CSIT 304
IT IN THE GLOBAL ECONOMY
Session 1 – Introduction
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2017/2018 Academic Year
Data Link Institute
Topic One
INTRODUCTION & BASIC CONCEPT
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Basic Economic Concepts
Economics: The social science that deals with the
production, distribution, and consumption of goods
and services and with the theory and management of
economies or economic systems.
Macroeconomics: The study of the overall aspects and
workings of a national economy, such as income,
output, and the interrelationship among diverse
economic sectors.
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
Basic Economic Concepts
Megaeconomics: It studies the interaction of national
economies through comparative analysis of the
economic systems.
International Economics: A branch of economics that
studies economic interactions among different
countries, including foreign trade (exports and
imports), foreign exchange (trading currency),
balance of payments, and balance of trade.
The study of interactional economics focusses on two
related areas; International trade and International
finance
Data Link Institute
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Basic Economic Concepts
Microeconomics also looks at the economic problem
from the perspective of individual units comprised of
households or consumers (demand side) and firms or
producers (supply side).
In optimizing resources, also known as inputs (or
factors of production, which traditionally include land,
labour and capital), to produce enough output (or
commodities in goods and services) to satisfy human
wants, economics may also be looked at in terms of
three questions
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Basic Economic Concepts
Essentially, economics involves choices in terms of
what goods and services to produce, how to produce
them (i.e., the method or production function) and for
whom (implying the distribution of output).
Choice involves an opportunity cost, which is defined
as the next best alternative foregone, such as when
resources are allocated to produce more
telecommunications services instead of highways.
Data Link Institute
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Basic Economic Concepts
Efficiency implies that the maximum output is
obtained from a combination of inputs; that is, no
better means of allocating resources exists that can
produce a higher level of welfare for most people in
the society.
Data Link Institute
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Basic Economic Concepts
A PRODUCTION possibility curve, a locus of
combinations of two products that can be produced
given the availability of resources in an economy is
shown in Figure 1
It is used to illustrates the concept of opportunity
cost and efficiency
Data Link Institute
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
Basic Economic Concepts – Figure 1
Data Link Institute
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
The Law of Demand
The law of demand
states that there is a
negative, or inverse,
relationship between
price and the quantity
of a good demanded
and its price.
This means that
demand curves slope
downward.
Data Link Institute
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
The Law of Supply
The law of supply
Price of soybeans per bushel ($)
6
states that there is a
5
positive relationship
4
between price and
3 quantity of a good
2 supplied.
1
0
This means that supply
0 10 20 30 40
Thousands of bushels of soybeans
50
curves typically
produced per year have a positive slope.
Data Link Institute
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
Historical perspective on Globalization
and Economic Change
Globalization: Interdisciplinary subject which relates
to all branches and fields of knowledge
Main objectives of the study of Globalization of
economics is to:
THINK GLOBALLY AND ACT LOCALLY!
Therefore knowledge about globalization is an
important part of the academic knowledge
Data Link Institute
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
Change Economic Activity of the
Society
In our days, no one sphere of life, including economic
sphere can act independent and isolated.
All processes and events should be examined and
understood in the broad sense of economic, political,
social, ecological and demographic context, taking into
account their interdependence.
The area of economic science is already too narrow to
explain all the aspects of the complex and
interdependence world.
Data Link Institute
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
Globalization of Economics and IT
The main spheres of life are inseparable and economics is
one of these spheres of life;
The technological development fosters the development
of all other spheres;
This includes Simultaneous development of
communication technologies, culture, education, etc.;
Trends for universality of global development;
Economic activity of the society has changed;
Our choice is to examine globalization of economics in the
broad context of development !
Data Link Institute
Julius Yaw Ludu, MENG Slide 14 Department of Computer Science, UG
Special Features of Globalization Today
Growing interdependence of all processes
Establishing of a global financial-economic area
Information technologies - WWW
Change in the state’s functions – vanishing of
the national boarders
Universality of the world – dissemination of the
democratic system and socio – cultural values
Data Link Institute
Julius Yaw Ludu, MENG Slide 15 Department of Computer Science, UG
Special Features of Globalization Today
“Global” – a new scientific category, which treats
the processes and events on a global scale
“Globalization” – an approach which expands and
deepens the economic theory as well as other
scientific fields
Subject of globalizations are:
• global companies;
• regional structures;
• the state;
• international economic organizations
Data Link Institute
Julius Yaw Ludu, MENG Slide 16 Department of Computer Science, UG
Characteristics of the Globalization
Process
The dynamic development of the globalization
process follows the development of the
society.
As a phenomenon it has two levels: general
civilization and formative ones
Contradictory process which has its positive
and negative sides
It is pursued by anti-social phenomena
Data Link Institute
Julius Yaw Ludu, MENG Slide 17 Department of Computer Science, UG
Definition of Globalization
Globalization is a very high level of
development of the globality of economics,
and life in the conditions and content of life
activity expanding with a tendency for
planetarism.
Globalization is a compression of time and
space.
Data Link Institute
Julius Yaw Ludu, MENG Slide 18 Department of Computer Science, UG
Globalization
Economics
Media and
Technologies
communication
Globalization
Culture Democracy and
politics
Data Link Institute
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
Globalization
The analysis of globalization is made at two
levels:
• General civilization level
• Formative level (social system)
There is a clear dependence of globalization
from the civilization model and from the
dominated social system.
Data Link Institute
Julius Yaw Ludu, MENG Slide 20 Department of Computer Science, UG
Formative Basis of Globalization
It’s the main feature of the capitalistic system:
Intensified and strong competition between
corporations and leading countries;
Technological contest – new form of competition;
The corporate secret and informational isolation;
The market economy and the state set different
conditions for going off the globalization process;
Models of development – for each country they
determine the aim and the character of the
economic growth
Data Link Institute
Julius Yaw Ludu, MENG Slide 21 Department of Computer Science, UG
Role of Technological Factors
Technologies are a product of science.
Technologies are materialized reality of science.
Technologies are socially neutral and all the
conflicts that occur in society does not relate to
technologies.
The effect and role of technologies of life depend
on its way of application, and the goals pursued.
Data Link Institute
Julius Yaw Ludu, MENG Slide 22 Department of Computer Science, UG
Effects of Technologies
A possibility and necessity for public production to
go out of the national-state frames;
A possibility and necessity for the management of
the society to be performed by means of
information technologies and communication
networks;
Formation of a new type of consumer demand
which can not be shut off within the frames of
national markets
Data Link Institute
Julius Yaw Ludu, MENG Slide 23 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 2 – The Economics of Information
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Data Link Institute
Topic One
ECONOMICS OF INFORMATION
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Definition of “Information”
Information is that property of data that represents
and measures effects of processing of them.
– Processing includes data transfer, selection, structuring,
reduction, conceptualization.
– In that definition, ‘data’ is taken as equivalent to physical
“recorded symbols”, exemplified by printed characters; by
binary characters in magnetic, punched or optical form; by
spoken words; by images.
– Whatever the physical form may be, it becomes a recorded
symbol when it is interpreted as representing something.
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
Economic Role of Information
The writings of the economists concerning
information almost universally focus on its role in
decision-making.
But information clearly is important in operational
management beyond use in decision-making. This role
is supported by management information systems.
Data Link Institute
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Economic Roles of Information
Information is a result of environmental scan to
ensure that there is knowledge of external reality in
decision-making.
Information can serve as a substitute for physical
entities.
Information is used to influence and persuade.
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Economic Roles of Information
Information is essential in education, serving the
process of learning, supplementing interaction with
teachers, and providing (in books, media, and
databases) much of the substance.
Information may be an educational objective in itself,
since among things to be learned are the tools for
access to and use of information.
Information is the substance of cultural enrichment,
entertainment, and amusement.
Data Link Institute
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Economic Roles of Information
Information can be a product, a commodity
(something produced as a package).
Information can be a service. Indeed, the majority of
‘business services’ (the national economic account
that includes consulting) are information based.
Information can be a capital resource, especially for
companies that produce information products and
services.
Data Link Institute
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
General Economic Properties of
information
While information is represented in physical form, that
form can be changed without changing its content.
In contrast to physical goods, intellectual goods can
be created with limited physical resources and
frequently as a by-product of other operations.
Data Link Institute
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
General Economic Properties of
information
Information is easily and cheaply transported. The first
copy represents most of the costs in creation, and
reproduction costs are relatively small. As a result, it
can be produced and distributed with minimal
depletion of physical resources.
There is an evident and direct relationship between
physical goods and the materials used in producing
them.
Data Link Institute
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
General Economic Properties of
information
There is a complex relationship between the time of
acquiring information and the value of it.
Persons differ greatly in perceptions of the value of
information, in kinds of use, in ability and willingness
to use, in assessments of costs, and in ability to pay.
Use of information is affected by the distance users
must travel to get access to it.
Data Link Institute
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
General Economic Properties of
information
The theory states that the use of any facility decays as
the distance increases, as a function of the cost of
travel; if the cost is linear, the decay is exponential
and if the cost is logarithmic, it is quadratic. This
theory applies to information resources
An accumulation of information has more value than
the sum of the individual values because it increases
the combinations that can be made
Data Link Institute
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
General Economic Properties of
information
There are immense economies of scale. Combined
with the value in accumulation, this provides strong
incentives for sharing information.
Information is not consumed by being used or
transmitted to others. This imply that information is a
public good.
However, there is the need to invest in the creation,
production, and distribution of information and that
implies a wish to recover the investment
Data Link Institute
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
The Macro-economics of Information
The macro-economics of information relates to its role
in national economies, as reflected in the distribution
of the workforce among various types of activities
and functions.
It also relates to effects on national economic policies.
Data Link Institute
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
National Policy : Economic Values
Better workforce, better trained and more capable of
dealing with problems.
Better product planning and marketing, based on
more knowledge about consumer needs.
Better engineering, based on availability and use of
scientific and technical information.
Better economic data, leading to improved
investment decisions and allocation of resources.
Better management from improved communication
and decision-making.
Data Link Institute
Julius Yaw Ludu, MENG Slide 14 Department of Computer Science, UG
National Policy : Economic Barriers
Costs are incurred in acquiring information.
It is likely that the return is over the long term, while
the expenditure is made immediately.
Except for the information industries themselves,
information is not directly productive.
Rarely are results clearly attributable to the
information on which they were based.
Accounting practice treat information as an
‘overhead’ expense, subject to cost-cutting.
Data Link Institute
Julius Yaw Ludu, MENG Slide 15 Department of Computer Science, UG
Economic Policies
General Economic Policies
– Encourage entrepreneurship
– Shift from low technology to high technology
– Shift from production of physical goods to information
goods
Develop the “Information Economy”
– Encourage effective use of information in business
– Provide incentives for information industries
– Develop information skills
Data Link Institute
Julius Yaw Ludu, MENG Slide 16 Department of Computer Science, UG
Economic Policies
Management of Information Enterprises
– Establish technical information skills
– Develop information support staff skills
Data Link Institute
Julius Yaw Ludu, MENG Slide 17 Department of Computer Science, UG
Income to Providers of Information
The revenues for the information industries in the
United States in 1990 and 1998, as percentages of
gross national product and absolute dollars, are
shown the following tables (Statistical Abstract of the
United States, 1993, 2000)
Of special importance is the steady year by year
increase, for the past decade, in expenditures for
“Business Services”, reflecting growing use of
information in the economy.
Data Link Institute
Julius Yaw Ludu, MENG Slide 18 Department of Computer Science, UG
Revenues for the information industries in the United States in
1990 and 1998
(percentages of gross national product and billions of dollars)
INFORMATION U.S. Data for 1990 U.S. Data for
INDUSTRIES 1998
Transaction 4.9% $274 B 7.1% $629 B
Industries
Hardware and Software 3.4% 190 B 7.6% 665 B
Industries
Production & Distribution 14.0% 783 B 17.7% 1,545 B
Industries
Total for Information 22.3% 1,147 B 32.4% 2,839 B
Industries
Gross National Product 100.0% $5,600 B 100.0% $8,750 B
Data Link Institute
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
Revenues for the Production & Distribution industries in the
United States in 1990 and 1998
(percentages of gross national product and billions of dollars)
Data Link Institute
Julius Yaw Ludu, MENG Slide 20 Department of Computer Science, UG
The Cost of Information
Costs occur in the following stages of information
production and distribution:
– Information must be created, by generation and processing
of data; these are authoring functions.
– It must be assessed for publishing; these are editorial
functions.
– It must be processed for the generation of a master; these
are composition functions.
– Products and/or services will be produced.
– The products and services will be marketed.
– They will be distributed.
Data Link Institute
Julius Yaw Ludu, MENG Slide 21 Department of Computer Science, UG
The Value of Information to Individuals
The value of cultural enrichment, entertainment and
amusement as uses of information is demonstrated by
the willingness of people to pay for them
The other major individual use of information is for
education and personal development.
Another individual use of information is in the area of
industrial training.
Data Link Institute
Julius Yaw Ludu, MENG Slide 22 Department of Computer Science, UG
Value of Information to Professionals
It has been estimated that professionals spend nearly
60 per cent of their time communicating and working
with information (Carroll and King 1985).
They incur costs in obtaining information and in using
it, but it has been estimated that the direct benefits to
them are as much as ten times those costs.
More important than direct benefits, though, are
increases in productivity measured by results
produced (reports, management publications).
Data Link Institute
Julius Yaw Ludu, MENG Slide 23 Department of Computer Science, UG
Value of Information in Commerce and
Industry
In view of the importance of information to business,
a business plan should identify the role of information
in support of the business objectives.
Information is important for support of product
research and development, for access to finance, for
marketing, for knowledge of government regulations,
for use of industry standards, for management of
personnel.
The returns to profitability from investment in
information are real and large.
Data Link Institute
Julius Yaw Ludu, MENG Slide 24 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 3 – IT, LABOUR AND EMPLOYMENT
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Data Link Institute
Topic One
INFORMATION TECHNOLOGY,
LABOUR AND EMPLOYMENT
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Introduction
The knowledge economy featuring intellectual rather
than physical capital, and information technology,
revolutionizing production and exchange, are set to
affect employment and the labor market as well.
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
New capitalism
New capitalism
Since capitalism emerged from feudalism, the world is in a
period of punctuated equilibrium caused by the
simultaneous movements of five economic plates.
These are the end of communism, a technological shift to
an era dominated by man-made brainpower industries, a
demography never before seen, a global economy and an
era where there is no dominant economic, political or
military power.
The economic magma is a fluid mixture of technology and
ideology.
Data Link Institute
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Knowledge Economy
In contrast to an industrial or even post-industrial
economy, where raw materials and then man-made
brainpower industries form the basis of production
and exchange, a decoupling has emerged as
knowledge industries become the focus in knowledge
economies .
Society is in tandem, since the hunt is for knowledge
in the forest of information technology, global
telecommunications networks and electronic
highways.
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Knowledge Economy
Taken to its logical conclusion, a knowledge economy
and knowledge society is where all economic and
social activities revolve around information.
What sells is speed and instant gratification.
Data Link Institute
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Role of IT In Knowledge
Management
Most of our work is information based
Organizations compete on the basis of knowledge
Products and services available in the society are
increasingly complex
Life-long learning is inevitable needed
Data Link Institute
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Why KM in knowledge-base business
economy?
Foster innovation
By encouraging the free flow of ideas
Improve customer service
By streamlining response time
Boost revenues
By getting products and services to market faster
Enhance employee retention rates
By recognizing the value of employees’ knowledge and
rewarding them for it
Streamline operations and reduce costs
By eliminating redundant or unnecessary processes
Data Link Institute
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
The role of IT in KM
Information technology, by itself is not KM
However,
KM is often facilitated by IT
IT provides solutions to KM
IT is a tool to increase the “efficiency” and “capability”
of KM
IT as a facilitator of KM facilitates document
management, data storage, access of information, the
dissemination, exchange and sharing of ideas
Data Link Institute
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Technological and employment trends
The factory is the organizational and economic core of
industrialism but cybernation is changing that with the
imminent “workerless” robotized factory (Jones,
1997).
Automation refers to the age-old trend of replacing
discrete human actions with machine operations by
linking different machines with new controlling
devices.
Data Link Institute
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
Technological and employment trends
Automation of automation is cybernation such as in a
self-governing control and self-acting factory.
It converts entire productive functions into a
coordinated machinery or machine-like routines
characterized by regularity, predictability and
precision.
Data Link Institute
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
Technological and employment trends
Fordism defines the twentieth century expansion of
capitalism as a regulated co-ordination of mass
production with mass consumption, eponymous with
the Ford Motor Company.
It stands for the large-scale standardization of
products and production methods.
Data Link Institute
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
Technological and employment trends
The economic effects of Fordism include making mass
consumption affordable as workers’ purchasing
power increases with employment and rising wage
levels.
Taylorism is the scientific management of work
organization. It complements the process of
mechanization; precision and flexibility and, hence,
efficiency and cost effectiveness.
Data Link Institute
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
New production technologies involving
Computerization
Computer Integrated Manufacturing (CIM)
The flexible manufacturing system (CMS)
Computer aided manufacturing (CAM)
Computer-aided software engineering (CASE)
Computer-aided drafting and designing
(CADD) and the like.
Data Link Institute
Julius Yaw Ludu, MENG Slide 14 Department of Computer Science, UG
The IT Economic Impact on Work
The most immediate impact of such new
technologies and developments is on work
and the lifestyle that accompanies work.
In a job-fixated society, work represents not
only income and a means of sustenance, but
also self-respect, self-worth, hierarchy and the
governance of individuals in a society.
Data Link Institute
Julius Yaw Ludu, MENG Slide 15 Department of Computer Science, UG
The IT Economic Impact on Work
In a knowledge economy, there must be new
ways to attract, retain and motivate people
since intellectual capital is owned and resides
with people.
The demands of a better-educated, more self-
confident and independent workforce are such
that they want empowerment, such as in more
responsibility and authority
Data Link Institute
Julius Yaw Ludu, MENG Slide 16 Department of Computer Science, UG
Rethinking Work
It is vital to discuss the impact of new
technologies on the economy and to work to
lead into the social impact. With automation and
information technology, the knowledge
economy spawns information workers with new
attributes.
As noted, a job is redefined as a property right in
the knowledge economy corresponding to rising
entrepreneurialism.
Data Link Institute
Julius Yaw Ludu, MENG Slide 17 Department of Computer Science, UG
Rethinking Work
The right kind of education and skills in the
knowledge economy is a new form of security as
employability is assured.
As new communication technologies impinge on
work arrangements, a social effect includes that
of de-unionization, since the physical platform
for socialization in the workplace disappears
with tele-computing and the virtual corporation.
Data Link Institute
Julius Yaw Ludu, MENG Slide 18 Department of Computer Science, UG
Rethinking Work
Work becomes more self-directed in knowledge and
information industries, cutting down a layer of
supervision and middle management.
Strategic pay, rather than administered pay, also
occur with flatter organizations and individualized
work contracts (Murlis, 1996).
Trade unions may be further marginalied when
differentiated work based on creative qualities are
More important than cognitive manual skills, such as
in traditional supervised production jobs.
Data Link Institute
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
Rethinking Work
The shifts in thinking about work were noted ahead of
massive downsizing, though they were not taken
seriously then in a job-fixated society (Handy, 1984;
Winslow & Bramer, 1994).
Universally observed and recurrent changes bespeak
the full employment society giving way to part-time
employment as manual work yields to knowledge
activities, and industry declines as service rises.
Hierarchies and bureaucracies eclipse as networks and
partnerships dominate.
Data Link Institute
Julius Yaw Ludu, MENG Slide 20 Department of Computer Science, UG
Does new technology destroy jobs?
Two kinds of innovation with different impacts:
Process innovation – new ways of making and
delivering products
Effects of Process Innovation:
New technique increases efficiency and thus lowers costs of
production
Fewer workers can produce same output
This can cause technological redundancy
On the other hand, Cost reduction may lead firm to
expand its output as it gains market share
Potentially this leads to more jobs on balance
Data Link Institute
Julius Yaw Ludu, MENG Slide 21 Department of Computer Science, UG
Does new technology destroy jobs?
Product innovation – firm brings new varieties and
qualities of products to the market
Effects of Product Innovation:
Firm can capture new or increased segments of
markets
Again this is likely to lead to more jobs
Data Link Institute
Julius Yaw Ludu, MENG Slide 22 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 4 – PRODUCTIVITY IN THE DIGITAL AGE
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Data Link Institute
Topic One
PRODUCTIVITY IN THE DIGITAL AGE
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Definition of Productivity
Productivity is the relationship between the outputs
generated from a system and the inputs that are used
to create those outputs. Mathematically,
P = O Where
P = productivity
I O = output
I = input
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
System Concept
inputs outputs
transformations Customers
Land Goods
people SYSTEM and
capital services
facilities
equipment
tools O
energy I
materials
information productivity
Data Link Institute
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Productivity Improvement
Productivity Improvement (PI) is the result of
managing and intervening in transformation or work
processes.
PI will occur if:
O O O O O
I I I I I
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Measuring Productivity
Static: P=O/I in a given period of time (t). Its useful
for benchmarking purposes.
Dynamic:
p(1)=O(1)/I(1); p(2)=O(2)/I(2); then p(2)/p(1) yields a
dimensionless index that reflects change in
productivity between periods. ([p(2)-p(1)]/p(1))*100
yields the percentage change between periods.
Data Link Institute
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Measuring Productivity
Partial-Factor: Uses a single “I” factor; E.g.
output/labor-hour, sales/employee
Multi-Factor: Uses more than one “I” factor; e.g.
output/direct costs (labor, materials, and overhead).
Total-Factor: Uses all “I” factors.
(Note: Total-Factor captures “trade-offs” between input
factors.)
Data Link Institute
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Measurement Problems
Multiple products/services (aggregation-O)
Varied categories, types, and levels of input resources
(aggregation-I)
Price/cost changes of outputs & inputs
Redesigned products, services, processes
“Hard-to-measure” factors (e.g., quality)
Data Link Institute
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
Importance of Global-Level
Productivity Measures
Measure and compare competitiveness among
nations.
Contribute to the development of a nation’s
economic, social, and political policies.
Develop global cooperation among nations.
Help business organizations make investment
decisions.
Data Link Institute
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 5 – MARKET STRUCTURE AND COMPETITION
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Data Link Institute
Topic One
MARKET STRUCTURE AND COMPETITION
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Market Structure
The future society, as a dynamic society, will have each
wave of civilization tending to increase freedom and
choice sets (Snooks, 1996).
Timescape changes are most readily evident in the size of,
changes in the population and accompanying material
living standards.
More existential dynamic changes involve the competitive
driving force of the materialist man.
Dynamic strategies cover family multiplication,
technology, commerce and conquest
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
The Product Cycle
Product cycle is the length of time a vendor actively
markets a product, beginning from the initial stage of a
prototype to a mature product and ending with the
announcement and delivery of a new family of products.
Because the product cycle is short, there is a constant
shakeout in the industry marked by the appearance of
many vendors, price instability, competition for market
share, the emergence of technological and pricing.
standards, and the dropping out of weak competition with
inferior products.
Data Link Institute
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Reasons for the Reduction in the
Product Cycle (Tapscott, 1995).
New economy
New technology New enterprise
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Themes Surrounding the Points of a
triangle
There are 12 themes surrounding the points of a triangle formed by
a new economy, a new enterprise and a new technology.
1. Knowledge, 8. Globalization
2. Digitization (Instead Of Analogue), 9. Discordance
3. Virtualization (Instead Of Physical), 10. Immediacy
4. Molecularization (instead Of Mass), 11. Convergence
5. Integration/Internetworking, 12. Innovation
6. Disintermediation (Instead Of Middlemen),
7. Prosumption (A Cross Between Production And
Consumption),
Data Link Institute
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Converging Technologies
Communications
Computing Content
Data Link Institute
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Ten technology shifts (Tapscott, 1995)
The 10 technology shifts that drive the convergence of
content, computing and communication are:
1. Analogue Signals To Digital Signals,
2. Semiconductors To Microprocessors,
3. Host based Systems To Client Server Systems,
4. Garden Path Bandwidth To The Information Highway In Network
Capacity,
5. Dumb Access Service To Information Appliance,
6. Separate Data, Text, Voice And Images To Multimedia Forms,
7. Proprietary Systems To Open Systems,
8. Dumb Networks To Intelligent Ones,
9. Craft Computing To Object Computing Software Development,
10. Graphic User Interfaces to multimedia user interfaces.
Data Link Institute
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
Technological change
A distinction is made between some aspects of
technological change (Antonelli, 1992).
An effective state of technology uses all scarce and
abstract resources in the economy to produce technology
and technological information.
Technological information is knowledge that enables
economic production. In contrast, technological artifacts
are physical or abstract products that result from the
application of technology.
Julius Yaw Ludu, MENG Slide 9 Data Link Institute
Invention
Invention is the process by which new technological
information is created; a necessary part of that
process is the embodiment of new information in
scarce physical forms.
Invention is the necessary first stage of development
of all new technological artifacts, whether techniques,
processes or products.
Julius Yaw Ludu, MENG Slide 10 Data Link Institute
Innovation
Innovation involves the realization in practice of the
potential value of inventions, or is the process by
which inventions are implemented such that they
affect production activities in the economy.
Every invention presents a possibility for innovation in
the future, making every invention a technological
information resource to be exploited through the
process of innovation.
Julius Yaw Ludu, MENG Slide 11 Data Link Institute
Diffusion of Technological Information
The diffusion of technological information need not
involve economic transactions, but more information
or communication transactions.
The diffusion of new technology can be in physically
embodied forms, and there are some inherent public
good characteristics
Julius Yaw Ludu, MENG Slide 12 Data Link Institute
Significant Technological Change Trend
Technologically speaking, the most significant trend:
Digitization turns more and more analogue
transmissions in “waves” into a version of electronic
Morse Code composed of dots and dashes, or ones
and zeroes for transmission through telephones,
televisions and radios
Julius Yaw Ludu, MENG Slide 13 Data Link Institute
Advantages of Digitisation
Digital compression is a necessary part of high-
definition television (HDTV), which offers substantial
increases, over the existing standard, of the amount
of picture information possible.
As a comparison, an analogue HDTV signal requires
ten times more bandwidth than traditional analogues,
and a digitized HDTV can require transmission rates of
a full gigabyte per second.
Julius Yaw Ludu, MENG Slide 14 Data Link Institute
Technological Trend in the Electronics
Industry
The electronics industry underpins its new technology
and applications to Information Technology
Invention of the transistor in 1947 by scientists at Bell
Telephone Laboratories. (birthed the semiconductor)
1950s, a major innovation was that a single silicon chip
could hold more than a single transistor.
The development of capabilities with the design and
manufacture of integrated circuits (ICs).
Julius Yaw Ludu, MENG Slide 15 Data Link Institute
Technological Trend in the Electronics
Industry (Cont’d)
1982, Intel developed a microprocessor that made Mainframe
Computers extinct as Personal Computers took over
The diminution in size and fall in costs that makes electronic
products more affordable, more accessible and improves
performance (by shortening switching time and the time
needed for higher speed operations) transformed the world
in more ways than one.
The entry of microelectronics as a branch of the Information
Technology industry devoted to the design and manufacture
of circuitry devices constituted of extremely small electronics
parts.
Julius Yaw Ludu, MENG Slide 16 Data Link Institute
Technological Trend in the Electronics
Industry (Cont’d)
Broadly defined, electronic technology embodies a set
of human knowledge that makes possible the
production of a wide range of electronic goods and
services.
The digital age, knowledge economy and information
society have further profoundly impacted governance
and other socio-political structures
Julius Yaw Ludu, MENG Slide 17 Data Link Institute
Divisions of the electronics
industry
Semiconductors or Consumer electronics Industrial electronics or
electronic components electronic equipment
Passive: resistors, Computers and peripherals, Televisions, radios,
capacitors, inductors, telecommunications, video equipment, audio
relays industrial equipment, electrical
Active: semiconductors, control equipment, testing appliances, video games,
discrete, integrated and watches
circuits, vacuum tubes measuring (e.g, office
equipment,
military, aerospace,
automotive)
Julius Yaw Ludu, MENG Slide 18 18 Data Link Institute
Logic Chips
Memory chips store data. Microprocessors perform various
arithmetic or calculating functions on data stored in memory
chips.
Logic chips : Logic chips fall into three types.
First, standard logic or off-the-shelf chips typically feature five
to fifty logic circuits or gates.
Second, semicustom chips (ie, application-specific integrated
circuits (ASICs)) with thousands of gates have an extra layer of
metal connection to enable them to be customized to perform
various functions required by end-users.
Third, programmable logic chips are programmed through
arrays of built-in electronic switches; they are the most
sophisticated and expensive chips
Julius Yaw Ludu, MENG Slide 19 Data Link Institute
Electronic technology chain
Branches Products
Upstream sectors Advanced materials: TV tubes, special
electronic tubes, ICs
(eg, memory, logic, microprocessor),
transistors
Industrial end-user sectors Telecommunications equipment, computer
systems, software
engineering, industrial instruments (e.g.,
optical, medical,
measuring)
Consumer goods Automotive industry, personal computers,
cellular phones, TV
sets, radios, audio-recorders, video-recorders
Extensions Multimedia information systems, flexible
manufacturing
systems, management systems, industrial
Julius Yaw Ludu, MENG robots
Slide 20 20 Data Link Institute
Artificial intelligence (AI)
Artificial intelligence refers to computer-based
technologies that replicate behaviors associated with
human thinking such as making decisions, evaluating
options or developing new ideas
Computer vision in Artificial Intelligence requires three
different, but not necessarily distinct, abstract
techniques
Julius Yaw Ludu, MENG Slide 21 Data Link Institute
Computer Vision Techniques
1.Psychology in wanting to discover how people think so
as to simulate those processes on a computer act
techniques
2.The logistician uses formal scientific, mathematical
logic to create non-monotonic forms of logic
3.The structuralists, believes that the best way to
simulate the workings of the mind is to recreate the
information-processing capabilities of the brain.
Structuralists (also known as connectionists) thus build
interconnected networks, or neural networks, of
artificial neurons using silicon
Julius Yaw Ludu, MENG Slide 22 Data Link Institute
Virtual reality
Virtual reality refers to the use of computer-based
systems to create an
environment that seems real to one or more
senses (usually including sight)
of human users.
The computer-generated environment represents
an amalgam
of technologies, notably, a digital computer, software
capable of processing
Julius Yaw Ludu, MENG Slide 23 Data Link Institute
Virtual reality
visual and auditory information and a means of
presenting the information to
the user.
Applications of virtual reality range from
entertainment to military training.
Wherever a laboratory, clinical, pedagogic or
simulated situation or event is
Julius Yaw Ludu, MENG Slide 24 Data Link Institute
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 6 – THE DIGITAL ECONOMY AND THE ART INDUSTRY
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius Yaw Ludu, MENG Slide 1 Department of Computer Science, UG
Topic One
THE DIGITAL ECONOMY AND THE ART
INDUSTRY
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
THE DIGITAL ECONOMY AND THE ART
INDUSTRY
Information technology, digitization, converging
technologies, the knowledge economy, interactive
multimedia, a network-centric era, virtual reality and a
host of exciting developments have been identified and
discussed in the course.
Mankind is stepping into the virtual world and the promise
of things to come in the next millennium has yet to fully
unfold.
This lecture is devoted to probing the non-economic,
socio-political and legal issues of the information
technology revolution and emerging multimedia industry
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
Property Rights, Copyrights and the
Digital Economy
Copyright conveys a sense of monopoly power.
When monopolies have absolute market power, or
enjoy entry barriers, consumer welfare suffers
higher prices and restricted quantities.
If an argument of positive externality can be made
for products with intellectual property, they should
fall into the realm of other merit products such as
education and health.
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Property Rights, Copyrights and the Digital
Economy (Cont’d)
Intellectual property is unlike ordinary
property, making it more difficult to protect.
The revolution in digital technology and
electronic transmission means that
copyrighted materials can be easily
downloaded and reproduced.
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Property Rights, Copyrights and the Digital
Economy (Cont’d)
Information ranging from frivolous recreation to
commercial applications, such as databases and
computer software, can be copied or adapted.
Copying is almost effortless, costless, widespread and
immediate. It is a business in itself; pirated software,
music, articles and films available on the Internet can
be had by anyone who is determined, be they amateur
or professional.
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Piracy
DOES PIRATED MATERIALS ULTIMATELY
ENABLE MORE WIDESPREAD
COMMUNICATION AND TRANSMISSION OF
KNOWLEDGE?
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Piracy Cont’d
The Robin Hood argument creates a vicious circle.
Presently, companies charge more for a small piece of
intellectual property precisely because of piracy and their
need to recover research and development (R&D) costs.
Most users of pirated materials argue that they would
never pay the full price for such products.
So long as the originators are getting payment from
corporate and professional users, they see no harm in
benefiting amateurs and less endowed users in the name
of knowledge and development for all.
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
3- Approaches For Redesigning Copyright
Regulations
In redesigning copyright regulations, three approaches are
possible (Cairncross, 1997: 206).
Content can be sold outright to sponsors or advertisers who
can give it away free to attract new customers.
A combination of a free portion and a chargeable portion.
A replacement of copyright with by a service right in which
charges are made, not for reproduction, but for a continuity
of service in the form of updates and maintaining the
original material such as in a financial newsletter.
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Importance of Copyright to the Economy
Development of technology to support creativity and
growth of the creative industries;
Incentivizing creativity and culture;
Striking the balance between the interests of creators,
distributors and consumers.
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
Copyright for the Digital Economy
The value of assets lies in intellectual, rather than
physical capital.
IP related business opportunities are increasing, either
for the area of creation of product (i.e. upstream), or
for the service of assuring the diffusion and
application of content (i.e. downstream).
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
Ethics in Information Technology
Public concern about the ethical use of information
technology includes:
E-mail and Internet access monitoring
Peer-to-peer networks violation of copyright
Unsolicited e-mail
Hackers and identify theft
Plagiarism
Cookies and spyware
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 12 Slide 12 Department of Computer Science, UG
Ethics in Information Technology
(Cont’d)
The general public has not realized the critical
importance of ethics as applied to IT
Important technical decisions are often left to
technical experts
General business managers must assume greater
responsibility for these decisions
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 13 Slide 13 Department of Computer Science, UG
Ethics in Information Technology
(Cont’d)
They must be able to make broad-minded,
objective, ethical decisions based on technical
savvy, business know-how, and a sense of
ethics
They must also try to create a working
environment in which ethical dilemmas can be
discussed openly, objectively, and
constructively
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 14 Slide 14 Department of Computer Science, UG
What is Ethics?
Moral code
Set of rules
Establishes boundaries of generally accepted
behaviour
Different rules often have contradictions
Morality
Social conventions about right and wrong
Widely shared
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 15 Slide 15 Department of Computer Science, UG
What is Ethics? (continued)
Morality may vary by:
Age
Cultural group
Ethnic background
Religion
Gender
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 16 Slide 16 Department of Computer Science, UG
Definition of Ethics
Ethics are set of beliefs about right and wrong
behaviour
Ethical behaviour conforms to generally accepted
social norms
Virtues on ther other hand are habits that incline
people to do what is acceptable
Vices are habits of unacceptable behavior
Value system are scheme of moral values
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 17 Slide 17 Department of Computer Science, UG
The Importance of Integrity
Integrity is a cornerstone of ethical behaviour
People with integrity
Act in accordance with a personal code of
principles
Extend to all people the same respect and
consideration that you desire
Apply the same moral standards in all situations
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 18 Slide 18 Department of Computer Science, UG
Ethics in the Business World
Risk is the product of multiplying the likelihood of an
event by the impact of its occurrence
Risks associated with inappropriate behaviour have
increased due to
Globalization
Heightened vigilance by
Employees
Shareholders
Regulatory agencies
Julius
Julius Yaw
Yaw Ludu, 4/29/20
Ludu, MENG
MENG Slide 19 Slide 19 19
Department of Computer Science, UG
Logic Chips
Examples of Scandals in IT companies include;
WorldCom
Qwest Communications International Inc.
Adelphia Communications Corp.
Computer Associates (CA)
Any in Ghana?
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 20 Slide 20 Department of Computer Science, UG
Why Foster Good Business Ethics?
1. To gain the goodwill of the community
2. To create an organization that operates
consistently
3. To produce good business
4. To protect the organization and its employees
from legal action
5. To avoid unfavourable publicity
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 21 Slide 21 21
Department of Computer Science, UG
Good Ethics Can Mean Good Business
Produce safe and effective products
Avoid costly recalls and lawsuits
Provide excellent service
Maintain customers
Develop and maintain strong employee relations
Suffer less turnover
Enjoy better employee morale
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 22 Slide 22 Department of Computer Science, UG
Good Ethics Can Mean Good Business
(Cont’d)
Suppliers and other business partners prefer
companies that operate in a fair and ethical manner
Bad ethics can lead to bad business results
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 23 Slide 23 Department of Computer Science, UG
Avoiding Unfavorable Publicity
Public reputation of company strongly influences
Value of its stock
How consumers regard products and services
Degree of oversight received from government
agencies
Amount of support and cooperation received from
business partners
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 24 Slide 24 Department of Computer Science, UG
Establishing a Corporate Code of Ethics
Code of ethics:
Highlights an organization’s key ethical issues
Identifies overarching values and principles important
to an organization
Focuses employees on areas of ethical risk
Cannot gain company-wide acceptance unless
Developed with employee participation
Fully endorsed by organization’s leadership
Must continually be applied to company’s decision
making
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 25 Slide 25 Department of Computer Science, UG
Social Audits
Social audit
Identifies ethical lapses committed in the past
Sets directives for avoiding similar missteps in the
future
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 26 Slide 26 Department of Computer Science, UG
Require Employees to Take Ethics
Training
Comprehensive ethics education program encourages
employees to act responsibly and ethically
Often presented in small workshop formats
Principle-based decision making is based on principles
in corporate code of ethics
CAN GOOD ETHICS RESULT IN SHORT-TERM
LOSSES?
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 27 Slide 27 Department of Computer Science, UG
Creating an Ethical Work Environment
Good employees sometimes make bad ethical choices
May be encouraged to do “whatever it takes” to get
the job done
Employees must have a knowledgeable and potent
resource available to discuss perceived unethical
practices
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 28 Slide 28 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 7 – ETHICAL THEORIES
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius Yaw Ludu, MENG Slide 1 Department of Computer Science, UG
Topic One
ETHICAL THEORIES
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Utilitarianism Theories
Jeremy Bentham (1748-1832),John Stuart Mill (1806 -
1873)
An ethics of consequences
An action is good if it produces the greatest good for
the greatest number
WHAT DOES “GOOD” MEAN?
Julius
Julius Yaw
Yaw Ludu,
Ludu, MENG
MENG Slide 3 Department of Computer Science, UG
Utilitarianism Cont’d
A variety of consequentialism
"actions are right in proportion as they tend to
promote happiness, wrong as they tend to produce
the reverse of happiness." (John Stuart Mill's
Greatest Happiness Principle)
In other words, judge an action by the total amount of
happiness and unhappiness it creates
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
Deontology
'Duty Based' Ethics
Deontologists deny that what ultimately matters is an
action's consequences.
They claim that what matters is the kind of action it is.
What matters is doing our duty.
There are many kinds of deontological theory
e.g., The 'Golden Rule' - "Do unto others as you'd have
them do unto you."
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Kantian Deontology
Immanuel Kant (1724-1804) is the most influential
deontologist.
Rejecting Consequentialism: "A good will is good not
because of what it effects or accomplishes." Even if by
bad luck a good person never accomplishes anything
much, the good will would "like a jewel, still shine by
its own light as something which has its full value in
itself."
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Categorical Imperative
Kant claims that all our actions should be judged according
to a rule he calls the Categorical Imperative.
First Version: "Act only according to that maxim [i.e., rule]
whereby you can at the same time will that it become a
universal law."
Second Version: "Act in such a way that you treat
humanity, whether in your own person or in the person of
another, always at the same time as an end and never
simply as a means."
Important to treat people as autonomous agents
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Autonomy
A central element in many deontological theories is the
idea of autonomy
Autonomy = self + rule
Roughly, the idea is that people must be respected as
autonomous agents.
This means there are certain ways we must not treat
people (no matter how much utility might be produced
by treating them in those ways)
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
3 Elements of ‘Ideal’ Autonomy
Rationality
only informed decisions are truly autonomous
Freedom of Action
lack of coercion
Freedom of Choice
availability of alternative options
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Deontological Theories
An ethics of duty or obligation
Kant (1724-1804)
single principle: categorical imperative
Universality - what maxims pass this test
persons as ends (what counts as a person?)
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
Deontological Theories (cont’d)
Pluralists = many duties
Ross' additional duties:
fidelity: be faithful
reparation: return good for good
gratitude
self-improvement
non-malfeasance: do not harm
beneficence: do good, benefit
justice: treat equals equally
add autonomy: respect individuals
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
Problems with Deontology and
Utilitarianism/Consequentialism
Deontology: What if doing your duty has repugnant
consequences?
Kant on telling lies
Consequentialism: What if you have to do something
that seems wrong in order to produce the best
consequences?
Convicting the innocent
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
Four Principles
Autonomy
Beneficence
Non-maleficence
Justice
1 & 4 are deontological
2 & 3 are consequentialist
It is really possible to have it both ways?
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
Utilitarianism 1
Focus on the consequences of maintaining
confidentiality
A tension: Should we focus on
the consequences of this case alone (act
utilitarianism) or
on general rules for maintaining confidentiality
(rule utilitarianism)
Assessing consequences requires attention to the
concrete details of the case
Julius Yaw Ludu, MENG Slide 14 Department of Computer Science, UG
Deontology
Asks us to focus on our duties
Respecting the autonomy of the patient
Helping the person
Helping others
Julius Yaw Ludu, MENG Slide 15 Department of Computer Science, UG
Common Ground?
In neither case is the duty to maintain confidentiality
absolute
The possible consequences of absolute
confidentiality are too dire
Our duty to respect a person’s autonomy may be
outweighed by our duty to help others (and the
persons)
Julius Yaw Ludu, MENG Slide 16 Department of Computer Science, UG
Principles of Behavior
Honesty
to be truthful in all our endeavors; to be honest and
forthright with one another and with customers,
communities, suppliers, and shareholders.
Integrity
to say what we mean, to deliver what we promise, to fulfill
our commitments, and to stand for what is right.
Respect
to treat one another with dignity and fairness, appreciating
the diversity of our workforce and the uniqueness of each
employee.
Trust
to build confidence through teamwork and open, candid
communication.
Julius Yaw Ludu, MENG Slide 17 Department of Computer Science, UG
Principles of Behavior (cont’d)
Responsibility
To take responsibility for our actions, and to speak
up -- without fear of retribution -- and report
concerns in the workplace, including violations of
laws, regulations and company policies, and seek
clarification and guidance whenever there is doubt.
Citizenship
To obey all the laws and to do our part to make the
communities in which we live and work better.
Julius Yaw Ludu, MENG Slide 18 Department of Computer Science, UG
Broader View of Moral and Ethical
Issues
As the Association for Computing Machinery states in
its Code of Ethics and Professional Conduct,
computing professionals are obligated to heed a
common set of moral imperatives that reflect duties
to (among others) foster human well-being, avoid
harm to others, be honest and trustworthy, respect
privacy, and give proper credit for intellectual
property.
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
Ethical Decision Making Model
Evaluate Information
Consider how our decision might affect stakeholders
Consider what ethical values are relevant to the
situation
Determine the best course of action that takes into
account relevant values and stakeholders’ interests
Julius Yaw Ludu, MENG Slide 20 Department of Computer Science, UG
7 Steps to Ethical Decision Making
1. Get the facts
2. Identify stakeholders and their positions
3. Consider the consequences of a decision
4. Weigh various guidelines and principles
5. Develop and evaluate options
6. Review a decision
7. Evaluate the results of a decision
Julius Yaw Ludu, MENG Slide 21 Department of Computer Science, UG
Basis of Moral Decisions
Do what the Bible/Quran tells you”--Divine Command
Theories
“Follow your conscience”--The Ethics of Conscience
“Watch out for #1”--Ethical Egoism
“Do the right thing”--The Ethics of Duty
“Don't ‘dis' me”--The Ethics of Respect
“...all Men are created ...with certain unalienable Rights”--
The Ethics of Rights
“Make the world a better place”--Utilitarianism
“Daddy, that’s not fair”--The Ethics of Justice
“Be a good person”--Virtue Ethics
Julius Yaw Ludu, MENG Slide 22 Department of Computer Science, UG
Question
WHY IS COMPUTER ETHICS IMPORTANT TO
IT PROFESSIONALS?
Julius Yaw Ludu, MENG Slide 23 Department of Computer Science, UG
Character
HERACLITUS (c. 540 - c. 480 BC) -- Greek philosopher said "A
man's character is his fate.“
BOOKER T. WASHINGTON (1856-1915) -- African-American
educator said "Character is power."
RICHARD NIXON (1913-1994) said "With all the power that a
President has, the most important thing to bear in mind is this:
You must not give power to a man unless, above everything
else, he has character. Character is the most important
qualification the President of the United States can have."
LYNDON JOHNSON (1908-1973) "The fact that a man is a
newspaper reporter is evidence of some flaw of character."
CALVIN COOLIDGE (1872-1933) "Character is the only secure
foundation of the state.“
THEODORE ROOSEVELT “To Educate A Person In Mind And
Not In Morals Is To Educate A Menace Society”
Julius Yaw Ludu, MENG Slide 24 Department of Computer Science, UG
Code of Ethics Canons
Protect society, the commonwealth, and the
infrastructure
Promote and preserve public trust and confidence in
information and systems.
Promote the understanding and acceptance of
prudent information security measures.
Act honorably, honestly, justly, responsibly, and legally
Tell the truth; Treat all constituents fairly.
Observe all contracts and agreements, express or
implied.
Julius Yaw Ludu, MENG Slide 25 Slide 25 Department of Computer Science, UG
Code of Ethics Canons (Cont’d)
Provide diligent and competent service to principals
Preserve the value of their systems, applications, and
information.
Avoid conflicts of interest or the appearance thereof.
Advance and protect the profession
Sponsor for professional advancement those best
qualified. All other things equal, prefer those who are
certified and who adhere to these canons. Avoid
professional association with those whose practices
or reputation might diminish the profession.
Take care not to injure the reputation of other
professionals through malice or indifference.
Julius Yaw Ludu, MENG Slide 26 Department of Computer Science, UG
The Ten IT Moral and Ethical
Commandments
1. Thou shall not use a computer to harm people.
2. Thou shall not interfere with other people’s computer work.
3. Thou shall not snoop around in other people’s computer files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness
6. Thou shall not copy or use proprietary software for which you
have not paid
7. Thou shall not use other people’s computer resources without
authorization or proper compensation.
8. Thou shall not appropriate other people’s intellectual output.
9. Thou shall think about the social consequences of the program
you are writing or system you are designing.
10. Thou shall use a computer in ways that ensure consideration and
respect for your fellow humans.
Julius Yaw Ludu, MENG Slide 27 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 8 – The Digital Economy and Privacy
Regulation, Encryption and Terrorism
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Data Link Institute
Topic One
THE DIGITAL ECONOMY AND PRIVACY
REGULATION, ENCRYPTION AND TERRORISM
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
THE DIGITAL ECONOMY AND
PRIVACY REGULATION
A security firm discovered a botnet responsible for stealing
sensitive data from more than 2,500 companies, gov’t
agencies, and educational institutions .
The company found a 75GB cache of data that included 68,000
logon credentials, access to email systems, online banking
sites, Facebook, Yahoo, Hotmail, and others. The company
described it as "a vast cache of dossier-level data sets on
individuals including complete dumps of entire identities from
victim machines.”
Once infected, the botnet can capture everything the victim
types (including passwords), files, cookies, usernames, and
provides full remote control. Once an endpoint is infected, the
attacker then makes their way onto the primary network.
Data Link Institute
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
Digital Privacy:
How long does it take to break your password?
6 days to break a reasonably strong password (10
characters) with 5 lowercase, 2 uppercase and 3
numbers.
Less than 2 minutes to break an 8 character password
with uppercase, lowercase, and numbers
More common passwords like "test", "password" or
"123" will be cracked instantly
Data Link Institute
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
QUESTIONS?
WHICH COUNTRY HOSTS THE MOST
PHISHING ATTACKS?
DO YOU KNOW WHERE YOUR MOBILE
DEVICES ARE?
Data Link Institute
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Some IT Privacy Terms and Definitions
Script kiddie is a term that refers to anyone who is not
technologically sophisticated enough to understand the
Internet vulnerability they are attempting to exploit, who
often uses tools created by others
Hacker, either white hat (good) or black hat (bad), is the
most commonly used term for people who find software
vulnerabilities
Cracker applies to those who break into software or Web
servers, often with criminal intentions.
Ethics, in simple terms, is the study of morality.
Morality refers to the "rightness" or "goodness" of
matters.
Character is the moral quality and direction of one’s
decisions and behavior
Data Link Institute
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Some IT Privacy Terms and Definitions
(Cont’d)
Values are the rules by which we make decisions about
right and wrong, should and should not, good and bad.
They also tell us which are more or less important.
Professionalism
Characterized by or conforming to the technical or
ethical standards of a profession [emphasis added]
Exhibiting a courteous, conscientious, and generally
businesslike manner in the workplace
Of high moral character
Security Awareness - to ensure all personnel understand
the necessity of, and practice of safeguarding information
processed, stored, or transmitted on all information
systems
Data Link Institute
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Cyber Crime
Identity theft is the fastest growing crime.
Experts estimate that about 10 million people become
victims each year. That means every minute, 19 people
become new victims of identity fraud.
Drug trafficking has been replaced by identity theft as
the number one crime.
The major player is now organized crime, responsible
for 70% and billions in ill-gotten gains.
Data Link Institute
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
Digital Privacy - Risks
Identity theft and fraud
Profiling and commercial targeting
Personal attacks
Data Link Institute
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Digital Privacy - Threats:
Threat = [Equipment + Knowledge +Skills] + Intent
[ Capability ]
Malware*
Social networking – many issues
Phishing
Impersonation
Cookies and web bugs
Cloud computing (HealthVault, Flickr, Gmail)
Data mining
Web browsing history
Digital trails and retained data
Data Link Institute
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
Malware
(Malicious Software)
Examples
1. Viruses, trojans, worms 3. Root kits, botnets
2. Key loggers and scrapers 4. Spyware, adware, spam
“Malware has, in fact, become professionalized.
Malware is now coded by professional software developers, often
working for organized crime.
Malware authors now employ encryption to make detection
more difficult, and, in the spirit of the best defense being a good
offense, aggressively target and remove security software and
even rival malware.
This evolution in the nature of malware behavior is forcing
security experts to change their approach to security, moving
from a threat recognition model to a behavior analysis model.”
Julius Yaw Ludu, MENG Slide 11 Data Link Institute
The Threat and the Players
Threat = [Equipment + Knowledge +Skills] + Intent
[ Capability ]
Information Reduce Decision Space,
National Strategic Advantage, Chaos,
Security Warrior Target Damage
Threats National Information for Political, Military,
Intelligence Economic Advantage
Terrorist Visibility, Publicity,
Chaos, Political Change
Shared
Industrial Competitive Advantage
Threats Espionage Intimidation
Organized Crime Revenge, Retribution, Financial
Gain, Institutional Change
Institutional Monetary Gain
Local Hacker Thrill, Challenge, Prestige
Threats Recreational Hacker Thrill, Challenge
Julius Yaw Ludu, MENG Slide 12 Data Link Institute
The loss of privacy and the concept of
“information prison”
Security threats are increasing in COMPLEXITY,
FREQUENCY and SEVERITY
Each week over 100 new viruses are identified and 60 new
vulnerabilities are discovered
There are over 57000 Hacker sites for people to peruse
$266 BILLION - Estimated cost of damages caused by
viruses and computer cracking in U.S. in 2015
(InformationWeek)
$1.6 TRILLION - Estimated worldwide loss last year due to
downtime resulting from security breaches and virus
attacks. (InformationWeek)
Julius Yaw Ludu, MENG Slide 13 Data Link Institute
Vulnerability Opportunities
New Vulnerabilities
Detected
10000
8000
6000
4000
2000
0
2000 2001 2002 2003
Julius Yaw Ludu, MENG Slide 14 Data Link Institute
Attack Approach
There are two primary methods that hackers rely
upon to disrupt the Web operations of major
companies and organizations:
attackers break into systems by "taking advantage
of holes in corporate operating systems and
applications that are out there on Web servers
attackers take advantage of easy-to-guess
passwords -- and this can come both from outside
hackers and from people working within company.
“
Julius Yaw Ludu, MENG Slide 15 Data Link Institute
Some Evidence; A wake Up Call
20 Young Hackers' Plot To Sabotage Internet
Investigations By FBI – TIMES
Four Israeli Youths have been arrested in that country on
suspicion of planning to disrupt computer systems - FBI
and Israeli national police
Code Red (Mountain Dew): 1 million computers affected;
Clean-up: $1.1 billion; Lost productivity: $1.5B
SINGAPORE Nov 13, 2003l– Two 15-year-old hackers have
been placed under probation for two years, one for
flooding his teacher’s e-mail inbox with more than 160,000
messages, the other for posing as the Education Minister
We have Dutch-born Jan de Wit, the 20-year-old who
wrote the Anna virus using an online worm generator kit
Julius Yaw Ludu, MENG Slide 16 Data Link Institute
Some Evidence; A wake Up Call
(Cont’d)
Michael Buen and Onel de Guzman, the 20-something
Filipino college students who allegedly wrote the
ILOVEYOU virus - 40 million computers affected; $8.7 billion
for clean-up and lost productivity
MafiaBoy, the 17-year-old Canadian who created one of the
best known denial-of-service attacks in February, 2000; and
Benjamin Troy Breuninger, the recently sentenced 22-year-
old who broke into the Lawrence Livermore Labs
A young hacker was caught breaking into NASA's
computers and sentenced to six months in jail - he took
possession of $1.7 million in software.
Curador is a 18-year old hacker from rural Wales who in the
winter of 2000 stole an estimated 26,000 credit cards
numbers from a group of e-commerce web sites, and
posted the numbers on the web.
Julius Yaw Ludu, MENG Slide 17 Data Link Institute
What is Ethics? (continued)
A teenager from the U.S. was trying to impress other youths
I was just running my mouth, trying to brag," said another
youth
"It was teenage talk, is what it was - "I've been throwing up
nonstop," said still another
“I did it for the thrill and challenge”
“I wanted to see if I could do it”
“I did not realize the consequences of my action”
“I wanted to be cool”
"it was the first time I was given complete power over
something - I could do whatever I wanted, and there was no
one there to do anything about it"
Julius Yaw Ludu, MENG Slide 18 Data Link Institute
The solution: Moral Leadership:
A 21st Century Imperative
Moral leadership is the key issue at all levels for the 21st Century.
Educators (and Parents) have the unique opportunity to teach
and to model such leadership. They can literally take the moral
high ground.
This opportunity has a price however. To walk-our-talk, to serve
as a voice of conscience to leaders, to prepare a discerning
citizenry and to avoid being hypocritical "do as I say, not as I do"
moralists, we must get our collective act together first.
Far too many kids aren't getting (character education) from
their parents," said Josephson, founder of Character Counts and
the Josephson Institute of Ethics. "And if the schools don't do it,
they won't learn it."
Programs that focus on six character elements: caring, civic
virtue and citizenship, justice and fairness, respect, responsibility
and trustworthiness.
Julius Yaw Ludu, MENG Slide 19 Data Link Institute
Digital Privacy - Protections
What Organizations Do to Protect Your Data
Identify risks to sensitive data
Implement information security program to ensure
adequate protection of sensitive data:
Policies and procedures
Incident response plans
Security awareness
Encryption of sensitive data
Technical security measures
Comply with industry standard security practices
Comply with applicable laws and regulations
Julius Yaw Ludu, MENG Slide 20 Data Link Institute
Digital Privacy – Protections
(Cont’d)
What You Can Do
Protect your PII - Personally Identifiable Information
Name + SSN, drivers license number, any financial
account number, address, phone number
Never give it out unless necessary
Don’t put it on social media, you can’t take it back
Be sure who you’re giving it to
Julius Yaw Ludu, MENG Slide 21 Data Link Institute
Digital Privacy – Protections (Cont’d)
What You Can Do
Practice good security
*Search and surf anonymously *Use strong privacy settings
*Read policies and agreements *Patch and apply upgrades
*Use current AV and firewalls *Use strong passwords
*Report Problems * Opt out
*Don’t click on anything unsolicited
Think – be smart!
Julius Yaw Ludu, MENG Slide 22 Data Link Institute
The Digital Economy And
Encryption
Cryptography allows for the protection of sensitive information,
either in storage or in communication, and is a necessary feature of
any secure e-commerce or electronic communication system
(including secure email and voice communication).
Encryption is the primary tool used for information security in the
digital age.
In its most basic form, encryption takes a message/document and
scrambles it so that only intended recipients can view its contents.
An unencrypted document—example, an email message—can be
viewed and understood by anyone who receives it; an encrypted
document, on the other hand, cannot be read or viewed by
unintended recipients, even if they possess the document itself.
Julius Yaw Ludu, MENG Slide 23 Data Link Institute
How Encryption Works
Encryption works by taking an original, unsecured
document called the cleartext and using a key to
transform it into a secured document the ciphertext.
Cryptography is not new; in fact, encryption in simple
forms has been in use for thousands of years.
However, modern encryption methods in widespread
use today involve complicated mathematical
algorithms
Julius Yaw Ludu, MENG Slide 24 Data Link Institute
Basic Types of Encryption (Symmetric)
Symmetric (or "private") system
In a symmetric system, the same key is used to both
encrypt and decrypt the document.
A common example of this form of encryption is the
password protection function of word processors.
This form of encryption is sufficient for protection of
personal documents, where a user wants to prevent
everyone but herself from accessing her files.(But
“The key-exchange problem”)
Julius Yaw Ludu, MENG Slide 25 Data Link Institute
Basic Types of Encryption
(Asymmetric)
Asymmetric key systems(or "public")
This uses 2 key system, one key(public key) for encryption, and
a separate key(the private key) for decryption.
The public key and the private key are mathematically related;
the breakthrough that led to the development of asymmetric
cryptography was the discovery of mathematical arrangements
that make it nearly impossible to derive the private key from a
user's public key.
Julius Yaw Ludu, MENG Slide 26 Data Link Institute
Advantages of Asymmetric Encryption
The ability to initiate a secure communications channel
between two parties who had never before
communicated and who could be complete strangers, and
even anonymous made possible the growth of all forms of
e-commerce on the Internet.
Asymmetric cryptography underlies Hypertext Transfer
Protocol Secure (HTTPS), which is the protocol that allows
for secure communication between servers and clients on
the World Wide Web.
Without asymmetric cryptography, it would be impossible
for users of the Internet to communicate securely with e-
commerce vendors, online banking websites, and the like.
Julius Yaw Ludu, MENG Slide 27 Data Link Institute
Factors that determines the strength
of Encryption Systems,
1. Key security is the responsibility of users, and hence is usually
the least secure component of a cryptography system.
2. The underlying algorithms have to be extensively researched
and tested to ensure mathematical security.
3. The key length: keys used should be long enough to make a
brute-force attack impractical.
Popular and widely-available encryption software, using tested
algorithms and sufficiently long keys, can make data virtually
impenetrable to attack.
Julius Yaw Ludu, MENG Slide 28 Data Link Institute
The Concept of Key Escrow
Because data that have been encrypted with a strong
cryptography system cannot be retrieved without the
decryption key, managing those keys is a matter of great
importance for organizations.
This is particularly important in the case of asymmetric
cryptography, where a single public-private key pair may be
used for innumerable communications and transactions; if the
private key is lost, all prior communications become
inaccessible, and the key pair itself becomes unusable.
To manage this risk, the concept of key escrow was developed.
With key escrow, a copy of each decryption key is placed in
escrow with a trusted third party (TTP); if the key holder loses
her copy of the key, the TTP can recover it.
Julius Yaw Ludu, MENG Slide 29 Data Link Institute
The Concept of Key Escrow (Cont’d)
Many large organizations operate their own key escrow
systems.
A more important example of a key escrow system, however,
is the case of certificate authorities (CAs).
Certificate authorities are organizations (either private
companies or governmental agencies) that issue public-private
key pairs to authenticated organizations or individuals.
For example, if an individual wants to start an e-commerce
website that uses encryption and is trusted by consumer web
browsers, that individual can request that a certificate
authority issue a key pair in her name.
The certificate authority will verify that the person requesting
the certificate is who she claims to be
Julius Yaw Ludu, MENG Slide 30 Data Link Institute
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 9 – The Digital Economy and Privacy
Regulation, Encryption and Terrorism (Cont’d)
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Data Link Institute
Topic One
THE DIGITAL ECONOMY AND PRIVACY
REGULATION, ENCRYPTION AND TERRORISM
(CONT’D)
Data Link Institute
Julius Yaw Ludu, MENG Slide 2 Department of Computer Science, UG
Cryptography Regulation
Most major countries regulate encryption, to varying degrees.
Encryption is regulated because it is a "dual-use" technology;
that is, it has both commercial and military value.
The United States pioneered the efforts to regulate
encryption during the Cold War.
Since then, U.S. encryption regulation has been driven by two
competing concerns:
(1) The ability of American high-tech industries to compete
in foreign markets; and
(2) The ability of criminals and terrorists to threaten
national security through the use of strong encryption.
Julius Yaw Ludu, MENG Slide 3 Data Link Institute
Cryptography Regulation:
The Wassenaar Arrangement.
In an effort to harmonize regulations on the export and import
of dual-use technologies, many countries have come together
and agreed to a set of principles known as the Wassenaar
Arrangement.
The stated goal of the Wassenaar Arrangement was "to
contribute to regional and international security and stability
by promoting transparency and greater responsibility in
transfers of conventional arms and dual-use goods and
technologies . . .“ Cryptography is classified as a dual-use good.
The Wassenaar Arrangement makes symmetric cryptography
products of up to 56 bit key length, and asymmetric
cryptography products of up to 512 bit key length, free from
export restriction.
Julius Yaw Ludu, MENG Slide 4 Data Link Institute
Cryptography Regulation:
The Wassenaar Arrangement. (Cont’d)
Furthermore, the Wassenaar Arrangement includes a
personal-use exemption, allowing individuals who travel
abroad to carry with them cryptography devices for their
personal use.
However, cryptography products that do not fall into
these exemptions are still eligible for restriction.
The Wassenaar Arrangement sets general parameters for
import and export control to which member states largely
adhere; however, the Wassenaar controls are not binding
on member states and are implemented at the discretion
of member governments.
Julius Yaw Ludu, MENG Slide 5 Data Link Institute
Impacts of Cryptography Regulations
Restrictions on cryptography have deleterious effects
on at least three groups:
Information Technology and security companies
wishing to compete in international markets;
Firms operating abroad that desire to use
cryptography to protect their data and
communications; and
Individuals and groups in countries with restrictions
on use of cryptography who would like to protect
their data from corporate or government
interference.
Julius Yaw Ludu, MENG Slide 6 Data Link Institute
Effects of Cryptography Regulations
on IT Industry
• Varying cryptography regulations worldwide place substantial
burdens on information technology and security firms looking
to expand into new markets.
• Many analysts believe for example, that the U.S. export
controls have placed American IT firms at a competitive
disadvantage vis-à-vis foreign competitors.
• Furthermore, all IT and security firms not just those based in
the U.S. face increased costs due to compliance with foreign
import requirements.
• Finally, to the extent that encryption regulations in major
markets (e.g. China) constrain demand for cryptography
services in those countries, security firms are disadvantaged.
Julius Yaw Ludu, MENG Slide 7 Data Link Institute
Effects of Cryptography Regulations
on IT Industry (Cont’d)
The effects of cryptography regulations on IT firms extend
beyond the market for cryptography software, however.
Many information technology products, services, and
businesses depend upon strong cryptography.
For example, e-commerce (exemplified by Amazon.com in the
U.S.) would not have flourished had customers feared that
every time they made a purchase online, they were placing
their credit card information at risk of compromise; yet this
fear would be justified in the absence of strong cryptography
to protect the information in transit.
By limiting the use of cryptography, countries hinder the
development of their IT and e-commerce markets in general
Julius Yaw Ludu, MENG Slide 8 Data Link Institute
Effects of Cryptography Regulations
on Global Economic Activities
Restrictions on the import and use of cryptography affect
businesses in several important ways.
If firms cannot use encryption devices to secure their data and
communications in a given country, then their intellectual
property in that country is put at substantial risk.
The situation is perhaps even worse where regulations are
unclear and inconsistently applied, as is the case in China,
Russia, and elsewhere; in such situations, a firm must decide
between avoiding cryptography but exposing its data to
compromise, and using cryptography but exposing itself to
sanctions.
Such regulatory uncertainty will tend to favor well-connected
firms at the expense of market newcomers, undermining the
Julius Yaw Ludu, MENG Slide 9 Data Link Institute
Effects of Cryptography Regulations
on Global Economic Activities (Cont’d)
Competitiveness of the market and discouraging new entrants
As Bruce Schneier, a noted encryption expert, observed, “Rules
are often hard to find and hard to follow [because]
governments want people not to do anything.”
Finally, limitations on the use of cryptography by individuals
and organizations remove a potent tool to preserve privacy
and communicate in the face of governmental opposition.
Encryption makes it far easier for human rights advocates,
dissent movements, and the like to communicate and organize.
Where encryption software is unavailable/illegal, movements
will find it much harder to organize. This can have deleterious
effects on the promotion of socially valuable change
Julius Yaw Ludu, MENG Slide 10 Data Link Institute
THE DIGITAL ECONOMY AND
TERRORISM
Globalization and the Internet are accelerating
terrorist activity and their quest for digital jihad.
Terrorists use the Internet
to achieve many of their
objectives.
Julius Yaw Ludu, MENG Slide 11 Data Link Institute
THE DIGITAL ECONOMY AND
TERRORISM (Cont’d)
The Internet allows small groups of non-state foes to
finance, plan, supply, and execute terrorist
operations globally with little regard to borders,
laws, and governments. ”
John Robb, Brave New War
Julius Yaw Ludu, MENG Slide 12 Data Link Institute
What is The Threat?
To identify the threat posed, we need to examine:
Terrorists’ use of the Internet
Cyber terrorism
Terrorism
No universal accepted definition of terrorism.
•Marsella defines terrorism as :
“ . . . the use of force or violence, by individuals or groups
that is directed toward civilian populations and intended
to instill fear as a means of coercing individuals or groups
to change their political and social positions”.
Julius Yaw Ludu, MENG Slide 13 Data Link Institute
Definitions: Terrorism and
Cyberterrorism
Like terrorism, cyberterrorism has different
connotations.
Denning holds that cyberterrorism “ . . . refers to highly
damaging computer-based attacks or threats of attack.
By non-state actors against information systems when
conducted to intimidate or coerce governments or
societies in pursuit of goals that are political or social.”
What distinguishes cyberterrorism from cyber war is that
non-state actors undertake cyberterrorism, whereas
nation states undertake cyber war.
Julius Yaw Ludu, MENG Slide 14 Data Link Institute
Definitions - Terrorism and
Cyberterrorism (Cont’d)
The Center on Terrorism and Irregular Warfare
Monterey, California conducted one of the first
comprehensive surveys of cyber terrorism
The Center’s original assessment and follow-on work
found that terrorists have at best a marginal and
cursory capability to carry out cyber terrorism.
Dr. Denning (2007) assessment, A View of
Cyberterrorism Five Years Later, reaches much the
same conclusion as well as others.
Current literature and research evidence simply does
not support an imminent threat of cyber terrorism.
Julius Yaw Ludu, MENG Slide 15 Data Link Institute
Electronic Jihad
While suicide attacks and improvised
explosives devices (IEDs) remain popular
with terrorists, this does not mean we
ignore the threat of cyber terrorism.
The Jamestown Foundation reports
how ‘electronic jihad’ organized and
coordinated attacks to wage economic
and ideological warfare is being promoted on the internet.
Dr. Alshech contends that while electronic jihad is capable
of causing some moderate damage to western economy,
there is no indication of an immediate threat.
Julius Yaw Ludu, MENG Slide 16 Data Link Institute
Internet Not A Terrorist Target
While electronic jihad promotes coordinated cyber attacks
using the Internet, the internet itself is not a terrorist
target.
For terrorists, the Internet is a computer-mediated
communication (CMC) platform for:
Recruiting
Training
Funding
Targeting
Information operations
Intelligence collection
Julius Yaw Ludu, MENG Slide 17 Data Link Institute
Principles of Behavior
Honesty
to be truthful in all our endeavors; to be honest and
forthright with one another and with customers,
communities, suppliers, and shareholders.
Integrity
to say what we mean, to deliver what we promise, to fulfill
our commitments, and to stand for what is right.
Respect
to treat one another with dignity and fairness, appreciating
the diversity of our workforce and the uniqueness of each
employee.
Trust
to build confidence through teamwork and open, candid
communication.
Julius Yaw Ludu, MENG Slide 18 Data Link Institute
Computer-Mediated Communication
(CMC)
Julius Yaw Ludu, MENG Slide 19 Data Link Institute
Convergence:
Terrorism, Crime, Internet
Terrorists have found that the Internet and criminal
activity (e.g., drug trafficking, financial scams, cyber-
crime, illegal money transfers, identity theft) gives
them ‘discrete advantages.’
For example, using the Internet and ATMs to move
money illustrates the creativity and sophistication of
terrorists and criminals.
An example of how terrorism, crime and the Internet
converge is found in the Bali disco bombing.
Julius Yaw Ludu, MENG Slide 20 Data Link Institute
Terrorism + Crime + Internet
= Operational Funding
• Bali, Indonesia Disco Bombing
• Two hundred and two people died in the Bali, Indonesia,
disco bombing of October 12, 2002.
• A suicide bomber blew himself up on a tourist-bar dance
floor, and then, moments later, a second bomber detonated
an explosives-filled Mitsubishi van parked outside.
• Now, the mastermind of the attacks Imam Samudra, a 35-
year-old Islamist militant with links to al-Qaeda has written a
jailhouse memoir that offers a primer on the more
sophisticated crime of online credit card fraud, which he
promotes as a way for Muslim radicals to fund their
activities.
Julius Yaw Ludu, MENG Slide 21 Data Link Institute
NetWar, Networking, and Information
Security
The Internet provides non-state actors a place and a means to
expand their influence, social network, and operational reach.
Arquilla and Ronfeldt defined ‘netwar’ as unconventional
decentralized warfare: nontraditional warfare carried out by
dispersed groups of activists (i.e., terrorists, criminals, gangs,
tribes, clans, militias) without a central command.
They often communicate and coordinate electronically via the
Internet.
Sullivan posits that netwar may result in a distinct and perhaps “
refined form of terrorism . . ." where ’inter-netted’ transnational
criminal organizations (TCOs), triads, cartels, cults, terrorists,
gangs, etc. replace their more state-oriented predecessors.
Julius Yaw Ludu, MENG Slide 22 Data Link Institute
Information and Operational Security
A terrorist survival kit (OPSEC
used by Al Qaeda and the Taliban
contained instructions on information and operational
security (OPSEC) for Internet and network communications.
“Internet use follows protocols based on using public
Internet cafés . . . never go to the same café repeatedly and
not using messages that will betray your ideological
commitment.”
Zanini and Edwards note terrorist networks’ information
security is bolstered by commercial encryption programs.
Denning observes there are reports suggesting jihadists are
using steganography, and an issue of The Technical Mujahid
refers to steganography.
Julius Yaw Ludu, MENG Slide 23 Data Link Institute
Social Engineering
Social engineering is a compilation of techniques used
to influence and manipulate people into divulging or
exposing guarded, sensitive or confidential
information.
Social engineering is similar to a confidence or fraud
scam.
It typically involves trickery, ruses and deception to
gather sensitive information or gain access to
computer network systems
Julius Yaw Ludu, MENG Slide 24 Data Link Institute
Character
HERACLITUS (c. 540 - c. 480 BC) -- Greek philosopher said "A
man's character is his fate.“
BOOKER T. WASHINGTON (1856-1915) -- African-American
educator said "Character is power."
RICHARD NIXON (1913-1994) said "With all the power that a
President has, the most important thing to bear in mind is this:
You must not give power to a man unless, above everything
else, he has character. Character is the most important
qualification the President of the United States can have."
LYNDON JOHNSON (1908-1973) "The fact that a man is a
newspaper reporter is evidence of some flaw of character."
CALVIN COOLIDGE (1872-1933) "Character is the only secure
foundation of the state.“
THEODORE ROOSEVELT “To Educate A Person In Mind And
Not In Morals Is To Educate A Menace Society”
Julius Yaw Ludu, MENG Slide 25 Data Link Institute
Using social engineering techniques,
this trio stole more than 37,000 credit
card numbers.
Left to right, Waseem Mughal, Younis Tsouli and Tariq
al-Daour. The three men pleaded guilty to a terrorism
charge in the UK.
$3.5 million in fraudulent charges and purchases
Hundreds of prepaid cell phones acquired
More than 250 airline tickets obtained, using 110
different credit cards at 46 airlines and travel agencies
Julius Yaw Ludu, MENG Slide 26 Data Link Institute
Code of Ethics Canons (Cont’d)
Provide diligent and competent service to principals
Preserve the value of their systems, applications, and
information.
Avoid conflicts of interest or the appearance thereof.
Advance and protect the profession
Sponsor for professional advancement those best
qualified. All other things equal, prefer those who are
certified and who adhere to these canons. Avoid
professional association with those whose practices
or reputation might diminish the profession.
Take care not to injure the reputation of other
professionals through malice or indifference.
Julius Yaw Ludu, MENG Slide 27 Data Link Institute
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 10 – PUBLIC POLICY AND GLOBAL
ECONOMY (CON’D)
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius Yaw Ludu, MENG Slide 1 Department of Computer Science, UG
Topic One
PUBLIC POLICY AND GLOBAL ECONOMY
(CONT’D)
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
Public policy development: The policy
life cycle
As countries develop, they deal with problems
through effective public policies
But, other problems (e.g., air pollution, ozone
depletion) arise that require further public policy
development
Policy life cycle: the predictable course of policy
development
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
The policy life cycle
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
The recognition stage of a policy life
cycle
Is low in political weight
Begins with early perceptions of a problem
Results from published scientific research
The media popularize the information
Public involvement starts the political process
Dissension is high because opposing views surface
The problem gets attention from some level of
government
The possibility of addressing it with public policy is
considered
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
The formulation stage of a policy life
cycle
A stage of rapidly increasing political weight
The public is aroused and debates policy options
Political battles occur over regulation and who pays
for it
High media coverage
Politicians hear from their constituencies and lobbyists
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
The implementation stage of a policy
life cycle
The real political and economic costs are exacted
The policy has been determined
Focus moves to regulatory agencies
Public concern and political weight decline
The media lose interest
The emphasis shifts to development and enforcement
of regulations
Industry learns how to comply
As all players gain experience with the policy attention
is paid to efficiency and equity
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
The control stage of a policy life cycle
Years have passed since the recognition stage
Policies are supported
They become embedded in society
However, they are vulnerable to political shifts
Regulations become streamlined
The public may forget there was a serious problem
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
Different problems are in different
stages
Countries in different stages of development are in
different stages of the policy life cycle for any
problem
Developing countries have serious problems because
public policies have not caught up with the need for
control
Discrepancies result from the costs of development
and implementation of public policy
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Global trade Policy Issues
Global trade cannot be judged only on the basis of
theories and analyses. Government policies reflect
objectives that go beyond simple measures of cost and
benefit. Hence, we observe a number of debates on
the policies of global trade. The following are the main
topics:
Free trade vs. protectionism
Liberalization in the developing world
The role of the World Trade Organization (WTO)
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
Free trade
Free trade means there will be no
restrictions on either exports or imports
in the form of
Tariffs
Subsidies
Quotas
Restrictions
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
Cases for free trade
The first case for free trade is the argument that
producers and consumers allocate resources most
efficiently when governments do not distort market
prices through trade policy.
National welfare of a small country is highest with free
trade. With restricted trade, consumers pay higher
prices.
With restricted trade, distorted prices cause
overproduction either by existing firms producing
more or by more firms entering the industry.
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
Cases for free trade (cont.)
The efficiency
argument for
free trade
suggests that a
trade
restriction, such
as a tariff, leads
to production
and
consumption
distortions.
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
Cases for free trade (cont.)
When quotas are used instead of tariffs, costs can be
magnified through rent seeking.
To seek quota licenses or the rights to sell a
restricted number of imports and the profit that they
will earn, individuals or institutions need to spend
time and other resources.
Thus, another reason why trade allocates resources
efficiently is that it avoids the loss of resources
through rent seeking.
Julius Yaw Ludu, MENG Slide 14 Department of Computer Science, UG
Cases for free trade (cont.)
A second argument for free trade is that it allows
firms or industry to take advantage of economies of
scale.
A third argument for free trade is that it provides
competition and opportunities for innovation.
These are dynamic benefits, unlike the static benefits
of eliminating the efficiency losses caused by distorted
prices and overproduction.
Julius Yaw Ludu, MENG Slide 15 Department of Computer Science, UG
Cases for free trade (cont.)
A fourth argument, called the political argument for
free trade, says that free trade is the best feasible
political policy, even though there may be better
policies in principle.
Any policy that deviates from free trade would be
quickly manipulated by political groups, leading to
decreased national welfare.
Julius Yaw Ludu, MENG Slide 16 Department of Computer Science, UG
Cases against free trade
For a “large” country, a tariff or quota lowers the
price of imports in world markets and generates a
terms of trade gain.
This benefit may exceed the losses caused by
distortions in production and consumption.
In fact, a small tariff will lead to an increase in national
welfare for a large country.
But at some tariff rate, the national welfare will begin
to decrease as the economic efficiency loss exceeds
the terms of trade gain.
Julius Yaw Ludu, MENG Slide 17 Department of Computer Science, UG
Cases against free trade (cont.)
For a large country, there is an optimum tariff to at
which the marginal gain from improved terms of
trade just equals the marginal efficiency loss form
production and consumption distortions.
Julius Yaw Ludu, MENG Slide 18 Department of Computer Science, UG
Cases against free trade (cont.)
A tariff rate that completely prohibits imports leaves a
country worse off, but tariff rate t0 may exist that
maximizes national welfare: an optimum tariff.
An export tax (a negative export subsidy) that
completely prohibits exports leaves a country worse
off, but an export tax rate may exist that maximizes
national welfare through the terms of trade.
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
Cases against free trade (cont.)
An export subsidy lowers the terms of trade for a
large country; an export tax raises the terms of trade
for a large country.
An export tax may raise the price of exports in the
world market, increasing the terms of trade.
A second argument against free trade is that
domestic market failures may exist that cause free
trade to be a suboptimal policy.
Julius Yaw Ludu, MENG Slide 20 Department of Computer Science, UG
Cases against free trade (cont.)
Types of market failures include:
Persistently high under-employment of workers
surpluses that are not eliminated in the market for
labor because wages do not adjust
Persistently high under-utilization of structures,
equipment and other forms of capital
surpluses that are not eliminated in the market for
capital because prices do not adjust
Julius Yaw Ludu, MENG Slide 21 Department of Computer Science, UG
Cases against free trade (cont.)
Technological benefits for society discovered through
private production, but from which private firms can
not fully profit.
Environmental costs for society caused by private
production, but for which private firms do not fully
pay. Property rights that are not well defined or well
enforced
Sellers that are not well informed about the
(opportunity) cost of production or buyers that are
not well informed about value from consumption
Julius Yaw Ludu, MENG Slide 22 Department of Computer Science, UG
Cases against free trade (cont.)
Economists calculate the marginal social benefit to
represent the additional benefit to society from
private production.
With a market failure, marginal social benefit is not
accurately measured by the producer surplus of
private firms, so that economic efficiency loss
calculations are misleading.
It is possible that when a tariff increases domestic
production, the benefit to domestic society will
increase due to a market failure.
Julius Yaw Ludu, MENG Slide 23 Department of Computer Science, UG
Cases against free trade (cont.)
The Domestic Market
Failure Argument for
a Tariff suggests that
if production of a
good yields extra
social benefits
(measured in panel
(b) by area (c) not
captured as producer
surplus), a tariff can
increase welfare.
Julius Yaw Ludu, MENG Slide 24 Department of Computer Science, UG
Cases against free trade (cont.)
The domestic market failure argument against free
trade is an example of a more general argument called
the theory of the second best.
This theory states that government intervention
which distorts market incentives in one market may
increase national welfare by offsetting the
consequences of market failures elsewhere.
Julius Yaw Ludu, MENG Slide 25 Department of Computer Science, UG
Decision
Now it’s your turn to decide between free trade and
protectionism
Julius Yaw Ludu, MENG Slide 26 Department of Computer Science, UG
Trade liberalization in developing
economies
There is some evidence that low and middle income
countries which had relatively free trade had higher
average economic growth than those that followed
import substituting industrialization.
But this claim is a matter of debate.
Regardless, by the mid-1980s many governments had
lost faith in import substituting industrialization and
began to liberalize trade.
Julius Yaw Ludu, MENG Slide 27 Department of Computer Science, UG
Trade liberalization (cont.)
The Growth of Developing-Country Trade
Trade liberalization after 1985 led to a surge in both
imports and exports as a percentage of GDP in the
developing world.
Julius Yaw Ludu, MENG Slide 28 Department of Computer Science, UG
Trade liberalization (cont.)
As with import substituting industrialization,
economic development was the ultimate goal of trade
liberalization.
Has trade liberalization promoted development?
The evidence is mixed.
Growth rates in Brazil and other Latin American
countries have been slower since trade liberalization
than they were during import substituting
industrialization,
Julius Yaw Ludu, MENG Slide 29 Department of Computer Science, UG
Trade liberalization (cont.)
But unstable macroeconomic policies and financial
crises contributed to slower growth since the 1980s.
Other countries like India have grown rapidly since
liberalizing trade in the 1980s, but it is unclear to what
degree liberalized trade contributed to growth.
Some economists also argue that trade liberalization
has contributed to income inequality, as the
Hechscher-Ohlin model predicts.
Julius Yaw Ludu, MENG Slide 30 Department of Computer Science, UG
Trade liberalization (cont.)
Instead of import substituting industrialization,
several countries in East Asia adopted
trade policies that promoted exports in targeted
industries.
Japan, Hong Kong, Taiwan, South Korea, Singapore,
Malaysia, Thailand, Indonesia, and China are countries
that have experienced rapid growth in various export
sectors and rapid economic growth in general.
These economies or a subset of them are sometimes
called “high performance Asian economies.”
Julius Yaw Ludu, MENG Slide 31 Department of Computer Science, UG
International negotiations of trade
policy (cont.)
Multilateral negotiations mobilize exporters to
support free trade if they believe export markets will
expand.
This support would be lacking in a unilateral push for
free trade.
This support counteracts the support for restricted
trade by import-competing groups.
Multilateral negotiations also help avoid a trade war
between countries.
Julius Yaw Ludu, MENG Slide 32 Department of Computer Science, UG
World Trade Organization
The WTO negotiations addresses trade restrictions in at
least 3 ways:
Reduction of tariff rates through multilateral
negotiations.
Binding: a tariff is “bound” by having the imposing
country agree not to raise it in the future.
Prevention of non-tariff barriers: quotas and export
subsidies are changed to tariffs because the costs of
tariff protection are more apparent.
Julius Yaw Ludu, MENG Slide 33 Department of Computer Science, UG
World Trade Organization (cont.)
The World Trade Organization was founded in 1995 on
a number of agreements:
General Agreement on Tariffs and Trade: covers
trade in goods
General Agreement on Tariffs and Services: covers
trade in services (ex., insurance, consulting, legal
services, banking).
Agreement on Trade-Related Aspects of Intellectual
Property: covers international property rights (ex.,
patents and copyrights).
Julius Yaw Ludu, MENG Slide 34 Department of Computer Science, UG
World Trade Organization (cont.)
The World Trade Organization was founded in 1995
on a number of agreements (cont.):
The dispute settlement procedure: a formal
procedure where countries in a trade dispute can
bring their case to a panel of WTO experts to rule
upon.
The cases are settled fairly quickly: even with
appeals the procedure is not supposed to last
more than 15 months.
Julius Yaw Ludu, MENG Slide 35 Department of Computer Science, UG
World Trade Organization (cont.)
The World Trade Organization was founded in 1995
on a number of agreements (cont.):
The panel uses previous agreements by member
countries to decide which ones are breaking their
agreements.
A country that refuses to adhere to the panel’s
decision may be punished by allowing other
countries to impose trade restrictions on its
exports.
Julius Yaw Ludu, MENG Slide 36 Department of Computer Science, UG
World Trade Organization (cont.)
The GATT/WTO multilateral negotiations, ratified in
1994 (called the Uruguay Round),
agreed that all quantitative restrictions (ex., quotas)
on trade in textiles and clothing as previously
specified in the Multi-Fiber Agreement were to be
eliminated by 2005.
But as the restrictions were eliminated, China had to
re-impose quotas until 2011 due to political pressure.
Julius Yaw Ludu, MENG Slide 37 Department of Computer Science, UG
World Trade Organization (cont.)
In 2001, a new round of negotiations was started in
Doha, Qatar, but these negotiations have failed to
produce an agreement.
Most of the remaining forms of protection are in
agriculture, textiles and clothing—industries that are
politically active.
Julius Yaw Ludu, MENG Slide 38 Department of Computer Science, UG
Activity/Essay
1. After examining the arguments for and against
free trade, it’s your turn to decide. Write an
essay on free trade justifying your opinion.
Julius Yaw Ludu, MENG Slide 39 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 11 – Public Policy and Global Economy
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius Yaw Ludu, MENG Slide 1 Department of Computer Science, UG
Topic One
PUBLIC POLICY AND GLOBAL ECONOMY
(CONT’D)
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
Definition of Corruption
Corruption often is defined as: “The abuse of
entrusted power for private gain”.
While this broad statement encompasses all different
forms of illicit and illegal acts in which corrupt
behavior is manifested, it does not attempt to
enumerate or precisely delimit them.
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
The United Nations Global Compact
The United Nations Global Compact was launched at
the UN Headquarters in 2000.
It was the result of a speech by then UN Secretary-
General Kofi Annan at the World Economic Forum in
1999, proposing that business and the UN jointly
initiate a “global compact of shared values and
principles, which will give a human face to the global
market”.
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
The United Nations Global Compact
The United Nations Global Compact is a call to companies
everywhere to voluntarily align their operations and
strategies with ten universally accepted principles in the
areas of human rights, labor, environment and anti-
corruption, and to take action in support of UN goals and
issues.
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Background to the GC
Announced in a speech by UN Secretary General Kofi
Annan at the World Economic Forum in Davos,
Switzerland, in 1999
“I propose that you, the business leaders, and we, the
United Nations, initiate a global compact of shared
values and principles, which will give a human face to
the global market.”
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Understanding the UN Global Compact
An international initiative designed to bring companies
together with UN agencies, labour, NGOs, and other civil
society actors with the aim of fostering action and
partnerships for a more sustainable and inclusive global
economy
Relies on the enlightened self-interest of companies, labour
organisations and civil society bodies to initiate and share
substantive action in pursuing the principles
Seeks to provide a contextual framework to encourage
innovation, creative solutions, and good practices among
participants
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
Benefits of participating in the Global
Compact
Provides access to practical solutions to globalisation,
sustainable development and CSR problems
By engaging, business leaders demonstrate leadership
with regards to responsible corporate citizenship
Provides companies with access to UN expertise
Offers simple framework for engagement without
expensive certification and intrusive monitoring
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
The UN Global Compact against
corruption:
“Businesses should work against corruption in all its
forms, including extortion and bribery”.
Implementation of the 10th Principle entails avoiding
bribery, extortion and other forms of corruption, as
well as proactively developing policies and concrete
programmes to address the risk and actual instances
of corruption internally and within their supply chains.
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Key characteristics of the Global
Compact
A learning approach
A diversity of actors and approaches
A decentralised network
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
The Global Compact: Key Characteristics
A Learning Approach
Learning focus on how business can respect
universal values
Many ways to achieve goals
Underlying objective of encouraging innovation
and creative solutions
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
The Global Compact: Key Characteristics
A Decentralised Network
The UN Global Compact Office (in New York) and
various agency focal points
Not a large bureaucracy
The Global Compact relies on the actions of those
involved
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
The Global Compact: Key Characteristics
The Global Compact is not:
A code of conduct
A mechanism to check compliance
A mandatory set of guidelines
A regulatory system
An attempt to shift governmental responsibilities
to business
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 12 – Public Policy and Global Economy
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius Yaw Ludu, MENG Slide 1 Department of Computer Science, UG
Topic One
PUBLIC POLICY AND GLOBAL ECONOMY
(CONT’D)
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
3
International Nature of Cyber Crime
Access/mobility of data fundamental to economic
systems
Borders by-passed
Exploitation by criminals & terrorists
data hidden abroad
hackers and viruses abroad
economic criminals abroad
illegal content abroad
communicate to plan
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
International Nature of Cybercrime
Minimal risk of detection and apprehension
Different national laws
Crime is borderless but enforcement is constrained by
borders
International cooperation is essential
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
5
Harmonization of National Laws
Common framework required
But , no universal consensus of:
types of “computer crime”
set of procedural powers
specifics of definition or scope
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
6
Harmonization of National Laws
Lack of harmonization creates problems:
no common understanding of problem and how to
respond
sovereignty (e.g., trans-border search)
dual criminality
treaties may not include necessary investigative powers
No truly international fora
Problems regarding international cooperation inter-
related with harmonization of substantive & procedural
law
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
7
Inter-relation with procedural law
International investigative powers are coextensive
with domestic powers:
search or production of data
preservation of stored data
collection of traffic data
interception of communications
Obtain evidence and trace communications
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
8
Legal Framework for International
Cooperation
Mutual legal assistance
scope of cooperation
mechanics of cooperation
general obligations
specific investigative powers
Extradition
dual criminality
nationality
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
9
Mutual Legal Assistance:
Scope of cooperation
Scope of offences
crimes against access, integrity & availability
crimes committed by means of computers
• facilitate communication crimes
• facilitate communication to plan crimes
collect electronic evidence of any crime
Types of investigative powers
approximate domestic powers
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
10
Mutual Legal Assistance: Mechanics of
cooperation
Conventions are generally independent of bilateral or
other treaties
Council of Europe Convention - hybrid
convention serves as basis
existing treaties take precedence
convention supplements or applies in absence of
other treaties
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG
11
Mutual Legal Assistance: General
obligations
Afford MLA to widest extent possible
MLA subject to law of requested state or applicable
treaties
If no pre-existing arrangement, supplement with new
provisions
Julius Yaw Ludu, MENG Slide 11 Department of Computer Science, UG
12
Mutual Legal Assistance: Specific
powers
Employ both traditional and new investigative powers
Preservation of stored data
volatility of data, inherent delays, increased threat
of loss
provisional measure to secure availability
• rapid
• protects privacy
• safeguards (e.g., intent to make MLA request;
time limits)
Julius Yaw Ludu, MENG Slide 12 Department of Computer Science, UG
13
Mutual Legal Assistance: Specific
powers
Dual criminality
modern trend to eliminate or restrict
preservation less intrusive
verification counter-productive to quick provisional
measure
early stages - extent of criminality unknown
Council of Europe compromise
may refuse to preserve if reasons to believe that at
time of disclosure dual criminality can not be met
Julius Yaw Ludu, MENG Slide 13 Department of Computer Science, UG
14
Mutual Legal Assistance: Specific
powers
Expedited preservation and disclosure of preserved
traffic data
essential to trace communications
traffic data reveals source, path and destination of
a specific communication
multiple service providers
preservation at each service provider
disclosure of sufficient amount of data to
identify next service provider and path
cross-border and MLA
Julius Yaw Ludu, MENG Slide 14 Department of Computer Science, UG
15
Mutual Legal Assistance: Specific
powers
Search, access and disclosure
apply to electronic data
system searches
avoids trans-border search
Real-time collection of traffic data
historical tracing may not be possible
crime may require immediate tracing
cross-border and MLA
Council of Europe - reservation
Julius Yaw Ludu, MENG Slide 15 Department of Computer Science, UG
16
Mutual Legal Assistance: Specific
powers
Interception of content data
content may be illegal or afford evidence of crime
privacy issues
Council of Europe
• only to extent permitted by Parties’ laws and
treaties
• convention not provide independent basis
Julius Yaw Ludu, MENG Slide 16 Department of Computer Science, UG
17
Mutual Legal Assistance:
Specific powers
Safeguards
subject to law of requested state
safeguards in definition of powers
Council of Europe
subject to national safeguards, which must:
• protect human rights under applicable
conventions between Parties
• provide proportionality, judicial or other
supervision, justifying grounds, limitations on
scope and duration
consider impact on third parties
Julius Yaw Ludu, MENG Slide 17 Department of Computer Science, UG
18
Extradition
Dual criminality and harmonization of law
Council of Europe
convention may serve as basis
precedence given to existing treaties
refusal on grounds of nationality
• obligation to investigate and prosecute
Julius Yaw Ludu, MENG Slide 18 Department of Computer Science, UG
19
G8
Washington, D.C., 1997:
Principles and Action Plan to Combat High-tech Crime
Moscow, Russia, 1999:
Principles on Transborder Access to Stored Computer Data
Mont Tremblant, Canada, 2002:
Recommendations for Tracing Networked Communications
Across National Borders in Terrorist and Criminal
Investigations
Principles on the Availability of Data Essential to Protecting
Public Safety
G8 Statement on Data Protection Regimes
Data Preservation Checklists
Julius Yaw Ludu, MENG Slide 19 Department of Computer Science, UG
20
Commonwealth
Model Law on Computer Related Crime, 2002
Guide to assist
Influenced by text of Council of Europe Convention
Common framework with Council of Europe
Julius Yaw Ludu, MENG Slide 20 Department of Computer Science, UG
21
24-7 Network
Need for coordinated law enforcement contacts
G8
Council of Europe
Julius Yaw Ludu, MENG Slide 21 Department of Computer Science, UG
22
Inter-American Conventions
Consider extent to which Conventions require
amendment or protocol to:
incorporate new investigative techniques
supplement existing bilateral treaties
provide additional safeguards
24/7 Network
Julius Yaw Ludu, MENG Slide 22 Department of Computer Science, UG
23
Recommendations
Agree to common concepts of crime
Agree to common list of investigative powers
Investigative powers should:
apply not only to computer-related crime but to
collection of evidence of any crime
balance powers with privacy and human rights
provide ability to trace communications
be available for MLA
Cont’d
Julius Yaw Ludu, MENG Slide 23 Department of Computer Science, UG
24
Information Policy
Defined as “any law, regulation, rule, or practice
(written or unwritten) that affects the creation,
acquisition, organization, dissemination, or
evaluation of information
Generally discussed in terms of government
legislation
Includes information technologies for
educational and industrial uses;
telecommunications; privacy issues; computer
regulations and crimes; copyright and intellectual
freedom; and government information systems
Julius Yaw Ludu, MENG Slide 24 Department of Computer Science, UG
25
Elements of Information Policy
Common elements in any national information policy
would thus include
being open,
accessible,
universal and
flexible
Julius Yaw Ludu, MENG Slide 25 Department of Computer Science, UG
CSIT 304
IT IN THE GLOBAL ECONOMY
Session 13 – Public Policy and Global Economy
(Cont’d)
Lecturer: Julius Yaw Ludu, MENG
Contact Information: mcclyconsult@gmail.com
UNIVERSITY OF GHANA
Department of Computer Science
2016/2017 Academic Year
Julius Yaw Ludu, MENG Slide 1 Department of Computer Science, UG
Topic One
PUBLIC POLICY AND GLOBAL ECONOMY
(CONT’D)
Julius
JuliusYaw
YawLudu,
Ludu,MENG
MENG Slide 2 Department of Computer
Department Science,
of Computer UG UG
Science,
What is the NII?
A broad approach to maximising the value of
information to the nation and to society
A representation of a Government Information
Strategy
An information parallel to the National (physical)
Infrastructure
A structured approach to releasing the greatest
benefit from our information
A manageable initiative to create, make readily
available and publicise an entity and framework to
promote availability and best practice in fostering
openness and the information ecosystem
Julius Yaw Ludu, MENG Slide 3 Department of Computer Science, UG
What topics are covered in the NII?
Data, policies about its availability, standards,
applications of the data, producers and users, tools,
organisations involved, etc.
Potentially, all relevant data matters are in scope
Realistically, focussed on information and processes
that government can most readily influence – and are
high priorities
Julius Yaw Ludu, MENG Slide 4 Department of Computer Science, UG
What information is in the NII?
Potentially a wide range of data but focussed first on
PSI
Not just central government data - devolved
governments, LAs, health, etc, private sector
involved in public (and infrastructure,
communications) services plus independent and
voluntary sectors where they too provide publicly
funded or (tax-) subsidised services
PSI is a wide definition and is sometimes blended
with data from non-public sources
Julius Yaw Ludu, MENG Slide 5 Department of Computer Science, UG
Private data in the NII
Can be personal or commercial confidential
Public confidence must be assured
Anonymity must be assured
There are proven good ways to release anonymised
sensitive data
An important element of PSI - needs special attention
Julius Yaw Ludu, MENG Slide 6 Department of Computer Science, UG
Who are the data providers for NII?
Central government departments
Devolved administrations
Key public facing sectors such as local government,
health and social services
Near-government (e.g. transport, privatised utilities,
those who government pays)
Non-government sources where there is a public
sector interest
Julius Yaw Ludu, MENG Slide 7 Department of Computer Science, UG
What are the NII applications?
A vast array – known and unknown
There is a need to better understand usage and
applications for input to prioritisation and investment.
The pace of change in electronic methods will greatly
increase the scope and value of data
The NII is a living entity
Julius Yaw Ludu, MENG Slide 8 Department of Computer Science, UG
Is the NII the same as Open Data?
The NII is a broader concept that embraces Open Data
Government plans for OD are a relevant and
important component of the NII.
Julius Yaw Ludu, MENG Slide 9 Department of Computer Science, UG
Why is the NII so important?
The information economy is already worth £billions
and growing rapidly
There is considerable waste from duplication and data
misuse
Better data availability in the widest sense will lead to
better applications – quality, relevance, openness,
value
Julius Yaw Ludu, MENG Slide 10 Department of Computer Science, UG