首页 > 最新文献

The African Journal of Information and Communication最新文献

英文 中文
Innovation Practices at Makerspaces in Egypt, Tunisia and Morocco 埃及、突尼斯和摩洛哥创客空间的创新实践
Pub Date : 2020-12-15 DOI: 10.23962/10539/30357
Nagham ElHoussamy, Nagla Rizk
This article sets out findings from research exploring approaches to innovation at makerspaces in Egypt, Tunisia, and Morocco. Based on interviews with individuals involved in makerspaces in each country—seven spaces in Egypt, two in Tunisia, and one in Morocco—we provide findings on the origins and general characteristics of the spaces, as well as findings on five core themes that emerged from the interviews: knowledge-sharing; innovation and product development; openness, collaboration, and innovation ownership; attitudes towards intellectual property (IP); and scaling.
这篇文章阐述了埃及、突尼斯和摩洛哥在探索制造商空间创新方法方面的研究结果。基于对每个国家(埃及有七个空间,突尼斯有两个,摩洛哥有一个)参与创客空间的个人的采访,我们提供了关于创客空间起源和一般特征的调查结果,以及采访中出现的五个核心主题的调查结果:知识共享;创新和产品开发;开放、协作和自主创新;对知识产权的态度;和缩放。
{"title":"Innovation Practices at Makerspaces in Egypt, Tunisia and Morocco","authors":"Nagham ElHoussamy, Nagla Rizk","doi":"10.23962/10539/30357","DOIUrl":"https://doi.org/10.23962/10539/30357","url":null,"abstract":"This article sets out findings from research exploring approaches to innovation at makerspaces in Egypt, Tunisia, and Morocco. Based on interviews with individuals involved in makerspaces in each country—seven spaces in Egypt, two in Tunisia, and one in Morocco—we provide findings on the origins and general characteristics of the spaces, as well as findings on five core themes that emerged from the interviews: knowledge-sharing; innovation and product development; openness, collaboration, and innovation ownership; attitudes towards intellectual property (IP); and scaling.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42982385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Indigenous Peoples, Data Sovereignty, and Self-Determination: Current Realities and Imperatives 土著人民、数据主权和自决:当前现实和当务之急
Pub Date : 2020-12-15 DOI: 10.23962/10539/30360
Chidi Oguamanam
Abstract This study explores the current state and dynamics of the global Indigenous data sovereignty movement—the movement pressing for Indigenous peoples to have full control over the collection and governance of data relating to their lived realities. The article outlines the movement’s place within the broader push for Indigenous self-determination; examines its links to big data, open data, intellectual property rights, and access and benefit-sharing; details a pioneering assertion of data sovereignty by Canada’s First Nations; outlines relevant UN and international civil society processes; and examines the nascent movement in Africa. The study identifies a fundamental tension between the objectives of Indigenous data sovereignty and those of the open data movement, which does not directly cater for Indigenous peoples’ full control over their data. The study also identifies the need for African Indigenous peoples to become more fully integrated into the global Indigenous data sovereignty movement.
摘要:本研究探讨了全球土著数据主权运动的现状和动态,该运动敦促土著人民完全控制与他们生活现实有关的数据的收集和治理。文章概述了该运动在推动土著民族自决的更广泛运动中的地位;考察其与大数据、开放数据、知识产权、获取和利益分享的联系;详细介绍了加拿大第一民族对数据主权的开创性主张;概述联合国和国际民间社会的相关进程;并考察了非洲的新生运动。该研究确定了土著数据主权目标与开放数据运动目标之间的根本紧张关系,开放数据运动并不直接满足土著人民对其数据的完全控制。该研究还确定了非洲土著人民更充分地融入全球土著数据主权运动的必要性。
{"title":"Indigenous Peoples, Data Sovereignty, and Self-Determination: Current Realities and Imperatives","authors":"Chidi Oguamanam","doi":"10.23962/10539/30360","DOIUrl":"https://doi.org/10.23962/10539/30360","url":null,"abstract":"Abstract This study explores the current state and dynamics of the global Indigenous data sovereignty movement—the movement pressing for Indigenous peoples to have full control over the collection and governance of data relating to their lived realities. The article outlines the movement’s place within the broader push for Indigenous self-determination; examines its links to big data, open data, intellectual property rights, and access and benefit-sharing; details a pioneering assertion of data sovereignty by Canada’s First Nations; outlines relevant UN and international civil society processes; and examines the nascent movement in Africa. The study identifies a fundamental tension between the objectives of Indigenous data sovereignty and those of the open data movement, which does not directly cater for Indigenous peoples’ full control over their data. The study also identifies the need for African Indigenous peoples to become more fully integrated into the global Indigenous data sovereignty movement.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48206503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Assessing the Social Media Maturity of a Community Radio Station: The Case of Rhodes Music Radio in South Africa 评估社区广播电台的社会媒体成熟度:以南非罗德音乐电台为例
Pub Date : 2019-12-06 DOI: 10.23962/10539/28661
Mudiwa A. Gavaza, N. Pearse
Social media has become a major factor within the operations and functions of radio stations. This study used a social media maturity model (SMMM), developed from available literature, to assess the social media maturity of a South Africa community radio station, Rhodes Music Radio (RMR). The study found that RMR had a level 3 rating on a 5-level maturity scale, indicating that it was quite, but not yet fully, mature in its social media use. In addition to outlining the research and its findings, this article makes recommendations for how the station could increase the maturity of its social media use.
社交媒体已成为电台运营和职能的一个主要因素。本研究使用根据现有文献开发的社交媒体成熟度模型(SMMM)来评估南非社区广播电台罗兹音乐电台(RMR)的社交媒体的成熟度。研究发现,RMR在5级成熟度量表中的评分为3级,这表明它在社交媒体使用方面相当成熟,但尚未完全成熟。除了概述这项研究及其发现外,本文还就电视台如何提高其社交媒体使用的成熟度提出了建议。
{"title":"Assessing the Social Media Maturity of a Community Radio Station: The Case of Rhodes Music Radio in South Africa","authors":"Mudiwa A. Gavaza, N. Pearse","doi":"10.23962/10539/28661","DOIUrl":"https://doi.org/10.23962/10539/28661","url":null,"abstract":"Social media has become a major factor within the operations and functions of radio stations. This study used a social media maturity model (SMMM), developed from available literature, to assess the social media maturity of a South Africa community radio station, Rhodes Music Radio (RMR). The study found that RMR had a level 3 rating on a 5-level maturity scale, indicating that it was quite, but not yet fully, mature in its social media use. In addition to outlining the research and its findings, this article makes recommendations for how the station could increase the maturity of its social media use.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49154322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposed “Agricultural Data Commons” in Support of Food Security 支持粮食安全的拟议“农业数据共享”
Pub Date : 2019-06-28 DOI: 10.23962/10539/27534
J. Baarbé, M. Blom, J. de Beer
This article identifies a data governance model that could help reduce dataset access inequities currently experienced by smallholder farmers in both developed-world and developing-world settings. Agricultural data is globally recognised for its importance in addressing food insecurity, with such data generated and used by a value chain of contributors, collectors, and users. Guided by the modified institutional analysis and development (IAD) framework, our study considered the features of agricultural data as a “knowledge commons” resource. The study also looked at existing data collection modalities practiced by John Deere, Plantwise and Abalobi, and at the open data distribution modalities available under the Creative Commons and the Open Data Commons licensing frameworks. The study found that an “agricultural data commons” model could give greater agency to the smallholder farmers who contribute data. A model open data licence could be used by data collectors, supported by a certification mark and a dedicated public interest organisation. These features could engender an agricultural data commons that would be advantageous to the three key stakeholders in agricultural data: data contributors, who need engagement, privacy, control, and benefit-sharing; small and medium-sized-enterprise (SME) data collectors, who need sophisticated legal tools and an ability to brand their participation in opening data; and data users, who need open access.
本文确定了一种数据治理模型,可以帮助减少目前发达国家和发展中国家小农所经历的数据集访问不平等。农业数据在解决粮食不安全问题方面的重要性得到全球认可,这类数据由一个价值链的贡献者、收集者和用户生成和使用。在改进的制度分析与发展(IAD)框架的指导下,我们的研究考虑了农业数据作为“知识共享”资源的特征。该研究还考察了John Deere、Plantwise和Abalobi所采用的现有数据收集模式,以及在知识共享和开放数据共享许可框架下可用的开放数据分发模式。该研究发现,“农业数据共享”模式可以赋予提供数据的小农更大的权力。数据收集者可以使用模型开放数据许可,并由认证标志和专门的公共利益组织提供支持。这些特征可以产生一种农业数据共享,这将有利于农业数据的三个关键利益相关者:数据贡献者,他们需要参与、隐私、控制和利益分享;中小型企业(SME)数据收集者,他们需要复杂的法律工具,并有能力将自己参与开放数据的活动打上品牌;以及需要开放访问的数据用户。
{"title":"A Proposed “Agricultural Data Commons” in Support of Food Security","authors":"J. Baarbé, M. Blom, J. de Beer","doi":"10.23962/10539/27534","DOIUrl":"https://doi.org/10.23962/10539/27534","url":null,"abstract":"This article identifies a data governance model that could help reduce dataset access inequities currently experienced by smallholder farmers in both developed-world and developing-world settings. Agricultural data is globally recognised for its importance in addressing food insecurity, with such data generated and used by a value chain of contributors, collectors, and users. Guided by the modified institutional analysis and development (IAD) framework, our study considered the features of agricultural data as a “knowledge commons” resource. The study also looked at existing data collection modalities practiced by John Deere, Plantwise and Abalobi, and at the open data distribution modalities available under the Creative Commons and the Open Data Commons licensing frameworks. The study found that an “agricultural data commons” model could give greater agency to the smallholder farmers who contribute data. A model open data licence could be used by data collectors, supported by a certification mark and a dedicated public interest organisation. These features could engender an agricultural data commons that would be advantageous to the three key stakeholders in agricultural data: data contributors, who need engagement, privacy, control, and benefit-sharing; small and medium-sized-enterprise (SME) data collectors, who need sophisticated legal tools and an ability to brand their participation in opening data; and data users, who need open access.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42688390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Asymmetry in South Africa’s Regulation of Customer Data Protection: Unequal Treatment between Mobile Network Operators (MNOs) and Over-the-Top (OTT) Service Providers 南非对客户数据保护监管的不对称:移动网络运营商(MNOs)和OTT服务提供商之间的不平等待遇
Pub Date : 2019-06-28 DOI: 10.23962/10539/27536
Stanley Shanapinda
This article examines the asymmetry that currently exists in South Africa in the regulatory treatment of customer data usage by mobile network operators (MNOs) and over-the-top (OTT) service providers. MNOs and OTTs must receive customer “consent”, in terms of the Protection of Personal Information Act (POPI Act) and its Regulations, before sharing the customer’s “personal information” with a third party. But MNOs have an additional requirement to meet, in terms of the Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA), which is not applicable to OTTs: a requirement whereby a customer must provide “written authorisation” to an MNO before the MNO can share “communication-related information which relates to the customer con cerned” with a third party. In this article, I examine and analyse provisions of the POPI Act, POPI Act Regulations, RICA, other relevant legislation, court decisions, records of a Parliamentary hearing, the standard terms and conditions and privacy policies of two South African MNOs (Vodacom and MTN), and two international OTT service providers (Google and Facebook). Based on the analysis, I argue that the unequal regulatory treatment between the MNOs and OTTs, if allowed to persist, threatens to undermine the growth of key elements of South Africa’s digital economy.
本文考察了南非目前在移动网络运营商(MNOs)和OTT服务提供商对客户数据使用的监管处理中存在的不对称性。在与第三方共享客户的“个人信息”之前,根据个人信息保护法(POPI法案)及其法规,mno和ott必须获得客户的“同意”。但是,根据《通信拦截和提供通信相关信息法案》(RICA)的规定,移动网络运营商还有一个额外的要求需要满足,这一要求不适用于ott:客户必须向移动网络运营商提供“书面授权”,移动网络运营商才能与第三方共享“与客户有关的通信相关信息”。在本文中,我研究和分析了POPI法案的规定,POPI法案条例,RICA,其他相关立法,法院判决,议会听证会记录,两个南非移动运营商(Vodacom和MTN)的标准条款和条件以及隐私政策,以及两个国际OTT服务提供商(b谷歌和Facebook)。基于分析,我认为mno和ott之间的不平等监管待遇,如果允许持续下去,可能会破坏南非数字经济关键要素的增长。
{"title":"Asymmetry in South Africa’s Regulation of Customer Data Protection: Unequal Treatment between Mobile Network Operators (MNOs) and Over-the-Top (OTT) Service Providers","authors":"Stanley Shanapinda","doi":"10.23962/10539/27536","DOIUrl":"https://doi.org/10.23962/10539/27536","url":null,"abstract":"This article examines the asymmetry that currently exists in South Africa in the regulatory treatment of customer data usage by mobile network operators (MNOs) and over-the-top (OTT) service providers. MNOs and OTTs must receive customer “consent”, in terms of the Protection of Personal Information Act (POPI Act) and its Regulations, before sharing the customer’s “personal information” with a third party. But MNOs have an additional requirement to meet, in terms of the Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA), which is not applicable to OTTs: a requirement whereby a customer must provide “written authorisation” to an MNO before the MNO can share “communication-related information which relates to the customer con cerned” with a third party. In this article, I examine and analyse provisions of the POPI Act, POPI Act Regulations, RICA, other relevant legislation, court decisions, records of a Parliamentary hearing, the standard terms and conditions and privacy policies of two South African MNOs (Vodacom and MTN), and two international OTT service providers (Google and Facebook). Based on the analysis, I argue that the unequal regulatory treatment between the MNOs and OTTs, if allowed to persist, threatens to undermine the growth of key elements of South Africa’s digital economy.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42152274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Treatment of Kenya’s Internet Service Providers (ISPs) under the Kenya Copyright (Amendment) Bill, 2017 2017年《肯尼亚版权(修正案)法案》对肯尼亚互联网服务提供商(isp)的待遇
Pub Date : 2019-06-28 DOI: 10.23962/10539/27532
J. Walubengo, Mercy Mutemi
Kenya’s Copyright (Amendment) Bill, 2017, is nearing its final stage of consideration by Parliament. In this article, we provide a review of the Bill’s provisions in respect of its treatment of internet intermediaries, specifically internet service providers (ISPs). We seek to establish the impact that the intermediary liability provisions in the Bill could have on ISPs’ operations if the Bill is passed into law in its present form. We applaud the Bill’s provision for a “safe harbours” regime, whereby ISPs would incur no liability, or limited liability, for certain specific intermediary actions. However, we also note that the framing of the Bill’s notice-and-takedown provisions would require quasi-judicial skills on the part of ISPs, which may not be appropriate. We conclude by providing recommendations for how legislators could address the weaknesses in the Bill’s treatment of ISPs.
肯尼亚2017年版权(修正案)法案即将进入议会审议的最后阶段。在本文中,我们将检讨条例草案中有关处理互联网中介人(特别是互联网服务供应商)的条文。我们力求确定如果条例草案以目前的形式通过成为法律,条例草案中的中介人责任条文对互联网服务供应商的运作可能产生的影响。我们欢迎条例草案订明“安全港”制度,让互联网服务供应商无须为某些特定的中介人行为负上法律责任,或负上有限法律责任。然而,我们也注意到,该法案的通知和删除条款的框架将需要互联网服务提供商方面的准司法技能,这可能不合适。最后,我们就立法者如何解决法案中对待互联网服务提供商的弱点提出建议。
{"title":"Treatment of Kenya’s Internet Service Providers (ISPs) under the Kenya Copyright (Amendment) Bill, 2017","authors":"J. Walubengo, Mercy Mutemi","doi":"10.23962/10539/27532","DOIUrl":"https://doi.org/10.23962/10539/27532","url":null,"abstract":"Kenya’s Copyright (Amendment) Bill, 2017, is nearing its final stage of consideration by Parliament. In this article, we provide a review of the Bill’s provisions in respect of its treatment of internet intermediaries, specifically internet service providers (ISPs). We seek to establish the impact that the intermediary liability provisions in the Bill could have on ISPs’ operations if the Bill is passed into law in its present form. We applaud the Bill’s provision for a “safe harbours” regime, whereby ISPs would incur no liability, or limited liability, for certain specific intermediary actions. However, we also note that the framing of the Bill’s notice-and-takedown provisions would require quasi-judicial skills on the part of ISPs, which may not be appropriate. We conclude by providing recommendations for how legislators could address the weaknesses in the Bill’s treatment of ISPs.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48581688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Book Review: Telecommunications Law and Regulation in Nigeria 书评:尼日利亚的电信法律和法规
Pub Date : 2019-06-28 DOI: 10.23962/10539/27530
P. Obutte
{"title":"Book Review: Telecommunications Law and Regulation in Nigeria","authors":"P. Obutte","doi":"10.23962/10539/27530","DOIUrl":"https://doi.org/10.23962/10539/27530","url":null,"abstract":"","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41451274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Tiered or Differentiated Approach to Protection of Traditional Knowledge (TK) and Traditional Cultural Expressions (TCEs) in Relation to the Intellectual Property System 在知识产权制度下对传统知识和传统文化表现形式采取分层或差异化的保护方法
Pub Date : 2019-06-28 DOI: 10.2139/ssrn.3412293
Chidi Oguamanam
The World Intellectual Property Organisation (WIPO) has, for nearly two decades, engaged in formulating the nature and content of a text-based legal instrument or instruments for the effective protection of genetic resources (GRs), traditional knowledge (TK), and traditional cultural expressions (TCEs, also known as folklore) within or relating to the international intellectual property (IP) system. This task has been the job of WIPO’s Intergovernmental Committee on Intellectual Property and Genetic Resources, Traditional Knowledge and Folklore (IGC), established in 2000. In this article, I explore the context and rationales for, and evolution of, one of the IGC’s evolving contributions: development of a tiered or differentiated approach to the protection of TK and TCEs. The article discusses and analyses the empirical ramifications and challenges of the tiered approach — alternatively referred to as differentiated approach — with reference to examples of forms of TK and TCE in Africa, North America and Australia. I conclude that the approach is a work in progress, still evolving, which provides a useful broad policy framework at the international level while, at the same time, its details are contingent on many considerations better addressed at national and local levels.
近二十年来,世界知识产权组织(WIPO)一直致力于制定一项或多项基于文本的法律文书的性质和内容,以便在国际知识产权(IP)体系内或与之相关的范围内有效保护遗传资源(gr)、传统知识(TK)和传统文化表现形式(tce,也称为民间传说)。这项任务一直是WIPO于2000年成立的知识产权与遗传资源、传统知识和民间文学文学政府间委员会(IGC)的工作。在本文中,我将探讨政府间委员会不断发展的贡献之一的背景、理由和演变:制定一种分层或差异化的方法来保护传统文化和传统文化。本文以非洲、北美和澳大利亚的传统知识和技术教育形式为例,讨论和分析了分层方法(或称为差异化方法)的经验后果和挑战。我的结论是,这种方法是一项正在进行的工作,仍在不断发展,它在国际一级提供了一个有用的广泛政策框架,同时,其细节取决于在国家和地方一级更好地处理的许多考虑。
{"title":"Towards a Tiered or Differentiated Approach to Protection of Traditional Knowledge (TK) and Traditional Cultural Expressions (TCEs) in Relation to the Intellectual Property System","authors":"Chidi Oguamanam","doi":"10.2139/ssrn.3412293","DOIUrl":"https://doi.org/10.2139/ssrn.3412293","url":null,"abstract":"The World Intellectual Property Organisation (WIPO) has, for nearly two decades, engaged in formulating the nature and content of a text-based legal instrument or instruments for the effective protection of genetic resources (GRs), traditional knowledge (TK), and traditional cultural expressions (TCEs, also known as folklore) within or relating to the international intellectual property (IP) system. This task has been the job of WIPO’s Intergovernmental Committee on Intellectual Property and Genetic Resources, Traditional Knowledge and Folklore (IGC), established in 2000. In this article, I explore the context and rationales for, and evolution of, one of the IGC’s evolving contributions: development of a tiered or differentiated approach to the protection of TK and TCEs. The article discusses and analyses the empirical ramifications and challenges of the tiered approach — alternatively referred to as differentiated approach — with reference to examples of forms of TK and TCE in Africa, North America and Australia. I conclude that the approach is a work in progress, still evolving, which provides a useful broad policy framework at the international level while, at the same time, its details are contingent on many considerations better addressed at national and local levels.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47036831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Role of Discursive Constructions in Nigeria’s ASUU-FGN Labour Conflict of 2013 话语建构在2013年尼日利亚ASUU-FGN劳资冲突中的作用
Pub Date : 2019-06-28 DOI: 10.23962/10539/27531
Samuel Alaba Akinwotu
The performance of Nigeria’s tertiary education sector has been undermined on numerous occasions by labour conflicts. While these labour disputes are widely reported in the media, there has been only minimal scholarly examination of the discourses that predominate in the media during these conflicts. Using the critical discourse analysis (CDA) and conceptual metaphor (CM) frameworks, this study examined the discursive features of a labour conflict in 2013 between the Academic Staff Union of Universities (ASUU) and the Federal Government of Nigeria (FGN). Statements by ASUU and FGN officials and their supporters, as published by Nigerian print and online news sources during the dispute, were purposively sampled, along with media outlets’ editorial statements and readers’ online comments. It was found that the labour dispute was discursively and metaphorically constructed in militaristic terms, as a conflict between two enemies engaged in a kind of battle or war. It was also found that both ASUU and the FGN engaged in propagandistic discourses in line with their militaristic discursive constructions, and that the two sides propagated disparaging discourses in respect of each other’s motivations and behaviours. It was also found that certain readers reproduced elements of the prevailing discourses in their online comments on media coverage of the strike.
尼日利亚高等教育部门的表现多次受到劳资冲突的影响。虽然这些劳资纠纷在媒体上得到了广泛报道,但对这些冲突期间在媒体上占主导地位的话语进行的学术研究却很少。运用批判性话语分析(CDA)和概念隐喻(CM)框架,本研究考察了2013年大学学术人员工会(ASUU)和尼日利亚联邦政府(FGN)之间劳资冲突的话语特征。在争议期间,尼日利亚印刷和在线新闻来源发布的ASUU和FGN官员及其支持者的声明,以及媒体的社论声明和读者的在线评论,都被有意抽样。人们发现,劳资纠纷是用军国主义的术语来论述和隐喻的,就像两个敌人之间的冲突一样,参与了一场战斗或战争。研究还发现,ASUU和FGN都参与了与其军国主义话语结构一致的宣传话语,并且双方都传播了对对方动机和行为的贬低话语。调查还发现,某些读者在网上评论媒体对罢工的报道时,复制了主流话语的元素。
{"title":"The Role of Discursive Constructions in Nigeria’s ASUU-FGN Labour Conflict of 2013","authors":"Samuel Alaba Akinwotu","doi":"10.23962/10539/27531","DOIUrl":"https://doi.org/10.23962/10539/27531","url":null,"abstract":"The performance of Nigeria’s tertiary education sector has been undermined on numerous occasions by labour conflicts. While these labour disputes are widely reported in the media, there has been only minimal scholarly examination of the discourses that predominate in the media during these conflicts. Using the critical discourse analysis (CDA) and conceptual metaphor (CM) frameworks, this study examined the discursive features of a labour conflict in 2013 between the Academic Staff Union of Universities (ASUU) and the Federal Government of Nigeria (FGN). Statements by ASUU and FGN officials and their supporters, as published by Nigerian print and online news sources during the dispute, were purposively sampled, along with media outlets’ editorial statements and readers’ online comments. It was found that the labour dispute was discursively and metaphorically constructed in militaristic terms, as a conflict between two enemies engaged in a kind of battle or war. It was also found that both ASUU and the FGN engaged in propagandistic discourses in line with their militaristic discursive constructions, and that the two sides propagated disparaging discourses in respect of each other’s motivations and behaviours. It was also found that certain readers reproduced elements of the prevailing discourses in their online comments on media coverage of the strike.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41378580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework 网络安全弹性成熟度测量(CRMM)框架的概念设计
Pub Date : 2019-05-28 DOI: 10.23962/10539/27535
U. Mbanaso, Lucienne Abrahams, Oghenevovwero Zion Apene
African countries are at high risk with respect to cybersecurity breaches and are experiencing substantial financial losses. Amongst the top cybersecurity frameworks, many focus on guidelines with respect to detection, protection and response, but few offer formal frameworks for measuring actual cybersecurity resilience. This article presents the conceptual design for a cybersecurity resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as part of cyber risk management treatment. The main thrusts of the framework are to establish, through assessment in terms of quantitative measures, which cybersecurity controls exist in an organisation, how effective and efficient these controls are with respect to cybersecurity resilience, and steps that need to be taken to improve resilience maturity. The CRMM framework we outline is conceptualised as being applicable both preand post-cyber attack. Drawing on the NIST cybersecurity framework (NIST CSF) and other relevant frameworks, the CRMM approach conceptualised in this article would be able to depict an organisation’s cybersecurity practices and gauge the organisation’s cybersecurity maturity at regular intervals. This CRMM approach is grounded in the idea that, by quantifying an organisation’s current practices against established baseline security controls and global best practices, the resulting status measurement can provide the appropriate basis for managing cyber risk in a consistent and proportionate fashion. The CRMM framework defines four cybersecurity resilience quadrants (CRQs), which depict four different degrees of organisational preparedness, in terms of both risk and resilience.
非洲国家在网络安全漏洞方面面临高风险,并正在经历巨大的经济损失。在顶级网络安全框架中,许多框架侧重于检测、保护和响应方面的指导方针,但很少提供衡量实际网络安全弹性的正式框架。本文介绍了网络安全弹性成熟度测量(CRMM)框架的概念设计,该框架将应用于组织,特别是关键信息基础设施(CII),作为网络风险管理处理的一部分。该框架的主要目标是通过定量措施的评估,确定组织中存在哪些网络安全控制措施,这些控制措施在网络安全弹性方面的有效性和效率,以及需要采取哪些步骤来提高弹性成熟度。我们概述的CRMM框架被概念化为既适用于网络攻击前,也适用于网络攻击后。利用NIST网络安全框架(NIST CSF)和其他相关框架,本文中概念化的CRMM方法将能够描述组织的网络安全实践,并定期衡量组织的网络安全成熟度。这种CRMM方法基于这样一种理念,即通过量化组织当前的实践,对照已建立的基线安全控制和全球最佳实践,由此产生的状态测量可以为以一致和相称的方式管理网络风险提供适当的基础。CRMM框架定义了四个网络安全弹性象限(crq),从风险和弹性两个方面描述了四种不同程度的组织准备。
{"title":"Conceptual Design of a Cybersecurity Resilience Maturity Measurement (CRMM) Framework","authors":"U. Mbanaso, Lucienne Abrahams, Oghenevovwero Zion Apene","doi":"10.23962/10539/27535","DOIUrl":"https://doi.org/10.23962/10539/27535","url":null,"abstract":"African countries are at high risk with respect to cybersecurity breaches and are experiencing substantial financial losses. Amongst the top cybersecurity frameworks, many focus on guidelines with respect to detection, protection and response, but few offer formal frameworks for measuring actual cybersecurity resilience. This article presents the conceptual design for a cybersecurity resilience maturity measurement (CRMM) framework to be applied in organisations, notably for critical information infrastructure (CII), as part of cyber risk management treatment. The main thrusts of the framework are to establish, through assessment in terms of quantitative measures, which cybersecurity controls exist in an organisation, how effective and efficient these controls are with respect to cybersecurity resilience, and steps that need to be taken to improve resilience maturity. The CRMM framework we outline is conceptualised as being applicable both preand post-cyber attack. Drawing on the NIST cybersecurity framework (NIST CSF) and other relevant frameworks, the CRMM approach conceptualised in this article would be able to depict an organisation’s cybersecurity practices and gauge the organisation’s cybersecurity maturity at regular intervals. This CRMM approach is grounded in the idea that, by quantifying an organisation’s current practices against established baseline security controls and global best practices, the resulting status measurement can provide the appropriate basis for managing cyber risk in a consistent and proportionate fashion. The CRMM framework defines four cybersecurity resilience quadrants (CRQs), which depict four different degrees of organisational preparedness, in terms of both risk and resilience.","PeriodicalId":33369,"journal":{"name":"The African Journal of Information and Communication","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45503861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
The African Journal of Information and Communication
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1