Monday, 8 January 2018

Fighting Corruption Using E-Governance



In his first state of the nation address, the president, Cde E D Mnangagwa told a joint sitting of the country’s two houses of parliament; “Corruption remains the major source of some of the problems we face as a country and its retarding impact on national development cannot be overemphasized. We need to use the e-government programme not only as a means to keep in step with the ICT revolution, but also to fight corruption. This is being complemented by the concurrent drive to boost internet connectivity throughout the country."  



Before delving further into the article, e-governance or e-government is defined as the use of ICT (Information and Communication Technology) to provide information to citizens and to connect citizens and government. E-governance has gained popularity in recent years, with many countries resorting to ICTs to modernise government, increase efficiency and improve public service delivery.

The above statement was a refreshing acknowledgement of the depth of the problem by the President as Zimbabwe continues to struggle with systemic corruption. In the same breath, the President also pointed out that part of the solution lies in ICT and in particular e-governance. This was significant as it signals a fresh approach which targets the utilisation of technological advancements to fight some of the social ills.

The President rightly pointed out that corruption is probably the most prevalent and persistent challenge Zimbabwe is facing in enhancing economic growth and improving the quality of life. The World Bank’s 2011 guide identifies corruption as “one of the single greatest obstacles to economic and social development”. It involves the misuse of public power, office or authority for private benefit through bribery, extortion, influence peddling, nepotism, fraud or embezzlement. Evidence is beginning to emerge of corrupt activities that have contributed to the economic challenges Zimbabwe is facing, as some of the culprits are now being exposed or arrested.

Corrupt activities by individuals and companies contribute to a rise in public expenditure and reduction in the amount of tax received by governments, thus less money is available for essential government services. Zimbabwe has not been spared, with such activities having had the adverse effect of discouraging investment, limiting economic growth and retarding improvement in the quality of life for the rural and poor segments of the country. Corruption led to mistrust between Zimbabwean citizens and public officials with the traffic police being cited as the most unprincipled. The wealth exhibited by some public officials, exemplified by the ownership of asserts which are disproportionate to their official sources of income, have further put a wedge between public servants and the general public.

Corruption in Zimbabwe has been fueled by a number of issues. The monopoly of power, where public officials have absolute authority to enforce regulations and policies is one such factor. Other drivers include the misuse of the power of discretion, lack of accountability and transparency. Although the cases of corruption in Zimbabwe which have been publicized so far have involved abuse of public power for private benefit, it goes without saying that it is also prevalent in the private sector, where for example issues in procurement and hiring have been highlighted in allegations surrounding a local businessman and a parastatal. It is hoped the government will continue to pursue such cases and bring the perpetrators to justice.

The fight against corruption in Zimbabwe has taken different forms such as the establishment of anti-graft agencies like the Zimbabwe Anti-Corruption Commission (ZACC) and the waging of massive campaigns against corruption by other governmental agencies. Despite these measures by government, the corruption virus strain keeps spreading. In this respect, the proposal and intention to fight this scourge using Information and Communications Technologies (ICTs) tools, in particular e-governance by the President, has to be applauded as this can be an effective tool to increase transparency and combat corruption.

A considerable amount of corruption cases involve the participation of a “middle man” in service delivery processes. As an example when one wants to apply for land, a birth certificate, or a passport or some other documentation, a paper based application is used and handled by a “middle man” who may demand a bribe to facilitate the service. Electronic delivery of services (e.g., submitting internet applications and tax returns for computer processing) can reduce corruption by reducing interactions with officials, thus eliminating the “middle man”. This eliminates discretion from the equation by removing intermediary services and allowing citizens to conduct transactions themselves. It eliminates unnecessary human intervention in government work processes, which also reduces the need to monitor corrupt behaviour.

E-governance makes face-to-face interactions between government and citizens unnecessary through online communication. The contents and procedures of all work are disclosed, and the administrative agency responds to questions and inquiries of the complainants through online channels; reducing the possibility of unfair treatment (or corruption) by public officials. The entire tax system for example, must be restructured with the specific purpose of reducing direct contact between citizens and tax officials to reduce opportunities for requests for bribes.

E-governance can reduce the need for citizens to use bribes to obtain information by making essential information publicly available. The President has highlighted the importance of transparency and accountability in his New Year message: “I urge you fellow Zimbabweans to engage with Government, its institutions and agencies for more transparent, just, accountable and responsible governance. Let us equally commit to honesty, transparency, accountability and discipline to ensure accelerated national development and progress.”

Greater access to information will promote greater transparency and accountability which will contribute to the government’s anti-corruption goals. Implementation of e-governance will greatly reduce the cost of collecting, distributing, and accessing government information. Additionally, the more open the government, the bigger the chance of discovering corrupt behaviours; resulting in public officials being accountable to the citizens. This will lead to the satisfaction of citizens and the development of a closer and trustworthy relationship between the government and citizens.

The monopoly of power and exercise of discretion, if not supported by high professional or ethical standards, may result in increased corruption. E–governance can be designed to make government processes more rule-based and objective; reducing the possibility of public officials deciding and interpreting disagreements. In an “If the computer says no - it means no” culture an individual’s discretional powers will be eroded thereby reducing chances of corruption.

 

Corruption is often caused by competition restrictions and information monopolies. The Herald 01/01/2018 pointed out how corruption in procurement has manifested: “It is believed that Government has been losing public funds through inefficient and ineffective procurement processes, which often resulted in the acquisition of sub-standard goods. In some instances, procurement officers have been accused of inflating the cost of goods and services.

 

The effects of corruption control through competition can be significant, especially in government procurement. The implementation of e-procurement has been prioritised by the government as reflected in the statement by Ambassador Chidyausiku after the dissolution of the State Procurement Board: “There will be a new authority with new faces, which is expected to bring the much-needed efficiency and technology such as e-procurement.”

 

The e-governance's disclosure of information will make it possible to compete fairly. It will provide an environment in which all private operators participate in open competition in procurement contracts. Fair distribution of information will suppress corruption by eliminating opportunities for officials in charge to provide beneficial information to specific operators or to apply special criteria. E-procurement will also prevent price fixing in addition to providing transparency and accountability.

 

The government faces a lot of challenges in implementing e-governance. At the heart of these is poor ICT infrastructure. The development of a robust ICT infrastructure is a requirement for successful e-governance implementation in which the government should play a leading role. It should create an enabling environment for the adoption of ICT in everyday lives of citizens as a starting point of e-governance. Policies should be developed that aim to improve penetration, increase uptake and bridge the digital divide. Internet diffusion is still low due to the fact that local phone calls are expensive. The telecommunications infrastructure is still inaccessible to most parts of Zimbabwe. In places where it is accessible, cost is usually a barrier.

 

Lack of computer literacy among the citizens, businesses, and government sectors themselves has been proven to be a barrier in implementing e-governance. A lot of training and capacity building will be required in both government institutions and the general public. The majority of those who have ICT skills are young citizens thus the elders might be left out in adopting e-governance.


The government needs to set up an institutional framework supporting e-governance initiatives. It is important to define clear mandates and responsibilities to ensure e-governance development and proper co-ordination across government agencies. For sustainability, local expertise should be developed thus eliminating the need for costly foreign consultants. E-governance systems require considerable financial resources and these must be allocated to build and manage systems, upgrade and construct relevant infrastructure.



It is however acknowledged that e-governance in itself is not a silver bullet in the fight against corruption. Corruption and accountability involve complex economic, cultural, and governance issues. It is the summation of the various approaches that makes up the ethical infrastructure that we must all reaffirm commitment to preserving. The President’s resolve to eliminate corruption has been unwavering and e-governance with the right implementation can make a huge difference in eliminating this evil vice from the Zimbabwean society.

Thursday, 4 January 2018

Zimbabwe Operation Restore Legacy: Digital Footprint Lessons


Consistent with a global trend, Zimbabwe has experienced a marked growth in the use of social media and the internet in the past ten years. Recent developments with regards to the adoption and application of social media and the internet, have demonstrated that individuals and organisations need to carefully consider any content before publishing or dissipating it onto social media universe or uploading it on the internet platform. One has to be wary that it may just come back to haunt them at a later stage! The game-changing operation in Zimbabwe demonstrated politicians’ and social media activists’ ghosts of their former selves boomeranging to haunt them.

As the cornerstone of any democracy, freedom of speech empowers the general populace with the ability to freely express themselves in various forms; verbally or via electronic media in platforms including online. However, in today’s digital world any individual or organisation partaking in online activities leaves a permanent digital footprint, a trail which will be visible for generations to come. The pace of the changes that swept across Zimbabwe in the past month has demonstrated that going with the wind and having an irresistible urge to publish your thoughts and opinions online for the sake of re-tweets and “likes” can have a disastrous effect on your person. The internet is unforgiving.

A digital footprint is all of the information online about a person either posted by that person or others, intentionally or unintentionally. It is your online history, pertaining to all the stuff you leave behind as you use and surf the Internet. As the world moves increasingly online, most of our daily lives are recorded on some sort of electronic database. However what happens online is beyond our control!

Unlike footprints in the sand, which can be washed away by the wind or wave tides in the ocean or sea, digital footprints can be permanent. With the passing of every day, files, images and videos including pre-internet articles, are being uploaded; thus reincarnating historical footprints. Through your digital footprint; you are broadcasting what you look like, where you work, where you have been, who you know, your hobbies, and of course, your opinions on a variety of topics. This is accessible to anyone, including strangers!

In November this year, with the rapidly changing scenario in Zimbabwe, a lot of politicians, activists and “clikivists” (the internet politicians and analysts) found themselves flip-flopping on their analysis and commentary of the situation faster than the Karate Kid’s punches.  They found themselves navigating from the murky waters of “the Crocodile is finished” to the “return of the Crocodile”. Whilst this has been the norm in the political world before the digital age, the meandering path was not captured and it was easier for turncoats to shift positions and deny occupation of their previous ones. A lot of analysts were caught out; and embarrassingly so.

Philip Chiyangwa’s recordings for example, should provide lessons for figures of public prominence on the damage that the digital world can wreak on a reputation. Whilst he frantically tried to disassociate himself with the old order, the digital evidence was embarrassingly overwhelming. The way he is now being torn to shreds in the media gives an indication of what we can expect to see more of, as more politicians and political commentators of the digital age come into the spotlight as they try to flip-flop and change positions. Prof Moyo’s fall from grace, for example, is well documented on Twitter, thanks to his Twitter-activism and publicly available digital publications.

Prominent leaders of the MDC Alliance where also caught-up in the digital footprint unforgiving nature. After openly praising Operation Restore Legacy and the installation of President Mnangagwa on their Twitter and Facebook accounts; a number of them attempted to make a U-turn (apparently after failing to make it into government as they had hoped), but their digital activity was thrown back onto their faces, exposing them as  hypocrites. It is only a matter of time before our future leaders or even presidents find their teenage antics on Instagram, Twitter, Facebook and YouTube back-spinning to haunt them.

Whilst every individual could be the victim of his or her own digital footprint, it is public figures such as politicians who are most at risk. For such groups, even seemingly harmless information can be misinterpreted, spun and used by hostile third parties to expose private activity, attack reputations, and even do serious harm. However, counterintuitively, digital space remains overlooked by naïve public figures who venture into it without carrying out risk assessments. This was so prominent before, during and after the Zimbabwean events, where for example, the social media acts of the former President’s sons ignited and added heaps of fuel to the resentment towards the former first family. The bragging on social media by one Chivayo also came back to haunt him.

Known elements of a digital profile exist in the open for any unauthorised party to view indiscriminately. News stories, profile pieces and social media accounts offer a wealth of data that may reveal an individual’s interests, whereabouts and extended social circle. The social media accounts unwittingly divulge sensitive information, even where the target individuals themselves refrain from social media activity. Family members are often the prime information targets of hostile third parties. It does not take much effort to assemble a family tree and then to track down and monitor the circle’s digital activities. Investigative journalists are also increasingly turning to new tech-powered tools to source family-related stories.

As well as drawing negative press attention, some posts expose information which can pose physical risks too and can be used to track down the individuals themselves; such as license plate numbers and hotel locations.

Deviating from Zimbabwe, in the UK, the case of the burglary at the house of the millionaire footballer, John Terry in March this year is a typical example of how social postings can expose information which can be harmful. Terry’s mansion was targeted after the player posted pictures from the slopes of the French Alps with his wife, telling his 3.4 million Instagram followers that he was having a ‘great few days away skiing with the family’. A gang of four used the posted information to steal more than £400,000 worth of designer goods from the mansion of the former England captain whilst he was away!

It is difficult to permanently erase anything from the internet, and therefore it is critical to be aware of what is being circulated about an individual, their business or family. In this digital age these articles can become prominent features of an individual’s first page of internet search results; becoming a person’s virtual “business card”. Such content can have an especially enduring effect, appearing on the digital profiles of spouses, siblings and children due to a shared family name, creating an online reputation crisis.

Some websites build a list of the various devices one has used to visit them. While this can often be applicable as a means of helping to secure your account, it is important to understand the information being collected about your habits. Make no mistake about it – the web is listening every time you use it! It’s important that you understand what you’re leaving behind when you visit any website.

Social networking opens the door to the possibility of being cybervetted when applying for a job. Cybervetting or online vetting is the practice of using information found on the Internet to determine whether a person is a viable candidate for employment. It is just another tool in the box to gather information about the person’s behaviour to verify whether the applicant’s behaviour online is the same as in real life.

With one google search of your name prospective clients, employers, and co-workers can get a snapshot of your history. Most employers are using this snapshot to screen their applicants and eliminate candidates for consideration based on what they find. We should expect cybervetting to be used more and more by organisations, first to avoid surprises, and more as a digital background and fact checking tool. It is therefore critical now, more-so than ever, to be aware that what you say or do online is permanent. It can be a great opportunity for you to build your brand or conversely prove to be the easiest method of self-destruction.

There is also a flip side to this coin that suggests if you decide to go off the radar and remove your online trail you will cease to exist in a world where individuals are increasingly judged on their number of followers, online engagement or influence. Even employers already routinely check a candidate’s online profiles to see if they are a suitable fit for their organization and some are even hired as a result of their high Twitter following. The days of being digitally invisible are over, and anecdotally the lack of an online presence is starting to be viewed with suspicion in some circles. As the world increasingly turns online for information, digital silence can be obstructive in conducting effective due diligence or establishing a reputation.

Every day we contribute to a growing portrait of who we are online; a portrait that is probably more public than most of us assume. So no matter what you do online it is important that you know what kind of trail you are leaving, being aware of what the possible effects can be. Lessons should be drawn from the much-changed face of Zimbabwe and the speed of change, which saw a number of individuals scampering, trying to re-align themselves in vain, as the digital evidence was unforgiving.

Your digital footprint paints a picture of who you are. Before posting online, ask yourself whether the content portrays how you really want to be perceived. On the other hand creating a delusional online version of yourself is possibly the worst thing you can do; trying to be someone else is a waste of the person you are.

Social media and the internet are enablers that when used correctly can offer each and every one of us a wealth of opportunities with no side effects as long as we act responsibly. However, the internet is unforgiving, before texting, tweeting or sharing, consider how you would feel if the material went viral. Is your human need for approval for eliciting re-tweets and likes driving you to share questionable material? You should have zero expectation of privacy in cyberspace.

Thanks to screen capture; even a deleted post can still be retrieved and shared. Therefore, before you click ‘post’ on socio-economic and political topics think about your digital legacy! Unlike the Zimbabwean story, you cannot launch an “Operation Restore Legacy” in the digital world.