The document provides an overview of ICT policies and strategies. It defines key terms like policy, strategy, programme and project. It discusses the ICT policy process including situational analysis, objectives, actions, monitoring and evaluation. It also covers e-readiness assessments, trends that impact ICT policy, and international agreements that influence national ICT policies such as UNCITRAL, WIPO, WTO, and ICANN.
Presentation by Andrea Bohn, University of Illinois at Urbana Champaign
In collaboration with:
Mark Bell, University of California at Davis
Shahid Akbar, Bangladesh Institute for ICT in Development
Phil Malone, Access Agriculture
Plenary Session: Extension in ICT Overdrive
on 6 Nov 2013
ICT4Ag, Kigali, Rwanda
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...NAP Global Network
Presented by Julie Dekens, IISD/NAP Global Network, in September 2020 at the Virtual Learning Event on Monitoring and Evaluation (M&E) for National Adaptation in Pacific Small Island Developing States organized by organized by the NAP Global Network in collaboration with the Pacific Resilience Partnership (PRP)
Presentation by Andrea Bohn, University of Illinois at Urbana Champaign
In collaboration with:
Mark Bell, University of California at Davis
Shahid Akbar, Bangladesh Institute for ICT in Development
Phil Malone, Access Agriculture
Plenary Session: Extension in ICT Overdrive
on 6 Nov 2013
ICT4Ag, Kigali, Rwanda
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...NAP Global Network
Presented by Julie Dekens, IISD/NAP Global Network, in September 2020 at the Virtual Learning Event on Monitoring and Evaluation (M&E) for National Adaptation in Pacific Small Island Developing States organized by organized by the NAP Global Network in collaboration with the Pacific Resilience Partnership (PRP)
Development as Freedom in a Digital Age Soren Gigler
This presentation summarized the main findings of the recent publication Development as Freedom in a Digital Age. It provides an overview( i) the alternative impact evaluation framework of information and communications technologies on development based on Amartya Sen's capability approach and (ii) presents empirical evidence from rural Bolivia on the conditions under which ICTs can reduce poverty and empower local communities. The book addresses the following main issues (i) what is the impact of ICTs on the well-being of poor communities? (ii) how to evaluate the impact of ICTs on development from a human development perspective? (iii) which factors influence the successful implementation of ICT programs?
¿Qué podemos aprender de los asociados en el Sur? 4 lecciones de 10 años de controles sobre el terreno la experiencia en ICT4D? Presentación de Stijn Van Der Krogt para el II Encuentro Internacional TIC para la Cooperación al Desarrollo
This presentation discusses the critical importance of the “Communication for Development” (ComDev) approach in ensuring that the voices of all stakeholders are heard in the decision-making process that will be needed in Agricultural Adaptation to Climate Change, but especially illustrates how ComDev can engage those whose livelihoods are most vulnerable and most dependent on natural resource bases. Illustrative examples will be drawn especially from Small Island Developing States (SIDS) in the Caribbean, including the “Voices for CC” initiative in Jamaica as well as best practices in ComDev from RARE Radio in St. Lucia, Toco Radio in Trinidad, among others.
An introductory presentation for the Council of Europe INGOs introducing the transversal workig group called Digital Citizen. The group will deal with Education, Humand Rights and Democracy using a forward looking approach to policy making.
ICT Association Suriname Presentation On eGovernment 2012Cyril Soeri
This presentation was presented to raise awareness on eGovernment which is mainly based on the Worldbanks\' eGovernment Handbook for developing countries.
Equity workshop: Safeguards and standards for equity in redd+IIED
Safeguards and standards for equity in REDD+
A presentation by Phil Franks, IIED/REDD+ SES Secretariat
This presentation was given at the Expert Workshop on Equity, Justice and Well-being in Ecosystem Governance, held at the International Institute for Environment and Development (IIED) in London, March, 2015.
Information communicating technologies strategiesColani Nkosi
ICTs are quickly becoming popular in the world as part of social order, education has cought on and thus plans to intergrate ICTs as part of teaching and learning.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Development as Freedom in a Digital Age Soren Gigler
This presentation summarized the main findings of the recent publication Development as Freedom in a Digital Age. It provides an overview( i) the alternative impact evaluation framework of information and communications technologies on development based on Amartya Sen's capability approach and (ii) presents empirical evidence from rural Bolivia on the conditions under which ICTs can reduce poverty and empower local communities. The book addresses the following main issues (i) what is the impact of ICTs on the well-being of poor communities? (ii) how to evaluate the impact of ICTs on development from a human development perspective? (iii) which factors influence the successful implementation of ICT programs?
¿Qué podemos aprender de los asociados en el Sur? 4 lecciones de 10 años de controles sobre el terreno la experiencia en ICT4D? Presentación de Stijn Van Der Krogt para el II Encuentro Internacional TIC para la Cooperación al Desarrollo
This presentation discusses the critical importance of the “Communication for Development” (ComDev) approach in ensuring that the voices of all stakeholders are heard in the decision-making process that will be needed in Agricultural Adaptation to Climate Change, but especially illustrates how ComDev can engage those whose livelihoods are most vulnerable and most dependent on natural resource bases. Illustrative examples will be drawn especially from Small Island Developing States (SIDS) in the Caribbean, including the “Voices for CC” initiative in Jamaica as well as best practices in ComDev from RARE Radio in St. Lucia, Toco Radio in Trinidad, among others.
An introductory presentation for the Council of Europe INGOs introducing the transversal workig group called Digital Citizen. The group will deal with Education, Humand Rights and Democracy using a forward looking approach to policy making.
ICT Association Suriname Presentation On eGovernment 2012Cyril Soeri
This presentation was presented to raise awareness on eGovernment which is mainly based on the Worldbanks\' eGovernment Handbook for developing countries.
Equity workshop: Safeguards and standards for equity in redd+IIED
Safeguards and standards for equity in REDD+
A presentation by Phil Franks, IIED/REDD+ SES Secretariat
This presentation was given at the Expert Workshop on Equity, Justice and Well-being in Ecosystem Governance, held at the International Institute for Environment and Development (IIED) in London, March, 2015.
Information communicating technologies strategiesColani Nkosi
ICTs are quickly becoming popular in the world as part of social order, education has cought on and thus plans to intergrate ICTs as part of teaching and learning.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Module4-PolicyFormulation.pdf
1. 1
1
ICT Policies and Strategies
ICT Policies and Strategies
Margreet van Doodewaard
Regional Advisor ICT Policies and Strategies
UNESCAP
UNESCAP/ITU ICT Policy Training Module
Development and Implementation
Development and Implementation
www.signalkomplex.hu/skwww/tg006.jpgl
2
Introduction
Introduction
This session provides the basic lay out of the policy scene
as a basis for the days to come:
• Definitions
• Steps in policy formulation and implementation
• Role of stakeholders
• Measuring progress
• Resource mobilisation
3
Definitions
Definitions
Policy
Policy = short to the point document that provides
the governments’ mission and vision in a
particular area. (long term).
Strategy
Strategy (Master plan, Action plan) = the
translation of the policy into a framework of
related programmes. (medium term).
Programme
Programme = a set of projects that together
cover one particular area or key objective. (medium
term).
Project
Project = a time bound set of activities that lead
to the establishment of a particular goal. (short
term). 4
What is ICT?
What is ICT?
Information Communication Technology
• A tool.
• Includes ‘old’ and ‘new’ technologies.
• Rapidly changing and converging.
• Technology of the “young”.
• Affects all sectors and layers in society.
• Globaliser.
5
• Lifecycle of a new technology shorter than the
life cycle of an ICT policy.
Policy = technology neutral
• ICT is a tool.
Policy objectives = non- ICT
• ICT is cross cutting.
Policy integrates all sectors
• ICT is participatory.
Policy developed in participatory way.
What makes ICT policy different?
What makes ICT policy different?
6
Role of Government
Role of Government
• Regulator
– ICT Law
– Telecoms Law
– E-Commerce Law
– Media Law
• Enabler
– National policies and strategies
• User
– Procurement activities
– Reaping the benefits
2. 2
7
The Policy Process
The Policy Process
Actions consistent with objectives
and timeframes
ICT Policy
Vision,mission,principles,objectives
National action plan/strategy
Situational analysis,Prioritised objectives, key actions, timelines and resources
Project plan Project plan Project plan
Situational analysis
Objectives
Actions
Who is doing what?
Reporting duties
Budget
Planning
Risk assessment
What if scenarios
Exit strategy
Programme
Continuous monitoring and
evaluation.
Existing National Policies
E.g. PRSP
International Policies
E.g. WTO, international treaties and agreements
Existing ICT policies
E-Readiness Assessment
8
E
E-
-Readiness Assessments
Readiness Assessments
• What ?
• Why ?
• How ?
The measurement of how ready a country is to
the achieve the objectives it has laid out in its’
ICT policy.
To gain insight into the country’s strengths,
weaknesses, opportunities and threats.
To establish the starting point for future
measurement of progress.
Many different methods.
Chose method that will best produce the
information you need.
Chose method compatible with international
methods
9
E
E-
-Readiness Assessments: Steps
Readiness Assessments: Steps
• Define “E-Readiness” for your country.
– Choose a benchmark country.
• Select E-Readiness model:
– That provides insights needed.
– That is compatible with international indicators.
– That can be used in the Vietnamese setting.
• Apply the model
– Use external researchers if in-country expertise not available
• Advantage: Neutral outlook
• Disadvantage: May not understand the local setting fully.
Expensive
• Use the outcomes for policy, programme and project
development or adjustment.
• Use the outcomes to further develop progress indicators.
10
Readiness for the Networked World
Readiness for the Networked World
• An E-readiness assessment guide developed by Centre
for International Development (Harvard University).
• Based on the principle that a networked world 1) creates
opportunities, 2) eliminates barriers and 3) promotes
efficiency.
• Identifies four stages of readiness with the fourth stage
being most advanced.
• Note: E-Readiness needs internal or external
benchmarking.
• Note: E-Readiness is only a snapshot of today.
11
Readiness for the Networked World
Readiness for the Networked World
Uses five categories:
• Network Access:
– Availability, Cost and Quality of ICT networks, equipment and
services.
• Networked Learning
– Integration of ICT in general and professional education.
• Networked Society
– The ability of individuals to access and use ICT
• Networked Economy
– The usage of ICT as a communication tool by businesses and
government.
• Networked Policy
– Facilitation of policies.
12
DAI Index
DAI Index
Source: www.
Source: www.itu
itu.org
.org
Weight:
Weight:
0.5 + 0.5
0.5 + 0.5
Weight: 1
Weight: 1
Weight: 0.62
Weight: 0.62
(literacy) + 0.21
(literacy) + 0.21
Weight:
Weight:
0.5 + 0.5
0.5 + 0.5
Weight: 1
Weight: 1
3. 3
13
DAI Index for Selected Countries
DAI Index for Selected Countries
Country Infrastructure Affordability Knowledge Quality Usage DAI
Azerbaijan 0.15 0 0.88 0.12 0.04 0.24
Bangladesh 0.01 0.33 0.45 0.12 0 0.18
Bhutan 0.02 0 0.42 0.21 0.02 0.13
China 0.22 0.87 0.79 0.24 0.05 0.43
India 0.04 0.78 0.57 0.18 0.02 0.32
Kazakhstan 0.14 0.73 0.92 0.22 0.02 0.41
Malaysia 0.35 0.97 0.83 0.31 0.38 0.57
Nepal 0.01 0.3 0.5 0.14 0 0.19
Philippines 0.13 0.80 0.90 0.26 0.05 0.43
Sri Lanka 0.06 0.79 0.82 0.22 0.01 0.38
Thailand 0.22 0.96 0.88 0.27 0.09 0.48
Viet Nam 0.05 0.45 0.83 0.19 0.02 0.31
14
Networked Readiness Index
Networked Readiness Index
15
Networked Readiness Index for
Networked Readiness Index for
Selected Countries
Selected Countries
Country
Score NRI Rank Score Rank Score Rank Score Rank
Azerbaijan - - - - - - - -
Bangladesh 2.57 93 2.57 89 3.00 95 2.14 92
Bhutan - - - - - - - -
China 3.38 51 3.03 63 4.14 54 2.97 43
India 3.54 45 3.45 44 4.23 50 2.94 44
Kazakhstan - - - - - - - -
Malaysia 4.9 26 3.95 26 4.86 29 - -
Nepal - - - - - - - -
Philippines 3.10 69 2.67 82 3.84 72 2.80 50
Sri Lanka 3.15 66 2.99 66 3.98 64 2.49 71
Thailand 3.72 38 3.57 41 4.59 37 3.00 40
Viet Nam 3.13 68 2.80 74 3.93 67 2.67 58
Networked Readiness
Index Rankings
Environment
Component IndexComponent IndexComponent Index
Readiness Usage
Total participating countries: 102
Total participating countries: 102
16
SWOT
SWOT
Threats
Opportunities
What national and international trends
may be harmful to us?
What national and international
trends may be beneficial to us?
What do we do worse than our
neighbours?
What do we not have that others do
have?
What are our comparative
disadvantages?
What do we do better than our
neighbours?
What do we have that others do not
have?
What are our comparative
advantages?
Weaknesses
Strengths
17
ICT enabling strengths
ICT enabling strengths
Economy focus
• Infrastructure
• Affordable access
• High literacy rates
• English
• High quality technical and
managerial education
• Pro active (ICT) private sector
• Government enabling with
transparent, facilitating and fair
policies.
• Stable political, social and
economic environment
• Well developed R&D and
innovation (patents).
• Ample financial resources
• Low labour costs
Society focus
• Infrastructure
• Affordable and easy access
• Awareness
• Strong support from local
communities (champions!)
• Local content and applications
• Political, social and economic
stability
• Purchasing Power
• Government facilitating and
incorporating society
information needs.
18
ICT inhibiting weaknesses
ICT inhibiting weaknesses
Economy focus
• Lack of broadband access
• Access costs high
• Lack of market
• Lack of business skill and
experience
• Political, social and/or
economic environment
unstable.
• Government regulating rather
than facilitating
• Lack of access to investment
capital
• Low overall, managerial and
technically specific education
levels
• High labour costs
Society focus
• Lack of government priority
and support
• Poor infrastructure
• Lack of Awareness
• Lack of local support
• Political, social and/or
economic instability
• Lack of local content and
applications
• Lack of local purchasing
power.
4. 4
19
Trends in ICT and Policy Implications
Trends in ICT and Policy Implications
Trend
• Increase in affordable broadband.
• Convergence of DTV and ICT.
• Mobile / Wireless – convergence of ICT and telecoms.
• Traditional media (TV, radio, paper) continue to be strong.
Policy Implications
• Policies should encourage broadband application and liberalise
broadband market.
• Wireless infrastructure offers access opportunities for remote areas.
• New infrastructure and implications should anticipate convergence of
technologies.
• Policies should include traditional media.
• Traditional media can play an important role in awareness raising
campaigns.
20
Trends in ICT
Trends in ICT
Trends
• Level of Internet usage depends on access, age, education, gender,
and income (e-Living project Europe). Typical early adopters are male,
single, educated and young. Women, the elderly, families and groups
with little education lag behind.
• Increased overall reliance on new technologies and applications.
Policy Implications
• Start ICT penetration in education and young generation ‘hang-outs’.
The young are the ICT generation of tomorrow.
• Special access and awareness programmes for women, families, the
elderly and low income groups.
• Local content and applications should specifically focus on the
groups that lag behind.
21
Trends in ICT
Trends in ICT
Trends
• Demand for data security increases.
• Increase in use of Free and Open Software as a platform.
• Non ICT Companies integrate systems further and further; focus on E-
Commerce.
• Reduction in demand and costs for ICT staff.
• ICT and media industry maturing; inclination to cost-reduction and
economies of scale.
Policy Implications
• Regulatory framework and enforcement on data security, IPRs, cyber-
crime crucial.
• Policies should encourage interoperability of systems.
• Anti-monopolist policies.
• Government protection of incubators and SMEs (within framework of
international agreements) against early take-overs. 22
Trends in ICT
Trends in ICT
Trends
• Increased English language capacity.
• Reduction in demand and costs for IT staff.
• ICT and media industry maturing; inclination to cost-reduction and
economies of scale rather than innovation and incubation.
• ICT Industry: shift from product orientation to service orientation
Policy Implications
• Advantage of low cost labour should be exploited in-country
(outsourcing industry).
• Encourage large (foreign) firms to make use of local low costs
facilities.
23
Trends in ICT
Trends in ICT
Trends
• Upcoming new technologies gain ground: convergence ICT and bio-
technology, nano technology, artificial intelligence.
• On-going ‘technologisation’ of society will change traditional social
and institutional structures.
Policy Implications
• Innovation and high level technical education important to keep up with
developments.
• Enable government and others to keep up to date through research
facility.
• Encourage participation in international research initiatives.
• Government answer to changing society: developing new social and
institutional structures to match a changing world.
• Lifelong learning needs to be facilitated. 24
Definitions
Definitions
Policy
Policy = short to the point document that provides
the governments’ mission and vision in a
particular area. (long term).
Strategy
Strategy (Master plan, Action plan) = the
translation of the policy into a framework of
related programmes. (medium term).
Programme
Programme = a set of projects that together
cover one particular area or key objective. (medium
term).
Project
Project = a time bound set of activities that lead
to the establishment of a particular goal. (short
term).
5. 5
25
What are good policies?
What are good policies?
• Cover and integrate all aspects of ICT.
• Have the support of all stakeholders.
• Provide a clear mission, vision, guiding principles and
overall objectives.
• Are in line with national and international agreements
and policies.
• Forward looking and daring
• Yet realistic
• Are cross cutting in nature
• Are technology neutral.
• Prioritise objectives to facilitate implementation.
• Focus on NEED.
26
Policy evolution
Policy evolution
1st ICT
policy and
action plan
1) Implementation
2) Monitoring,
Evaluation, Internal
and External trends,
best practices and
worst failures
3) Newideas, new insights,
new political arena, different
settings
4) Needfor
policy and
strategy change
5) 2nd ICT
policy and
action plan
7) Monitoring, Evaluation,
Internal and External
trends, best practices and
worst failures
8) Newideas, new insights,
new political arena,
different settings
9) Needfor policy and
strategy change
10) 3rd ICT
policy and
action plan
6) Implementation
Time
27
National Impact on ICT policy
National Impact on ICT policy
ICT Policy
Poverty Reduction
Strategy Paper
Bilateral and
multilateral
agreements
Political, social and
economic
sentiments
E-Readiness
Outcomes
Existing ICT and
related policies (Trade,
Telecoms)
Governments’ Overall National Strategy
28
International impact on ICT Policy
International impact on ICT Policy
Source: Guide to International ICT Policy Making,
Source: Guide to International ICT Policy Making, Markle
Markle foundation, 2003. Available from http://www.
foundation, 2003. Available from http://www.unicttaskforce
unicttaskforce.org/
.org/perl
perl/documents.pl?id=1312
/documents.pl?id=1312
29
UNCITRAL
UNCITRAL
Underlying Principles:
Underlying Principles:
• Equivalence. Paper documents and their electronic counterparts
have the same legal value.
• Autonomy of contracts. Whether in paper form or in electronic
form, the substantive content of the contract remains the same.
• Voluntary use of electronic communication.
• The requirements for a contract to be valid and enforceable
remain the same.
• Application to form rather than substance. In other words, the law
regulates the contractual framework, form but not the content of
the contract.
• Consumer protection laws should take precedence over the
provisions of the UNCITRAL Model Law.
30
WIPO
WIPO -
- IPRs
IPRs
“Intellectual property refers to creations of the mind: inventions, literary
and artistic works, and symbols, names, images, and designs used
in commerce.
Intellectual property is divided into two categories: Industrial property,
which includes inventions (patents), trademarks, industrial designs,
and geographic indications of source; and Copyright, which includes
literary and artistic works such as novels, poems and plays, films,
musical works, artistic works such as drawings, paintings,
photographs and sculptures, and architectural designs. Rights
related to copyright include those of performing artists in their
performances, producers of phonograms in their recordings, and
those of broadcasters in their radio and television programs.”
6. 6
31
WTO
WTO -
- TRIPS
TRIPS
Agreement on Trade Related Aspects of
Intellectual Property Rights:
• Emphasizes the ownership of intellectual
property.
• Regulates globally copyrights,
trademarks, industrial design, patents.
32
ICANN
ICANN-
- DNS
DNS
• DNS = Domain Name System. (dot….)
• ICANN = The Internet Corporation for
Assigned Names and Numbers.
– Allocates domain names.
– TLDs = Top Level Domains
• Generic:.com, .org, .net
• Country code: .vn, .th, .nl
• Uses “Registrars” – local ISPs.
– Pay to ICANN for services
33
ICANN
ICANN-
- Trade mark conflict
Trade mark conflict
• Domain names can conflict with
trademarks:
– What to do with someone registering:
• www.cocacola.com?
• ICANNs response:
– Minimum quality requirements for registration
– Respect of IPRs.
– Uniform Domain Name Dispute Resolution
Policy (UDNDRP)
34
Roles of national stakeholders
Roles of national stakeholders
Private Sector – ICT and non ICT sectors
The Public – Citizens (women, the young,
vulnerable groups),NGOs
The Government – Government and government
affiliated agencies (incl.
educational institutions,
research centres)
Financing Institutions- Banks, donors, partners
• Dominance of a particular stakeholder
group will influence policy focus!
• Different stakeholders – different approach
35
Consultation process: a Model
Consultation process: a Model
Policy/Strategy
Programme
Executing agency;
E.g. ICT Agency
Governing body; e.g. Prime Minister of Ministry of
ICT, High level Commission
National
consultations
Working group; ICT focal
points from line ministries,
representatives from key
stakeholders
Project
Working group;
implementation agency,
partners and recipients
Role:
Consultative
Frequency: Low
Role:
Consultative
Monitoring
Evaluating
Directing
Frequency: Medium
Role:
Consultative
Monitoring
Evaluating
Directing
Frequency: Often
Implementingagency;
E.g. NGO, line ministry,
private sector consortium
Figure 3: Participatory structure 36
Methods of consultation
Physical
• Consultative meetings
• Focus groups
• Interviews
• Questionnaires
• Competitions
Virtual
• On-line discussion platform
• On-line voting
• On-line discussion group
7. 7
37
The DOI dynamics of ICT development
The DOI dynamics of ICT development
38
UNCTAD Policy Model Framework
UNCTAD Policy Model Framework
ICT Policy model framework. Source: E-Commerce and Development report 2003; UNCTAD 2003: p. 65
ICT Industry
SME development, local content
e-Business
Policies
Economic and business environment (trade,
investment, finance)
e-Government
e-Society polices
Information Economy
Private Domain
Information Society
Public Domain
Measurement and monitoring
Legal and regulatory issues
IT training & literacy, awareness
Technology Development, R&D
Cross
Cutting
Policies
Telecommunications infrastructure, access
Manufacturing
Services
Agriculture
Procurement
Services
Customs
Culture
Media
Sectors
Finance
Trade
Investment
Industry
Government
Education
Health
Other
39
However:
A policy will never be perfect…
…..therefore at some point one has to “get
on with it”’……..
40
From Policy to Strategy
From Policy to Strategy
• Group policy objectives thematically.
• Prioritise thematic groups.
• Prioritise objectives in each group.
• Per group define expected outcomes (results) =
programmes.
• Gap-analysis: identify key actions = projects.
• Per group identify key resources
• Per group identify implementing agency, key
partners and stakeholders.
• Allocate a timeframe for each group.
41
Gap Analysis
Gap Analysis
Baseline Expected Outcome
ACTIONS + RESOURCES
AIMS
Gap!
What is
missing and
what needs to
be done
42
Linking Pin
Linking Pin
Action Plan
ICT Education
Programme 2
Programme 3
Programme 1: ICT Education
1a: Awareness inschools
1b: National website competition
1c: Educating ICT Professionals
Programme 2
Project 2a
Project 2b
Project 2c
Programme 3
Project 3a
Project 3b
Project 3c
Project 1a:
Awareness inschool
1aI– Internet radio for schools
1aII– Computerlabs in core schools.
1aIII– Integration of ICT awareness
into curriculum
Project 1c
Action 1b – i
Action 1b – ii
Action 1b - iii
Project 1b
Action 1c– i
Action 1c – ii
Action 1c - iii
Aggregated,
overall,
general
Disaggregated,
detailed,
specific
8. 8
43
ICT Agency: Organisation structure
ICT Agency: Organisation structure
Governing Board:
Chairperson: Minister responsible for ICT
Secretary: Chief Information Officer
Members: Representatives of key stakeholder groups
Main Responsibility:
Responsible for the strategic management of the ICT Agency with the
objective to ensure the development and delivery of ICT policies, strategies
and regulations
ICT Agency
Secretariat
Responsible for the procedural
aspects of the ICT policy
development and implementation
process such as calling of meetings,
writing minutes, follow up on actions
and so on.
Implementing group
Responsible for the substantive
aspects of the ICT policy
development and implementation
process such as preparatory research,
drafting of policy documents,
coordination of project
implementation, maintaining
relationships with partners involved,
information dissemination.
Source: World bank
Source: World bank
44
ICT Agency: Networking Agency
ICT Agency: Networking Agency
ICT Institution
Line Ministries
Private Sector
Academia
NGO’s
Communities
Donors
International
organisations
45
TOR for an ICT Agency
TOR for an ICT Agency
Has a clear mandate.
Has adequate resources.
Has strong leadership.
Has decision taking power.
Has a neutral position.
Has the capacity to build and maintain partnerships.
Has a balance between technically and managerially
trained staff.
Is transparent, flexible and agile.
Is pro-active.
Is small.
46
Resource mobilisation
Resource mobilisation
47
Seeking Resources
Seeking Resources
Initial investment
Hiring of Staff
Equipment
Housing
Education
Installation
Forging partnerships
Kick off marketing
Maintenance
Salaries
Maintenance of Equipment
Housing
Training and awareness
Office costs
Maintaining partnerships
Structural Marketing
Transport
Sustainability
Exit activities
Hand Over
Keeping in touch
48
Seeking Resources
Seeking Resources
Initial investment
State funds
PPP
Loans
Grants
Venture capital
Micro Credit
Outsourcing
Privatisation
Maintenance
Government Budget
Communities
PPP
Piggybacking
In-kind contributions
User pays/Tax
Micro-Credit
Outsourcing
Sustainability
Phasing out
9. 9
49 50
Considerations
Develop a resource mobilisation strategy:
1. What types of investment are needed and
when?
2. What are the cost involved?
• On a one-off basis
• On a regular basis
3. What costs can be recovered?
4. Balance costs and quality criteria.
5. Take into account inflation and price increases.
51
Considerations
Develop a resource mobilisation strategy:
• What resources must be mobilised
externally?
• Which sources are available?
• What are the characteristics of these
sources?
• Match sources with needs.
• How do can we best tap into these
resources?
52
Outsourcing as a financing option
Outsourcing as a financing option
1. Determine:
– What needs to be done in-house?
• Government priorities
• International agreements
• Security and legal issues
– What can be outsourced?
2. What outsource modality works best?
• Least subsidy?
• BOOT schemes?
• Contracting?
3. What is the best financing modality?
– Available finance and other resources in-house?
– Piggybacking possible?
– External resources accessible?
– Risk assessment.
53
Public Private Partnership
Public Private Partnership
Definition:
A cooperative venture between the public and
A cooperative venture between the public and
private sectors, built on the expertise of each
private sectors, built on the expertise of each
partner, that best meets clearly defined public needs
partner, that best meets clearly defined public needs
through the appropriate allocation of resources,
through the appropriate allocation of resources,
risks and rewards.
risks and rewards.
(The Canadian Council for Public-Private Partnerships)
54
Public Private Partnership
Public Private Partnership
Risk
Privatization
Public administration
DB
O&M
DBFO
BOO
BOOT
BBO
OL
10. 10
55
Types of PPP
• Design-Build (DB) = The private sector designs and builds infrastructure to meet public sector performance
specifications, often for a fixed price, so the risk of cost overruns is transferred to the private sector.
• Operation & Maintenance Contract(O&M): A private operator, under contract, operates a publicly
owned asset for a specified term. Ownership of the asset remains with the public entity.
• Design-Build-Finance-Operate (DBFO): The private sector designs, finances and constructs a
new facility under a long-term lease, and operates the facility during the term of the lease. The private partner
transfers the new facility to the public sector at the end of the lease term.
• Build-Own-Operate: The private sector finances, builds, owns and operates a facility or service in
perpetuity. The public constraints are stated in the original agreement through on-going regulatory authority.
• Build Own Operate Transfer (BOOT): A private entity receives a franchise to finance, design, build
and operate a facility (and to charge user fees) for a specified period, after which ownership is transferred back to
the public sector.
• Build-Buy Operate (BBO): Transfer of a public asset to a private or quasi-public entity usually under
contract that the assets are to be upgraded and operated for a specified period of time. Public control is exercised
through the contract at the time of transfer.
• Operation Licence (OL): A private operator receives a license or rights to operate a public service,
usually for a specified term.
• Finance Only (FO): A private entity, usually a financial services company, funds a project directly or uses
various mechanisms such as a long term leas or bond issue. 56
Establishing partnerships
• A real need
• Understanding
• Mutual trust
• Visible benefits
• Clear incentives
Awareness
Participation
Implementation
Ownership
57
Public Private Partnerships
Public Private Partnerships
• Know and understand your partner.
– Recognize the strengths and the weaknesses of the partnership.
• Build synergies and trust.
• Maintain open communication.
– Give complete and timely communication.
– Seek to solve problems together.
• Emphasize and strengthen the partnership through formal
written agreements.
• Honour these agreements.
• Share risks and rewards.
58
Risk assessment
Risk assessment
• A good risk assessment saves resources.
• Include ratings from global companies such as S&P
• Risk assessment and management during the Feasibility and
Analysis phase of project development.
• Example methods:
– Simple Factor Rating
– Design-Reality Gap Assessment Techniques
http://www.e-devexchange.org/eGov/riskassess.htm
59
OECD Risk Ratings of Selected Countries
OECD Risk Ratings of Selected Countries
Country risk
Country
classification
5
Vietnam
7
Uzbekistan
3
Thailand
5
Sri Lanka
7
Solomon Islands
5
Philippines
7
Pakistan
7
Nepal
7
Myanmar (Burma)
7
Mongolia
5
Maldives
2
Malaysia
7
Laos
7
Kyrgyz Republic
5
Kazakhstan
6
Indonesia
3
India
2
Hong Kong
1
Chinese Taipei
2
China
6
Bangladesh
6
Azerbaijan
classification
Country risk
Country
60
Monitoring and Evaluation:
Monitoring and Evaluation:
ICT Indicators (OECD list)
ICT Indicators (OECD list)
• Resources for the
Information Society
– Investment in ICT
equipment and software
– Consumption of ICT goods
and services
– ICT patents
– Occupations and skills in
the information society
• The ICT sector
– ICT producing sectors
– Size and growth of the sector
– Contribution of the sector to
employment growth
– R&D in selected ICT industries
– Contribution of ICT sector to
international trade
– ICT sector exports: share in
total exports and composition
– ICT trade specification and
comparative advantage
– Foreign affiliates in the ICT
sector
11. 11
61
Monitoring and Evaluation:
Monitoring and Evaluation:
ICT Indicators (OECD list)
ICT Indicators (OECD list)
• Access to and use of information technologies
– Telecommunication networks
– Internet infrastructure
– Internet subscribers
– ICT access by households
– Internet access by households
– Use of the Internet by individuals
– Internet access and use by businesses
– Internet access and use by enterprise size and industry
– Perceived barriers to Internet access and use in the
business sector
– The price of Internet access and use
62
Monitoring and Evaluation:
Monitoring and Evaluation:
ICT Indicators (OECD list)
ICT Indicators (OECD list)
• ICT in education and
government
– ICT in education
• Computer access
• Computer use at different
education levels
– ICT in government
• Internet and e-mail access
of civil servants
• Electronic Commerce
– Infrastructure for Internet
commerce
– Measuring electronic
commerce transactions
– Internet and electronic
commerce transactions
– Internet and electronic
commerce transactions by
consumers
– Internet transactions by
product and cross-border
– Drivers and inhibitors of
Internet commerce
– Barriers to Internet
commerce
63
ICT Indicators
ICT Indicators
• ICT indicators should be:
– Developed in close liaison with NSO’s.
– Provide the information needed.
– As tangible as possible.
– Match as much as possible international statistical
standards.
– Make as much as possible use of indicators already
in use.
Working group on ICT Statistics (UN-OECD) is
developing questionnaire.
64
Interoperability framework
Interoperability framework
“A set of standards and guidelines which
describe the way in which organisations
have agreed, or should agree, to interact
with each other. An interoperability
framework is, therefore, not a static
document and may have to be adapted over
time as technologies, standards and
administrative requirements change.”
65
Interoperability in practice
Interoperability in practice
1. Organisational Interoperability
– Business models and processes.
– Organisation structures
– Information needs
2. Semantic Interoperability
– Readability of exchanged data across different
systems and applications. Harmonisation of
platforms and applications.
3. Technical Interoperability
– Compatibility of network architecture and hardware.
66
EU Interaction types
EU Interaction types
A2A Usee Government e-
services via the Internet
Enterprise
Citizens
-
In-house
applications
e-Government Portal
Government Agency
1 in MS2
A2C
A2B
A2A
Government
Agency 2inMS1
Government
Agency 1 inMS1
Three levels:
Three levels:
Information dissemination
Information dissemination
Data collection
Data collection
Data exchange
Data exchange
12. 12
67
Interoperability considerations
Interoperability considerations
1. Accessibility
2. Multilingualism
3. Security
• Different security levels for each interaction type.
4. Privacy
• Different privacy levels for different data type.
5. Subsidiarity
6. Use of Open Standards versus Propriety
software.
68
EU Interoperability framework
EU Interoperability framework
A2A (EU Inst. – MS)
A2A (EU Inst. – MS)
A2A (Member States)
A2A (Member States)
A2C / A2B
A2C / A2B
Member States Public
Administrations
Member States Public
Administrations
EU Institutions
EU Institutions
Others involved in the
delivery of public
Services
Others involved in the
delivery of public
Services
Security Services
Security Services
Accessibility
Accessibility
Data Presentation & exchange
Data Presentation & exchange
Data Integration & Middleware
Data Integration & Middleware
Interconnection Services
Interconnection Services
Technical Int.
Technical Int.
Data Models
Data Models
MetaData
MetaData
Semantic Int.
Semantic Int.
Organisational Int.
Organisational Int.
Business
episodes
Business
episodes
Life events
Life events
Other Documents
Other Documents
Framework
Framework
eEurope 2005 action plan
eEurope 2005 action plan
IDAbc
IDAbc
Accessibility
Accessibility
Open Source Software
Open Source Software
Open Standards
Open Standards
Security & Privacy
Security & Privacy
Subdidiarity
Subdidiarity
Political impulse
Addresses interactions
Target
Takes into account
Includes
Considered
in
European
Interoperability
Framework
European
Interoperability
Framework
Other
Other
Other
Other
Use
Citizens, Enterprises
benefit from
69
Thank you
Thank you
www.dataoptics.co.uk