41 research outputs found

    The impact of mobile phone uses in the developing world: giving voice to the rural poor in the Congo

    Get PDF
    In recent years, the rise of information and communication technologies (ICTs) contrasted with the dire living conditions of the world’s poorest has been the subject of debate among industry and academia. However, despite the amount of writings produced on mobile phones, Western bias is surprisingly unbridledly prevailing alongside the fêted dissemination of mobile phones. Expansive literature tends to present the rapid adoption of mobile phones among rural individuals, with little to no indication of how local values and voices are respected or promoted. We undertook semi-structured interviews with 16 rural chiefs to inquire into ways in which mobile phones enabled socio-economic development in the rural Congo. Rather than using quantitative, large-scale, or top-down data, we sought to give voice to chiefs themselves about the role of mobile phones. We found that Western bias dominates the literature and deployment of mobile phones more than usually acknowledged. We suggested some paths forward, while bringing the African communal Utu or Ubuntu culture to the center stage

    Knee Extensor Mechanism Disruptions: A Review

    No full text

    Enterprise Social Media

    No full text

    Secure e-Government Services

    No full text
    E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards - the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs - implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.</p
    corecore