovative Indo-US Professional
Exchange Programme, which makes use of Web based technology to connect students in the USA and
India for interactiive exchanges as part of a course.

Stephen M. Mutula is an associative professor in the Department of Library and Information Stud-
ies, University of Botswana where he serves as the head of department. He holds a PhD in information
science (University of Johannesburg, South Africa), Masters degree in information science (University
of Wales, UK), Postgraduate diploma in computer science (University of Nairobi, Kenya) and Bach-
elors degree in Education-Mathematics and Chemistry (Kenyatta University, Kenya). He has published
extensively in international refereed journals and books. He is a first co-author of a book titled: Web
information management: A cross disciplinary textbook published by Chandos Publishing, London,
2007. He is also the author of Digital Economies: SMEs and E-readiness published in 2009 by IGI. He
is an honorary research fellow of the University of Zululand, South. He has won several international
excellence awards for his extinguished research work from various academic societies and such as the
Emerald Literati Club (UK).

Alex Ozoemelem Obuh holds a Bachelors degree in Computer Science, Masters degree in Library
and Information Science plus professional certification in database management system. He attended
University of Benin, Benin City, Nigeria and Delta State University, Abraka, Delta State, Nigeria. He
has published book chapters and several articles in both national and international journals. He has

324
About the Contributors

participated as lead lecturer in seminars and workshops. He has worked in several IT firms and is cur-
rently a Programmer with the Department of Library and Information Science, Delta State University,
Nigeria. His interest is in database management system, application development, system security, web
technology, networking, management information systems and artificial intelligence.

John Peter has as Master of Social Work from Madurai, Institute of Social Sciences. He is currently
working with The East West Foundation of India as a social worker, organising community health and
development activities and is also monitoring the education of children in the community attending the
local schools. John Peter is currently pursuing a Master of Business Administration at Madurai Kamarajar
University through distance learning.

Tracy E. Rhima is a librarian in Delta State University Library, Abraka, Nigeria. She holds B.A
(HONS) in French and an MSc (LIS) from Delta State University Abraka, Nigeria. She commenced her
professional career as graduate assistant in 2005 with the Delta State University Library, Abraka where
she works in the Collection Development Division. She is a member of the Nigerian Library Association
(NLA). She has published some articles in the area of Library and Information science.

Ramamurthy Subramanian is an Assistant Professor of Law at the Hidayatullah National Law


University, India. He studied international criminal law at the Universities of Leipzig (Germany), Vi-
enna (Austria) and the Kings College, London (UK). He previously was with the Terrorism Prevention
Branch, Division for Treaty Affairs, United Nations Office on Drugs and Crime (UNODC), Vienna and
the School of Technology, Law and Development, West Bengal National University of Juridical Sciences,
India. He has special research interests in issues of science and technology law.

Ng Khar Thoe is a Specialist in Research and Development (R&D) Division, SEAMEO RECSAM,
Penang, Malaysia. She has the academic/professional qualifications of B.Sc.Ed. (Hons.) (USM), Dip. In
H.E.N. and M.Ed. from UK. She has many years of experience in science teaching via ICT integration
with involvement in international programmes incorporating R&D activities as resource person. She
has contributed to more than 50 research-based publications on Science Education via ICT integration.
Some papers were presented in conference/workshop/seminar, published in the conference proceed-
ings, training manuals, book chapters and as articles for national/international refereed journals. She
has completed the first doctoral thesis entitled Evaluative Studies on Problem-Solving Curriculum with
Development and Validation of Tools for Cultural Scaffolding in the Management of Project/Problem/
Programme-based Learning from USA. Currently she is completing her second doctoral thesis to study
a PBL programme that enhance secondary students Higher Order Thinking and Motivation under open
and distance learning mode.

Sitalakshmi Venkatraman is a Senior Lecturer in the Graduate School of Information Technology


and Mathematical Sciences at University of Ballarat. She has 22 years of work experience - in industry,
developing turnkey IT projects, and in academics, teaching and researching in a variety of IT topics.
Currently, she teaches E-Commerce, IT Project Management and Advanced Software Engineering for
the graduate programs. Her current research focus is on Malware and Digital Forensics and she super-
vises PhD students within the universitys Internet Commerce Security Laboratory. She has published
several technical research papers in internationally well-known refereed journals. She has peer-reviewed
research articles for journals and conferences and has been serving the editorial board of IJCSE. Sital-
akshmi Venkatraman is the corresponding author for the chapter A Framework for ICT Security Policy
Management and can be contacted at: s.venkatraman@ballarat.edu.au

325
About the Contributors

Wahyudi Wahyudi is an Indonesian working as a Research and Development Specialist in SEAMEO


RECSAM, Penang, Malaysia. He has published research based articles on Science and Mathematics
Education in the national and international journals. He is having many years of experience in science
teaching and research. He has his PhD in Science Education from Curtin University, Australia and Master
of Education from State University of New York, Buffalo. His areas of interest include classroom action
research, science education, learning environment and curriculum evaluation. He is one of the editors of
the Journal of Science and Mathematics Education in South East Asia, the official journal of SEAMEO
RECSAM, Penang, Malaysia.

Mirna Willer is Associate Professor at University of Zadar, Zadar, Croatia since 2007. She worked
from 1980 to 2007 as systems librarian, standards officer and senior researcher at the National and
University Library in Zagreb, Croatia responsible for implementing UNIMARC bibliographic and
authority formats on Librarys LIS software, and for incorporating national cataloguing rules into the
formats. Among other international body memberships, she was a standing member of the IFLA Per-
manent UNIMARC Committee since its establishment in 1991 until 2005 (chair of Committee from
1997 to 2005), since then she is its consultant and honorary member. Currently, she is a member of the
IFLA Working Group on FRANAR (Functional Requirements and Numbering of Authority Records),
the Working Group responsible for the conceptual model FRAD.

David Wilson is a senior officer of the New Zealand House of Representatives. Previously, he has
worked in policy roles in the New Zealands censorship agencies - the Office of Film and Literature Clas-
sification and the Department of Internal Affairs. David was an adviser to the parliamentary committee
that amended New Zealands censorship laws in 2004. He has also advised the Independent State of
Samoa on modernising its censorship office. David holds Masters degrees in history and management.
He has presented conference papers on media regulation and is the author of published papers on that
subject. David lives in New Zealands capital city, Wellington.

Saul F. C. Zulu is a Lecturer in the Department of Library and Information Studies, at the University
of Botswana. He holds a Bachelor of Arts degree in Library Studies with Sociology and Political Science
from the University of Zambia, Masters degree in Librarianship (IT Applications) obtained from the
University of Wales at Aberystwyth, a Masters degree in Archives and Records Management from the
University of Denver, Colorado, U.S.A and Masters degree in Librarianship and Information Management
from the University of Denver, Colorado, U.S.A. Mr. Zulu has previously worked at the University of
Zambia, where he served in various capacities, including as Head of Department of Library and Informa-
tion Studies at the University of Zambia and Acting University Librarian, University of Zambia Library

326
327

Index

A business to government (B2G) 15, 18


accepted usage policies (AUP) 238 C
access gap 148, 149
access point 194, 196, 197, 203, 204 capability approach (CA) 50, 51, 52, 53, 54,
advance fee fraud 98, 99, 100, 101, 104, 105, 55, 56, 57, 59, 62, 66, 68, 74
106, 109, 110 capability, empowerment, and sustainability
Africa 113, 114, 120, 121, 122, 123, 125, 126, virtuous spiral framework (CESVSF)
127, 128, 129, 130, 131, 132, 133, 164, 52, 53, 65, 67, 68, 75
171, 173, 174, 179, 181, 219, 221, 222, capability maturity models (CMM) 5
223, 225, 231 Caribbean 164, 174, 175, 179, 180
African Information Society Initiative (AISI) cataloguing principles 184, 190, 195, 202
221, 222, 278 Censorship Compliance Unit 248, 252, 253,
African National Congress (ANC) 89 254, 255, 256, 257, 258, 259, 260
ambient intelligence 36 chat rooms 253, 258
application programme interface (API) 267 child pornography 247, 248, 249, 250, 251,
archival value 270 252, 253, 254, 255, 256, 257, 258, 259
artificial intelligence (AI) 117, 133 Child Trafficking and Pornography Act 1998
Asia 164, 179 249
Association of Southeast Asian Nations China 236, 237, 238, 242
(ASEAN) 34, 35 citizens to government (C2G) interactions 15,
asymmetric crypto system 80 18
Australia 164, 175, 179 citizen trust 15, 29
authority control 182, 183, 184, 185, 186, 189, Classification Office 249, 250, 251
190, 191, 193, 195, 196, 197, 198, 199, Commonwealth of Independent States (CIS)
202, 203, 204 237, 238
authority entry 187, 188, 190, 191, 192, 204 community informatics (CI) 90, 91, 92, 93, 94,
authority record 189, 192, 193, 194, 196, 197, 97
198, 201, 204 CompuServe 241
computer-aided software engineering (CASE)
B tools 269
computerized library service 154, 162
broadcasting 220 confidence 33
business alignment 11, 14 connected governance 16, 17
Business Monitor International (BMI) 42, 46, continuous improvement 14
47 continuous improvement philosophy 1
business to business (B2B) interactions 15, 17

Copyright 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Index

contraventions 207, 208, 209, 217 electronic signature certificates 82, 88


Control Objectives for Information and Related electronic signatures 76, 77, 79, 83, 85, 87
Technology (COBIT) 5, 13 emerging ICTs 113, 114, 115, 119, 123, 124,
copyright 140, 142, 146, 147 129, 133
corporate records 264, 272 emerging software developments 117
crime 99, 102, 110, 111, 112 emerging technology 114, 120
Crown Entities Act 2004 250 empanelled background checking companies
crypto-analysis 238 (EBC) 215
cryptography 238 empowerment 75
cybercaf 108, 112 Engineers Without Borders Australia (EWB)
cyber-crime 98, 99, 100, 101, 102, 103, 105, 58, 68, 69, 75
106, 107, 108, 109, 110, 111, 112, 136, e-services 18, 30
206, 207, 209, 212, 215, 216 ethics 20, 25, 26, 27, 29, 31, 33, 135, 136, 143,
cyber-crime regulation 98 145, 146, 147
cyber scammers 99 ethics policy 135, 136, 143, 145, 147
cyber-security 87, 112, 208, 212, 213 Europe 164, 172, 173, 179
cyberspace 110, 111, 112, 206, 207, 212 European Union (EU) 239
cyber-stalking 209 expert systems 117
cyber-terrorism 207, 210 extensible markup language (XML) 269

D F
data protection 208, 212, 215 Federal Executive Council (FEC) of Nigeria
Department of Communications (DOC) 90, 95 151
Development as Freedom (DAF) 53, 54, 56, 57 Films, Videos, and Publications Classification
development strategies 181 Act 1993 250, 252, 254, 255, 262
digital divide 89, 90, 91, 95, 96, 97, 113, 114, filtering 236, 237, 238, 239, 240, 241, 242,
120, 121, 123, 129, 131, 132, 133, 149, 243, 244, 245
151, 153, 159, 162 first generation (1G) mobile phones 46, 47
digital signatures 76, 77, 78, 79, 80, 81, 82, 83, five trust pillars 15
84, 85, 86, 87, 88 five trust pillars: ethical/human 15, 29
distributed databases 36 five trust pillars: information/content 15, 29
five trust pillars: policy/legal 15
E five trust pillars: political/governance 15, 29
economic development 218, 219, 221, 225, five trust pillars: technical 15, 26, 29
227 fraud 99, 102, 103, 105, 111, 112
Education Trust Fund (ETF) 148, 155 fraudsters 101
e-governance 16, 33 freedom of information 147
e-government 15, 16, 17, 19, 23, 26, 27, 28, functional requirements for authority data
29, 30, 31, 32, 33 (FRAD) 194, 195, 196, 197, 198, 203,
e-government interaction 33 204
electronic documents 77, 78 functional requirements for bibliographic re-
electronic form evidence 87 cords (FRBR) 194, 196, 197, 200, 204
electronic mail (e-mail) 209, 268, 272
G
electronic records (e-records) 87, 263, 264,
265, 266, 267, 269, 270, 271, 272, 273, gender 164, 165, 168, 171, 172, 173, 175, 176,
274, 275, 276 177, 178, 179, 180, 181

328
Index

gender divide 165 231, 232, 277, 278, 279, 280, 281, 282,
gender policy 164 283, 284, 285, 286, 287, 288
Global System for Mobile Communication information rights 135, 136, 147
(GSM) 98 information society 97
government to government (G2G) interactions information system (IS) 263, 265, 270, 271,
15, 18 276
Gramm-Leach-Bliley Act (GLBA) 213 information systems success model 15
grid computing 116, 133 Information Technology Act of 2000 206, 207,
212, 215, 216, 217, 237
H Information Technology Infrastructure Library
hacking 101, 208, 209 (ITIL) 5, 13
hash function 80 information technology (IT) 207, 213, 214,
heading 186, 187, 189, 190, 191, 192, 193, 215, 216, 219, 221, 223, 224, 228, 231,
194, 195, 196, 203, 204 238, 265, 271
Health Insurance Portability and Accountability instant messaging 36
Act (HIPAA) 213 intellectual property 135, 136, 137, 140, 141,
hucksters 101 142, 143, 144, 145, 147, 241
intellectual property rights (IPR) 135, 136,
I 141, 142, 143, 144, 150
intermediaries 88
ICT literacy 148, 150, 156, 157, 160, 162
International Centre for Missing and Exploited
ICT policy 148, 149, 150, 151, 152, 153, 156,
Children 257, 259
157, 158, 159, 160, 162, 148, 164, 165,
International Conference on Cataloguing Prin-
167, 170, 172, 173, 179, 180, 181
ciples 185, 201, 202
ICT security 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12,
International Council on Archives 266, 275
13, 14
International Federation of Library Associa-
ICTs policy, formulation and implementation
tions and Institutions (IFLA) 183, 184,
of 181
185, 186, 187, 188, 189, 190, 191, 192,
identification authority record 192, 193
193, 194, 195, 197, 198, 199, 200, 201,
identity theft 209
202, 203, 204
iInternational Organisation for Standardisation
International Records Management Trust
(ISO) 4, 5, 7, 12, 13
(IRMT) 264, 275
India 50, 54, 57, 58, 60, 65, 71, 75, 76, 78, 79,
internet 220, 228, 233, 234, 235, 236, 237,
80, 81, 82, 83, 84, 85, 86, 87, 88
238, 239, 240, 241, 242, 243, 244, 245,
Indian Computer Emergency Response Team
246, 247, 248, 249, 251, 253, 254, 255,
(CERT-IN) 213, 216
256, 257, 258, 259, 260, 261, 262, 279,
Indian Information Technology Act of 2000
280, 281, 282, 283, 284, 286, 287, 288
76, 78
internet content censorship 246
Indonesia 34, 35, 36, 37, 38, 41, 42, 43, 45, 46,
internet protocol (IP) 253, 254, 262, 281, 287
47
internet protocol (IP) address 253, 262
informatics 221
internet service providers (ISP) 236, 237, 239,
information and communication technology for
241, 243, 251, 253, 254
development (ICT4D) projects 50, 51,
Interpol 254, 257, 259
52, 53, 56, 57, 58, 60, 66, 67, 68, 71
IT enabled services (ITES) 214, 216
information and communication technology
(ICT) 206, 207, 218, 219, 220, 221, 222,
223, 224, 225, 226, 227, 228, 229, 230,

329
Index

L National Universities Commission (NUC) 148,


151, 155, 158, 159, 160, 162
Latin America 164, 174, 175, 179, 180 networking 220
legislation 112 Nigeria 98, 99, 100, 101, 102, 103, 104, 105,
libraries 148, 149, 150, 151, 152, 153, 154, 106, 107, 108, 109, 110, 111, 135, 140,
155, 156, 157, 158, 159, 160, 162 142, 143, 146, 148, 149, 150, 151, 152,
library development fund (LDF) 148, 151, 155, 153, 155, 156, 157, 158, 159, 160, 161,
162 162, 163
library LAN (local area network) 154, 162 Nigerian 419 scam 99, 100, 101, 103, 104,
local control 234 106, 107, 108
location-dependence 36 Nigerian advance fee fraud 99
M Nigerian universities 149, 150, 153, 154, 155,
156, 157, 158, 159, 160
management framework 14
MARC 187, 189, 192, 198, 202 O
marginalization 287 objectionable material 248, 251, 252, 253, 254,
millennium development goals (MDG) 90, 255, 256, 257, 258, 262
114, 121, 123, 133 offline laws 233
m-learning 34, 35, 36 online public access catalogue (OPAC) 152,
m-learning classroom 37 154, 157, 159, 162
m-learning environments 36 opennet initiative (ONI) 235, 236, 237, 238,
mobile phone technology 34, 36 239, 240, 241, 245
mobile technologies (m-technologies) 34, 36, Organization of African Union (OAU) 278
47 outsourcing 208
mobile telephone networks (MTN) 280, 281
M.S. Swaminathan Research Foundation (MS- P
SRF) 53, 60, 66
multimedia 36, 48 Paris Principles 185, 186, 187, 190, 191, 195
multi-parallel processor (MPP) technology 116 peer-to-peer networks 254, 258
personal digital assistants (PDAs) 36
N personalization 36
pervasive computing 114, 117
name authority control 182, 183, 184, 185, pervasive or ubiquitous computing environment
195, 196, 198 134
nanotechnology 116, 117, 130, 131, 132, 133 phishing 100, 101, 109, 209
National Agricultural Advisor Services piracy 101
(NAADS) 279, 288 Point of Presence (PoP) 281, 282, 284, 287
National e-Skills Dialogue Initiative (Ne-SDI) policy 113, 124, 128, 129, 130, 131, 132, 133,
90 134
National Information and Communication policy formulation 91, 97
Infrastructure (NICI) 278 poverty eradication action plan 278, 287
national information infrastructure (NII) 224 Presidential National Commission on Informa-
National Information Technology Development tion Society and Development (PNC on
Agency (NITDA) 223 ISAD) 91
national security 239, 241 privacy 135, 136, 137, 138, 139, 141, 143,
national skills registry (NSR) 214, 215, 216, 144, 145, 147
217 problematic content 235

330
Index

public key cryptography 77, 79 269


public key infrastructure (PKI) 79, 80, 85, 86 Stop Demand Foundation 254
supercomputing 238
R
T
recordkeeping system (RKS) 268, 269, 271
records management programme (RMP) 266, Tamil Nadu, India 50, 58, 59, 60, 67, 75
267, 274 technological determinism 287
regulation 98, 100, 108, 110, 112 technology acceptance model (TAM) 15, 56
regulatory mechanism 244 telecentres 97
restricted access 242 telecommunications 220, 225, 227, 228, 229,
rural communications development fund 230, 232, 277, 278, 279, 280, 281, 286,
(RCDF) 278, 281, 282, 283, 285 288
rural communications development policy The East West Foundation of India (TEWFI)
(RCDP) 278, 279, 281, 282, 285 58, 59, 61, 63, 68, 69, 75
The East West Overseas Aid Foundation (TE-
S WOAF) 57, 58, 68, 69, 75
satellite communications 220 transparency 16, 27
satellites 220, 224 trust 15, 21, 22, 25, 27, 30, 31, 32, 33
Saudi Arabia 236, 240, 242 trust building 27, 33
scam 112 trust formation framework 15
Seacom project 283, 284, 285
U
section 419 of the Nigerian criminal code 99
secured electronic signature 88 Uganda 277, 278, 279, 280, 281, 282, 283,
security audit 14 284, 285, 286, 287, 288, 289
security awareness 14 unauthorized access 147
security breaches 2, 4 UNICTRAL model law 78, 79, 80, 87
security issue 14 UNIMARC 188, 189, 190, 191, 192, 193, 194,
security monitoring 2 198, 202, 203, 205
security objective 14 Union of Soviet Socialist Republics (USSR)
security policies 1, 2, 3, 4, 5, 6, 8, 10, 11, 12, 238
13 United Nations Economic Commission for
security standards 2, 4, 5, 7, 8, 9, 11, 12 Africa (ECA) 278
Sen, Amartya 50, 53, 54, 55, 56, 64, 68, 70, 71, United States Telecommunications Act 1996
73, 74, 75 241
Service Quality (SERVQUAL) framework 15, universal bibliographic control (UBC) 182,
22 183, 184, 185, 188, 191, 192, 193, 194,
sex offences 258 196, 198, 199, 200, 201, 202, 203, 204
smartphones 36 user responsibility 135, 143, 145
social capital development 92 user satisfaction 33
social construction of technology (SCOT) 287 U.S. Freedom of Information Act (FOIA) 139
social networks 97
socio-economic development 89, 97 V
South Africa , 34, 89, 90, ix, 91, 92, 94, 95, 96 Vanguard Institutions 282, 283
special incentive programs (SIP) 224 very large scale integration (VLSI) 116
spoofing spam 100 Vicki Standish e-Education Centre (VSeEC)
standard generalised markup language (SGML) 52, 53, 55, 57, 58, 59, 60, 61, 62, 63, 64,
65, 66, 67, 68, 75

331
Index

village phone movement 165 World Bank 282, 288


village resource centres (VCRs) 53 World Bank for Commonwealth Countries 264
virtual communities 136 World Trade Organization/Trade Related
voice over IP telephone (VoIP) 220 Aspects of Intellectual Property Rights
(WTO/TRIP) 135, 136, 141
W world wide web 95, 97
Web 2.0 117
whole-of-government approach 17

332

You might also like