Kinfe Micheal Yilma's research while affiliated with Addis Ababa University and other places

Publications (12)

Article
Ethiopia has been considering a Digital Identification legislation in the past few years. This comment offers a critical analysis of the legislative proposal with a focus on three aspects of the Bill. First, it analyzes the extent to which the Draft Digital Identification Proclamation attends to data privacy concerns associated with digital identif...
Article
Network disruption has become commonplace in Ethiopia in the past few years. Be it for preventing exam leaks, the spread of disinformation, or to fight off cyber-attacks, the government has repeatedly disrupted communication networks. However, the legal basis with which the government often shuts down the Internet or disrupts other means of digital...
Article
Full-text available
Ethiopia has embarked upon an ambitious project of revising a number of laws with a view to entrench human rights and democratic governance. Part of this legal reform program has been the revision of Computer Crime Proclamation No 958/2016. This article examines key aspects of the Draft Computer Crime Proclamation prepared by the Media Law Working...
Article
Disinformation has become a formidable challenge to the integrity of electoral processes as well as the internal political stability of many countries. This state of affairs has spurred a wave of new regulatory measures in several countries. From stringent rules governing dissemination of political advertisements via social media platforms to media...
Article
This article examines the extent to which the so called the ‘Internet Bill of Rights’ (IBRs) movement might offer useful lessons in building bills of rights for the 21st century. Informed by a selection of initiatives for IBRs and theories of rights, it considers possible lessons that may assist in building a bill of rights that possesses substanti...
Article
While the United Nations (UN) pioneered in recognizing the impact of modern technological developments on (data) privacy as far back as 1968, little has so far been achieved in terms of introducing a truly global data privacy framework. The present UN data privacy framework is by and large a mere patchwork of rules that exhibit a number of weakness...
Article
The Snowden revelations of mass digital surveillance practices of the USA and its allies have shaken grounds on many fronts. One profound impact of the leaks is felt in the human rights spectrum, particularly concerning the right to digital privacy. Digital privacy has since gained a whole new salience in the international arena. The revelations ha...
Article
Ethiopia has been enacting various pieces of legislation, since recently, to regulate some aspects of the digital environment. The Cybercrime Proclamation of 2016 (Computer Crime Proclamation No.958/2016) is the most recent addition to the legal regime that criminalizes a range of cybercrimes. It has also introduced a number of novel evidentiary an...
Article
Ethiopia has been enacting various pieces of legislation to regulate some aspects of the digital environment. The cybercrime proclamation of 2016 is the most recent addition to the statute book that criminalizes a range of cybercrimes. It has also introduced a number of novel evidentiary and procedural rules that will assist in the investigation an...
Article
textbox> Key points Ethiopia has recognized the right to privacy throughout its brief constitutional history, albeit to different degrees. All Ethiopian Constitutions, including the first written Constitution of 1931, have had provisions dedicated to the right to privacy. Comprehensive privacy safeguards were, however, introduced by the Constituti...
Article
With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and d...

Citations

... While there is still no universally agreed definition for this concept, it is frequently used to connect different initiatives that seek to articulate a set of political rights, governance norms, and limitations on the exercise of power on the Internet (Gill et al., 2015). One of the core themes discussed within the framework of digital constitutionalism is the use of encryption technologies (Yilma, 2017), often centered around the tension between the needs of law enforcement and national security agencies, on one hand, and the rights to privacy, personal data protection, and confidentiality of communications on the other. ...
... Notable among these perspectives is that research in the subject is either studied as purely technical or social (e.g. Ho, Lin, & Huang, 2012;Yilma, 2014Yilma, , 2017. This development seems to tilt cybercrime studies towards one direction. ...
... Issues of cybercrime have enjoyed a fair share of research conceivably because it is equally climbing into the categories of an ordinary day crime. Some of the scholarly works in this field include literature that underscores the need for laws, policies and regulatory frameworks to counter the cybercrime menace (Eboibi, 2017;Gerry & Moore, 2015;Hunton, 2011;Ju, Cho, Lee, & Ahn, 2016;Sun, Shih, & Hwang, 2015;Yilma, 2014), literature that highlight financial crimes and strategies to combatting these crimes. Such crimes may include, ICT aided banking crimes, digital currency crimes and credit card fraud (Bai & Koong, 2017;Bay, Cook, Grubisic, & Nikitkov, 2014;Bolimos & Choo, 2017;Hunton, 2012;Vahdati & Yasini, 2015). ...
... A sound data protection legislation is important for the protection of fundamental human rights and the right to privacy (Vanberg, 2021). The enactment is also important to set an autonomous body for monitoring the entire data protection regime while assessing their impacts, and carrying out other initiatives required for implementing the legal rules (Yilma, 2015). ...