{"id":1723,"date":"2023-12-28T23:37:55","date_gmt":"2023-12-28T23:37:55","guid":{"rendered":"https:\/\/cisanewsletter.com\/?p=1723"},"modified":"2024-01-31T15:40:11","modified_gmt":"2024-01-31T15:40:11","slug":"the-security-challenges-in-a-developing-digital-economy","status":"publish","type":"post","link":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/","title":{"rendered":"The Security Challenges in a Developing Digital Economy"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>The concept of a digital economy is an interesting one, as proponents believe it would enhance transparency and accountability as well as improve business processes and connectivity.\u00a0\u00a0This notwithstanding, there are inherent security challenges which would need to be assessed and addressed to ensure effectiveness, resilience and impact for good.<\/p>\n\n\n\n<p>The digital economy has been defined by an Australian government website as: &#8220;The global network of economic and social activities that are enabled by information and communications technologies, such as the internet, mobile and sensor networks.&#8217; This includes conducting communications, financial transactions, education, entertainment and business using computers, phones and other devices&#8221;[1].<\/p>\n\n\n\n<p>The concept of the global economy continues to evolve given the new trends and developments in technological advancement. The concept has been understood to reflect the use of digital technology in production, marketing, trading, transportation, consumption and payment for goods and services.<\/p>\n\n\n\n<p>It is thus the economic activity enabled by connections, of people, devices, systems and processes that engender transactions.\u00a0\u00a0These activities are essentially challenging traditional systems and ways of doing things, including traditional forms of security, diplomacy, defence and intelligence.<\/p>\n\n\n\n<p><strong>Importance of digital economies<\/strong><\/p>\n\n\n\n<p>The trend towards the creation of digital economies has engendered the development of systems and provision of services in ways that expand access to such services by the citizenry.\u00a0\u00a0In developing economies, this is even more crucial to bridging gaps between the educated and uneducated and providing access to services which were difficult to access, thereby excluding some individuals from mainstream economic activities.<\/p>\n\n\n\n<p>The digital economy makes use of platforms for the provision of services and ensuring interconnectedness which is vital to its existence. For instance, in several developing economies such as Ghana, the introduction of mobile phones and mobile money services has brought on board many unbanked individuals onto mobile money platforms. This engendered inclusion in financial services provision for many people who had no bank accounts.\u00a0\u00a0On a global scale, there have been opportunities for inclusion and business development through digital platforms that were developed to provide services.\u00a0<\/p>\n\n\n\n<p>For instance, \u201cUber, the world\u2019s largest taxi company, owns no vehicles. Facebook, the world\u2019s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world\u2019s largest accommodation provider, owns no real estate\u2026\u201d[2]\u00a0<\/p>\n\n\n\n<p>In Ghana, the development of the digital economy has found expression in the creation of a Ministry for Communications and Digitalisation as well as the creation of e-services meant to support the people.\u00a0\u00a0These include the following;<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0e-Justice system; for the delivery of services relative to criminal justice administration,<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0mobile money interoperability systems: a system which has integrated various mobile money payments with huge patronage among the unbanked population,<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0e-Procurement system; for the delivery of public procurement services,<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0digital property addressing system, which has enabled unique addresses to be generated for each household and landed property in Ghana;<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0the paperless port system which has transformed customs and cargo handling and clearance at Ghana\u2019s ports, and<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0a national identity system which provides effective identifiable proof of citizenship and residency in Ghana.<\/p>\n\n\n\n<p>While all of the above have provided significant improvement in doing business, challenges remain that need to be overcome to ensure the safety and security of the various platforms that exist.\u00a0<\/p>\n\n\n\n<p><strong>The Security Challenges<\/strong><\/p>\n\n\n\n<p>The idea of developing systems and platforms which enable access to a national and global audience is in itself a challenge.\u00a0\u00a0Ensuring the security of data and information is a fundamental prerequisite to maintaining trust and system integrity.\u00a0\u00a0The security challenges for a digital economy include the following;<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0People\u00a0\u2013 people are central to the maintenance of systems and the smooth running of platforms that engender business integration and service provision.\u00a0\u00a0However, they are also one of its weakest links within the infrastructure for digital services.\u00a0\u00a0When they are compromised, it undermines system integrity and trust, thereby eroding the confidence and willingness of clients to do business using digital channels. Many examples of compromised systems exist to support this assertion.\u00a0\u00a0It has been asserted, for instance, that in some countries, the electronic scheduling for services such as passport provision is manipulated for the benefit of individuals working within that office.\u00a0<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Storage of Data\u00a0\u2013 Data storage remains one critical security challenge within and across digital systems and platforms.\u00a0\u00a0An overview of data centres in the world indicates a disproportionate number of such centres in Africa, with a huge collection in America and other advanced countries.\u00a0\u00a0In essence, the country that has control of the storage actually controls the data and in an era of artificial intelligence, data can easily be stolen and manipulated for evil.\u00a0<\/p>\n\n\n\n<p>Cybersecurity\u00a0&#8211;\u00a0The internet is a fundamental pillar of the digital economy and with increased connections is a key driver for economic activity and invariably, growth. However, this naturally opens it up for attacks. Cyber criminals consistently target activities online thereby making it more fragile with the need for secure systems.\u00a0<\/p>\n\n\n\n<p>Omar Abbosh and Kelly Bissell, Group CDO and Senior Managing Director, both at Accenture in their article Reinventing the Internet to Secure the Digital Economy, state that: &#8220;\u2026 The Internet is facing many challenges. Malicious cybercriminals threaten the security of the digital economy, which becomes more fragile with each attack. The Internet, which was once a tool for information sharing and communication, has grown increasingly complex, and new, digital innovations are outpacing the ability to keep it secure. Trust in our digital economy now hangs in the balance, putting significant value at risk&#8221;.\u00a0[3].\u00a0<\/p>\n\n\n\n<p>It is, therefore, a matter of prime importance that nation-states take urgent steps to ensure protection and maximize benefits that occur from the spillover effects of the digital economy.\u00a0<\/p>\n\n\n\n<p>\u00b7\u00a0State-sponsored\u00a0attacks or espionage\u00a0\u2013 cyber attacks from government actors seeking information and or undermining the integrity of systems and platforms are real threats today.\u00a0\u00a0There have been accusations by states that their enemies stole intelligence, and technology and disrupted supply chains in the past.\u00a0\u00a0More insidious is the attempt to turn the tide of events in elections using cyber-enabled attacks.\u00a0<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0\u00a0\u00a0Cyberwarfare<\/strong><\/p>\n\n\n\n<p>Cyber warfare is usually defined as a cyber attack\u00a0or series of attacks that target the critical infrastructure of a country. It has the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the state and even loss of life.[4]\u00a0\u00a0The issue with cyber warfare is that it can be perpetrated against a country from a location outside its borders at services and infrastructure. A typical example is the denial-of-service attack which was experienced by the Electricity Company of Ghana earlier in 2023, resulting in significant disruption in service and discomfort for customers.\u00a0\u00a0Other types include the following<\/p>\n\n\n\n<p>o\u00a0\u00a0\u00a0Espionage. This is the case where the secrets of a country, particularly economic and military secrets are stolen online.<br>o\u00a0\u00a0\u00a0Sabotage.\u00a0\u00a0This is a deliberate attempt to undermine the operational integrity of critical systems and infrastructure<br>o\u00a0\u00a0\u00a0Denial of Service Attacks \u2013 this targets interruption in the supply of key services such as the electricity case referred to earlier.<br>o\u00a0\u00a0\u00a0Propaganda attacks<br>o\u00a0\u00a0\u00a0Disruption of key economic activities\u00a0<\/p>\n\n\n\n<p><strong>Given the challenges we face in this area, it is important that the following is done:<\/strong><\/p>\n\n\n\n<p>1.\u00a0\u00a0\u00a0\u00a0Ghana needs legislation which enforces international protocols and agreements around the world.\u00a0\u00a0This area is problematic as nation-states need to agree on transboundary activities that constitute crimes, what constitutes digital evidence and the fines that need to be imposed for digital crimes.\u00a0\u00a0Ghana has set a good example and has signed both the Malabo Convention and Budapest Convention, both of which deal with cybersecurity, but it is imperative that we encapsulate them in a local law that gives vent to the issues raised therein.<\/p>\n\n\n\n<p>2.\u00a0\u00a0Ghana needs to enhance multilateral cooperation in cyberspace as a basis for building trust and diffusion of geopolitical tensions relative to cyber espionage and other related intelligence challenges.\u00a0<\/p>\n\n\n\n<p>3.\u00a0\u00a0\u00a0\u00a0Given the changes that are occurring due to the digital age, it is imperative that Ghana takes action to plan the workforce and develop them in sync with the requirements of a digital economy.\u00a0\u00a0A 2018 report from the World Economic Forum on the Future of Work outlines that public adoption of new technologies and existing labour laws will influence the rate at which digitalization will drive workforce transformation.\u00a0\u00a0Effective planning and training will engender the development of the right cyberculture and workforce for entrenching the benefits of digitalization.[5]\u00a0<\/p>\n\n\n\n<p>4.\u00a0\u00a0Ghana needs to resource its Cyber Security Authority to scale up its work to ensure the protection of its digital ecosystem.\u00a0<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Ghana\u2019s cybersecurity journey has been, so far, an interesting one.\u00a0\u00a0Ghana is no different from many other countries within the Africa region.\u00a0\u00a0However, the efforts made, especially in the telecoms sector encouraged investment in technologies that have supported the provision of improved services \u2013 for instance internet, mobile money transfers among others.\u00a0<\/p>\n\n\n\n<p>Africa in general and Ghana in particular need to work expeditiously and in concert to achieve the full benefits of digitalisation.\u00a0\u00a0More importantly, the safeguards that are expected need to be put in place to ensure effective protection.\u00a0\u00a0Unless this is done, major successful attacks would undermine the confidence and trust in the digitalisation process and erode the gains already made.\u00a0\u00a0<br>Examples, where serious harm has been caused worldwide, are quite well known, for instance, the attack on the Iranian nuclear programme where the Stuxnet virus affected their systems and caused serious delays in their programme.\u00a0<br>An overview of the challenges in Africa as indicated online showed the following[6];\u00a0<\/p>\n\n\n\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Although there is digital growth in Africa, measures for ensuring their security remain weak,<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Legislative measures for ensuring information security and a low level of awareness threaten gains.<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Africa&#8217;s low level of preparedness to counter cyberthreats costs the concerned countries on average 10% of their GDP.<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0The banking and telecom sectors have been the key targets for cybercriminals.<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Attacks that seek to compromise Business Emails are the primary cyber threats to organizations and individuals.<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0On underground forums, cybercriminals actively buy and sell access to the networks of major African organizations.<br>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Financial difficulties across Africa are pushing the younger generation to look for ways to earn money quickly; the increasingly low entry threshold for engaging in cybercrime makes this a tempting prospect.<\/p>\n\n\n\n<p>The above calls for urgent action and it needs to start now with the CSA, Intelligence Services, the Judiciary, Banking and key government sectors.\u00a0\u00a0Digitalisation is good but it has inherent security challenges that require developing economies to be security conscious and get the populace and organisations to be cyber hygienic.\u00a0<\/p>\n\n\n\n<p>Source: Samuel Aning, CISA Associate<\/p>\n\n\n\n<p><a href=\"https:\/\/www.alrc.gov.au\/publication\/copyright-and-the-digital-economy-dp-79\/3-policy-context-of-the-inquiry\/the-concept-of-the-digital-economy\/\">[1] www.alrc.gov.au<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ir.com\/guides\/the-importance-of-the-digital-economy\">[2] Ted Crunch accessed at<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.accenture.com\/us-en\/insights\/cybersecurity\/reinventing-the-internet-digital-economy\">[3] www.accenture.com<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/cyber-warfare\/\">[4] www.imperva.com<\/a><\/p>\n\n\n\n<p>[5] World Economic Forum \u2013 The Future of Jobs Report 2018<\/p>\n\n\n\n<p><a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/africa-cybersecurity-threatscape-2022-2023\/\">[6] www.ptsecurity.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction The concept of a digital economy is an interesting one, as proponents believe it would enhance transparency and accountability as well as improve business processes and connectivity.\u00a0\u00a0This notwithstanding, there are inherent security challenges which would need to be assessed and addressed to ensure effectiveness, resilience and impact for good. The digital economy has been [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_wp_convertkit_post_meta":{"form":"-1","landing_page":"0","tag":"0","restrict_content":"0"},"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"0","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_review":[],"enable_review":"0","type":"percentage","name":"","summary":"","brand":"","sku":"","good":[{"good_text":""}],"bad":[{"bad_text":""}],"score_override":"","override_value":"","rating":[{"rating_text":"","rating_number":"10"}],"price":[{"shop":"","price":"","link":"","icon":""}],"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"jnews_post_split":{"enable_post_split":"0","post_split":[{"template":"1","tag":"h2","numbering":"asc","mode":"normal","first":"0","enable_toc":"0","toc_type":"normal"}]},"footnotes":""},"categories":[183],"tags":[193],"class_list":["post-1723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysts","tag-1st-edition"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Security Challenges in a Developing Digital Economy - CISA NEWSLETTER<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Security Challenges in a Developing Digital Economy - CISA NEWSLETTER\" \/>\n<meta property=\"og:description\" content=\"Introduction The concept of a digital economy is an interesting one, as proponents believe it would enhance transparency and accountability as well as improve business processes and connectivity.\u00a0\u00a0This notwithstanding, there are inherent security challenges which would need to be assessed and addressed to ensure effectiveness, resilience and impact for good. The digital economy has been [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/\" \/>\n<meta property=\"og:site_name\" content=\"CISA NEWSLETTER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61558173539135\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-28T23:37:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-31T15:40:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-Challenges.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CISA EDITORIAL\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:site\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CISA EDITORIAL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/\"},\"author\":{\"name\":\"CISA EDITORIAL\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\"},\"headline\":\"The Security Challenges in a Developing Digital Economy\",\"datePublished\":\"2023-12-28T23:37:55+00:00\",\"dateModified\":\"2024-01-31T15:40:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/\"},\"wordCount\":1782,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Cybersecurity-Challenges.jpg\",\"keywords\":[\"1st Edition\"],\"articleSection\":[\"ANALYSTS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/\",\"name\":\"The Security Challenges in a Developing Digital Economy - CISA NEWSLETTER\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Cybersecurity-Challenges.jpg\",\"datePublished\":\"2023-12-28T23:37:55+00:00\",\"dateModified\":\"2024-01-31T15:40:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Cybersecurity-Challenges.jpg\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Cybersecurity-Challenges.jpg\",\"width\":800,\"height\":333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/the-security-challenges-in-a-developing-digital-economy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cisanewsletter.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Security Challenges in a Developing Digital Economy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"name\":\"CISA NEWSLETTER\",\"description\":\"Headlining West African News\",\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cisanewsletter.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\",\"name\":\"Centre for Intelligence & Security Analysis Ghana\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"width\":1055,\"height\":1063,\"caption\":\"Centre for Intelligence & Security Analysis Ghana\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61558173539135\",\"https:\\\/\\\/x.com\\\/CisaSocial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\",\"name\":\"CISA EDITORIAL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"caption\":\"CISA EDITORIAL\"},\"sameAs\":[\"http:\\\/\\\/cisanewsletter.com\"],\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/author\\\/cisa-editorial\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Security Challenges in a Developing Digital Economy - CISA NEWSLETTER","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/","og_locale":"en_US","og_type":"article","og_title":"The Security Challenges in a Developing Digital Economy - CISA NEWSLETTER","og_description":"Introduction The concept of a digital economy is an interesting one, as proponents believe it would enhance transparency and accountability as well as improve business processes and connectivity.\u00a0\u00a0This notwithstanding, there are inherent security challenges which would need to be assessed and addressed to ensure effectiveness, resilience and impact for good. The digital economy has been [&hellip;]","og_url":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/","og_site_name":"CISA NEWSLETTER","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61558173539135","article_published_time":"2023-12-28T23:37:55+00:00","article_modified_time":"2024-01-31T15:40:11+00:00","og_image":[{"width":800,"height":333,"url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-Challenges.jpg","type":"image\/jpeg"}],"author":"CISA EDITORIAL","twitter_card":"summary_large_image","twitter_creator":"@CisaSocial","twitter_site":"@CisaSocial","twitter_misc":{"Written by":"CISA EDITORIAL","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#article","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/"},"author":{"name":"CISA EDITORIAL","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01"},"headline":"The Security Challenges in a Developing Digital Economy","datePublished":"2023-12-28T23:37:55+00:00","dateModified":"2024-01-31T15:40:11+00:00","mainEntityOfPage":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/"},"wordCount":1782,"commentCount":0,"publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"image":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-Challenges.jpg","keywords":["1st Edition"],"articleSection":["ANALYSTS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/","url":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/","name":"The Security Challenges in a Developing Digital Economy - CISA NEWSLETTER","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#primaryimage"},"image":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-Challenges.jpg","datePublished":"2023-12-28T23:37:55+00:00","dateModified":"2024-01-31T15:40:11+00:00","breadcrumb":{"@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#primaryimage","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-Challenges.jpg","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-Challenges.jpg","width":800,"height":333},{"@type":"BreadcrumbList","@id":"https:\/\/cisanewsletter.com\/index.php\/the-security-challenges-in-a-developing-digital-economy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cisanewsletter.com\/"},{"@type":"ListItem","position":2,"name":"The Security Challenges in a Developing Digital Economy"}]},{"@type":"WebSite","@id":"https:\/\/cisanewsletter.com\/#website","url":"https:\/\/cisanewsletter.com\/","name":"CISA NEWSLETTER","description":"Headlining West African News","publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cisanewsletter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cisanewsletter.com\/#organization","name":"Centre for Intelligence & Security Analysis Ghana","url":"https:\/\/cisanewsletter.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","width":1055,"height":1063,"caption":"Centre for Intelligence & Security Analysis Ghana"},"image":{"@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61558173539135","https:\/\/x.com\/CisaSocial"]},{"@type":"Person","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01","name":"CISA EDITORIAL","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","caption":"CISA EDITORIAL"},"sameAs":["http:\/\/cisanewsletter.com"],"url":"https:\/\/cisanewsletter.com\/index.php\/author\/cisa-editorial\/"}]}},"_links":{"self":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts\/1723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/comments?post=1723"}],"version-history":[{"count":1,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts\/1723\/revisions"}],"predecessor-version":[{"id":1726,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/posts\/1723\/revisions\/1726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/media\/1724"}],"wp:attachment":[{"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/media?parent=1723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/categories?post=1723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisanewsletter.com\/index.php\/wp-json\/wp\/v2\/tags?post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}