Vers un indice de vulnérabilité numérique (OIF)

4 Dec 2023 11:30h - 13:00h UTC

official event page

Table of contents

Disclaimer: This is not an official record of the UNCTAD eWeek session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the UNCTAD website.

Full session report

Kamilia Amdouni

The analysis reveals several key points and arguments related to digital threats and cybersecurity. Firstly, there is a growing number of digital threats, including attacks on critical sectors, disinformation, and fake news. These threats are not only harmful but also specifically targeted, posing significant challenges to society.

Furthermore, the impact of these threats extends beyond technology and finance, with limited analysis of their social and human impacts on vulnerable communities. Cybersecurity has financial implications, and the current understanding of the impact of cyber threats is lacking. Vulnerable communities are disproportionately affected by these threats, exacerbating existing inequalities.

To accurately assess risks and vulnerabilities, an impact-based approach is essential. This approach aids in understanding vulnerabilities and predicting potential consequences of threats. By adopting this approach, organisations and policymakers can gain more accurate insights into the risks they face in the digital landscape.

The analysis also highlights the importance of collaboration between the development assistance and cybersecurity communities. Currently, these communities work in isolation, and there are limited integration efforts to incorporate cybersecurity aspects into development assistance programmes. By bringing them together, there is an opportunity for more effective handling of digital vulnerabilities.

Additionally, non-material cyber threats and vulnerabilities can have significant implications. Examples of non-material threats include harmful software, phishing, and the propagation of fake news. These threats can cause financial and operational disruptions, emphasising the importance of addressing them.

Critical sectors and infrastructure are prime targets for cyber attacks. Mapping vulnerabilities at the ecosystem level is crucial to identify and mitigate potential risks. During the COVID-19 pandemic, many cyber attacks specifically targeted the health sector, underscoring the need for comprehensive vulnerability mapping.

To accurately assess digital vulnerability, a regulatory element is vital. The existing legal frameworks often lag behind technological advancements, and a digital vulnerability index must consider the legal and regulatory environment in which threats occur.

Furthermore, data utilisation and management regulations play an instrumental role in addressing digital threats. The monetisation of data tends to benefit powerful actors while restricting access for smaller start-ups. Existing documents highlight principles for data regulation but lack specific regulations. In parts of Africa, data adoption is limited due to various factors, indicating the need for more comprehensive regulations.

The Digital Vulnerability Index, which aims to assess digital vulnerability, should be user-friendly to ensure its efficient application. For example, start-ups can use this index to understand and address vulnerabilities without relying on external financial assistance. Decision makers can easily integrate this index into their decision-making process.

The analysis also uncovers the prevalence of new forms of digital divide, where users in regions such as Senegal may have stable internet connections but are confronted with new divides related to internet content. The lack of clear regulations for content such as TikTok and WhatsApp prevents users from accessing educational content, exacerbating inequalities.

Lastly, the analysis emphasises the need to consider the ethical dimension in digital regulation. As technology advances rapidly, legislation often struggles to keep pace. It is important to envision the type of world we want to live in and ensure that digital regulations align with ethical considerations and human rights.

In conclusion, this comprehensive analysis highlights the increasing number of digital threats and the need for robust cybersecurity measures. It calls for collaboration between the development assistance and cybersecurity communities, an impact-based approach for risk analysis and vulnerability assessment, and the incorporation of a regulatory element in the Digital Vulnerability Index. Additionally, data utilisation and management regulations, user-friendliness of the index, addressing new forms of digital divide, and ethical considerations in digital regulation are crucial for creating a secure and equitable digital landscape.

Minata Sarr

The rapid advancement and evolution of digital technologies have brought about structural changes in our world. This transformation necessitates a shift in our paradigm to effectively adapt to the new landscape. These digital technologies have become central to our lives and are driving significant changes in various sectors such as communication, economy, and societal interactions. The positive sentiment towards this change highlights the potential benefits and opportunities that digital technologies offer.

Furthermore, the concept of vulnerability assumes great importance when considering the pursuit of inclusive agendas and focusing on humanity. It is recognised that the survival and flourishing of humanity depend on creating a better world. In this context, the Sustainable Development Goals (SDGs) have emphasised the need for concrete actions to promote inclusiveness. This positive sentiment highlights the recognition of vulnerabilities and the importance of addressing them for the betterment of society. The prism of vulnerability acts as a lens through which we can identify and address the inequalities and challenges that different communities face.

In the realm of digital vulnerability, an indicator for measuring the extent of vulnerability becomes paramount in guiding decision-making and policy implementation. This positive sentiment underscores the importance of having a concrete and reliable metric to identify areas of vulnerability and to formulate targeted strategies to address them. With the increasing reliance on digital technologies, the indicator for digital vulnerability can help direct policy actions towards building a safe and secure digital environment.

Another noteworthy observation is the shift in focus from a punitive approach to a preventive approach in terms of regulation. Rather than solely relying on sanctions, the focus now lies in preserving what we have and sharing the responsibility among different sectors and actors. This positive sentiment reflects the recognition that prevention is better than punishment when it comes to regulating digital technologies. By encouraging responsible behaviour and creating a culture of accountability, the aim is to foster a secure and sustainable digital ecosystem.

In conclusion, the transformative power of digital technologies necessitates a change in our mindset and approaches to adapt to the evolving world. Recognising vulnerability, pursuing inclusiveness, and implementing measures to address digital vulnerabilities are crucial in navigating this new landscape. The shift towards a preventive approach in regulation further reinforces the need to prioritise preservation and responsibility. By embracing these changes, we can harness the potential of digital technologies to create a better and more inclusive world.

Joël Cariolle

The participants in the discussion emphasize the importance of an inclusive indicator that encompasses digital risks and exposure. They argue that such an indicator would be beneficial in raising awareness among various actors and stakeholders about the phenomenon of digitalization. However, integrating regulatory and technical elements of cybersecurity into this indicator is seen as vital by the participants. Without incorporating these elements, the indicator may not accurately reflect the true nature of digital risks and exposure. Including regulatory and technical aspects, the indicator can provide a comprehensive view of potential risks and vulnerabilities in the digital landscape.

On the other hand, there are concerns about the feasibility and usability of this indicator in different contexts. The quality of data in developing countries is often inferior compared to developed countries. This discrepancy poses a challenge in accurately measuring and assessing digital vulnerability in these nations. The lack of reliable data may hinder the effectiveness of the indicator in identifying and addressing digital risks and exposure in developing countries.

Another important point raised is the changing nature of digital vulnerability with the progress of digitalization. Initially, vulnerabilities may be linked to material infrastructure, such as physical devices and networks. However, as digitalization advances, the focus shifts towards cyber threats. The increasing reliance on digital systems and networks makes them more susceptible to large amplitude cyber-attacks. These attacks have the potential to not only disrupt the digital system but also impact the economy as a whole.

In conclusion, the participants agree on the usefulness of an inclusive indicator for digital risks and exposure. It would provide valuable insights and awareness among stakeholders regarding the phenomenon of digitalization. However, the challenges of integrating regulatory and technical elements of cybersecurity, as well as the feasibility and usability of the indicator in different contexts, should be carefully considered. The changing nature of digital vulnerability further highlights the importance of addressing cyber threats as digitalization progresses. Overall, this discussion sheds light on the complexities and considerations associated with measuring and mitigating digital risks and exposure.

Audience

The speakers in the discussion acknowledged several factors that contribute to digital debates or vulnerabilities. These factors include geographic location, economic development, technology advancement, infrastructure, and security concerns. Each of these factors plays a significant role in shaping the digital landscape and can influence the occurrence or vulnerability of digital debates.

Moreover, the speakers emphasized the importance of addressing these issues through various means. Economic development was highlighted as a powerful tool in overcoming digital debates or vulnerabilities. By investing in industries, innovation, and infrastructure (as outlined in SDG 9: Industry, Innovation, and Infrastructure), societies can strengthen their digital capabilities and reduce the potential for debates or vulnerabilities.

Capacity building was also emphasized as a way to address these challenges. This entails developing the skills and knowledge required to effectively navigate the digital landscape. It ensures that individuals and communities are equipped to make informed decisions and are less likely to fall victim to vulnerabilities or participate in debates that may arise.

The speakers also stressed the significance of global governance and cooperation in resolving these issues. Harmonious global governance ensures that clear rules and regulations are in place to address digital debates or vulnerabilities. Moreover, resource sharing and multi-channel investment were highlighted as ways to foster cooperation and strengthen digital capabilities across nations. This approach aligns with SDG 17: Partnerships for the Goals, which emphasizes the importance of global cooperation in achieving sustainable development.

Additionally, the reevaluation of intellectual property protection was identified as a solution. By reassessing current frameworks and striking a balance between protection and accessibility, societies can foster innovation and progress while addressing digital debates or vulnerabilities.

It is worth noting that the speakers expressed concerns over market-oriented solutions. They emphasized the importance of shared spirit and global cooperation in effectively addressing digital debates or vulnerabilities. Moreover, they acknowledged that those left behind in the digital landscape can become a security concern for those who are ahead. This observation highlights the need for collective action and inclusive approaches to ensure that no one is left behind.

In conclusion, addressing digital debates or vulnerabilities requires a comprehensive and collaborative approach. Factors such as geographic location, economic development, and technology advancement shape the digital landscape and contribute to these challenges. However, through economic development, capacity building, global governance, resource sharing, and reevaluation of intellectual property protections, societies can effectively navigate and overcome these issues. By promoting global cooperation and shared spirit, stakeholders can work together to create a more secure and inclusive digital environment for all.

Moderator

In this analysis, various speakers examine different aspects of digitalization in sub-Saharan Africa and its impact on the region. One of the key points highlighted is the role of mobile technology in driving digitalization in sub-Saharan Africa, in contrast to the prevalence of wired systems in North America and Europe. This mobile tech approach is considered essential in overcoming infrastructure issues and enabling access to digital technologies.

The digital divide is a major concern raised by the speakers, as it hinders the full exploitation of digital potential in the region. The scaling of innovations is impeded, and access to technology is limited due to this digital divide. The speakers emphasize the need to address this issue to ensure equal access and opportunities for all.

Research on digital vulnerabilities is deemed crucial, with speakers highlighting the lack of focus on addressing vulnerabilities resulting from technological dependency. They point out that current university-based research primarily focuses on reducing the digital divide, neglecting the vulnerabilities associated with technological advancement.

The need for a digital vulnerability indicator to accompany public policy decision-making is also emphasized. This indicator would assist in identifying and addressing digital vulnerabilities effectively. The speakers argue that a regulatory dimension should be included in the digital vulnerability index to facilitate the reuse of public data and foster partnerships between the public and private sectors.

Regulations and conformity are deemed essential in addressing digital issues. It is emphasized that legal, technical, and ethical conformity is required to achieve major goals such as the Sustainable Development Goals (SDGs). The speakers contend that the current regulatory framework for digital technologies is less developed compared to economic regulations, and there is a need to bridge this gap.

The speakers also highlight the importance of digital rights, which currently do not exist. Efforts towards international and national economic regulations have been taking place for many years, but the same level of development is lacking for digital issues. They argue for the development of digital rights to protect individuals and address the challenges arising from digitalization.

Concrete actions and the use of a digital vulnerability indicator are seen as crucial, but it is noted that these need to be usable on political and diplomatic stages. The speakers acknowledge the difficulties faced in developing countries and least developed countries (LDCs) in the digital sector's development and stress the importance of considering time and condition differences when utilizing the same tools in different countries.

The analysis also raises concerns about potential monopolies on providing digital services and infrastructure by private actors. Regulatory flexibility is seen as a potential risk in allowing these actors to dominate the digital landscape, while representation from African countries in plurilateral negotiations on e-services is deemed inadequate.

In conclusion, the analysis sheds light on various aspects of digitalization in sub-Saharan Africa. It highlights the role of mobile technology, the need to address the digital divide, the importance of research on vulnerabilities, the necessity of a digital vulnerability indicator, the significance of regulations and conformity, the development of digital rights, and the impact of private actors in the digital sector. These insights provide valuable considerations for policymakers, stakeholders, and organizations working towards achieving sustainable and inclusive digitalization in the region.

A

Audience

Speech speed

150 words per minute

Speech length

879 words

Speech time

351 secs

JC

Joël Cariolle

Speech speed

141 words per minute

Speech length

684 words

Speech time

290 secs

KA

Kamilia Amdouni

Speech speed

113 words per minute

Speech length

4067 words

Speech time

2157 secs

MS

Minata Sarr

Speech speed

143 words per minute

Speech length

808 words

Speech time

339 secs

M

Moderator

Speech speed

133 words per minute

Speech length

3583 words

Speech time

1617 secs