10 Ways Cybersecurity Can Improve Digital Development Outcomes
Rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored....
New USAID Primer: Disinformation, Misinformation, and Malinfomation
Disinformation is by no means new. Although social media platforms have emerged as the most efficient spreaders of false information, disinformation is also spread...
12 Ways to Manage Digital Risks to Refugee Community Connectivity
Connectivity initiatives, which entail the provision of internet and mobile access, can positively impact the lives of crisis-affected people, especially refugees,...
Are You Deploying Technologies of Disempowerment?
As noted in Technologies of Disempowerment, several technological systems for welfare delivery and social security in India have ended up disempowering many people,...
What Should Donors do to Support Responsible Data?
Donors such as USAID have a critical role to play in encouraging greater respect and protection of the data of vulnerable individuals and groups. They can help...
7 Ways You’re Contributing to the Humanitarian Metadata Problem
The past decade has seen a surge in the use of mobile telecommunications, messaging apps and social media. As they become more accessible around the world, these...
How Do You Mitigate Large Scale Distribution Risk For 3 Million Constituents?
Food distribution is a huge part of foreign aid in times of food insecurity. For Ethiopia, around 1.5 million acute food insecure households have received food...
What’s Your ICT4D Cyber Threat Model?
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...