Monday, April 16, 2018

Untimely Death?

Along time ago, on one lovely Friday evening my friends and I sat by a Veranda of some bar in Bukoto. At that sitting place, we could see all incoming traffic to the bar (this was not particularly, what influenced our choice of the bar, just in case you thought it was, it was not, Believe Me!) As the night went by, one rare model of a vehicle owned by a celebrity drove by and parked just below us. We could see it clearly from the balcony. The discussion about this monster of a car began and we all did not seem to have concrete facts about it. This created a mystery in my mind and in other people’s minds, as we will discover later.

At about Midnight, we decided to depart. We then all walked down stairs. The way to the exit was by this monster of a ride. As we approached it, one of us wondered whether this car’s body was made of aluminium or plastic. The car was just in front of us, huge, looking nice and very well polished.  This was the opportunity to confirm whether this monster ride was made of Aluminium or Plastic.

At this point, curiosity got the better of one of us and he touched to feel the body of the car. I speculate that the urge to slap the car entered him, I speculate. It could have been the ghost of slapping or the spirit of slapping, I do not know; no body knows, Believe Me! He slapped the damn Monster!

Well, the car had a customised plate and by that fact, we all knew who owned the car. We knew who this celebrity was and frankly, what he was capable of, going by the stories in the tabloids, particularly about how he deals with disagreements with others. At the time, his resolution mechanisms were to beat or be beaten by those he disagreed with! He also had a gang of young energetic folks that clearly could beat!

Now, after my friend had slapped the car, a group of young folks surrounded us. This Celeb appeared before us and asked why we had slapped his car. Clearly not all of us had slapped the car, and in my mind, we are about to be beaten. I did not trust in our ability to beat this gang. In-fact, I could feel my body under some sort of adjustment as if getting ready to withstand as much pain as humanly possible. More so, knowing that Alcohol is a painkiller, I was at this point very ready!

I have witnessed bar fights and most of the times it is because one side over estimates its power and goes on an offensive that gets them hurt. Fortunately, my friend who slapped the car immediately apologised and asked for forgiveness. That was wise. We all joined him, in a chorus, as if rehearsed to apologise completely and also. The celeb gave us a speech, as if to provoke us to annoy him again and he gets to beat us. We stuck to apologising. After a while, about 3-5 Minutes (This seemed like the length of January), he and his gang entered their monster slapped ride and went about their business.

I said my goodbyes and left for home. Restraint and humility saved us or them…hehehehehe. We missed the opportunity to know how much pain our bodies could withstand or the strength within us to fight off a gang!

Now, the death of this heavily talented musician, Radio, has made many wonder whether the bouncer who beat him could have restrained himself or whether Radio outdid himself in starting a war he could not win and forgot that he was weak. Either or both could have saved his life. This brings me to a headline carried by Red Pepper, “The End of Good life: Mowzey Radio”. This headline is speculative but plausible because this dude was the face of Good Life. He was an invaluable asset to Good Life and in fact, one could argue that he and his comrade Weasel TV were the heart of Good Life. They could have been the Good Life itself, I do not know!

After the death of Radio, some, mostly fellow musicians have spoken to the need for protection to celebrities but fell short of proposing who should provide this Protection. Government? HELL NO? I have wondered why good life, an institution of its repute in the industry, can allow its most prized asset wander about unattended to. This death is therefore a combination of avoidable factors; Lack of humility and restraint on the part of the bouncer and the deceased and more so failure by Good Life Management to take care of its most prised asset.
“Don't compromise yourself. You're all you've got.” Janis Joplin.

In conclusion, therefore, I want to let you all know that I do need a drink!

Friday, June 5, 2015

Uganda’s ICT WAIT– I Blame the Military!

ICT has been one of the most growing sectors in Africa. Uganda in particular has indeed made effort to deploy ICTs for service delivery. There is an effort to connect all MDAs to the a National Fiber Backbone in a bid to promote e-governance. The digitization of the National Register for electronic identity cards for citizens, the number of telephone subscribers has increased to approximately 20Million people and according to UCC, ICT sector contribution to GDP averages for the last 3 years at about 7% per annum. All this is happening despite the visible laziness towards the adoption and implementation of ICTs in service delivery. The Sector Ministry is one of the most underfunded and understaffed. If government expenditure is taken as an indicator of priority, ICT is one of those at the bottom of the priority list.

What could be the reason why ICT is not growing as fast as it should despite the obvious need for the adoption of these technologies in service delivery? Why does the Gov’t seem to be slow or hesitant in implementing ICTs for service delivery? I want to blame the Military, yes, the UPDF!
Looking at Many developed countries and tracing the birth and eventual advancement and utilization of ICT's for service delivery and the advanced Technologies like Encryption, Artificial Intelligence and sophisticated mission critical applications lands us in the Military departments in Europe and the USA. For the ICT scholars and practitioners, the US Department of Defense (DoD) [an equivalent of Uganda’s Ministry of Defense] will appear many times in the literature and this surely cannot be by mistake. The department was and still is at the forefront of research and innovation in ICT and other fields.

The Military is one those institutions that requires the highest levels of accuracy in execution of tasks, high levels of confidentiality, Efficiency, Effectiveness and Integrity among others. The demand for performance in the Military is very high and with very low tolerance for mistakes in most of its missions. This requires more than a highly trained human resource and therefore the need for technology and ICT in particular becomes eminent.  The USA, a global super power, having realized the need to impose itself as a ‘GOD Father’ of the whole world, has presence in many locations of the world and ICT supports this presence. It has to be deployed very effectively and hence the high levels of research and innovation which the rest of the world, has immensely benefitted from majorly through adoption of the standards and technology transfer.

A cyber-attack on a business entity even in the private sector of some of the developed nations, like Russia, China and the United states of America, is a matter of national Security. The Military gets involved and gets to the bottom of things using it's full resources because these types of attacks are considered attacks on the nation as a whole, and insult to their sovereignty. The attack has to be dealt with and studied and sometimes leads to a more sophisticated defense being built. This advances further technologies in digital information security. In 2014, USA held the government of North Korea responsible for attacking Sony Pictures Entertainment network in order to sabotage the release of the movie titled the ‘Interview’ which portrayed the President of North Korea as mostly a clown.
Compared to the majority of the civilian population, the military operates in harsh, stringent and life threatening conditions. This environment is normally good ground for high level innovation because of the need to protect the lives of the officers on duty executing missions both on land and in air protecting the lives and property of the others [The civilians]. These conditions require high levels of efficiency and effectiveness. The current/modern warfare is shifting, increasingly towards the cyberspace. Spying, attacking military installations and capabilities through the cyber space is on the rise and one cannot ignore the need to develop high end technology oriented defense systems. This requires investment in research and innovation. 

It is a fact that in many countries the Military / Defense finds it easy to access considerable budgets and funding for research and development. It is the case in Uganda and this advantage should be exploited to establish a technical wing of ICT in the Military that will then become a good spring board for sustainable high level innovation, adoption and implementation of ICTs and ultimately encouraging the rest of the country to accelerate the integration of ICTs into their business processes. The Uganda’s Ministry of Defense Budget hit the 1 trillion Mark in 2013. In the year 2015/2016, the Ministry of ICT has been allocated a budget of a mere 20Bn UGX. This advantage must be exploited for accelerated adoption of technology in our business processes.

The Nation has been involved in many security related missions internally and at regional level and technology could just make their work even much easier. The nation has also been struggling with citizens identification and voter registration, which technology has partly made possible and can make even much more exciting. Institutions like FBI, CIA, M15/6 SRS, the police and other security and intelligent services have systems that run on databases of citizens with details of their crime history, locations and families, making it much easier to dispense justice. This also benefits other ways of Life for example, the banks will find it less risky to lend money to a person who is known and can fully be accounted for by the state.

The Military in Uganda, MUST provide leadership in this cause to advance the integration of ICT's in business processes to improve provision of services to Ugandans better. They have the resources and the MOTIVATION!

Wednesday, August 27, 2014

Cloud Computing Can Contribute to Uganda’s Development

The use of Information and Communications Technologies (ICT) to improve how goods are produced and services are delivered and consumed is a feature of everyday life in the developed countries. Therefore, if ICT is used appropriately, it has the potential to vastly boost productivity. Cloud computing is being viewed as a potential area by businesses and government agencies in Uganda to improve efficiency and effectiveness of business operations in government and business enterprises. The potential and impact of cloud computing is undoubtedly quantifiable; however, findings and conclusions drawn from surveys, studies and experiences of different companies are inconsistent. This article, therefore seeks to support and encourage the application of shared resources, i.e. cloud computing as an enabler especially in government and SMSEs like agricultural cooperatives to maximize or boost productivity and effectiveness of operations.

Key words: ICT, Cloud Computing, productivity, service delivery

Introduction

Uganda has continued to embrace the use of Information and Communications Technology for development through the formulation of appropriate policies, creation of an enabling environment for private investment in ICT and the provision of infrastructure for ICT growth. Access to internet bandwidth is improving through technologies like 3G, WI Max, Fiber and Satellite and this can be attributed to increase in literacy rates, the increased demand for information services in both the rural and urban centers, the growth and competition in the private sector, the need for effective service delivery by governments and the increased global investment in ICT infrastructural development.

The economic case for the contribution of ICT to economic growth is illustrated in the diagram below. The postulated relationship between access to ICT and economic growth is spelt out through a five-step process starting at the bottom of the pyramid.



Source: Eggleston, K; Jensen, R; and Zeckhauser, R; 2002, ‘Information and communication technologies, markets and economic development’, in G. Kirkman et al. The Global Information Technology Report: Readiness for the Networked World. Oxford University Press, New York, p 71.

The economic justification for providing better access to ICT is that up to-date and reliable information about markets and availability of resources can be more easily disseminated to even hard to reach areas. The recipients of the information are then better able, as both producers and consumers, to participate in effective markets. The immediate consequence should be income gains for participants, and the ability to better spend their incomes. Over the long term, enhanced access to information should enable producers to significantly improve their practices. Such improvement lays the path to economic growth. [5]

Efforts to integrate IT into business with institutions (Public and private) in Uganda are capital intensive. Businesses and government institutions incur high costs to purchase hardware, software, software licenses, and maintain the infrastructure. This therefore increases the cost of doing business which ultimately affects demand and supply [4].

Use of shared resources, for example deployment of cloud computing can provide a cost effective relief and satisfy the need of government and small and medium scale businesses, including Agra-business to boost production and service delivery.

According to Uganda Communications Commission (UCC), internet access in Uganda is approximately 10% of the total population [11] and Uganda’s tele-density is currently approximated at 52% of the total population. Internet access in Africa averages at 7% of the world population as illustrated in the table below. The low access to the internet has therefore impacted on the innovation capacity of businesses, adoption of internet based service delivery by government and ultimately consumption of internet based services. [6]















 

Cloud Computing

Cloud computing is computing, where shared resources, software, and information are provided over a large networked environment like the internet. Cloud computing provides services that are broadly divided into three categories: Infrastructure-as-a-Service such as data centers (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) such as online scanners. [2]

Cloud computing is a technology that uses the internet and central remote servers to allow sharing of resources such as computing power, memory, storage, on-line applications and networking infrastructures. Cloud computing allows consumers and businesses use applications without high capital intensive investment on infrastructure and to access services through the Internet. Global players like Amazon, Google, Microsoft, HP, and IBM have developed private clouds that support their business applications and provide services to many of their clients worldwide. [2]

Developments in Uganda

There has been a number of developments in the ICT sector and particulars in the advancement of the integration of ICT in both government and business. These developments in infrastructural development or availability of markets for internet-based services directly and indirectly provide an opportunity for cloud computing to thrive.
  1. Uganda witnessed a large increase in the number of mobile subscribers over the last eight years. In 2013 the number of mobile subscribers reached 14,840,687 operating under 6 network operators. The number of Fixed Internet Service Providers and Mobile Internet Subscribers reached 8 and 3,061,374 respectively. [11]
  2. The Government of Uganda (GOU) has realized the contribution of enterprises and established several support institutions to nurture enterprise growth, performance and competitiveness. The GOU is in the process of enacting a Medium and Small Scale Enterprises (MSME) policy to enable them access e-information to enhance their market access, technology transfer and financial management.
  3. The GOU is also in the process of establishing the National Backbone Infrastructure (NBI) which is expected to link Uganda’s major cities and thus provide diversified ICT services like internet, VoIP and video conferencing. This is in addition to the potential benefits of Business Process Outsourcing (BPO) platform which is expected to offer telemarketing services, customer support services and other value-added services which are likely to benefit enterprises in the medium term. [10]
  4. Following the approval of an e-government policy framework, NITA-U was tasked to work closely with various government agencies to develop a “shared corporate services infrastructure” to map out its architecture for the country’s e-government infrastructure. In June 2011, the Office of the Prime Minister in Uganda also tasked all MDAs to use e-government equipment as provided for in the E-government policy framework. [10]
  5. The Virtual University of Uganda (VUU) is the pioneer university in Uganda using cloud-based technology to drive its IT systems. No more need for local servers that are subject to power outages, no need for more extensive support for mail servers, everything is in the cloud and this makes it much more stable. And the best of all is that everything is simple to use. The complex back end work is done by the experts; the front end user is in safe hands.
  6. NITA-U and UNBS are government organizations that are spearheading the process of formulation, review and adoption of ICT related standards, for example Hardware / software, applications, processes, project management and technologies within Government for consistence and efficiency. [10]
  7. The government of Uganda, through NITA-U is spearheading the process of formulating a multi-sectoral national CERT for emergency and incidence handling of security related incidences. This provides an opportunity therefore for continuity of services. [10]
  8. Various private sector initiatives have taken shape in the provision of private premium rated cloud computing services, notably MTN Uganda, Airtel Uganda, Computer Point Uganda among others. Individual organizations purchase cloud services mostly, storage services for backup and recovery.

Business Cases

Business Case 1

In Uganda, agriculture is a key sector for socioeconomic transformation. Agriculture contributes 20% of GDP, accounts for 48% of exports and employs 73% of the population. Although agriculture provides the main source of income for the population, farmers suffer from disadvantages and inefficiencies, due to their higher operating costs, narrow market reach and limited access to agricultural related information. This is the reason why farmers constitute themselves into groups commonly known as cooperatives.

According to the Ministry of Trade, Industry and Cooperatives (MTIC), there are currently over 10,746 registered cooperative societies with a membership of about 4 million. These cooperatives are mainly involved in agriculture marketing and production, savings and credit. They play a major role in financial resource mobilization, agro-processing, marketing of agricultural produce and the provision of other services like transport. A high proportion of these cooperatives are involved in agricultural marketing and produce.

These cooperatives face several challenges, including lack of access to reliable markets that pay competitive prices, weak internal operations and lack of access to modern technology and information. This is partly due to the lack of capacity to engage, use and apply ICTs to facilitate key business processes. There is currently a deliberate strategy to provide continuing member education in skills that should ultimately increase members’ savings, capital accumulation, investment, employment and incomes. The cooperatives, however have not been in a position to provide this training support to their members mainly because of budgetary constraints. Cooperatives in Uganda have almost similar governance structures and internal management processes in design and therefore can easily adopt shared resources and tools like ERPs and web portals for improved and effective operations.

Business Case 2

In a bandwidth capacity survey conducted, by NITA among 101 Ministries, Departmentand Agencies (MDAs) othe government of Uganda, 81 MDAprovided responses towards thsurvey, it was found out that approximately 6.2 billion Uganda shillings per annum is spent on Internet bandwidth, and this is exclusive of maintenance costs, purchase of software and hardware, and licensing among other ICT requirements.

Government ministries, departments and agencies thrive on data and information sharing and therefore require standard data structures. This requires ICT infrastructure to facilitate standardization of applications across government organizations for consistency.


Technology Description





















































In cloud Computing, business and enterprise applications and infrastructure are hosted centrally in data centers and services are remotely accessed over the internet through mobile phones, computers and any other appropriate ICT gadgets. The cloud may or may not be privately owned but for purposes of ownership and more control, this paper recommends private clouds especially for government applications. The diagram below is a representation of a typical cloud computing architecture.

Cloud computing therefore presents opportunities for users, especially in weak economies like in Uganda to access affordable, high performance infrastructure, more advanced technologies, and incur lesser costs of hardware, software and maintenance. Uganda therefore stands to benefit greatly from this technological advancement.

According to NITA, the Government of Uganda spends approximately 6.2 billion Uganda shillings on internet subscription only per year. This is an expenditure that can be rationalized to provide more impact services through the deployment of cloud computing technologies. Integration of cloud computing into business in Uganda therefore will provide the following opportunities;
  1. The costs related to accomplishing institutional functions. As noted in South Africa and China, where cloud computing has been deployed by IBM, Microsoft and other players, cloud computing can lead to cost cuts of up to 30% thus leading to operational efficiency and productivity gains.
  2. Most MDAs and organizations in Uganda have weak defense mechanisms due to limited human resource like certified security professionals, but also due to lack of adequate resources to deploy the necessary security infrastructure. With centralized Infrastructure, resources to provide security can be deployed and concentrated on the infrastructure rather than at each MDA. Cloud computing therefore provides a model that works for governments and small and medium scale enterprises.
  3.  Cloud computing can support standardization of data structures and platforms for consistency across government organizations. Hosting ERP solutions will provide other applications for MDA’s along with a centralized managed infrastructure facilitates reduced costs on bandwidth expenditure, maintenance and the overall purchase cost of hardware and software. This is a service that can attract markets in Uganda and beyond.
  4. Cloud Computing will provide a low cost of access to high performance (high bandwidth, low latency and stable network connection) infrastructure for data center hosting. This provides for professional data handling, data backups and disaster recovery options. Institutions can develop applications delivered to their users over the internet, hence no need to buy servers and upfront licensing, affordability of software licensing being one of Uganda’s biggest challenges.
  5. Access/use/interaction with new technologies at no extra cost. Cloud computing will provide Uganda with an opportunity to access multiple open source tools that can be applied to their computing needs, thus reducing the licensing burden on the resource constrained Ugandan users.
  6. Improved productivity of businesses through automation of the management information systems and operations, including advertising, marketing and sales
  7. Ease of access to both open source and proprietary information in journals and online libraries increased visibility and an improved image of Ugandan states to the rest of the world, thus more opportunities in for investment, tourism, trade, employment and access to international markets.
  8. Facilitation of e-governance to improve service delivery, especially in the public sector and ease of information sharing between government institutions and the citizens.
  9. Increased access to employment opportunities for the Ugandan unemployed youth and professionals in journalism, broadcasting, money markets and education.
  10. Improvement in the education sector through e-learning and online exchanges between different academic institutions, students and tutors.

Conclusion and Recommendations

The demand of integration of IT services into business in Uganda continues to grow and can benefit a lot from cloud computing. Cloud computing won’t solve all of the problems, but will significantly contribute greatly to its social, economic transformation as it is evident in countries like South Uganda, China and India. Government and other small and medium scale enterprises can achieve more, by saving on investment in the ICT infrastructure (hardware, Software, licensing and maintenance) by embracing cloud computing.

However Uganda and its development partners have to enhance sensitization and awareness of the populace about the opportunities cloud computing provides, help make the cost of internet bandwidth affordable and invest more in the development of ICT infrastructure to increase the coverage of the service to wider and more remote areas.

As Cloud computing continues to grow from its infant stage, it must be seen to support economic and institutional realities facing Governments, Small and Medium scale enterprise. The impact will include productivity gain, development of innovative services, and efficient supply chain management, especially for the farmers, implementation of B2B e-commerce and development of a skilled workforce.

Uganda must therefore be ready and start working towards investing in Infrastructure for provision of cloud computing services. As evidenced in China, government support and making cloud computing a national priority will foster its development and growth. In Uganda, therefore, NITA-U needs more government commitment in terms of funding to build clouds to support government applications and businesses.

There is a need to intensify efforts to provide a legal and regulatory framework for confidence building in cloud computing technologies, especially with very pertinent issues like privacy and confidentiality of data/information. Privacy is often a key concern and therefore an obstacle to the adoption of cloud computing services. This will be a key driver for the successful implementation and development of cloud computing especially in Uganda.

References

[1]. PTC’10 Proceedings, cloud computing in developing economies: drivers, effects and policy measures, Nir Kshetri, Professor, Business Administration, University of North Carolina - Greensboro
[2]. G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical Report UCB/EECS-2009- 28, EECS Department, University of California, Berkeley, Feb 2009.
[3]. R. Aversa, B. Di Martino, M. Rak, and S. Venticinque. Cloud agency: A mobile agent based cloud system. In CISIS, pp. 132137, 2010.
[4.] Robust Mobile Cloud Services Through Offline Support, Maxwell Omwenga Momanyi, Julianne Suzzanne Sansa-Otim, Agnes F. Namulinda Lumala, African Conference of Software Engineering and Applied Computing, 2012.

[5]. ICT as an Engine for Uganda’s Economic Growth: The Role of and Opportunities for Makerere University, Venansius Baryamureeba,

[6]. [7]. World internet usage and population statistics, http://www.internetworldstats.com/stats.htm , June 30, 2012

[8]. Ugandan government to implement cloud computing, Monday, 06 August 2012 07:10, http://www.communicationsafrica.com/internet/uganda-to-implement-cloud-computing-soon

[8]. TechnologyBanker, Cloud Computing Service for SMEs Launched in Uganda, http://www.technologybanker.com/it-ops/cloud-computing-service-for-smes-launched-in-uganda#.UqmM9idthft

[9]. Cloud computing trends and business opportunities, Compuware, Uniface ©

[10]. National Information and Technology Authority – Uganda (NIAT-U), http://www.nita.go.ug

[11]. Uganda communications Commission (UCC), http://www.ucc.co.ug 
1.      

Human Beings, the Biggest Threat to Information Security

Human beings have evolved from a primitive to a highly sophisticated natural grouping. Humans have attempted and continue to study everything that exists under the sun and the sun as well. This is all in a bid to get more information to better their lives, improve their businesses, gain superiority over everything else, become prosperous and control the Universe. As such, the need for information and information about this information has become increasingly vital as the years go by.

Information, as human beings developed, was transmitted through telling stories, songs, drama and then written text. Today information of all types is stored and transmitted in digital format. The need for this knowledge / Information is not only for business growth, academic prowess, but critical for the survival of the human race and its environment. Information about, among other things, climate change, planets that surround the earth and micro-organisms that cause disease is vital for the survival of humans today and tomorrow.

It is said that the more information one (Individual/Government/ Institution) is in possession of, the more powerful they are in Governance, Trade, Medicine, Manufacturing and, Military among others. A counter argument is that information in the hands of an individual or Government or Institution that does not need it might lead to a catastrophe. Protection and investment in the protection of Information systems therefore is very important. The protection of information systems is to ensure that information transmission systems are not tampered with, that information in storage or transmission is not tampered with, that information in storage and/or transmission is only accessible to authorized individuals that processes involved in the generation of information are not tampered with and are in custody of only authorized people. Information, technology and the processes for the generation, storage and transmission of information are created and controlled by and to the benefit of human beings. Ironically, the compromise of these systems is majorly by and ultimately to the benefit of human beings as well. The human being therefore is at the center of strong or weak security in any environment.

Key Information bleaches of recent times include fraud and theft of money or financial assets from banks and other financial institutions world over. In Uganda, particularly, over 18[1] billion shillings has been lost due to compromise of information systems in 2013 alone, and this is only a figure known to the authorities.  On many occasions, in Uganda, key gov’t information has been leaked. The leaked information is in inform of confidential memos or e-mails and recorded conversations between high profile government officials in key gov’t sanctioned operations. It has been observed in the SIM Card and National ID Registration exercises in Uganda that people, especially in urban centers, provide wrong data (Name, Residence, Date of Birth, Place of birth etc.) to the authorities, and this can only be for the wrong reasons. The damage caused by information security bleaches therefore is of a huge magnitude and extends beyond financial loses to Reputational Damage, Loss of Trade Secrets and Intellectual Property, Loss of Industrial Designs and the worst of them all, Loss of Life. Imagine the effect of a legendary Coca-Cola formula leaking to the press!

On the international scale, Julian Asange started an online NGO- Wikileaks that sells Government secret information to willing buyers, Edward Joseph "Ed" Snowden an American computer professional, a former system administrator for the Central Intelligence Agency (CIA) and a counterintelligence trainer at the Defense Intelligence Agency (DIA) has been in the news for leaking key classified USA gov’t information to the world. In the recent past, the Republic of China and the USA have been engaged in countless counter accusations of trying to or actually hacking each other’s systems to gain access to key government information. These incidents and more have caused diplomatic uproar and mistrust among the people on how their governments conduct business. Millions of Dollars have inevitably been spent in trying to fight back and recover from any damage these attempted or/and successful leaks have caused. These are just few of the incidents and clearly, all these efforts are initiated by human beings.

Amidst all this, Information security efforts continue to evolve overtime in sophistication and purpose. Information Security can be achieved through a combination of Physical, Logical and administrative techniques to secure information assets. The sophistication of the technologies and processes to secure Information assets allude to the importance of information to the human race and also to the fact that compromise of information assets is on the increase and equally, in a more sophisticated manner.
There is one Key Player that has made the need for information and to protect this information so VITAL, HUMAN BEINGS.

The human beings that might compromise information systems include employees who turn out to be disgruntled, Employees who collude (In an environment where separation of duties is implemented) to beat systems, Manufacturers (Hardware and software) who install malware and back-doors in the products they sell, Governments who want to spy on others for political/diplomatic interests, among others.  Ignorance of information security by Human beings is also a great resource for insecurity.  Social Engineering techniques like Phishing, sharing passwords (voluntarily or writing it on a sticky Note on your desk etc) and giving strangers access to information systems without due process are some of the ways information systems can be compromised. And these techniques are not new they are as old as the Human Race itself and have become handy in the hi-tech era. This means therefore that ultimately, with the Human Beings Involvement in information systems management, with the right tools, resources and time, any system can be compromised.

However, all hope should not be lost, Societies, Companies, Governments and Institutions can achieve an acceptable level of security if human beings are managed better. There is need to invest more in management of Human Resources. Management of Employees, Clients, Competitors, Consumers and Shareholders among others is as vital or even as/more vital as/than installing the most expensive security system for your organisation. A well-managed human resource will more likely manage the technology and other resources better.

“Don't compromise yourself. You're all you've got.”  Says Janis Joplin. Techniques like continuous human resource development programs, continuous screening of the employees (People change according to circumstances and therefore are largely unpredictable), investing in maintaining a stable state of being (Psychological and Social) for employees, and also applying basic principles of information security (Risk Management, Disaster Recovery, Business Continuity, Good Information Security Governance Practices among others) will help a great deal to reduce the exposure to an acceptable level. In summary, there can be enough security but only if there is keen interest in the Human Factor in Information security!

In Uganda, there are a number of companies that can be able to provide advisory/consultancy and technical services to help institutions and the Government nurture an information security culture and help initiate and manage information, information security and information security processes and DERIVE VALUR from the investment in information systems.

The writer is an Information Security Practitioner at iFrontiers (U) Ltd (www.ifrontiers.net).



[1] Ag. Commissioner Electronic Counter Measure, ‘Current IT fraud Situation Trends and Challenges; Perspectives from the Uganda Police Force’ East African Information Security Conference, Hotel Africana, 20th -21st August 2014

Friday, January 25, 2013

The Need to Identify and Develop Talent in Science and Technology
Many institutions including Universities, Ministries, Departments and Agencies of the state and the President of the Republic of Uganda are at the forefront of integrating Science Technology and Innovation into the national development process, and in that capacity have designed programs geared towards encouraging the youth not only to pursue Science and Technology based careers but to also excel in studying and applying Science and Technology in their society so that an abundant critical mass of Scientists and Technologists is bred to foster National Development and Social Transformation through Scientific Inventions, Innovations and Product Development. This can be evidenced by the National Science and Technology Policy, The National Science, Technology and Innovation Plan, The compulsory learning of all Science subjects at O’ Level, the Presidential Initiative to Support Scientists and the President’s commitments in his party manifesto among others.
With all the initiatives and good will highlighted above, Uganda’s Education Curriculum and many other programs do not provide much of incentives for special talents in sciences to flourish; in fact there is little or no formal talent identification efforts to;
1.       Fish out the most talented or skilled persons whose technical / hands on skills can be refined further to feed the technical labor force required for the industry and
2.       To produce the passionate and motivated persons to invent technologies in their home stead backyards and/or garages.
Talents emerge from general ability as a union of genetic dispositions, home and school experiences, and the person’s unique interests and learning styles. As evidenced in sports, entertainment and related industries, scouting and tapping of individuals with potential and interest at an early stage and giving it special attention will deliver tremendous results in having highly specialized and productive citizens in any society. This can be replicated for other sectors especially in Science and Technology.
Putting more emphasis in talent identification therefore should target primary school pupils and secondary school students at all levels and the Informal Sector as well to encourage them to invent or innovate by providing incentives like;
1.       Protecting their Ideas (IPR) and confidence building in the system, that these ideas would not be replicated or hijacked by opportunists.
2.       Providing scholarships for special talents to technical institutions abroad if possible but with guarantees of retaining this labor force.
3.       Exposing these talents to successful industrialists and to the Industrial process for Motivation and an opportunity for young innovators and inventors to get a real life experience of how the industry works. 

This challenge [Skills Gap] is not for Uganda alone, but Africa as a whole and to a lesser extent the developed world. It therefore requires investment and a deliberate approach in order to improve on the quality of the technical Labor force. Countries like China, South Africa, and India among others continue to develop the quality of their scientific technical labor through similar or more refined approaches and the results are as alarming as we all can attest.

About Me

Kampala, Uganda
Mwesigwa Collins is a Data Communications Engineer. He has been involved in Information Systems for more than eight years in both the Private and Public sectors. Mwesigwa has been involved in; the design, implementation and Maintenance of ICT systems (Voice, Video and Data applications) ensuring high quality of service, the development and implementation of Administrative Policies, IS Strategies and IT/Security Policies, the National IT Standards Development, Review and Adoption, the Development of District Business Information Centers (DBICs) in Uganda among others. Mwesigwa has contributed to various efforts in the advancement of ICT in Uganda and his versatility has enabled him to actively participate in various national programs in the promotion and advancement of Science, Technology and Innovation (STI) in Uganda. Mwesigwa Collins holds a BCS – Bachelors of Computer Science, MSC Data Communications and Software Engineering, an MCITP Certification – Enterprise Administrator and a CISA Certification and CISM.