Information Security Education & Solidarity (ISES) Initiative: Facts, Figures, Models and Implementation

IFIP TC3, Swiss Informatics Society

Discussion Background is given first, then content of contributions
This WS in collaboration with IFIP TC3

Background: Internet is global, and in the internet we are electronically all interconnected: We face a Data Tsunami and an according explosion of world-wide stored and exchanged data: Nobody should be excluded from this innovation. Tofoster development of poor region it is an utmost important issue to participate in the next generation of data usage and exchange. The data sciences and its data engineering are crucial for inclusion of all regions in the digital society. Smart applications and technologies require smart citizen in a smart society or – as named by Prof. Seang-Tae Kim from South Korea: smartizen. To manage lowering – or even closing – the gap between advanced and poor regions there is an all-over penetration of all societies and smartizen with secure access to devices and internet required. Unhappily poor regions are flooded today with cheap, partly used, but almost in any case insecure devices. The factors “lack of knowledge”, high priced security and bandwidth to get advantage from free security solution, protection software, and missing knowledge on secure behaviour lead to inacceptable open challenges in information security. And: having security challenges in the global net means having security changes everywhere globally. This means failure in Europe or Africa can have immediate impact on the world: We depend on each other. Against this background, we need urgently to improve the security level in each single location, such that we reach as fast as possible minimum protection goal and standards all-over the world.

  1. The ISES Challenge: Why is it important, why now and what is the target?The meaning of ICT Security Policies and Strategies. Implementation models under consideration of diversity, gender issues, wealth & solidarity, education and collaboration.
  2. A Socio-technical Modelling Responsibility Authority and Competence for Developing Countries: Socio-technical model that was used to model computer security governance for the United States after the Computer Security Act of 1987 and discuss the strength and weakness of using this model to model capacity build of cyber security in developing countries.
  3. IT Security Education and Awareness Programme Proposal for developing countries: The enormous growth of internet and mobile users in combination with lack of ICT Skills and IT Security Awareness leads to wide spread exploitation by cyber criminals.  A structured approach on IT Security Education and Awareness to educate protect themselves by an affordable is discussed.
  4. What means the IT Security Challenges in terms of technology for development countries: Rwanda case study Cost of security software, access and indirect cost of "free" security software, e.g. by bandwidth will be discussed. Implementation models for least developed countries needs to be tuned to its network and ICT architecture.
  5. Cyber security strategies in Nepal: How to reach international compliance?Least developed and developing countries are vulnerable to cyber-crimes. E.g. Nepal, established first IT policy in 2000 and the computer emergency response team (CERT) has been established April 9, 2015. The implementation of cyber security strategy for reaching international compliance will be controversially discussed.
Speakers / panellists
  • Prof. Dr. Bernhard M. Hämmerli, Swiss Academy of Engineering Sciences, SI and IFIP
  • Prof. Dr. Steward Kowalski, University College Gjovik Norway
  • Serah Francis, ISES project, Master Student representing Kenya
  • Prof. Dr. Konrad Marfurt, Lucerne University of Applied Sciences , representing for ICT cooperation with Rwanda
  • Ambika Shrestha Chitrakar, PhD Student HIG, representing Nepal
Session's link to WSIS Action Lines
  • C1. The role of public governance authorities and all stakeholders in the promotion of ICTs for development
  • C2. Information and communication infrastructure
  • C4. Capacity building
  • C5. Building confidence and security in the use of ICTs
  • C7. ICT Applications: E-government
  • C7. ICT Applications: E-learning
  • C7. ICT Applications: E-science
  • C8. Cultural diversity and identity, linguistic diversity and local content
  • C10. Ethical dimensions of the Information Society
  • C11. International and regional cooperation
Session's link to the Sustainable Development Process

Ref (1) WCCE 2013, “Learning while we are connected”, Torun, Poland, 2-5 July 2013
Workshop & Presentations by ISES key members.
Bernhard M. Haemmerli, Frank Mockler, Tone Hoddo Bakas, Serah Francis, Adrian Kapczyñski “Teaching Information Security: Multi-Country Overview” http://wcce2013.umk.pl

Ref (2) WSIS+10: WSIS Review Process http://www.itu.int/net/wsis/review/2014.html
First Physical Meeting 7-8 October 2013, Room C, ITU Headquarters, Geneva
http://www.itu.int/net/wsis/review/mpp/#phase2 http://www.itu.int/net/wsis/review/mpp/

Ref (3) WSIS+10: WSIS + 10 and beyond (June 2014 HLE in Geneva)
http://www.itu.int/net/wsis/review/2014.html
The WSIS+10 High-Level Event endorsed the WSIS+10 Statement on Implementation of WSIS Outcomes and the WSIS+10 Vision for WSIS Beyond 2015. These Outcome Documents have been developed in an open and inclusive preparatory process, the WSIS+10 Multistakeholder Preparatory Platform (WSIS+10 MPP).
http://www.itu.int/net/wsis/review/reports/outcomes
http://www.itu.int/net/wsis/implementation/2014/forum/dam/documents.html/#outcome

Ref (4) KEYCICT (Key Competencies in Informatics and ICT) Open Conference, Potsdam, Germany)
Exploratory workshop by ISES http://ifip-education.ning.com/events/ifip-wg-3-1-wg-3-2-wg-3-3-conference-key-competencies-in

Ref (5) Extracts of the Report from TC 3:  Education to IFIP GA, Vienna, Austria, and 13th and 12th VISION” An Open Torun Vision - International Federation for Information Processing (IFIP) Technical Committee 3 (TC3) - 2013 to 2017 - Educational stakeholders and purpose: who and what can be supported better by computers? [11:27:19] Raymond Morel:
http://www.ict-21.ch/com-ict/IMG/pdf/Ref5.pdf    Cf. doc 2 - 5 pages

Ref (6) A preliminary List of members 2014
http://www.ict-21.ch/com-ict/IMG/pdf/Ref6.pdf 

Ref (7) ”An overview of cyber security challenges in developing world”
http://www.ict-21.ch/com-ict/IMG/pdf/Abstract-contextualisation-ref-7.pdf


Session 220
  • Monday 25 May,
  • Room C1, ITU Tower
  • Thematic Workshop

WSIS Forum 2015 | Innovating Together: Enabling ICTs for Sustainable Development
25–29 May 2015, International Telecommunication Union (ITU), Place des Nations, 1211 Geneva, Switzerland