What’s Your ICT4D Cyber Threat Model?
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...
5 Unanswered Questions on Expanding Digital Economies in Developing Countries
Recently, the Technology Salon in Washington DC asked if Digital Economies Will Empower or Enslave the Next 4 Billion Mobile Users? While there was a general recognition...
Please RSVP Now for ICT4D Principle 8: Address Privacy & Security in Development Programs
In recent years, ICTs such as mobile phone apps, web-based mapping technologies and data-mining techniques have been incorporated into development programmes, ranging...
Digital Freedom is a Myth. How Can We Ethically Provide ICT4D Solutions?
Ethics is an ever-present theme in Development and one which is sometimes overlooked in ICT4D/Technology for Development – a field in which people can sometimes...
Do Development Constituents Have a Right to Be Forgotten Too?
Since Google started to comply with a European Union court ruling on individuals’ “right to be forgotten” by the search giant, its received 70,000...
The Best Mobile Data Collection System Exists: Choice is the Challenge
You might think that the topic of collecting data via mobile devices would be a rather dry discussion of data management and statistical methodology....
10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans
PandaLabs, the anti-malware laboratory of Panda Security, has produced a simple guide to the 10 most common symptoms of infection, to help all users find out if...
Is Data Security and Encryption Really Necessary in Rural Africa?
I am often asked about cyber security on WiFi networks for international development projects in rural Africa. My response is usually a laugh, as I find it hard...






