SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
1
Cyrils,s Blog
Cyril’s Blog on Digital
Fault-Lines
April Publication Edition1
2
Cyrils,s Blog
Life in the Era of Digital Fault-Lines
Introduction
The term fault lines quickly
brings to mind the geological phenom-
enon of the earth’s tectonic shift cre-
ated by the movement of the earth’s
tectonic plates to cause earth quakes.
Similar dynamics liken to the earth’s
tectonic shift has been discovered to
exist in our digital world albeit more
widespread than recognized, causing
almost unstoppable cracks that are
regarded as digital fault lines. These
fault lines impede the realization of
the full potential of digital and elec-
tronic connectivity anticipated by glo-
balization.
While earth quakes are be-
lieved to benefit the earth with the
even dispersal of uneven earth re-
sources and in the same vein destroy
lives and landscape, digital quakes
from digital fault lines can similarly
benefit us when leveraged or can be-
come destructive element when left
without due care. This is because
quakes in their nature hold vast op-
portunities and threats that can be
harnessed. Two of these fault lines
are characterized as Access fault line
and Trust fault line
Access Fault Line
Access Fault line is perceived
as a digital divide but argued to be
better coined as digital fault line
(Reich, J.,2013) due to the global un-
even access to digital information and
connectivity. Several efforts are been
mobilized using various approaches to
reduce global digital divide referred to
as “Access fault line” in this blog.
These efforts are geared to maximize
accessibility to digital technology and
electronic connectivity perceived to
boost global economic prosperity.
More than ever before, global
economic leadership are reaching
consensus with governments in
support of building technolgy based
infrastructures and inclusions to
manage challenges of the global digital
future.
According to Anderson, J. (2015) of
New York Times, a panel of technology
leaders in the World Economic forum
at Davos in January 2015 made a
personate plea to see the connectivity
of the next billion of the unconnected
4.3 Billion globally. The concern of
how to achieve the connectivity of a
next Billion or better still the world’s
7.3 Billion Population in the mist of
global disparities is a huge challenge
for these leaders.
Achieving this objective re-
quires a radical approach that can buy
in government support to institute in-
frastructures in view of boosting glob-
al digital and Internet usage from its
current 46.4% as reported by Mini-
watts Marketing Group (2001-2015).
While immense effort is on the way to
curb digital fault line, it is prudent to
tag knowledge as an integral factor
because its lack inhibits the ability to
fully leverage the benefits of digital
technologies in a more realistic way.
3
Cyrils,s Blog
Digital Fault-Lines
Currently, a higher proportion
of access to Internet and digital con-
tent can be attributed to the mobile
platform; 3G/4G/GPRS, unlike broad-
band services that holds the key to
vast resources locked in digital con-
nectivity. While this can be seen as a
step in the right direction , we should
not forget that several challenges
marred connectivity through mobile
platforms. But the positive note is
that their contribution to achieve ac-
cess for all far outweighs provisions
made by broadband services. This is
encouraging in the drive to connect
the next Billion.
As we applaud mobile service
providers for their dexterity to pro-
vide digital access to the world, we
should not be ignorant that such ser-
vices remain commercially focused
with most times monetized value for
service outweighing the service lever-
aged by end users.
I recall about 3 years ago when I had
to purchase all the services provided
by mobile carries in my country to en-
sure my ability to publish a paper for
peer review but when the crucial time
reached, all of the carries could not
provide me the means to get connect-
ed. Such experiences remain common
in developing countries hence the
need for government driven infra-
structures to provide broadband ser-
vices for their people.
Furthermore, leaders should
be cognitive that access provided
through mobile platforms are mostly
application based that hardly unleash
the potential of Internet or electronic
connectivity not emphasizing the
magnitude of cyber attack footprint
inherent in their vendor locked plat-
forms. “The Internet is truly global
and every new user online benefits
other users, for social interaction,
economic opportunities and many
other benefits that were previously
unimaginable.” said Internet Society
President and CEO Kathy Brown.
Trust Fault Line
Trust in the realm of digital
connectivity is almost a fallacy. Let me
liken trust as confidence and using
trust in context, I trust icloud and
without a contract entrusted them
with my data. I trust that checking the
agree box in the end users
agreement will make them store my
data in the same way I should have
protected my data if I had the
capability to host it myself.
In the same vein, I will trust my email
with Google and hope they don’t
betray my trust. These are some of
the decisions we are faced with daily
and without a second thought
connect with everything that is
presented before us as digital users.
My hope is that as users, we must
make concious decisions when faced
with the decision to connect or not to
connect.
4
Cyrils,s Blog
Digital Fault-Lines
Despite all odds and negative
media reports, be assured that
technology providers can not single
you out unnecessarily for abuse. Also
know as fact that there is no liability
or responsibility for providers
without an agreement and even
when one exist, it is almost assured it
legally favors the provider than the
subscriber. The question now is how
increasing trust will help the end
user?
Drawing parallels between trust and
assurance in relation to product
security, technology leaders and
regulators require logical data from
system builders to certify their
product against; either for
functionality or assurance or both
using systematic and well calibrated
test to certify the accuracy of data
provided in product manuals. This
allows regulators certify techies’
product against a security target for
products that attempt evaluation.
There are several of these evaluation
bodies but the most common are
TCSEC, ITSEC and Common Criteria.
Detail procedure of evaluation
processes is beyond the scope of this
blog.
It is also interesting to know that
certification by these bodies for
products is not mandatory hence a lot
of uncertified products out there not
evaluated by independent bodies
with their get out of jail card free
embedded in the end-user agreement
which is hardly read or understood by
users that often sign them. A radical
move to check this kind of product
development can utterly improve
trust and reduce the cracks in trust as
a fault line.
Much like access fault line,
trust fault line holds opportunities
and threats. Of recent, we have seen
tech companies using stronger
encryptions and using radical concept
like multi-factored authentication to
protect user privacy and multihomed
cloud services to complement
resource availability. More often, we
have seen service providers paying
indemnity to users for contract
breeches and utterly remorseful for
compromising users personal
identifiable Information (PII). We
have also seen legislators regulating
the kind of information providers are
allowed to collect with almost
complete authority for the use of
data at the discretion of the data
owner albeit in some part of the
world. We have also seen litigations
by users for unauthorized use and
abuse of their PII.
More than ever, we have
seen economic benefits from web 3.0
hosted sometimes for negligible
amount when compared to the
enormous economic value that they
derive. Similarly, booming of service
oriented architectures (SOA) like
cloud services did not only open
access to globalization but minimizes
business requirement for starters
using the pay as you grow model.
How to leverage these economic
benefit within the fault lines remain
the sole objective of this blog which I
will treat in subsequent blogs.

Mais conteúdo relacionado

Mais procurados

TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030amTLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
Rod Dines
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internet
Aireen Sinong
 
FUTURE Perspective #11 trends newsletter
FUTURE Perspective #11 trends newsletterFUTURE Perspective #11 trends newsletter
FUTURE Perspective #11 trends newsletter
Elaine Cameron
 

Mais procurados (20)

The Rise of Incognito Tech
The Rise of Incognito TechThe Rise of Incognito Tech
The Rise of Incognito Tech
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
 
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030amTLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
TLC220_2014_S1_ResearchEssay_DinesR_31510992_Monday_1030am
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
Trusting the internet
Trusting the internetTrusting the internet
Trusting the internet
 
FUTURE Perspective #11 trends newsletter
FUTURE Perspective #11 trends newsletterFUTURE Perspective #11 trends newsletter
FUTURE Perspective #11 trends newsletter
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Net Neutrality in Education
Net Neutrality in EducationNet Neutrality in Education
Net Neutrality in Education
 
What is Web 3.0
What is Web 3.0What is Web 3.0
What is Web 3.0
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Learning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagementLearning to crowd-surf: Gov 2.0 and community engagement
Learning to crowd-surf: Gov 2.0 and community engagement
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Proof of immunity and the demise of privacy 2020 world in 2030
Proof of immunity and the demise of privacy 2020   world in 2030Proof of immunity and the demise of privacy 2020   world in 2030
Proof of immunity and the demise of privacy 2020 world in 2030
 
Future agenda the future of digital business - dubai - 29 april 2018
Future agenda   the future of digital business - dubai - 29 april 2018Future agenda   the future of digital business - dubai - 29 april 2018
Future agenda the future of digital business - dubai - 29 april 2018
 
decoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effectdecoding Justice 2.0: tapping into the social network effect
decoding Justice 2.0: tapping into the social network effect
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressed
 

Semelhante a Digital Fault-Lines

ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of Things
Darryl Gray
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docx
arnoldmeredith47041
 
E com iii unit-16-8-13
E com iii unit-16-8-13E com iii unit-16-8-13
E com iii unit-16-8-13
naaaaz
 

Semelhante a Digital Fault-Lines (20)

Blockchain Factors for Consumer Acceptance
Blockchain Factors for Consumer AcceptanceBlockchain Factors for Consumer Acceptance
Blockchain Factors for Consumer Acceptance
 
BT Cloud Security Whitepaper
BT Cloud Security WhitepaperBT Cloud Security Whitepaper
BT Cloud Security Whitepaper
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030
 
1637 copy
1637   copy1637   copy
1637 copy
 
How do you think the use of cloud computing can affect individuals, a.pdf
How do you think the use of cloud computing can affect individuals, a.pdfHow do you think the use of cloud computing can affect individuals, a.pdf
How do you think the use of cloud computing can affect individuals, a.pdf
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
Gilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation InsightsGilbert + Tobin Innovation Insights
Gilbert + Tobin Innovation Insights
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of Things
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics Paper
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docx
 
Future Agenda Future Of Connectivity
Future Agenda   Future Of ConnectivityFuture Agenda   Future Of Connectivity
Future Agenda Future Of Connectivity
 
UK Financial Services: Digital Trends Report 2020
UK Financial Services: Digital Trends Report 2020UK Financial Services: Digital Trends Report 2020
UK Financial Services: Digital Trends Report 2020
 
Introducing thriving with information in the digital economy
Introducing thriving with information in the digital economyIntroducing thriving with information in the digital economy
Introducing thriving with information in the digital economy
 
E com iii unit-16-8-13
E com iii unit-16-8-13E com iii unit-16-8-13
E com iii unit-16-8-13
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
TCS Innovation Forum - The Digital World in 2025 - 28 05 15
TCS Innovation Forum - The Digital World in 2025 - 28 05 15TCS Innovation Forum - The Digital World in 2025 - 28 05 15
TCS Innovation Forum - The Digital World in 2025 - 28 05 15
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Digital Fault-Lines

  • 1. 1 Cyrils,s Blog Cyril’s Blog on Digital Fault-Lines April Publication Edition1
  • 2. 2 Cyrils,s Blog Life in the Era of Digital Fault-Lines Introduction The term fault lines quickly brings to mind the geological phenom- enon of the earth’s tectonic shift cre- ated by the movement of the earth’s tectonic plates to cause earth quakes. Similar dynamics liken to the earth’s tectonic shift has been discovered to exist in our digital world albeit more widespread than recognized, causing almost unstoppable cracks that are regarded as digital fault lines. These fault lines impede the realization of the full potential of digital and elec- tronic connectivity anticipated by glo- balization. While earth quakes are be- lieved to benefit the earth with the even dispersal of uneven earth re- sources and in the same vein destroy lives and landscape, digital quakes from digital fault lines can similarly benefit us when leveraged or can be- come destructive element when left without due care. This is because quakes in their nature hold vast op- portunities and threats that can be harnessed. Two of these fault lines are characterized as Access fault line and Trust fault line Access Fault Line Access Fault line is perceived as a digital divide but argued to be better coined as digital fault line (Reich, J.,2013) due to the global un- even access to digital information and connectivity. Several efforts are been mobilized using various approaches to reduce global digital divide referred to as “Access fault line” in this blog. These efforts are geared to maximize accessibility to digital technology and electronic connectivity perceived to boost global economic prosperity. More than ever before, global economic leadership are reaching consensus with governments in support of building technolgy based infrastructures and inclusions to manage challenges of the global digital future. According to Anderson, J. (2015) of New York Times, a panel of technology leaders in the World Economic forum at Davos in January 2015 made a personate plea to see the connectivity of the next billion of the unconnected 4.3 Billion globally. The concern of how to achieve the connectivity of a next Billion or better still the world’s 7.3 Billion Population in the mist of global disparities is a huge challenge for these leaders. Achieving this objective re- quires a radical approach that can buy in government support to institute in- frastructures in view of boosting glob- al digital and Internet usage from its current 46.4% as reported by Mini- watts Marketing Group (2001-2015). While immense effort is on the way to curb digital fault line, it is prudent to tag knowledge as an integral factor because its lack inhibits the ability to fully leverage the benefits of digital technologies in a more realistic way.
  • 3. 3 Cyrils,s Blog Digital Fault-Lines Currently, a higher proportion of access to Internet and digital con- tent can be attributed to the mobile platform; 3G/4G/GPRS, unlike broad- band services that holds the key to vast resources locked in digital con- nectivity. While this can be seen as a step in the right direction , we should not forget that several challenges marred connectivity through mobile platforms. But the positive note is that their contribution to achieve ac- cess for all far outweighs provisions made by broadband services. This is encouraging in the drive to connect the next Billion. As we applaud mobile service providers for their dexterity to pro- vide digital access to the world, we should not be ignorant that such ser- vices remain commercially focused with most times monetized value for service outweighing the service lever- aged by end users. I recall about 3 years ago when I had to purchase all the services provided by mobile carries in my country to en- sure my ability to publish a paper for peer review but when the crucial time reached, all of the carries could not provide me the means to get connect- ed. Such experiences remain common in developing countries hence the need for government driven infra- structures to provide broadband ser- vices for their people. Furthermore, leaders should be cognitive that access provided through mobile platforms are mostly application based that hardly unleash the potential of Internet or electronic connectivity not emphasizing the magnitude of cyber attack footprint inherent in their vendor locked plat- forms. “The Internet is truly global and every new user online benefits other users, for social interaction, economic opportunities and many other benefits that were previously unimaginable.” said Internet Society President and CEO Kathy Brown. Trust Fault Line Trust in the realm of digital connectivity is almost a fallacy. Let me liken trust as confidence and using trust in context, I trust icloud and without a contract entrusted them with my data. I trust that checking the agree box in the end users agreement will make them store my data in the same way I should have protected my data if I had the capability to host it myself. In the same vein, I will trust my email with Google and hope they don’t betray my trust. These are some of the decisions we are faced with daily and without a second thought connect with everything that is presented before us as digital users. My hope is that as users, we must make concious decisions when faced with the decision to connect or not to connect.
  • 4. 4 Cyrils,s Blog Digital Fault-Lines Despite all odds and negative media reports, be assured that technology providers can not single you out unnecessarily for abuse. Also know as fact that there is no liability or responsibility for providers without an agreement and even when one exist, it is almost assured it legally favors the provider than the subscriber. The question now is how increasing trust will help the end user? Drawing parallels between trust and assurance in relation to product security, technology leaders and regulators require logical data from system builders to certify their product against; either for functionality or assurance or both using systematic and well calibrated test to certify the accuracy of data provided in product manuals. This allows regulators certify techies’ product against a security target for products that attempt evaluation. There are several of these evaluation bodies but the most common are TCSEC, ITSEC and Common Criteria. Detail procedure of evaluation processes is beyond the scope of this blog. It is also interesting to know that certification by these bodies for products is not mandatory hence a lot of uncertified products out there not evaluated by independent bodies with their get out of jail card free embedded in the end-user agreement which is hardly read or understood by users that often sign them. A radical move to check this kind of product development can utterly improve trust and reduce the cracks in trust as a fault line. Much like access fault line, trust fault line holds opportunities and threats. Of recent, we have seen tech companies using stronger encryptions and using radical concept like multi-factored authentication to protect user privacy and multihomed cloud services to complement resource availability. More often, we have seen service providers paying indemnity to users for contract breeches and utterly remorseful for compromising users personal identifiable Information (PII). We have also seen legislators regulating the kind of information providers are allowed to collect with almost complete authority for the use of data at the discretion of the data owner albeit in some part of the world. We have also seen litigations by users for unauthorized use and abuse of their PII. More than ever, we have seen economic benefits from web 3.0 hosted sometimes for negligible amount when compared to the enormous economic value that they derive. Similarly, booming of service oriented architectures (SOA) like cloud services did not only open access to globalization but minimizes business requirement for starters using the pay as you grow model. How to leverage these economic benefit within the fault lines remain the sole objective of this blog which I will treat in subsequent blogs.