The Internet and Development: a critical perspective

9780199589074_140I am delighted to see Bill Dutton’s magisterial edited The Oxford Handbook of Internet Studies (Oxford University Press, 2013) just published.  This is a really excellent and authoritative review of current research on all aspects of the Internet, with some 26 chapters from leading figures in the field.  The 607 page book is divided into five main parts:

  1. Perspectives on the Internet and Web as objects of study
  2. Living in a network society
  3. Creating and working in a global network economy
  4. Communication, power, and influence in a converging media world
  5. Governing and regulating the Internet.

Two of the real strengths of the book as an introduction to the field of Internet studies are the very readable style of most of the chapters, and the comprehensive bibliographies that accompany them.

I was delighted to have been asked to write the chapter on the Internet and Development, which Bill suggested should be sub-titled “a critical perspective”!  As I write in the summary, “This chapter explores research on the complex inter-relationship between the Internet and ‘development’, focusing especially on the effects of the Internet on the lives of some of the poorest people and most marginalised communities.  Much of the literature on Information and Communication Technologies for Development (ICT4D) suggests that the Internet can indeed bring very significant benefits in the ‘fight against poverty’ (see, for example, Weigel and Waldburger 2004; Rao and Raman 2009; Unwin 2009), but other research is marshalled in this synthesis to challenge this assumption.  In essence, I argue that the expansion of the Internet serves very specific capitalist interests, and that unless conscious and explicit attention is paid to designing interventions that will indeed directly serve the needs of the world’s poorest people, then the Internet will only replicate and reinforce existing structures of dominance and control. This argument supports the need for more research that challenges taken-for-granted assumptions about the Internet and development”.

In essence, the Internet is not some benign force for good as is so often supposed.  Instead it is being shaped and reshaped by a relatively small group of people with very specific interests.  It is absolutely essential that those committed to trying to ensure that digital technologies are used to serve the interests of all peoples in the world, and particularly the poorest and most marginalised, do indeed continue to challenge many of the all too often taken for granted assumptions that the Internet is necessarily automatically a force for positive “development”.

1 Comment

Filed under Development, ICT4D

Fieldfares in Virginia Water

Looking out into the back garden this morning, across the tracks of the Muntjac deer that crept in over the snow yesterday, I saw a small flock of fieldfare – beautiful birds from the same family as the much more common song thrush.  Sadly, they are on the Royal Society for the Protection of Birds’ (RSPB) Red List, indicating that they are of the highest conservation priority.  I have never seen them before where we live, and they seem to have been attracted by the hawthorn berries and rose hips in the hedge at the end of the garden.  As the RSPB says, fieldfares are “Best looked for in the countryside, along hedges and in fields. Hawthorn hedges with berries are a favourite feeding area”.

This slideshow requires JavaScript.

2 Comments

Filed under Photographs

Passwords, PIN numbers and cybersecurity

Ever since one of my websites was hacked a few months ago, I have taken a much more personal interest in issues of cybersecurity.  Whilst I have spoken and written many times on the subject, it is only when things really affect you in a personal way that you begin to gain different understandings of the issues.  It represents a shift from a theoretical understanding to a practical one!

I thought I knew most of the various recommendations concerning password and PIN security, and that I had indeed followed them.  However, no digital system is ever completely secure, and the level of sophistication now being used by those intent on stealing identity data, particularly with respect to banking information, is becoming very much more sophisticated.

There are many well known organisations providing advice and recommendations, such as Sophos, Symantec and Kaspersky Lab, but there are rather few places where all of this information is brought together in a single place.  The level of insecurity, and the apparent disinterest among vast numbers of people in doing much about their digital security is not only surprising, but is also deeply concerning.  So, in this posting, I have tried to bring together some of the more interesting observations that have recently been made about passwords and PIN numbers, in order to try to persuade people to take action on this really rather important topic!

Most popular PIN codes and iPhone passcodes
There are numerous articles on the most popular PIN codes – in other words the ones that no-one should actually use! One of the best is Daniel Amitay‘s experiment, where he used Big Brother’s passcode set up screen as a surrogate to estimate iPhone passcode usage, and discovered that the top ten codes listed below represented 15% of all passcodes used:

  1. 1234
  2. 0000
  3. 2580
  4. 1111
  5. 5555
  6. 5683
  7. 0852
  8. 2222
  9. 1212
  10. 1998

None of these are surprising, given that they represent easily remembered structures around the keypad. The passcode 1998 features because it is a year of birth and as Amitay goes on to point out other birth years also feature highly among passwords.

What is perhaps even more worrying is that research by Sophos in 2011 suggested that 67% of consumers do not even use any passcode on their ‘phones, so that a passer-by can access all of the information on the ‘phone without even having to bother to hack the code.

Four digit codes are also commonly used by banks to enable customers to access money through cashpoint machines (ATMs).  Research summarised by Chris Taylor (on Mashable) notes that 27% of people use one of the top 20 PINs for their banking, with the most popular number (1234) being used by a massive 11%.  The top 20 PIN codes he lists are as follows:

  1. 1234 (10.7%)
  2. 1111 (6.0%)
  3. 0000 (1.9%)
  4. 1212 (1.2%)
  5. 7777 (0.7%)
  6. 1004 (0.6%)
  7. 2000 (0.6%)
  8. 4444 (0.5%)
  9. 2222 (0.5%)
  10. 6969 (0.5%)
  11. 9999 (o.5%)
  12. 3333 (0.4%)
  13. 5555 (0.4%)
  14. 6666 (0.4%)
  15. 1122 (0.4%)
  16. 1313 (0.3%)
  17. 8888 (0.3%)
  18. 4321 (0.3%)
  19. 2001 (0.3%)
  20. 1010 (0.3%)

Chris Taylor goes on to comment that although there are 10,000 possible combinations of four digits, 50% of people use the most popular 426 codes!  As he says, “Pick up an ATM card on the street, and you have a 1 in 5 chance of unlocking its cash by entering just five PINs. That’s the kind of Russian Roulette that’s going to be attractive to any casual thief”.

There is therefore  really quite a high probability that even without watching someone enter their PIN number and then stealing the card, or using sophisticated technology to ‘crack’ someone’s PIN code, criminals would have a pretty good chance of accessing someone’s bank account just by using the most popular codes above.  The implication for users is clear: use a PIN code that is not among the most common!

Passwords
The situation is scarcely better with passwords that people use for their online digital activities. Numerous surveys have all pointed to the same conclusion, that a very small number of passwords continue to be used by large numbers of people.  These change a bit over time, and vary depending on cultural context and country, but the message is clear.  Even without sophisticated programmes to crack passwords, those wishing to access personal information can achieve remarkable success just by trying to use the most common passwords!  The most common passwords, in other words those to be avoided, are listed below:

Splashdata 2012

Sophos Naked Security 2010, based on leaked Gawker Media passwords

1

password

123456

2

123456

Password

3

12345678

12345678

4

abc123

lifehack

5

qwerty

qwerty

6

monkey

abc123

7

letmein

111111

8

dragon

monkey

9

111111

consumer

10

baseball

12345

11

iloveyou

0

12

trustno1

letmein

13

1234567

trustno1

14

sunshine

Dragon

15

master

1234567

16

123123

baseball

17

welcome

superman

18

shadow

iloveyou

19

ashley

gizmodo

20

football

sunshine

21

jesus

1234

22

michael

princess

23

ninja

starwars

24

mustang

whatever

25

password1

shadow

A slightly more sophisticated approach is that adopted by those wishing to break into networks by testing them automatically against a much larger number of different passwords.  One of the best publicised accounts of this was the Conficker worm, which used the passwords in the chart below to try to access accounts (Sophos, 2009):

Worm

Again, this clearly indicates that considerable care needs to be taken in choosing passwords, and ensuring that they are at the very least more complex than those listed above.

Tips to reduce the risk of fraud through mobile devices and digital technologies
Much has been written about sensible advice for reducing the risk of fraud through mobile passcodes, banking PINs and online login passwords.  Such tips will never eliminate really determined people from hacking into your identity, but a few simple steps can at least make it more difficult for the less determined.  These include:

  • Always secure your ‘phone with a PIN code, or better still a password (iPhone users can do this simply in Settings>General>Passcode Lock).  This will help to prevent all of your contacts, photos, e-mails and other personal information being accessed immediately by anyone who picks up your ‘phone.
  • Reduce the time before your ‘phone automatically locks so that it is as short as possible, preferably no more than a minute
  • Always use complex passwords, that preferably include lower case and upper case letters, numbers and special characters
  • Use passwords that are at least 8 characters and preferably more than 12 characters in length
  • Frequently change your passwords at random intervals, so that possible hackers are unaware when to expect changes
  • Use different passwords for different accounts, so that if one password is ‘broken’ this will not permit access to your other accounts
  • Think about using a service that tests the strength of a proposed password (such as The Password Meter, Microsoft’s password checker, or Rumkin’s strength test) – for the hyper-security-conscious person, it is probably best to do this from a computer other than your own!
  • Never, under any circumstances give your passwords or PIN codes to other people

Ultimately, passwords and PIN numbers are just part of a wider defence needed against digital theft.  Human action, be it using the ‘phone in an unsafe public place or unfortunately responding to a phishing attack, is still the cause of much digital grief.  As I write, Sophos has just for example reported a phishing attack through a security breach on the Ethiopian Red Cross Society’s website purporting to be a Google Docs login page.

If the worst happens, and you do lose a ‘phone there are at least two important things to do:

  • Ensure you have software on the ‘phone that can enable you to track it (as with the Find My iPhone app, or for Android ‘phones there are apps such as Sophos’ Mobile Security app)
  • If there is no chance of getting the ‘phone back, then remotely delete all of its content as swiftly as possible, remembering that if it has been backed up on a laptop or cloud facility, then all of the data can be restored at a later date.

Working together, and sharing good practices in personal digital security we can do much to help reduce digital identity theft.

3 Comments

Filed under 'phones, ICT4D general

New Year’s orchid

Amazingly, I managed to get one of my Cymbidium orchids into flower on New Year’s Day – first time ever!  Definitely pure chance rather than skill, but a great way of welcoming 2013!  A gift from ‘nature’ to my blog – they really are beautiful plants…

Orchid-small

Leave a comment

Filed under Photographs

On critical thinking…

thinker smallI overheard a strange and depressing conversation about critical thinking at last month’s otherwise excellent Online Educa conference in Berlin. Ever since then it has been nagging away at my mind.  So many of those involved in the conversation seemed to have a conceptualisation of critical thinking that is so totally at odds with my own!  For many of them, critical thinking seemed to be something destructive, a form of negative criticism of the works of others. Critical thinking, in their views, was all too often damaging, destroying the confidence of young academics, and a means through which supervisors impose and re-enforce power relations over their doctoral students.  This is so alarmingly different from my own perspective, that I feel I should share some of my thoughts here, not only to contribute to the debate, but also so that others may perhaps gain some insight into alternative views of critical thinking.  Here, then, are my list of the ten most important aspects of critical thinking.

  1. First, critical thinking is something hugely positive. It should be very far from the negative caricature summarised above.
  2. It is a way of creating new knowledges, rather than simply encouraging the regurgitation of accepted truths.  All too often, universities across the world today focus on teaching students accepted truths that they then learn and regurgitate in examinations, rather than liberating them to think for themselves.
  3. Critical thinking is therefore hugely creative, a way of encouraging people to craft new ideas that will hopefully better explain, or help us to understand, the world in which we live.
  4. It is fundamentally concerned with questioning and challenging accepted norms and arguments, weighing them up both through the power of reason and logic, but also through empirical experience to see which, for the moment, can continue to be accepted as approximations to some truth.
  5. My notions of critical thinking derive heavily from my engagement with the Critical Theory of the Frankfurt School, and especially the writings of Jürgen Habermas (notably Theorie und Praxis. Sozialphilosophische Studien, Neuwied, 1963, and Erkenntnis und Interesse. Suhrkamp, Frankfurt am Main, 1968).  In particular, for me, Critical Theory provides two important underpinnings for critical thinking: its emphasis on the interests behind all knowledges, and its focus on emancipation.
    • There is no such thing as value free science.  All science or knowledge, is created by individuals, or groups of sentient people, for particular purposes.  We must therefore understand these interests, and indeed our own interests, if we are to reach agreement on the extent to which such ideas can be accepted as accounting for any particular observations of reality.  Critical thinking is in part about understanding the interests underlying any claim to knowledge.
    • The ultimate purpose of critical thinking is about emancipation, both for the individual thinker, but also perhaps more importantly for the wider community of which that thinker is a part.
  6. Critical thinking is self-reflective, requiring a conscious consideration of how and why a particular set of thoughts comes into being.  In this sense, it is an ancient tradition, going back at least to Socrates, but being developed by scholars such as Dewey (Moral Principles in Education, SIU Press, 1909), and more recently Glaser (An Experiment in the Development of Critical Thinking, Columbia University, 1941) and Ennis (Critical Thinking, Prentice Hall, 1996).
  7. Critical thinking is committed to action. This, again, derives in part from my own commitment to Critical Theory, but it emphasises that thinkers must also be actors.  Unless knowledge is shared, in a sense liberated from the confines of the thinker’s own body, then its creation is a purely selfish, indeed arrogant process.  If society permits some of its members to be set apart for thinking (most usually in universities), then it is incumbent on those thinkers to ensure that the outputs of their thinking are indeed used for the betterment of society.
  8. Critical thinking involves serendipitous rigour (about which I have written elsewhere).  We need both to be rigorous in ensuring that we create places for serendipity, and likewise be rigorous in how we respond to serendipitous occurrences.  Serendipity is essential to the creative aspect of critical thinking.
  9. Critical thinking requires clarity of method.  I do not want to be prescriptive in defining any single particular set of methods, not least because many such lists already exist (Glaser, 1941; Fisher, Critical Thinking: An Introduction, CUP, 2001), but most of these focus on the importance of reason, logic, judgement, argument, inference and analysis.
  10. Finally, for me critical thinking is fundamentally about those who are privileged enough to be thinkers, using their thinking skills to enhance society and not just selfishly for themselves; it is, in particular, to use such thinking to help and enable the poorest and most marginalised individuals to improve their lives.  This is not just about action (point 7 above), but about action committed to a particular social and political cause.

There are, of course, many other aspects of critical thinking, but reflecting on that conversation in Berlin, these seem to me to be the most pertinent responses. Let me conclude, though, with a quotation from Herman Hesse’s Steppenwolf (Penguin, 1966, p.21), “‘Most men will not swim before they are able to.’ Is that not witty? Naturally, they won’t swim! They are born for the solid earth, not for the water. And naturally they wont think. They are made for life, not for thought. Yes, and he who thinks, what’s more, he who makes thought his business, he may go far in it, but he has bartered the solid earth for the water all the same, and one day he will drown”.  I used this years ago as the introduction to one of my chapters in The Place of Geography and it still seems as pertinent now as it did then!

6 Comments

Filed under Geography, Higher Education, Postgraduate supervision, Universities

The Sun in Constable country

A few days holiday earlier this month provided us with an opportunity to explore a corner of England that we do not know very well, namely the Essex-Suffolk border.   My ancestors between the 17th and 19th centuries lived not that far away in Coggeshall and Castle Hedingham, but we have never spent much time in this part of the country.

We chose to explore the Stour Valley and by great good fortune stayed at the Sun Inn at Dedham – what a find!  Dedham itself is a picturesque small village on the Stour, with its fine church dating from the 15th century indicating its past affluence as a wool and market town.  The village still retains a communal atmosphere, with the church having standing room only for its annual carol service, and it is the only place I know where the chemist and post office are in one and the same shop!  For those not wanting to be contacted, some parts of the village also fortunately still remain beyond the access of mobile connectivity!

The Sun is a wonderful, hidden away place to stay.  The young staff are efficienSunt and friendly, without being either intrusive or obsequious.  The rooms are each individually designed, with  pocket sprung mattress, Egyptian cotton bed linen, goose down pillows and duvets; luxury body products are sourced from Abahna.

The food is locally sourced and delicious, reflecting mainly an Italian style.  We particularly enjoyed the five course taster menu, but all of the food was well balanced, tasty, and very nicely presented. Highlights included the duck, saffron pears, pasta dishes and hake. The wine list, too, is unusually impressive both in its content and its value for money!  A particular feature is its “desert island cellared wine”, made up of wines purchased by the owners at bin end sales with just a charge of £15 added.  So, a 2001 Barolo Vigna Conca, Revello, costs just £54, the same as a 2007 Puligny-Montrachet 1er Cru Les Champs-Gain, Maroslavac-Leger!

This slideshow requires JavaScript.

 

Dedham is perhaps best known for being the place where the artist John Constable went to school.  It was a strange experience to walk in his footsteps along the valley and across the Stour up to where his home was in the nearby village of East Bergholt.  His father was a corn merchant who also owned the nearby Flatford Mill, and the local buildings and landscapes provided the inspiration for many of his famous paintings such as The Hay Wain (1821) and Dedham Vale (1802).  Walking along the river bank on a cold frosty December morning was very evocative of England past, and made a wonderful escape from the “business” and turmoil of London, less than 70 miles away!

The Sun Inn and Dedham are most definitely to be recommended by anyone wishing to discover a beautiful hidden away part of England, and enjoy English food (with a touch of Mediterranean influence!) and hospitality at its best.

Thanks to everyone at the Sun who made our stay so enjoyable and relaxing!

Leave a comment

Filed under Photographs, UK

Commonwealth Telecommunications Organisation – vacancy for Head of Operations Department

The Commonwealth Telecommunications Organisation (CTO) is seeking to appoint a new Head of its Operations Department, managing the delivery of its three operations divisions (research and consultancy, capacity development and training, and events and conferences).  This exciting opportunity would suit applicants from diverse backgrounds, including the private sector and the international development community.  The appointment will be at Director level with a starting salary in the range £60,000-£66,150. Closing Date 15th February 2013.

The successful applicant will

  • Manage the CTO’s Operations Department, consisting of three divisions, with heads of these divisions being direct reports:
    • Research and Consultancy
    • Capacity Development and Training
    • Events and Conferences
  • Develop the Operations Department’s activities in line with the CTO’s Strategic Plan, so as to deliver effective, value for money services for the CTO’s members and others
  • Ensure that the Operations Department delivers on its financial targets
  • Contribute to the activities of the Operations Department in areas of own expertise.
  • Be responsible for oversight and development of one or two of the CTO’s six niche focus areas
  • Be responsible for oversight and development of the CTO’s activities in one or two regions of the Commonwealth.
  • Provide support and report directly to the Secretary General of the CTO
  • Liaise closely with the Head of the Finance and Administration Department and the Head of Corporate Services to ensure effective collaboration between Departments in delivering the CTO’s mission.

The successful applicant will have the following proven experiences and characteristics:

Essential

  • Excellent timely delivery against business targets
  • At least ten years of management experience within the broad field of ICTs, preferably with a development focus
  • Successful management of small teams charged with delivering ambitious financial targets
  • Strong sense of the need for accuracy and precision in delivery
  • Ability to set high individual and team standards
  • At least ten years direct experience of two or more of the areas of activity of the CTO’s operational divisions
  • An excellent team player, committed to helping staff build their careers within an organisation
  • Excellent international networking skills across different groups of stakeholders in ICT for Development

Desirable

  • Strong affinity with delivering ICT based activities through multi-stakeholder partnerships
  • Good knowledge of Commonwealth organisations and agendas
  • Experience of working in a multi-cultural environment and preferably in two or more regions of the Commonwealth (Africa, Asia, Caribbean, Europe, Pacific)
  • Fluency in the English language, as well as working knowledge of at least one other language.

Application procedure

The CTO is committed to providing a challenging and stimulating workplace, where all staff can fulfil their career ambitions in a diverse and supportive environment. It places considerable emphasis on the importance of teamwork, alongside its commitment to delivering the best possible value for money services to all of its members. People work for the CTO primarily because they believe in its commitment to using ICTs to help make a difference to the lives of some of the poorest and most marginalised people in the Commonwealth.  All employees must be citizens of Full Member Countries of the CTO at the time of employment.

All applications, including a curriculum vitae and a letter of application should be submitted to recruitment@cto.int by 15th February 2013.

Full details are available at http://www.cto.int/about-the-cto/working-with-us/current-vacancies/director-and-head-of-operations-department-full-time/

Leave a comment

Filed under ICT4D

2013 Commonwealth Essay Competition

The 2013 Commonwealth Essay Competition has just been launched. Run by the Royal Commonwealth Society (RCS) since 1883, the Commonwealth Essay Competition is the world’s oldest and largest schools’ international writing competition. Past winners include Mr Lee Hsien Loong, the Prime Minister of Singapore and Elspeth Huxley.

The competition is free to enter and in 2012 over 8,000 young people, from 400 schools across the Commonwealth took part. The RCS would like to harness the momentum from this Diamond Jubilee year and continue to expand the Essay Competition in 2013.

The theme for 2013 is Opportunity through Enterprise, for more details and to download the 2013 booklet do check out the RCS website.

2 Comments

Filed under Uncategorized

Mike Trucano’s ten worst practices in e-learning

I have always admired Mike Trucano‘s work, and so it was great to hear him speaking this morning at Online Educa Berlin.  His theme was understanding failures in e-learning, especially in the countries where the World Bank is working.

This was his list of the ten worst practices in e-learning:

  1. Dump hardware in schools, hope for magic to happen
  2. Design for OECD learning environments, implement elsewhere
  3. Think about educational content only after you have rolled out your hardware
  4. Assume you can just import content from someone else
  5. Don’t monitor, don’t evaluate
  6. Make a big bet on an unproven technology (especially one based on a closed/proprietary standard) or single vendor, don’t plan for how to avoid ‘lock in’
  7. Don’t think about or acknowledge total costs of ownership/operation issues or calculations
  8. Assume away equity issues
  9. Don’t train your teachers (nor your school headmasters, for that matter)
  10. ….for your own worst practice

The really sad thing is that all of these known worst practices continue to be replicated across the world.  Hopefully, more people will listen to Mike, and then we can develop much better ways through which technology can really be used effectively to enhance learning!

8 Comments

Filed under Education, ICT4D

New GSMA publication on how mobiles contribute to economic growth

The GSM Association, together with Deloitte and Cisco have recently published a useful report (.pdf 3.4 MB) on the contribution of mobiles to economic growth, and they intend to run their analysis on an annual basis so as to provide a barometer of change in the industry and its impact.

Some of the key findings of the report include:

  • For a given level of total mobile penetration, a 10% substitution from 2G to 3G penetration increases GDP per capita growth by 0.15% points
  • A doubling of mobile data use leads to an increase in the GDP per capita growth rate of 0.5% points
  • A 10% increase in mobile penetration increases Total Factor Productivity in the long run by 4.2% points

The Appendices provide much more detail about the precise econometric models used, and it is good to see such detail and transparency.  I retain some concerns, though, about the ways in which causality is imputed from what are essentially relationships between economic indicators.  This could be the basis of an interesting dialogue about methodologies for undertaking such research, which I guess would depend heavily on ideological premises!  However, using this as a starting point, it would be interesting to drill down in more detail to ask what factors need to be in place for the economies of particular countries to follow the general observations noted.  From my perspective, we need to learn more about what some of the poorest countries and peoples can do to ensure that they too benefit.  In other words, we need to disaggregate the data, and understand in detail about the wider governance structures, infrastructure and social conditions that need to be in place to enable growth.  That is, of course, if economic growth is of prime concern!

2 Comments

Filed under 'phones, ICT4D