Is anytthing going on with Automation of Government Reciepting?

Listers, Can someone please let me know why with all the ICT brains in Kenya, Government Receipts are still issued in longhand using carbon paper! Without for a moment suggesting impropriety on the part of anyone currently using long hand, one suspects that, if the process is automated, revenue will rise significantly. After all, how does one know that the seven (7) in the customer copy of the handwritten receipt is not accounted for as a one (1) in the duplicate copy. Add zeros to the figures and see what effect it can have (7,000 = 1000; 70,000 = 10,000 etc). Imagine the resultant reduction in taxes. Do the government accounting officers not want to have a dashboard on their computers where they can see revenues coming in in real-time. Does any one know if there is anything going on to remove us from the carbon paper age? Regards, Leonard Obura Aloo Advocate

HI colleagues Cybercrime against the person and in this case the woman is real and is rising . unfortunately, all the efforts to understand the vice focuses on the cyber crime against property and against governments . the only other notable effort against the person is against the child. While cyberspace have provided secure tools and spaces where women can enjoy their freedom of expression, information and privacy of communication, the same benefits of anonymity and privacy also extend to those who employ ICTs for criminal activities and use the internet to commit violence against women. The use of mobile phones and internet to stalk, abuse, traffic, intimidate and humiliate women is palpable in developing countries including Kenya. The lack of specific cybercrime/cyber security legislation makes it even more difficult to punish those who use ICTs tools to conduct violence against women. Kenya Communications ( Amendment) Act 2009 focused on the cybercrime against property and not the person. Kenya is not alone but that is not a consolation. With increased use of internet in Kenya with the onset of broadband, it is necessary to create the necessary policy / regulatory and the operational framework to reign in the vice . KICTANET has launched a study on the vice whose research questions are; 1. What is the prevalence of cybercrime against women in terms of degree, level, quantity, and distribution? 2. How does cyber crime affect women differently? (Demonstrate spiral effect and determine if women are already intimidated by cyber space e.g. mailing lists, how active do women participate in debates? Is the design of the cyber already woman unfriendly?) 3. What are the current measures and gaps (technological, legal, social, and psychological) to address cyber crime against women (local, regional, and global)? Map the efforts (lessons of best practice). 4. What mechanisms are appropriate for addressing cyber crime against women? Kictanet will mount a validation workshop to review literature as well as the research strategy on Feb 16th, 2010 If you wish to contribute to make the cyberspace safer for women , we have limited spaces(free) for Kictanet members at the workshop- send your request for space OFFLINE not to clog the mailing list. Cheers Muriuki Mureithi

Nice initiative MM. Can we think of a workshop in Vilnius for presentation of the results of this interesting study? I am sure it would generate great interest. Waudo On Wed, 03 Feb 2010 18:14 +0300, "muriuki mureithi" <mureithi@summitstrategies.co.ke> wrote: HI colleagues Cybercrime against the person and in this case the woman is real and is rising . unfortunately, all the efforts to understand the vice focuses on the cyber crime against property and against governments . the only other notable effort against the person is against the child. While cyberspace have provided secure tools and spaces where women can enjoy their freedom of expression, information and privacy of communication, the same benefits of anonymity and privacy also extend to those who employ ICTs for criminal activities and use the internet to commit violence against women. The use of mobile phones and internet to stalk, abuse, traffic, intimidate and humiliate women is palpable in developing countries including Kenya. The lack of specific cybercrime/cyber security legislation makes it even more difficult to punish those who use ICTs tools to conduct violence against women. Kenya Communications ( Amendment) Act 2009 focused on the cybercrime against property and not the person. Kenya is not alone but that is not a consolation. With increased use of internet in Kenya with the onset of broadband, it is necessary to create the necessary policy / regulatory and the operational framework to reign in the vice . KICTANET has launched a study on the vice whose research questions are; 1. What is the prevalence of cybercrime against women in terms of degree, level, quantity, and distribution? 2. How does cyber crime affect women differently? (Demonstrate spiral effect and determine if women are already intimidated by cyber space e.g. mailing lists, how active do women participate in debates? Is the design of the cyber already woman unfriendly?) 3. What are the current measures and gaps (technological, legal, social, and psychological) to address cyber crime against women (local, regional, and global)? Map the efforts (lessons of best practice). 4. What mechanisms are appropriate for addressing cyber crime against women? Kictanet will mount a validation workshop to review literature as well as the research strategy on Feb 16^th, 2010 If you wish to contribute to make the cyberspace safer for women , we have limited spaces(free) for Kictanet members at the workshop- send your request for space OFFLINE not to clog the mailing list. Cheers Muriuki Mureithi "Those who say it cannot be done should not interrupt the ones doing it." -old proverb

Thanks Waudo Our first stop is at home - ICANN Nairobi next month and then to other international conferences but we wish to create evidence based awareness at home first as a test case Cheers MM From: waudo siganga [mailto:emailsignet@mailcan.com] Sent: 03 February 2010 18:26 To: muriuki mureithi Cc: KICTAnet ICT Policy Discussions Subject: Re: [kictanet] Getting a hold on cybercrime against women (cyber pests!) Nice initiative MM. Can we think of a workshop in Vilnius for presentation of the results of this interesting study? I am sure it would generate great interest. Waudo On Wed, 03 Feb 2010 18:14 +0300, "muriuki mureithi" <mureithi@summitstrategies.co.ke> wrote: HI colleagues Cybercrime against the person and in this case the woman is real and is rising . unfortunately, all the efforts to understand the vice focuses on the cyber crime against property and against governments . the only other notable effort against the person is against the child. While cyberspace have provided secure tools and spaces where women can enjoy their freedom of expression, information and privacy of communication, the same benefits of anonymity and privacy also extend to those who employ ICTs for criminal activities and use the internet to commit violence against women. The use of mobile phones and internet to stalk, abuse, traffic, intimidate and humiliate women is palpable in developing countries including Kenya. The lack of specific cybercrime/cyber security legislation makes it even more difficult to punish those who use ICTs tools to conduct violence against women. Kenya Communications ( Amendment) Act 2009 focused on the cybercrime against property and not the person. Kenya is not alone but that is not a consolation. With increased use of internet in Kenya with the onset of broadband, it is necessary to create the necessary policy / regulatory and the operational framework to reign in the vice . KICTANET has launched a study on the vice whose research questions are; 1. What is the prevalence of cybercrime against women in terms of degree, level, quantity, and distribution? 2. How does cyber crime affect women differently? (Demonstrate spiral effect and determine if women are already intimidated by cyber space e.g. mailing lists, how active do women participate in debates? Is the design of the cyber already woman unfriendly?) 3. What are the current measures and gaps (technological, legal, social, and psychological) to address cyber crime against women (local, regional, and global)? Map the efforts (lessons of best practice). 4. What mechanisms are appropriate for addressing cyber crime against women? Kictanet will mount a validation workshop to review literature as well as the research strategy on Feb 16th, 2010 If you wish to contribute to make the cyberspace safer for women , we have limited spaces(free) for Kictanet members at the workshop- send your request for space OFFLINE not to clog the mailing list. Cheers Muriuki Mureithi "Those who say it cannot be done should not interrupt the ones doing it." -old proverb

On Wed, Feb 3, 2010 at 6:33 PM, muriuki mureithi <mureithi@summitstrategies.co.ke> wrote:
Thanks Waudo
Our first stop is at home – ICANN Nairobi next month
What do you realistically expect ICANN to do about this? It's well out of scope for them. -- Cheers, McTim "A name indicates what we seek. An address indicates where it is. A route indicates how we get there." Jon Postel

McTim Should have clarified Will run a workshop alongside ICANN event cheers -----Original Message----- From: McTim [mailto:dogwallah@gmail.com] Sent: 03 February 2010 19:30 To: mureithi@summitstrategies.co.ke Cc: KICTAnet ICT Policy Discussions Subject: Re: [kictanet] Getting a hold on cybercrime against women (cyber pests!) On Wed, Feb 3, 2010 at 6:33 PM, muriuki mureithi <mureithi@summitstrategies.co.ke> wrote:
Thanks Waudo
Our first stop is at home - ICANN Nairobi next month
What do you realistically expect ICANN to do about this? It's well out of scope for them. -- Cheers, McTim "A name indicates what we seek. An address indicates where it is. A route indicates how we get there." Jon Postel

This is a great piece! I wonder whether men are immune to this vice hence the concentration on women. Maybe there will be an opportunity to do this but I opine that we should ensure we don't fall into the problems girl child activism and neglect of the boy child...especially on this sms stalking one! Have a great evening listers! EK Sent from my BlackBerry® -----Original Message----- From: "muriuki mureithi" <mureithi@summitstrategies.co.ke> Date: Wed, 3 Feb 2010 18:14:20 To: <emmanuel.khisa@kadet.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: [kictanet] Getting a hold on cybercrime against women (cyber pests!) _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: emmanuel.khisa@kadet.co.ke Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/emmanuel.khisa%40kadet....

Hi Emmanuel Just a glimpse of the literature review data -- 'Self reports to WHOA between 2000 -2008 indicates that the cyber stalkers are predominantly men representing 49.5% while women cyber stalkers were significant at 28.5%. Thus, women are a significant contributor to cyber stalking. The victim is clearly the women, 72.5% of the victims were women while men victims accounted for 22% of the cases' . In 71% of the cases, the cyber stalking did not result in offline threats. Nevertheless the 29% offline threats is significant representing one in three cases The woman is overwhelmingly the victim both by men and sometimes other women! That's the motivation for the study Cheers MM -----Original Message----- From: emmanuel.khisa@kadet.co.ke [mailto:emmanuel.khisa@kadet.co.ke] Sent: 03 February 2010 19:29 To: mureithi@summitstrategies.co.ke Cc: KICTAnet ICT Policy Discussions Subject: Re: [kictanet] Getting a hold on cybercrime against women (cyber pests!) This is a great piece! I wonder whether men are immune to this vice hence the concentration on women. Maybe there will be an opportunity to do this but I opine that we should ensure we don't fall into the problems girl child activism and neglect of the boy child...especially on this sms stalking one! Have a great evening listers! EK Sent from my BlackBerryR -----Original Message----- From: "muriuki mureithi" <mureithi@summitstrategies.co.ke> Date: Wed, 3 Feb 2010 18:14:20 To: <emmanuel.khisa@kadet.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: [kictanet] Getting a hold on cybercrime against women (cyber pests!) _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: emmanuel.khisa@kadet.co.ke Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/emmanuel.khisa%40kadet. co.ke

Dear listers, Prof. Kamau, University of Nairobi's engineering school has successifully reverse engineered the converter box for digital TV. Those willing to visit the fab lab next week should register with Awiti in my office. His e-mail is nawiti@information.go.ke. I am hoping soon we can reverse engineer the ipad so that we can use it to distribute e-books to all kids in the country and avoid this theft of textbooks. Regards. Ndemo. Sent from my BlackBerry® -----Original Message----- From: "muriuki mureithi" <mureithi@summitstrategies.co.ke> Date: Wed, 3 Feb 2010 18:14:20 To: <bitange@jambo.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: [kictanet] Getting a hold on cybercrime against women (cyber pests!) _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: bitange@jambo.co.ke Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke

Reverse engineering - or patent infringement? On 8 February 2010 21:01, <bitange@jambo.co.ke> wrote:

Andrea Bohnstedt, The converter box was a generic product from China which was reverse engineered there. To my knowledge nobody has stopped the manufacture of these generic products. Perharps I may have gone too far with the Ipad. I meant something close to the ipad which is an improvement of the many electronic solutions to reading e-books. Regards Ndemo. Sent from my BlackBerry® -----Original Message----- From: Andrea Bohnstedt <andrea.bohnstedt@ratio-magazine.com> Date: Mon, 8 Feb 2010 23:40:31 To: <bitange@jambo.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: Re: [kictanet] Getting a hold on cybercrime against women (cyber pests!) Reverse engineering - or patent infringement? On 8 February 2010 21:01, <bitange@jambo.co.ke> wrote:
---------------------------------------------- This message has been scanned for viruses and dangerous content by Jambo MailScanner, and is believed to be clean. --------------------------------------------- "easy access to the world"

How did Japan develop it's electronics industry? Reverse engineering and process improvement. Harry Sent from my iPhone On 9 Feb 2010, at 00:26, bitange@jambo.co.ke wrote:

@Andrea, Reverse engineering - or patent infringement? If I was Prof. Kamau, I would carefully ride on both - depending on the convenience of the laws applicable and the demand for public good. Draw the parallel with generic HIV medicines... walu. --- On Tue, 2/9/10, Andrea Bohnstedt <andrea.bohnstedt@ratio-magazine.com> wrote: From: Andrea Bohnstedt <andrea.bohnstedt@ratio-magazine.com> Subject: Re: [kictanet] Getting a hold on cybercrime against women (cyber pests!) To: jwalu@yahoo.com Cc: "KICTAnet ICT Policy Discussions" <kictanet@lists.kictanet.or.ke> Date: Tuesday, February 9, 2010, 12:40 AM Reverse engineering - or patent infringement? On 8 February 2010 21:01, <bitange@jambo.co.ke> wrote: Dear listers, Prof. Kamau, University of Nairobi's engineering school has successifully reverse engineered the converter box for digital TV. Those willing to visit the fab lab next week should register with Awiti in my office. His e-mail is nawiti@information.go.ke. I am hoping soon we can reverse engineer the ipad so that we can use it to distribute e-books to all kids in the country and avoid this theft of textbooks. Regards. Ndemo. Sent from my BlackBerry® -----Original Message----- From: "muriuki mureithi" <mureithi@summitstrategies.co.ke> Date: Wed, 3 Feb 2010 18:14:20 To: <bitange@jambo.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: [kictanet] Getting a hold on cybercrime against women (cyber pests!) _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: bitange@jambo.co.ke Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: andrea.bohnstedt@ratio-magazine.com Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/andrea.bohnstedt%40rati... -----Inline Attachment Follows----- _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: jwalu@yahoo.com Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com

Walu Are you suggesting that at best we can only be second best - we cannot go beyond 'riding' and using public good as a cover We have smart Kenyans who can invent - what we need is a mechanism to recognise and motivate for innovation Cheers MM From: kictanet-bounces+mureithi=summitstrategies.co.ke@lists.kictanet.or.ke [mailto:kictanet-bounces+mureithi=summitstrategies.co.ke@lists.kictanet.or.k e] On Behalf Of Walubengo J Sent: 09 February 2010 09:08 To: mureithi@summitstrategies.co.ke Cc: KICTAnet ICT Policy Discussions Subject: Re: [kictanet] Reverse engineering - or patent infringement? @Andrea, Reverse engineering - or patent infringement? If I was Prof. Kamau, I would carefully ride on both - depending on the convenience of the laws applicable and the demand for public good. Draw the parallel with generic HIV medicines... walu. --- On Tue, 2/9/10, Andrea Bohnstedt <andrea.bohnstedt@ratio-magazine.com> wrote: From: Andrea Bohnstedt <andrea.bohnstedt@ratio-magazine.com> Subject: Re: [kictanet] Getting a hold on cybercrime against women (cyber pests!) To: jwalu@yahoo.com Cc: "KICTAnet ICT Policy Discussions" <kictanet@lists.kictanet.or.ke> Date: Tuesday, February 9, 2010, 12:40 AM Reverse engineering - or patent infringement? On 8 February 2010 21:01, <bitange@jambo.co.ke> wrote: Dear listers, Prof. Kamau, University of Nairobi's engineering school has successifully reverse engineered the converter box for digital TV. Those willing to visit the fab lab next week should register with Awiti in my office. His e-mail is nawiti@information.go.ke. I am hoping soon we can reverse engineer the ipad so that we can use it to distribute e-books to all kids in the country and avoid this theft of textbooks. Regards. Ndemo. Sent from my BlackBerryR -----Original Message----- From: "muriuki mureithi" <mureithi@summitstrategies.co.ke> Date: Wed, 3 Feb 2010 18:14:20 To: <bitange@jambo.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: [kictanet] Getting a hold on cybercrime against women (cyber pests!) _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: bitange@jambo.co.ke Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: andrea.bohnstedt@ratio-magazine.com Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/andrea.bohnstedt%40rati o-magazine.com -----Inline Attachment Follows----- _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: jwalu@yahoo.com Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com

Good morning all, I didn't refer to Prof. Kamau, I referred to the statement of Dr Ndemo, which he kindly qualified. I am aware of the debate of generic drugs and the arguments made that the public good should override patent rights. But this is, as I'm sure everyone is also aware of, a complex topic, with an equally complex international legal framework, and as much as it's easy to hate big pharma, I think some recognition needs to be given to companies that invest heavily in R&D. In the Kenyan debate specifically, I would find it counterproductive if senior government officials openly call for patent right infringements (and again, Dr Ndemo did qualify his statement). Apart from the fact that I'd rather like to see innovation encouraged, it does nothing for Kenya's image towards international ICT and tech investors or people looking to outsource processes. Copy right and patent infringement and intellectual property right theft was and is a big concern in China, and Kenya has none of the advantages that China offers to offset these: very low-cost manufacturing environment and a huge domestic market. It's a bit of a contradiction to call for e.g. certifications etc to build international credibility, and then offset it with a signal like this. On the IPad specificially: I doubt that Kenyan companies, even if they managed to copy the IPad, would be able to build it at a lower cost, and the way the education sector is run now, they'd be stolen just as quickly as any book - probably faster. I went to the Intel Classmate launch a couple of years ago and they made a useful point that just handing out kiddie laptops is not the solution: You need the whole ecosystem to make them productive. Electricity, connectivity, a place to lock them up, and importantly a teaching plan that they are integrated into. Have a lovely day, Andrea On 9 February 2010 09:07, Walubengo J <jwalu@yahoo.com> wrote:
-- Andrea Bohnstedt Publisher +254 720 960 322 www.ratio-magazine.com

Andrea Bohnstedt, Thanks for your e-mail. I understand where you are coming from. Kenya is just recovering from the pain of losing its Ciondo patent to Japan. We have on several occassions lost whenever we have shared our intellectual property especially on medicinal plants. I am however confident that we can take on China. It may turn out to be a David and Goliath story. Often we forget that Africa's population is approaching one billion and the efforts to have Africa to approach issues as a unit is bearing fruit. Yes we must respect international treaties but where they have been abused we cannot sit and simply become consumers. Academicians ordinarily build on new inventions. Steve jobs' innovation was built on existing solution (see last week's Economist). I would hope that our academics would do the same. Ndemo. Sent from my BlackBerry® -----Original Message----- From: Andrea Bohnstedt <andrea.bohnstedt@ratio-magazine.com> Date: Tue, 9 Feb 2010 09:47:18 To: <bitange@jambo.co.ke> Cc: KICTAnet ICT Policy Discussions<kictanet@lists.kictanet.or.ke> Subject: {Disarmed} Re: [kictanet] Reverse engineering - or patent infringement? _______________________________________________ kictanet mailing list kictanet@lists.kictanet.or.ke http://lists.kictanet.or.ke/mailman/listinfo/kictanet This message was sent to: bitange@jambo.co.ke Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/bitange%40jambo.co.ke

I believe that what Prof Kamau has done is the dissasembly, cataloguing and indexing of the *components* of the STB, including how they are interconnected, the circuit board designs, internal and external interfaces etc... This then serves as the basis to be able to procure same or similar - adapt the designs in order to come up with a local version, ostensibly at a lower cost. Patents in such hardware are held by the chip manufacturers - Prof would be offending if what he was doing was trying to 'hack' the chip in order to produce his own version. That would be a grossly expensive and in all likelihood, foolhardy pursuit. It's much easier (and cheaper), once the components have been identified to purchase them from the same manufacturer and simply do the assembly here - with whatever local modifications may be required. I remember that when we started messing around with computer assembly in the early 90s - the furore from the "branded" companies - with all kinds of threats regarding patents, copyrights etc... I simply see this as determination of components for local assembly of STBs. I'm sure the good professor is wise, intelligent and educated enough to know that patent infringement could land himself in a heap of trouble. Regards, Brian On Tue, Feb 9, 2010 at 9:07 AM, Walubengo J <jwalu@yahoo.com> wrote:
-- Brian Munyao Longwe e-mail: blongwe@gmail.com cell: + 254 722 518 744 blog : http://zinjlog.blogspot.com meta-blog: http://mashilingi.blogspot.com
participants (10)
-
Andrea Bohnstedt
-
bitange@jambo.co.ke
-
Brian Munyao Longwe
-
emmanuel.khisa@kadet.co.ke
-
Harry Hare
-
Leonard Aloo
-
McTim
-
muriuki mureithi
-
Walubengo J
-
waudo siganga