Volume 3, Issue 1, March 2019, Page: 1-7
The Quandary of Cyber Governance in Ethiopia
Temesgen Aschenek Zeleke, Institute of Governance, Humanities and Social Sciences, Pan African University, Cameroon, Yaoundé
Received: Nov. 18, 2018;       Accepted: Jan. 2, 2019;       Published: Jan. 31, 2019
DOI: 10.11648/j.jppa.20190301.11      View  366      Downloads  100
Abstract
The incorporation of Information Communication Technology to the human endeavor have brought cyber space as one of the major areas of cooperation and conflict for actors of international relations. Its decentralized nature challenges traditional conception of state as the sole actor to possess coercive power. As a response states design different ingenuities to incorporate cyber governance as one domain of policy making and research. Likewise a number of legal, policy and institutional initiatives have been designed to guide cyber governance in Ethiopia. However, the over all aspects of cyber governance have posed a peril to digital landscape. The short history of internet has been accompanied by deliberate interruptions and online manipulations by the government. Neither complementarity nor clearly set of line of authority characterizes the institutional and legal architecture of Ethiopian cyber environment. By employing descriptive approach and integrating primary and secondary data sources the article analyzed the overall dilemma of cyber governance and its implication in Ethiopia. Thus the article scrutinizes the institutional, legal and policy aspects of internet governance neither crafts conducive environment for non-governmental actors nor able to support to exploit digital opportunities. This brought socio-economic costs which is generally resulted in what is termed as “digital divide”.
Keywords
Cyberspace, Internet Governance, Digital divide, Cyber Governance, Cyber Security
To cite this article
Temesgen Aschenek Zeleke, The Quandary of Cyber Governance in Ethiopia, Journal of Public Policy and Administration. Vol. 3, No. 1, 2019, pp. 1-7. doi: 10.11648/j.jppa.20190301.11
Copyright
Copyright © 2019 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
Liaropoilos N. Andrew (2017). Cyberspace governance and state sovereignty, in democracy and an open economy world order. Page 25-37.
[2]
Lewis A. (2010). Sovereignty and the Role of Government in Cyberspace. The Brown Journal of World Affairs volume xvi, issue ii, page 55-65.
[3]
Perritt, Henry H. Jr. (1998) "The Internet as a Threat to Sovereignty? Thoughts on the Internet's Role in Strengthening National and Global Governance," Indiana Journal of Global Legal Studies: Vol. 5: Issue. 2, Article 4. Available at: http://www.repository.law.indiana.edu/ijgls/vol5/iss2/4.
[4]
Wenger A. (2001). The internet and the challenging face of International relations and security. Journal of Information and Security. Vol, 7 P 5-11.
[5]
Sheldon, J. (2014). Geopolitics and cyber power: Why geography still matters, in American foreign policy interests. The Journal of the National Committee on American Foreign Policy, 36 (5), 286-293.
[6]
Adams J. and Albakajai M. (2016). Cyberspace: A New Threat to the Sovereignty of the State. Management Studies, 2016, Vol. 4, No. 6, 256-265.
[7]
Laguerre, M. (2004). Virtual time, in information. Communication & Society, 7 (2), 223-247.
[8]
Collaboration on International ICT Policy for East and Southern Africa ((CIPESA), 2017). Calculating the economic cost of internet shut down in sub Saharan Africa.
[9]
Gagliardone, I and Golooba-Mutebi, F (2016). The Evolution of the Internet in Ethiopia and Rwanda: Towards a “Developmental” Model? Stability: International Journal of Security & Development, 5 (1): 8, pp. 1–24, DOI:
[10]
Xiao Yingying, & Yuan Zhengqing. (2016). A primary exploration on cyber security governance in Africa, West Asia and Africa, No. 3: 121–137.
[11]
Daniel T. Kuehl (2009). From Cyberspace to Cyber power: Defining the Problem, US Naval Institute. Available at http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-02.pdf.
[12]
Clark D. (2010). Characterizing, cyberspace: past, present and, future. MIT, Csail.
[13]
Jensen T. (2015). Cyber Sovereignty: The Way Ahead. Texas International Law Journal, volume 50 issue 2, page 274-302.
[14]
The Hague Institute for Global Justice (2015). Cyber Governance: Challenges, Solutions, and Lessons for Effective Global Governance. Policy Brief 17, November 2015.
[15]
Internet Society (2017). Policy Brief: Internet Shutdowns https://www.internetsociety.org/policybriefs/internet-shutdowns accessed on April 10,/2018.
[16]
Kurbalija K.(2016). Introduction to internet governance (7th ed.). Malta, diplo foundation.
[17]
West M. Sarah, (N. d). Globalizing Internet Governance: Negotiating Cyberspace Agreements in the Post Snowden Era. University of Southern California, Annenberg School for Communication and Journalism.
[18]
ITU (2002). Internet from the Horn of Africa: Ethiopia case study. Geneva, Switzerland.
[19]
https://www.internetworldstats.com/stats1.htm, is a website that provides statistics on internet users world wide.
[20]
Ministry of Finance and Economic Development (2014). Growth and Transformation Plan Annual Progress Report for F. Y. 2012/13. Addis Ababa, Ethiopia
[21]
National Planning Commission, (2016). Ethiopian Growth and Transformation Plan II (GTP II) (2015/16-2019/20). Addis Ababa, Ethiopia.
[22]
Ernest j. Wilson,(2005). What is Internet Governance and Where Does it Come From?. Cambridge University Press.
[23]
International Chamber of Commerce (2004). Issue Paper on Internet Governance. Paris, France.
[24]
Mueller, J. Mathiason, H. (2007). The Internet and global governance: principles and norms for a new regime, Global Governance, Review of Multilateralism and International Organizations, n. 13.
[25]
Kinfe Micheal and Halefom Hailu, (2015). The Internet and Regulatory Responses in Ethiopia: Telecoms, Cybercrimes, Privacy, E-commerce, and the New Media. Mizan Law Review, Vol. 9, No.1, p 108-153.
[26]
Ethiopian Federal Democratic Republic, Federal Negarit Gazeta (2016). Computer Crime Proclamation No. 958/2016, Addis Ababa, 22nd Year No. 58th July, 2016.
[27]
Online Interview with Genet Yigrem (the name changed for security reasons), date of interview 25/04/2018. Interviewer, the researcher
[28]
Minyahel Desta (2012). Liberalization of telecommunication in Ethiopia challenges and prospects: citizens’ view and opinion Research paper submitted to trade policy training center in Africa (trapca) for the 2012 annual conference. AddisAbaba, Ethiopia.
[29]
Freedom House,(2018). Freedom on the Net 2018 - Ethiopia, available at: https://www.refworld.org/docid/5be16b1a4.html.
[30]
Access Now (2017) Shutdown Stories Project. https://www.accessnow.org/shutdown-stories-project/Accessed on May 01/2018
[31]
Marczak B., Alexander G. and etal (2017). CHAMPING AT THE CYBERBIT Ethiopian Dissidents Targeted with New Commercial Spyware. https://citizenlab.ca/2017/12/champing-cyberbit-ethiopian-dissidents-targeted-commercial-spyware/ Accessed on May 15/2018.
[32]
The Brookings Institution, (2016). Internet shutdowns cost countries $2.4 billion last year Washington, DC.
[33]
Online Interview with Mengistu Bayih (the name changed for security reasons), date of Interview 30/04/2018. Interviewer the researcher.
[34]
Voice of America (2017). As Violence Flares in Ethiopia, Internet Goes Dark https://www.voanews.com/a/as-violence-flares-in-ethiopia-internet-goes-dark/4164223.html Accessed on May 15/2018.
[35]
Calandro. E, Galpaya H., Jaume-Palasí L., Lara C., Spielkamp M. (2016). Guidebook Internet Governance, Media freedom in a connected world. Germany, Bonn.
[36]
Ethiopian Federal Democratic Republic, Federal Negarit Gazeta (2012). Telecom Fraud Offence Proclamation No. 761/2012, 18th Year No. 61 Addis Ababa 4th September, 2012.
[37]
Ethiopian Reporter (2016). Ethio-Telecom plans continental expansion. Retrieved from https://www.thereporterethiopia.com/content/ethio-telecom-plans-continental-expansion.
[38]
Freedom House (2017). Freedom on the net 2017. Freedom house report 2017.
[39]
Lucchi N.(2014). Internet Content Governance and Human Rights. Vanderbilt Journal of Entertainment & Technology Law. Vol. 16, No.4 Page 809-856.
[40]
Oguno P. (2016). Cyber Security, Sovereignty and democratic governance in Africa, challenges. Global Journal of Politics and Law Research Vol.4, No.2, p.43-54.
[41]
Solum B. Lawrence (2008). Models of Internet governance. University of Illinois, Public Law Research Paper No. 07.
[42]
Weber R. (2015). Principles for governing the Internet a comparative analysis (6th ed.). United Nations Educational, Scientific and Cultural Organization, France.
Browse journals by subject