Digital colonialism: South Africa’s education transformation in the shadow of Silicon Valley
- Authors: Kwet, Michael
- Date: 2019
- Subjects: Operation Phakisa Education (South Africa) , Educational technology -- South Africa , Internet in education -- South Africa , Educational sociology -- South Africa , Technological innovations -- South Africa , Technological literacy -- South Africa , Education and state -- South Africa , Open source software -- South Africa , Electronic surveillance -- Social aspects -- South Africa , Privacy, Right of -- South Africa , Business and education -- South Africa
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/93767 , vital:30936
- Description: This dissertation investigates the social implications of technology choices for the emerging education transformation of the South African basic education sector. In October 2015, then President Jacob Zuma launched Operation Phakisa Education (OPE), an initiative designed behind closed doors to fast-track digital education into all South African public schools. This study identifies and analyses policy choices and perspectives regarding the technology considered and deployed for the national education rollout. It documents the OPE proposal, and examines how e-education policy choices relate to humanitarian objectives. Theoretically, this study draws upon libertarian socialist theory (anarchism) to examine the sociology of education technology policy. Using anarchist theory, it assesses the perspective, aims, and choices of e-education policy at the national level. It also draws on the Free Software philosophy for society as articulated by Richard Stallman and Eben Moglen. Finally, it compares classic colonialism with global power in the digital era, and posits a theory of digital colonialism. Synthesizing anarchism and the Free Software philosophy into a single theoretical framework – placed into the context of colonial relations – it is the first work to apply anarchist sociological theory to education technology policy, and the first doctoral study on digital colonialism. For its methodology, this dissertation utilizes two qualitative methods: document analysis and semi-structured interviews. Interview subjects include high-level e-education policymakers and administrators in government, key stakeholders, and experts at the intersection of technology innovation and human rights. These methods were used to both identify and interrogate e-education policy as it relates to the humanitarian objectives of education policy at the national level. The findings demonstrate that South African education policy is beholden to largely United States-based corporations and models for e-education. The study found that the types of technologies for consideration in education are rooted in surveillance capitalism, which is spreading across the world. It contends that current e-education policy choices will entrench the power and exploitation of US state-corporate power in South African education, economy, and society. It argues that an alternative set of choices, People’s Technology for People’s Power, is consistent with the spirit of South African technology policy, and should be chosen for South African schools in order to counter the power of foreign power and resist surveillance capitalism. This dissertation is the first publication to document and analyze what the new government education policy is about and how it relates to equality and human rights. It argues that present South African e-education policy constitutes a new form of digitally-driven technocratic neoliberalism which ultimately favors ruling class interests in the United States and South Africa. It also argues that OPE violates South Africa’s Free and Open Source policy and the spirit of democracy outlined in the Phakisa methodology and the Batho Pele principles. This study found that OPE replicates the latest trends in e-education implementation popular in Silicon Valley. Tech multinationals are providing both the products and models for use in South Africa. The dissertation concludes that US technological and conceptual dominance in South African education constitutes digital colonialism. It emphasizes the need for public inclusion in the policy process, and proposes alternative policies and technologies for e-education based on the idea of People’s Technology for People’s Power. It also argues that current scholarship on education technology neglects the political and sociological importance of People’s Technology to education, economy, and society, as well as the global significance of Big Tech dominance vis-a-vis digital colonialism, and that subsequent literature would be enriched by addressing these issues.
- Full Text:
- Date Issued: 2019
- Authors: Kwet, Michael
- Date: 2019
- Subjects: Operation Phakisa Education (South Africa) , Educational technology -- South Africa , Internet in education -- South Africa , Educational sociology -- South Africa , Technological innovations -- South Africa , Technological literacy -- South Africa , Education and state -- South Africa , Open source software -- South Africa , Electronic surveillance -- Social aspects -- South Africa , Privacy, Right of -- South Africa , Business and education -- South Africa
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/93767 , vital:30936
- Description: This dissertation investigates the social implications of technology choices for the emerging education transformation of the South African basic education sector. In October 2015, then President Jacob Zuma launched Operation Phakisa Education (OPE), an initiative designed behind closed doors to fast-track digital education into all South African public schools. This study identifies and analyses policy choices and perspectives regarding the technology considered and deployed for the national education rollout. It documents the OPE proposal, and examines how e-education policy choices relate to humanitarian objectives. Theoretically, this study draws upon libertarian socialist theory (anarchism) to examine the sociology of education technology policy. Using anarchist theory, it assesses the perspective, aims, and choices of e-education policy at the national level. It also draws on the Free Software philosophy for society as articulated by Richard Stallman and Eben Moglen. Finally, it compares classic colonialism with global power in the digital era, and posits a theory of digital colonialism. Synthesizing anarchism and the Free Software philosophy into a single theoretical framework – placed into the context of colonial relations – it is the first work to apply anarchist sociological theory to education technology policy, and the first doctoral study on digital colonialism. For its methodology, this dissertation utilizes two qualitative methods: document analysis and semi-structured interviews. Interview subjects include high-level e-education policymakers and administrators in government, key stakeholders, and experts at the intersection of technology innovation and human rights. These methods were used to both identify and interrogate e-education policy as it relates to the humanitarian objectives of education policy at the national level. The findings demonstrate that South African education policy is beholden to largely United States-based corporations and models for e-education. The study found that the types of technologies for consideration in education are rooted in surveillance capitalism, which is spreading across the world. It contends that current e-education policy choices will entrench the power and exploitation of US state-corporate power in South African education, economy, and society. It argues that an alternative set of choices, People’s Technology for People’s Power, is consistent with the spirit of South African technology policy, and should be chosen for South African schools in order to counter the power of foreign power and resist surveillance capitalism. This dissertation is the first publication to document and analyze what the new government education policy is about and how it relates to equality and human rights. It argues that present South African e-education policy constitutes a new form of digitally-driven technocratic neoliberalism which ultimately favors ruling class interests in the United States and South Africa. It also argues that OPE violates South Africa’s Free and Open Source policy and the spirit of democracy outlined in the Phakisa methodology and the Batho Pele principles. This study found that OPE replicates the latest trends in e-education implementation popular in Silicon Valley. Tech multinationals are providing both the products and models for use in South Africa. The dissertation concludes that US technological and conceptual dominance in South African education constitutes digital colonialism. It emphasizes the need for public inclusion in the policy process, and proposes alternative policies and technologies for e-education based on the idea of People’s Technology for People’s Power. It also argues that current scholarship on education technology neglects the political and sociological importance of People’s Technology to education, economy, and society, as well as the global significance of Big Tech dominance vis-a-vis digital colonialism, and that subsequent literature would be enriched by addressing these issues.
- Full Text:
- Date Issued: 2019
Visualisation of PF firewall logs using open source
- Authors: Coetzee, Dirk
- Date: 2015
- Subjects: Open source software -- South Africa , Firewalls (Computer security) -- South Africa , Data logging -- South Africa , Data integrity -- South Africa , Data protection -- South Africa , Computer crimes -- South Africa , Hacktivism
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4719 , http://hdl.handle.net/10962/d1018552
- Description: If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking attempt, data leak or even data theft, whether the attempt is successful or unsuccessful. No logs mean no evidence, and in many cases not even the opportunity to find the mistake or fault in the organisation’s defence systems. Historically, it remains difficult to choose what logs are required by your organization. A number of questions should be considered: should a centralised or decentralised approach for collecting these logs be followed or a combination of both? How many events will be collected, how much additional bandwidth will be required and will the log collection be near real time? How long must the logs be saved and what if any hashing and encryption (integrity of data) should be used? Lastly, what system must be used to correlate, analyse, and make alerts and reports available? This thesis will address these myriad questions, examining the current lack of log analysis, practical implementations in modern organisation, and also how a need for the latter can be fulfilled by means of a basic approach. South African organizations must use technology that is at hand in order to know what electronic data are sent in and out of their organizations network. Concentrating only on FreeBSD PF firewall logs, it is demonstrated within this thesis the excellent results are possible when logs are collected to obtain a visual display of what data is traversing the corporate network and which parts of this data are posing a threat to the corporate network. This threat is easily determined via a visual interpretation of statistical outliers. This thesis aims to show that in the field of corporate data protection, if you can measure, you can manage.
- Full Text:
- Date Issued: 2015
- Authors: Coetzee, Dirk
- Date: 2015
- Subjects: Open source software -- South Africa , Firewalls (Computer security) -- South Africa , Data logging -- South Africa , Data integrity -- South Africa , Data protection -- South Africa , Computer crimes -- South Africa , Hacktivism
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4719 , http://hdl.handle.net/10962/d1018552
- Description: If you cannot measure, you cannot manage. This is an age old saying, but still very true, especially within the current South African cybercrime scene and the ever-growing Internet footprint. Due to the significant increase in cybercrime across the globe, information security specialists are starting to see the intrinsic value of logs that can ‘tell a story’. Logs do not only tell a story, but also provide a tool to measure a normally dark force within an organisation. The collection of current logs from installed systems, operating systems and devices is imperative in the event of a hacking attempt, data leak or even data theft, whether the attempt is successful or unsuccessful. No logs mean no evidence, and in many cases not even the opportunity to find the mistake or fault in the organisation’s defence systems. Historically, it remains difficult to choose what logs are required by your organization. A number of questions should be considered: should a centralised or decentralised approach for collecting these logs be followed or a combination of both? How many events will be collected, how much additional bandwidth will be required and will the log collection be near real time? How long must the logs be saved and what if any hashing and encryption (integrity of data) should be used? Lastly, what system must be used to correlate, analyse, and make alerts and reports available? This thesis will address these myriad questions, examining the current lack of log analysis, practical implementations in modern organisation, and also how a need for the latter can be fulfilled by means of a basic approach. South African organizations must use technology that is at hand in order to know what electronic data are sent in and out of their organizations network. Concentrating only on FreeBSD PF firewall logs, it is demonstrated within this thesis the excellent results are possible when logs are collected to obtain a visual display of what data is traversing the corporate network and which parts of this data are posing a threat to the corporate network. This threat is easily determined via a visual interpretation of statistical outliers. This thesis aims to show that in the field of corporate data protection, if you can measure, you can manage.
- Full Text:
- Date Issued: 2015
- «
- ‹
- 1
- ›
- »